Data manipulation courses can help you learn data cleaning, transformation techniques, and exploratory data analysis. You can build skills in using functions for data aggregation, filtering datasets, and visualizing information effectively. Many courses introduce tools like Python, R, and SQL, that support handling large datasets and performing complex analyses. You'll also explore libraries such as Pandas and NumPy, which streamline data manipulation tasks and enhance your ability to derive insights from raw data.

Skills you'll gain: Oracle Databases, Performance Tuning, SQL, Query Languages, Database Design, Stored Procedure, Database Management, Data Storage
Intermediate · Course · 1 - 4 Weeks

University of Minnesota
Skills you'll gain: Test Automation, Regression Testing, Software Testing, Software Development Tools, Unit Testing, White-Box Testing, Code Coverage, Security Testing, Verification And Validation, Test Case, Test Data, Debugging, Automation, Application Security
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Data-Driven Decision-Making, Strategic Decision-Making, AI Enablement, Data Ethics, Marketing Analytics, Trend Analysis, Case Studies, Artificial Intelligence, Strategic Planning, Marketing Strategies, Business Ethics
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Google Cloud Platform, Google App Engine, Containerization, Identity and Access Management, Kubernetes, Virtual Machines, Microservices, Application Deployment, Cloud Computing, Cloud Computing Architecture, Infrastructure As A Service (IaaS), Generative AI, Cloud-Native Computing, Infrastructure Architecture, Data Storage, Cloud Services, Site Reliability Engineering, Infrastructure as Code (IaC)
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

Sapienza University of Rome
Skills you'll gain: Ancient History, Data Collection, Scientific Methods, Research Methodologies, Research, Investigation, Land Management, World History, Cultural Responsiveness, Timelines
Beginner · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Generative AI Agents, CrewAI, AI Orchestration, Generative AI, Agentic systems, Prompt Patterns, Tool Calling, LLM Application, Model Deployment, Responsible AI, Scalability, Application Deployment, Collaboration, Data Integration, Job Evaluation, Logical Reasoning
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Security Management, Network Security, Cyber Security Policies, Internet Of Things, Data Security, Wireless Networks, Emerging Technologies, Business Logic
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Anomaly Detection, AI Security, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Computer Vision, Image Analysis, Autoencoders, Convolutional Neural Networks, Vision Transformer (ViT), Generative Adversarial Networks (GANs), Computer Graphics, Recurrent Neural Networks (RNNs), Multimodal Prompts, Computer Science, Visualization (Computer Graphics), Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Model Deployment, Data Ethics, Embeddings, Deep Learning, Applied Machine Learning, Data Processing, Linear Algebra
Build toward a degree
Intermediate · Specialization · 1 - 3 Months