Relevance to EB2-NIW (Dhanasar Prong 2): These credentials demonstrate specialized knowledge across the exact domains claimed in the proposed endeavor: AI governance (38 credentials), cybersecurity and critical infrastructure protection (42 credentials), and national security technology (15 credentials). The breadth of institutional sources (25+ universities and professional bodies including Stanford, Yale, Harvard, Oxford, Johns Hopkins, and Wharton) indicates sustained, multi-year investment in domain expertise rather than narrow specialization. The combination of technical depth (cybersecurity, ML, cryptography) with policy breadth (compliance, governance, national security) is directly aligned with the applicant's cross-disciplinary research in autonomous systems safety.
- IEEE MembershipMember #102193505
- Advanced Learning AlgorithmsDFLWSEME4Q03
- Supervised Machine Learning: Regression and ClassificationOK0TWED8CUB8
- The Global Financial Crisis8XIVBF7PLK44
- America's Unwritten/Written Constitution9ZMAWM0XUS7Y
- American Contract Law I & IIQK7VDZL8CCI6
- Financial Markets53KECAN4Q311
- Introduction to PsychologyDZF37OY3K2BM
- Creating Change through Social EntrepreneurshipPL7O0ASDCRJ8
- Narrative Economics2Y894OFHFAAQ
- A Law Student's Toolkit20K2181U9HG4
- Lead with Technology and AIKM0YVIC7I7Z0
- Think Like a LeaderCR3NG6TOHMQO
- Act StrategicallyVDX8BD8FEI0M
- Master Financial Fundamentals3S5CMHSYYBA9
- Strengthen Your Business SavvyJ1785KKF1GVW
- Generative and Agentic AIRWLBVUTTTDD5
- Open Data and Intelligent FinanceL319PGOK228M
- AI in Financial Services: Foundations through Future TrendsL319PGOK228M
- Designing the Future of Finance69HMBUJ4MQ8X
- AI Fundamentals in Financial ServicesH2B6PNUNG3F7
- AI for CybersecurityR7J4P42K3C2Y
- Securing AI and Advanced TopicsGRHURBK57V35
- Machine Learning and Emerging Technologies in Cybersecurity6ELBRYJ48AOW
- Advanced Malware and Network Anomaly DetectionJPIDUNVBSL8N
- Advanced Network Analysis and Incident ResponseWF1NWH70CB08
- Intrusion Detection2KP6S3ZEPCWK
- Introduction to Intrusion Detection Systems (IDS)0UGQ1RXHRW5M
- Introduction to AI for CybersecurityO07X11PIIYS1
- AI Strategy and GovernanceQ6NO0ENYVV99
- AI For BusinessEMMVX6XKLJRT
- AI Applications in People ManagementNUPWZXIP9W02
- AI Applications in Marketing and FinanceQ2CAUIYD8WO8
- Regulatory ComplianceP0SFM1MDVR5J
- Privacy Law and Data Protection46NRPZRJ8IQE
- Effective Compliance ProgramsVSPOA3GYQLCV
- What is Corruption: Anti-Corruption and ComplianceHWUS4FBTDZB6
- What is Compliance?4TTE7ILRV0LT
- Generative AI: Governance, Policy, and Emerging RegulationTVQ9T2ZO8T5C
- Responsible Generative AIYPUSYKZ7NDWD
- Generative AI: Fundamentals, Applications, and ChallengesV3OMX0V1LPDU
- Generative AI: Impact on Business and SocietyLMH3YED0XWSS
- Generative AI: Labor and the Future of WorkYLD2FMSVS1LV
- AI Product Management419CISQLDXD9
- Human Factors in AI9A9WIN1QKWQ4
- Explainable AI (XAI)6A0AHBOH2GHC
- Explainable Machine Learning (XAI)A8WG8B80O6O9
- Interpretable Machine Learning75GGDCKP7SOM
- Developing Explainable AI (XAI)P6RH81E0RJNB
- Managing Machine Learning ProjectsASOG2X9X29TX
- Introduction to Generative AIODBX66BVODVA
- Impact Measurement & Management for the SDGsT7QVGSJT9LGA
- Understanding 9/11: Why 9/11 HappenedWF4AAQ7536SO
- DeFi: The Future of FinanceP6THIGDK2EKW
- DeFi Opportunities and Risks7UEKPMKXYRE1
- DeFi Deep DiveB799LU1GVF4X
- DeFi PrimitivesKKOMVHMFMAH6
- DeFi InfrastructureD2JUDEMSRWZ8
- Blockchain Business ModelsYCA04CISUBZP
- Gold and BitcoinDQUDC7M5MW9J
- Gold Market FoundationsRPUOIP2GWF0L
- ESG Essentials for Sustainable Business9UUEL4L33OO4
- ESG Mindsets for Business TransformationCRLD711GFLHE
- ESG Challenges and SolutionsVKORBKCC20Y9
- ESG Value Creation for Business ImpactH5A41NQN2IU7
- ESG Communication for Inclusive DialogueC2A17L50IT1G
- How to Prioritize ESG InitiativesXJTP6J053MSW
- Financial ManagementUNXLYMO6X84G
