CINXE.COM
Best Online Metasploit Courses and Programs | edX
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/bed218a56490fce6.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/403d28282e775383.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/05177b9cba5d3efe.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/b4ab6e6f5f0f9ce2.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/f8b0d7642df77b70.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-26d6f45027cd47cc.js"/><script src="/_next/static/chunks/fd9d1056-948c3dc981481b0a.js" async=""></script><script src="/_next/static/chunks/2117-4878efafa67aefd1.js" async=""></script><script src="/_next/static/chunks/main-app-d020afa6a5def42e.js" async=""></script><script src="/_next/static/chunks/0e5ce63c-e4012ad3e28fdbed.js" async=""></script><script src="/_next/static/chunks/c233e9bd-865e5bc301f09aaf.js" async=""></script><script src="/_next/static/chunks/6290-14a62ddd57f81ba6.js" async=""></script><script src="/_next/static/chunks/9177-4f779ab065ca3298.js" async=""></script><script src="/_next/static/chunks/5878-e3c69aff2e273e23.js" async=""></script><script src="/_next/static/chunks/3069-556a3605b335d482.js" async=""></script><script src="/_next/static/chunks/4858-aef93864f4abb320.js" async=""></script><script src="/_next/static/chunks/8003-2972b8eea56e87df.js" async=""></script><script src="/_next/static/chunks/6686-f007b1e2101fda62.js" async=""></script><script src="/_next/static/chunks/9366-e6a7fb83e1c23555.js" async=""></script><script src="/_next/static/chunks/3397-dd13dd89c81e42c8.js" async=""></script><script src="/_next/static/chunks/554-025495b6bf8e1dac.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/not-found-3aafa877300c524c.js" async=""></script><script src="/_next/static/chunks/a4634e51-1ae34582fa2bb120.js" async=""></script><script src="/_next/static/chunks/8890-cd2934b2aa3b89dc.js" async=""></script><script src="/_next/static/chunks/3402-f8625ce91eb27ea6.js" async=""></script><script src="/_next/static/chunks/8082-143f9f9fdf5b9192.js" async=""></script><script src="/_next/static/chunks/4980-d730333976453575.js" async=""></script><script src="/_next/static/chunks/32-bafec80821f44ed5.js" async=""></script><script src="/_next/static/chunks/2628-8d231bd404df8976.js" async=""></script><script src="/_next/static/chunks/121-00c8365f8c57a8cc.js" async=""></script><script src="/_next/static/chunks/3564-dbea25076659e35b.js" async=""></script><script src="/_next/static/chunks/5099-9a5433902d87437e.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/layout-bdcb92f3a05369b1.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/error-3b41dcbdabbc3d14.js" async=""></script><link rel="preload" href="https://beam.edx.org/consent/fa169e97-be64-4cc1-bad3-9534590f9a30/OtAutoBlock.js" as="script"/><link rel="preload" href="https://beam.edx.org/scripttemplates/otSDKStub.js" as="script"/><link rel="preconnect" href="https://cdn.segment.com"/><link rel="preconnect" href="https://prospect-form-plugin.2u.com"/><title>Best Online Metasploit Courses and Programs | edX</title><meta name="description" content="Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career."/><link rel="canonical" href="https://www.edx.org/learn/metasploit"/><meta property="og:title" content="Best Online Metasploit Courses and Programs | edX"/><meta property="og:description" content="Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career."/><meta property="og:url" content="https://www.edx.org/learn/metasploit"/><meta property="og:site_name" content="edX"/><meta property="og:locale" content="EN_US"/><meta name="twitter:card" content="summary"/><meta name="twitter:creator" content="@edXOnline"/><meta name="twitter:title" content="Best Online Metasploit Courses and Programs"/><meta name="twitter:description" content="Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career."/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="16x16"/><meta name="next-size-adjust"/><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"!