Explore thousands of online courses from MIT, Harvard, Princeton and more — free and paid, self-paced or instructor-led.
22,703 courses available
22,703 results — page 458 of 946
Codio
Learn to code and run Python scripts with Matplotlib quickly and easily without installations, focusing on creating and customizing data visualizations.

University of Colorado Boulder
This course gives an overview of social and emotional learning history and programs in schools, highlighting their role in promoting student well-being.

Starweaver
Learn practical steps to secure cloud projects on AWS, Azure, and Google Cloud using free-tier services and checklists, suitable for beginners and IT professionals.

Universidad de los Andes
Organizations increasingly depend on IT and communication technologies, exposing them to risks. This course covers fundamentals of network and cloud cybersecurity architecture.

Coursera
Beginner course on using the RFM model to segment customers, measure campaign profitability, and optimize marketing resource allocation.

Coursera
Learn to segment and validate live marketing data streams to improve audience targeting and base decisions on accurate, real-time insights.

Coursera
Intermediate course for marketing professionals focusing on advanced customer segmentation and retention strategies to enhance loyalty and engagement.

Microsoft
This course is designed for early undergraduates interested in engineering or science, focusing on designing APIs, middleware, and deploying scalable, secure applications.

Universiteit Leiden
Understand complex modern security and safety challenges worldwide shaped by globalization, and the roles of multiple actors in governance.

28DIGITAL
Focuses on privacy-preserving methods and data protection regulations for big data, exploring tools and techniques to minimize risks and safeguard data confidentiality.

28DIGITAL
Covers cryptographic principles and access control management in big data systems, equipping learners with tools to understand and handle security challenges.

Cisco Learning and Certifications
Acquire fundamental skills for cybersecurity analysts in SOCs, understanding team roles, attacker motives, SOC goals, and operational challenges.

Royal Holloway, University of London
Explore practical cybersecurity management and governance, incident response, and the critical role of people in enhancing security outcomes.

ISC2
Learn daily security controls and risk mitigation techniques to protect data, systems, and promote secure practices among organizational users.

Microsoft
Develop database administration skills focusing on security, maintenance, and integrating SQL Server with Power BI for actionable business insights.

LearnQuest
Discover fundamental Mac security concepts, threat assessment, and proactive management, including automation for enhanced device protection.

Board Infinity
Explore fundamentals and best practices for AI security, covering secure coding, vulnerability assessment, and management of AI APIs and endpoints.

University of Colorado Boulder
Explore offensive security techniques including exploitation and post-exploitation of Unix and Windows systems using programming and scripting for advanced attacks.

Coursera
Learn to identify and mitigate vulnerabilities in large language models through red-teaming and content-safety filters, ensuring robust AI system protection.

University of Colorado System
Learn TOR network basics, user privacy protection, censorship resistance, setup of hidden services, and operational security best practices.

ISC2
Introduction to security concepts and practices focusing on ethics, fundamental principles, security controls, change management, and security awareness.

Amazon Web Services
Understand governance, compliance requirements, and security methods for AI systems using Amazon Web Services to apply effective controls.

Google Cloud
Learn fundamental features of Google Cloud’s Security Command Center including asset management, threat detection, and compliance reporting.

Google Cloud
Comprehensive study of security controls and techniques in Google Cloud, covering access management, encryption, and securing applications and Kubernetes clusters.