Mastering Project Management: From Basics to ExecutionJohn Sumanth VemuriBusiness | intermediate | 15 hrsLearn project management from basics to execution, covering planning, organizing, and leading projects for successful outcomes.COURSE DETAILS
Financial Analyst AcademyManish GuptaFinance | intermediate | 15 hrsThe Financial Analyst Academy is a four-course program that covers financial analysis, modeling, and data storytelling. It includes financial statements, valuation techniques, f...COURSE DETAILS
Automating Cybersecurity Operations with AIRafiq WayaniCybersecurity | core | 9 hrsLearn to automate cybersecurity tasks with AI using no-code tools like ChatGPT, Google Colab, and Splunk Free. Streamline threat detection, incident response, and SOC workflows ...COURSE DETAILS
Accounting and Financial Modelling BootcampMichael McDonaldFinance | core | 15 hrsThe Accounting & Financial Modeling Bootcamp is an online program for beginners, covering financial statements, Excel modeling, ratio analysis, and DCF valuation. Perfect for as...COURSE DETAILS
Threat Hunting Techniques Archan ChoudhuryCybersecurity | intermediate | 9 hrsLearn to hunt cyber threats using machine learning and real-world tools like Splunk and Jupyter Notebooks. This course covers log analysis, anomaly detection, and behavior-based...COURSE DETAILS
Digital Forensics EssentialsGilbert GeorgeCybersecurity | intermediate | 9 hrsLearn the fundamentals of digital forensics, how to collect, analyse, & report digital evidence using tools like FTK Imager and Autopsy. Gain hands-on skills in data recovery, c...COURSE DETAILS
Instructional Design FoundationsPaul SiegelUI/UX | core | 9 hrsThis course teaches foundational instructional design skills using the ADDIE model, covering needs analysis, design, content development, and evaluation, preparing learners for ...COURSE DETAILS
Securing Cloud OperationsLuca BertonCybersecurity | intermediate | 9 hrsLearn hands-on cloud security for AWS, Azure, and GCP. Configure IAM, firewalls, and encryption; enable GuardDuty and Defender; and map controls to CIS, ISO, and NIST frameworks...COURSE DETAILS
Incident Response FrameworksBrett MoffettCybersecurity | intermediate | 9 hrsLearn to plan, implement, and manage cybersecurity incident response using NIST, SANS, and ISO frameworks. Build a customized, testable response plan to detect, contain, and rec...COURSE DETAILS
Basics of Cyber Threat IntelligenceTom ThemelesCybersecurity | intermediate | 9 hrsLearn the fundamentals of Cyber Threat Intelligence (CTI), including its lifecycle, key tools, and practical applications for proactive defense against evolving cyber threats. I...COURSE DETAILS
Cyber Espionage and CounterintelligenceHanniel JafaruCybersecurity | intermediate | 9 hrsLearn how cyber espionage operations work and how to counter them. Analyze APT tactics, detect data exfiltration, design counter-intelligence strategies, and deploy deception to...COURSE DETAILS
Application Security Testing and DebuggingSonali Sen BaidyaCybersecurity | intermediate | 9 hrsApplication Security Testing and Debugging involves finding software vulnerabilities through testing and fixing issues to ensure secure, functional code, protecting against pote...COURSE DETAILS