(function () {\n var i = \"analytics\",\n analytics = (window[i] = window[i] || []);\n if (!analytics.initialize)\n if (analytics.invoked)\n window.console &&\n console.error &&\n console.error(\"Segment snippet included twice.\");\n else {\n analytics.invoked = !0;\n analytics.methods = [\n \"trackSubmit\",\n \"trackClick\",\n \"trackLink\",\n \"trackForm\",\n \"pageview\",\n \"identify\",\n \"reset\",\n \"group\",\n \"track\",\n \"ready\",\n \"alias\",\n \"debug\",\n \"page\",\n \"screen\",\n \"once\",\n \"off\",\n \"on\",\n \"addSourceMiddleware\",\n \"addIntegrationMiddleware\",\n \"setAnonymousId\",\n \"addDestinationMiddleware\",\n \"register\",\n ];\n analytics.factory = function (e) {\n return function () {\n if (window[i].initialized)\n return window[i][e].apply(window[i], arguments);\n var n = Array.prototype.slice.call(arguments);\n if (\n [\"track\", \"screen\", \"alias\", \"group\", \"page\", \"identify\"].indexOf(\n e\n ) > -1\n ) {\n var c = document.querySelector(\"link[rel='canonical']\");\n n.push({\n __t: \"bpc\",\n c: (c && c.getAttribute(\"href\")) || void 0,\n p: location.pathname,\n u: location.href,\n s: location.search,\n t: document.title,\n r: document.referrer,\n });\n }\n n.unshift(e);\n analytics.push(n);\n return analytics;\n };\n };\n for (var n = 0; n < analytics.methods.length; n++) {\n var key = analytics.methods[n];\n analytics[key] = analytics.factory(key);\n }\n analytics.load = function (key, n) {\n var t = document.createElement(\"script\");\n t.type = \"text/plain\";\n t.async = !0;\n t.id = \"segment-analytics\";\n t.setAttribute(\"data-global-segment-analytics-key\", i);\n t.setAttribute(\"class\", \"optanon-category-C0002-C0004\")\n t.src =\n \"https://cdn.segment.com/analytics.js/v1/\" +\n key +\n \"/analytics.min.js\";\n var r = document.getElementsByTagName(\"script\")[0];\n r.parentNode.insertBefore(t, r);\n analytics._loadOptions = n;\n };\n analytics._writeKey = \"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\";\n analytics.SNIPPET_VERSION = \"5.2.0\";\n analytics.load(\"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\");\n analytics.page()\n }\n})()","id":"script-segment"}])</script><style>.preampjs [data-preamp], .fusejs [data-fuse] { opacity: 0 !important}</style><script> !function(co,h,e,s,i,o,n){var d='documentElement';var a='className';h[d][a]+=' preampjs fusejs'; n.k=e;co._Cohesion=n;co._Preamp={k:s,start:new Date};co._Fuse={k:i};co._Tagular={k:o}; [e,s,i,o].map(function(x){co[x]=co[x]||function(){(co[x].q=co[x].q||[]).push([].slice.call(arguments))}}); var b=function(){var u=h[d][a];h[d][a]=u.replace(/ ?preampjs| ?fusejs/g,'')}; h.addEventListener('DOMContentLoaded',function(){co.setTimeout(b,3e3); co._Preamp.docReady=co._Fuse.docReady=!0});var z=h.createElement('script'); z.async=1;z.src='https://beam.edx.org/cohesion/cohesion-latest.min.js'; z.onerror=function(){var ce='error',f='function';for(var o of co[e].q||[])o[0]===ce&&typeof o[1]==f&&o[1]();co[e]=function(n,cb){n===ce&&typeof cb==f&&cb()};b()}; h.head.appendChild(z);} (window,document,'cohesion','preamp','fuse','tagular',{"domainAllowlist":["h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com","www.h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com","edx.org","www.edx.org"],"tagular":{"sourceKey":"src_2euJfAVNt6Z9kQz4e9t1SQBtm8x","writeKey":"wk_2euJfDkJVTtEVzsC8BPOb0g9dVj","apiHost":"https://beam.edx.org/v2/t","multiparty":true,"useBeacon":true,"cookieDomain":"edx.org"},"monarch":{"sourceId":"bdac7c16-924e-4180-bb35-5b2dfff6d308","endpoint":"https://beam.edx.org/monarch","token":"b43382aa-9f76-406c-a628-bf96086f1c28","autoRequest":{"enabled":false,"suppressPlacements":true,"timeout":2000}},"consent":{"onetrust":{"enabled":true,"optIn":true},"required":true,"domain":".edx.org"},"fuse":{"enabled":false},"cookieDomain":"edx.org"}); </script><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"(function (w, d, s, l, i) {\n w[l] = w[l] || [];\n w[l].push({ \"gtm.start\": new Date().getTime(), event: \"gtm.js\" });\n var f = d.getElementsByTagName(s)[0],\n j = d.createElement(s),\n dl = l != \"dataLayer\" ? \"&l=\" + l : \"\";\n j.async = true;\n j.src = \"https://www.googletagmanager.com/gtm.js?id=\" + i + dl;\n f.parentNode.insertBefore(j, f);\n})(window, document, \"script\", \"dataLayer\", \"GTM-543ZGMK2\");\n","id":"script-gtm"}])</script><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="__className_d65c78"><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-543ZGMK2" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><header class="contents mx-auto h-[76px] pointer-events-auto"><div class="hidden md:flex flex-col w-full border-b border-putty-400"><div class="relative h-[76px] flex justify-between items-center"><div class="flex items-center gap-6 w-full pl-2 sm:pl-4"><a href="/" class="min-w-12"><img alt="edX Online Homepage" title="edX" data-ot-ignore="true" loading="lazy" width="60" height="60" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" src="/trademark-logos/edx-logo-elm.svg"/></a><div class="flex items-center gap-2 w-full"><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 bg-primary text-primary-foreground shadow hover:bg-primary-hover hover:text-primary-hover-foreground border-2 border-primary h-auto lg:h-10 px-4 text-base">Learn<!-- --> <svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 ml-2 font-bold"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><div class="relative min-h-12"><div><form class="flex overflow-hidden gap-2.5 md:flex-row md:gap-0"><div class="my-2 md:my-0 flex bg-white rounded min-h-12 md:w-72 border border-gray-dark"><input type="search" class="border-0 grow focus-visible:ring-0 focus-visible:ring-offset-0 [&::-webkit-search-cancel-button]:hidden rounded w-[230px] h-[44px] shadow-none" placeholder="What do you want to learn?" value=""/><button class="mx-4" type="submit" role="button" aria-label="Search for courses, certificates and degrees"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M15.5 14h-.79l-.28-.27A6.471 6.471 0 0 0 16 9.5 6.5 6.5 0 1 0 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5Zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14Z" fill="currentColor"></path></svg></button><button class="hidden"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41Z" fill="currentColor"></path></svg></button></div><button class="rounded-full text-white text-base no-underline hover:no-underline ml-0 md:ml-2 px-[1rem] py-[0.5625rem] border bg-primary border-primary hover:text-white hover:border-secondary hover:bg-secondary md:hidden" type="submit">Search</button></form></div><div class="hidden px-3 md:px-0 md:w-[504px] absolute z-50 "><div class="shadow-md rounded bg-white"><p class="text-sm font-bold ml-3 mb-0">Most popular programs</p><ul class="list-none !p-0 !m-0 text-xs"><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/learn/computer-science/harvard-university-cs50-s-introduction-to-computer-science" class="no-underline flex items-center"><img alt="CS50's Introduction to Computer Science" title="CS50's Introduction to Computer Science" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">CS50's Introduction to Computer Science</span><span class="text-xs lg:text-sm block">HarvardX<!-- --> | <!-- -->Course</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy" class="no-underline flex items-center"><img alt="Artificial Intelligence: Implications for Business Strategy" title="Artificial Intelligence: Implications for Business Strategy" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Artificial Intelligence: Implications for Business Strategy</span><span class="text-xs lg:text-sm block">MIT Sloan School of Management<!-- --> | <!