- Financing for Startup BusinessesW7J933OUMEAT
- Startup Valuation MethodsKTY1RVN9UIB1
- Generative AI Cybersecurity & Privacy for LeadersUQMUIRDZARWF
- Generative AI Cybersecurity & Privacy: A PrimerI1GPVWJEKNFY
- ChatGPT + Cybersecurity: AI-Powered Tabletops & TrainingSBW6C5TO09X3
- OpenAI GPTs: Creating Custom AI AssistantsR3YQOWHDB8MV
- Prompt Engineering for ChatGPT3GA8066X6LOG
- Advanced System Security Design0KKS3ACIEW44
- Advanced System Security TopicsRJICL5TCU031
- Security and Privacy in TOR NetworkODZPE816LAOQ
- Cloud Computing SecuritySBR0MHDYY231
- DDoS Attacks and Defenses9N8SAOPU6TJ8
- Cyber Security SpecializationLH83A3OQIN3S
- Enterprise and Infrastructure SecurityASBTB1TNCQRX
- Real-Time Cyber Threat Detection and MitigationXU4H23YLPITY
- Cyber Attack Countermeasures4RYF2MIN3AH9
- Introduction to Cyber Attacks6WYA0KRISVDE
- Homeland Security & Cybersecurity ConnectionI579WS8J4PCO
- Artificial Intelligence in GovernmentG5BS4O287NC0
- AI-Augmented Procurement in Government6L1OMRU6P671
- Innovation in Government: Navigating the Age of AI0MC4VJHEY478
- AI in Government ProcurementO6SQ1M75G61O
- Cybersecurity Risk Management Across Critical SystemsUVGJGJJ1RQP4
- Ethical Leadership78170
- CISSP Domain 1: Security and Risk ManagementXABGQT2PXE4T
- Cybersecurity Risk Management FrameworkO2FDZ8YYLL7O
- NIST DoD RMFEAJNFU9PECXZ
- NIST 800-171P8YBUWUREFMS
- NIST CSFCGJFDEC3YWYD
- AI in National Security (SCSP)Coursera
- CompTIA Security+ CertificationS2GVU3B7JMYA
- Cybersecurity Operations and ControlsZVUUB3NS0WZM
- Cybersecurity Threats and Defense8IYABHOMDYVN
- Cybersecurity Governance and Compliance1B0PIMBKWI6J
- Google Business IntelligenceGY8S8WV0A22A
- Decisions, Decisions: Dashboards and ReportsHVIQOCUVIOI5
- The Path to Insights: Data Models and PipelinesLVEOKQRXLIB4
- Google AI EssentialsH4TKMBG01711
- Stay Ahead of the AI Curve195SN0ETNGZ3
- Use AI ResponsiblyWZEU73RC5M6M
- Discover the Art of PromptingB3E789EN3LSK
- Maximize Productivity With AI ToolsNBYBBLYWKGDS
- Introduction to AIISSSY6ZV7ID6
- Responsible AI: Applying AI Principles (Google Cloud)BGPRE77U8YPQ
- Introduction to Responsible AI (Google Cloud)SN4MEO2ZKJVX
- Introduction to Large Language Models (Google Cloud)CEN7Z5PWO6IV
- Cloud Computing LawUMQ6VY28F8I0
- Cloud Computing Law: Law Enforcement, Competition, & TaxI4ZXZPY593ZA
- Cloud Computing Law: Data Protection and CybersecurityZYWH5C2JR2NO
- Cloud Computing Law: TransactionsSF4Q9M6HLT55
- Applied CryptographyNJ8VS94JR4ND
- Global Diplomacy: the United Nations in the WorldLZZMJDPRGB0M
- Global Diplomacy: Diplomacy in the Modern WorldTJZ3NE2ZD1CO
- Introduction to Cybersecurity & Risk ManagementJ6V26X1ERP53
- Personnel & Third-Party SecurityIPJURTWX55JW
- Security Governance & ComplianceBNUNYRF7YWUB
- Risk ManagementQ3ORK8TKHWKB
- Operational Risk Management: Frameworks & StrategiesKUBJ7R66DNAI
- Market Risk Management: Frameworks & StrategiesGWE3IXWF495S
- Credit Risk Management: Frameworks and Strategies3LK6G82ZA3QQ
- Introduction to Risk Management7JK9PCGE09QU
- Columbia University: Intro to Financial Engineering and Risk ManagementDNSHF9BQDN6X
- Erasmus University Rotterdam: International Security ManagementC7Z7GF30XYQP
- University of Virginia: The Economics of AI5T5025V6ECSB
- UC Santa Cruz: Russian History, from Lenin to PutinTASV5C9PUF3U
- University of Illinois: Digital Marketing StrategyAKK8CHDL8IJ0
- University of Illinois: Digital Marketing Implementation9UC9XKFL9YUM
- Basel Institute: Open-Source IntelligenceOSINT
- Basel Institute: Combating Terrorism FinancingCTF
- Open-Source IntelligenceOSINT
- Combating Terrorism FinancingCTF
- Collective Action Against CorruptionCAAC
- Operational Analysis of Suspicious Transaction ReportsSTR
- Source and Application of Funds AnalysisSAFA
- International Cooperation and Mutual Legal AssistanceMLA
- Data Cleaning and HarvestingDCH
- Visualise Cases and Flows of MoneyVCF