Neural networks courses can help you learn the basics of architecture design, backpropagation, activation functions, and optimization techniques. You can build skills in training models, tuning hyperparameters, and evaluating performance metrics. Many courses introduce tools like TensorFlow and PyTorch, that support implementing neural networks in practical applications such as image recognition, natural language processing, and predictive analytics.

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Security Testing, Authorization (Computing), Authentications, Data Validation, Encryption, Security Controls, Data Security, Vulnerability Scanning, Role-Based Access Control (RBAC), Verification And Validation, Intrusion Detection and Prevention, Database Application, Security Awareness, Cybersecurity, Web Servers, Web Development Tools
Beginner · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Microsoft Azure, Docker (Software), YAML, Containerization, Application Deployment, Cloud Deployment, Security Controls, Virtual Networking, General Networking, Command-Line Interface
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MySQL, Data Migration, Google Cloud Platform, Operational Databases, Database Administration, Virtual Private Networks (VPN), Database Management
Advanced · Project · Less Than 2 Hours

Skills you'll gain: Growth Mindedness, Empowerment, Personal Development, Emotional Intelligence, Resilience, Self-Awareness, Courage, Accountability, Lifelong Learning, Willingness To Learn, Assertiveness, Open Mindset, Goal Setting
Beginner · Course · 1 - 4 Weeks

IBM
Skills you'll gain: Data Storytelling, Data Mining, Data Science, Data-Driven Decision-Making, Digital Transformation, Big Data, Data Analysis, Business Analytics, Regression Analysis, Analytics, Apache Hadoop, Health Informatics, Deep Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Network Analysis, Social Network Analysis, Marketing Analytics, Unstructured Data, Semantic Web, Statistical Methods, Text Mining, Data Structures, JSON, Natural Language Processing, Data Visualization Software, Python Programming
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, Network Monitoring, Virtualization
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Intermediate · Course · 1 - 4 Weeks