-- -->Executive Education</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/masters/micromasters/mitx-supply-chain-management" class="no-underline flex items-center"><img alt="Supply Chain Management" title="Supply Chain Management" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Supply Chain Management</span><span class="text-xs lg:text-sm block">MITx<!-- --> | <!-- -->MicroMasters</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/certificates/professional-certificate/harvardx-computer-science-for-game-development" class="no-underline flex items-center"><img alt="Computer Science for Game Development" title="Computer Science for Game Development" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Computer Science for Game Development</span><span class="text-xs lg:text-sm block">HarvardX<!-- --> | <!-- -->Professional Certificate</span></div></a></li></ul><p class="text-sm font-bold ml-3 mb-0">Trending now</p><ul class="list-none p-0 m-0"><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=data science" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">data science</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=ai" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">ai</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=finance" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">finance</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=business" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">business</span></a></li></ul></div><div class="hidden"><div class="bg-white rounded shadow-md overflow-hidden"><ul class="list-none p-0 my-0"></ul><div class="pl-3 py-2 bg-light"><a href="/search">View all results</a></div></div></div></div></div></div></div><div class="flex items-center pr-2 sm:pr-4"><a href="https://business.edx.org" class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 text-gray-dark hover:bg-putty-light hover:text-accent-foreground h-auto py-2 px-3">edX For Business</a></div></div></div><div class="hidden md:block absolute w-full z-40"></div><div class="grid grid-cols-3 md:hidden relative h-[76px] justify-center items-center border-b border-putty-400"><div class="pl-4"><button class="hover:bg-primary p-2 rounded-full hover:text-white" aria-label="Navigation menu"><svg width="20" height="20" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M1.5 3C1.22386 3 1 3.22386 1 3.5C1 3.77614 1.22386 4 1.5 4H13.5C13.7761 4 14 3.77614 14 3.5C14 3.22386 13.7761 3 13.5 3H1.5ZM1 7.5C1 7.22386 1.22386 7 1.5 7H13.5C13.7761 7 14 7.22386 14 7.5C14 7.77614 13.7761 8 13.5 8H1.5C1.22386 8 1 7.77614 1 7.5ZM1 11.5C1 11.2239 1.22386 11 1.5 11H13.5C13.7761 11 14 11.2239 14 11.5C14 11.7761 13.7761 12 13.5 12H1.5C1.22386 12 1 11.7761 1 11.5Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></div><div class="flex justify-items-center justify-center"><a href="/"><img alt="edX Online" title="edX Online" loading="lazy" width="60" height="60" decoding="async" data-nimg="1" style="color:transparent" src="/trademark-logos/edx-logo-elm.svg"/></a></div><div class="pr-4 flex justify-items-end justify-end"><button class="hover:bg-primary p-2 rounded-full hover:text-white focus:border-gray-dark" aria-label="Search courses"><svg width="24" height="24" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M10 6.5C10 8.433 8.433 10 6.5 10C4.567 10 3 8.433 3 6.5C3 4.567 4.567 3 6.5 3C8.433 3 10 4.567 10 6.5ZM9.30884 10.0159C8.53901 10.6318 7.56251 11 6.5 11C4.01472 11 2 8.98528 2 6.5C2 4.01472 4.01472 2 6.5 2C8.98528 2 11 4.01472 11 6.5C11 7.56251 10.6318 8.53901 10.0159 9.30884L12.8536 12.1464C13.0488 12.3417 13.0488 12.6583 12.8536 12.8536C12.6583 13.0488 12.3417 13.0488 12.1464 12.8536L9.30884 10.0159Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></div><div class="absolute top-full w-full z-40"></div></div></header><div style="min-height:50px"><script type="application/ld+json"> { "@context": "https://schema.org", "@type" : "Organization", "name" : "edX", "url" : "https://www.edx.org", "logo": "/images/logos/edx-logo-elm.svg", "sameAs" : [ "https://www.facebook.com/edX", "https://twitter.com/edXOnline", "https://www.linkedin.com/company/edx", "http://www.instagram.com/edxonline", "https://www.youtube.com/user/edxonline" ] } </script><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.edx.org/"},{"@type":"ListItem","position":2,"name":"Learn","item":"https://www.edx.org/learn"},{"@type":"ListItem","position":3,"name":"Metasploit"}]}</script><script type="application/ld+json">[{"@context":"https://schema.org","@type":"WebSite","url":"https://www.edx.org/learn/metasploit","name":"Best Online Metasploit Courses and Programs","alternateName":"edX Online"}]</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"ItemList","itemListElement":[{"@type":"ListItem","position":1,"url":"https://www.edx.org/learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity"},{"@type":"ListItem","position":2,"url":"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-basics"},{"@type":"ListItem","position":3,"url":"https://www.edx.org/learn/computer-programming/edx-try-it-ethical-hacking"},{"@type":"ListItem","position":4,"url":"https://www.edx.org/learn/penetration-testing/ibm-penetration-testing-and-incident-response"},{"@type":"ListItem","position":5,"url":"https://www.edx.org/learn/cybersecurity/ibm-beginners-guide-to-cybersecurity"},{"@type":"ListItem","position":6,"url":"https://www.edx.org/certificates/professional-certificate/ibm-cybersecurity-analyst"},{"@type":"ListItem","position":7,"url":"https://www.edx.org/learn/cybersecurity/university-of-washington-introduction-to-cybersecurity"},{"@type":"ListItem","position":8,"url":"https://www.edx.org/certificates/professional-certificate/harvardx-computer-science-for-cybersecurity"},{"@type":"ListItem","position":9,"url":"https://www.edx.org/learn/cybersecurity/edx-try-it-cybersecurity-basics"},{"@type":"ListItem","position":10,"url":"https://www.edx.org/learn/network-security/rochester-institute-of-technology-network-security"},{"@type":"ListItem","position":11,"url":"https://www.edx.org/learn/risk-management/rochester-institute-of-technology-cybersecurity-risk-management"},{"@type":"ListItem","position":12,"url":"https://www.edx.org/learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals"},{"@type":"ListItem","position":13,"url":"https://www.edx.org/learn/cybersecurity/university-of-washington-building-a-cybersecurity-toolkit"},{"@type":"ListItem","position":14,"url":"https://www.edx.org/learn/computer-forensics/rochester-institute-of-technology-computer-forensics"},{"@type":"ListItem","position":15,"url":"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-analyst-assessment"},{"@type":"ListItem","position":16,"url":"https://www.edx.org/masters/micromasters/ritx-cybersecurity"},{"@type":"ListItem","position":17,"url":"https://www.edx.org/learn/linux/edx-try-it-learn-linux-command-line"},{"@type":"ListItem","position":18,"url":"https://www.edx.org/learn/cybersecurity/university-of-washington-finding-your-cybersecurity-career-path"},{"@type":"ListItem","position":19,"url":"https://www.edx.org/learn/cybersecurity/ibm-threat-intelligence-in-cybersecurity"},{"@type":"ListItem","position":20,"url":"https://www.edx.org/executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age"},{"@type":"ListItem","position":21,"url":"https://www.edx.org/learn/cybersecurity/university-of-washington-cybersecurity-the-ciso-s-view"},{"@type":"ListItem","position":22,"url":"https://www.edx.org/certificates/professional-certificate/uwashingtonx-essentials-cybersecurity"},{"@type":"ListItem","position":23,"url":"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-compliance-and-system-administration"},{"@type":"ListItem","position":24,"url":"https://www.edx.org/learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications"},{"@type":"ListItem","position":25,"url":"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-capstone-and-case-studies"},{"@type":"ListItem","position":26,"url":"https://www.edx.org/learn/computer-programming/raspberry-pi-foundation-introduction-to-cybersecurity-for-teachers"},{"@type":"ListItem","position":27,"url":"https://www.edx.org/learn/computer-science/universidades-anahuac-digital-shield-cybersecurity-for-data-and-system-protection"},{"@type":"ListItem","position":28,"url":"https://www.edx.org/learn/computer-science/university-system-of-maryland-cybersecurity-essentials"},{"@type":"ListItem","position":29,"url":"https://www.edx.org/learn/computer-science/university-system-of-maryland-integrated-cybersecurity-from-physical-safeguards-to-digital-forensics-and-governance"},{"@type":"ListItem","position":30,"url":"https://www.edx.org/learn/cybersecurity/curtin-university-cybersecurity-and-privacy-in-the-iot"},{"@type":"ListItem","position":31,"url":"https://www.edx.org/learn/cybersecurity/the-university-of-texas-at-austin-try-it-cybersecurity-basics"},{"@type":"ListItem","position":32,"url":"https://www.edx.org/learn/cybersecurity/tecnologico-de-monterrey-try-it-cybersecurity-basics"}]}</script><main id="page-id-644"><article class="container prose mt-8 md:mt-auto"><div class="fullwidth pb-12 pt-20 md:pt-16 bg-cover bg-center bg-[url(/bg-images/learn-page-header.webp)]"><div class="mx-auto lg:container [&>*]:text-white"><nav aria-label="breadcrumb" class="not-prose mb-4"><ol class="list-none flex flex-wrap items-center gap-1.5 break-words text-base text-putty-dark sm:gap-2.5"><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize"><a class="Breadcrumbs_breadcrumb_link__il5uK" href="/">Home</a></li><li aria-hidden="true" class="ml-0"><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="text-white font-bold w-4 h-4" style="stroke-width:1;stroke:white"><path d="M6.1584 3.13508C6.35985 2.94621 6.67627 2.95642 6.86514 3.15788L10.6151 7.15788C10.7954 7.3502 10.7954 7.64949 10.6151 7.84182L6.86514 11.8418C6.67627 12.0433 6.35985 12.0535 6.1584 11.8646C5.95694 11.6757 5.94673 11.3593 6.1356 11.1579L9.565 7.49985L6.1356 3.84182C5.94673 3.64036 5.95694 3.32394 6.1584 3.13508Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></li><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize" aria-current="false"><a class="Breadcrumbs_breadcrumb_link__il5uK" href="/learn">learn</a></li><li aria-hidden="true" class="ml-0"><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="text-white font-bold w-4 h-4" style="stroke-width:1;stroke:white"><path d="M6.1584 3.13508C6.35985 2.94621 6.67627 2.95642 6.86514 3.15788L10.6151 7.15788C10.7954 7.3502 10.7954 7.64949 10.6151 7.84182L6.86514 11.8418C6.67627 12.0433 6.35985 12.0535 6.1584 11.8646C5.95694 11.6757 5.94673 11.3593 6.1356 11.1579L9.565 7.49985L6.1356 3.84182C5.94673 3.64036 5.95694 3.32394 6.1584 3.13508Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></li><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize" aria-current="page"><span class="">metasploit</span></li></ol></nav><h1 class="text-learn-hero-heading lg:text-learn-hero-heading-large lg:leading-learn-hero-line-height-large mb-6 font-extrabold tracking-tight">Learn Metasploit with online courses and programs</h1><div class="break-words [&>ul>li>p]:text-white [&>*]:text-white text-xl line-clamp-2"><p class="mb-8">Metasploit is an open-source penetration framework used by IT and cybersecurity teams. If you’re planning on pursuing an IT career, you can learn Metasploit with online courses delivered through edX.</p></div></div></div><div class="fullwidth bg-secondary text-primary-foreground p-8 sticky top-0 z-50"><div class="container"><div class="lg:flex hidden text-sm items-center "><a aria-label="Create an account" href="https://authn.edx.org/register" target="_self" class="inline-flex items-center justify-center whitespace-nowrap text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 @apply border-[1px] rounded-full h-auto px-4 py-2 not-prose undefined"><span class="inline-flex gap-2 items-center justify-center break-words whitespace-normal">Create an account</span></a></div><div class="lg:hidden p-4 w-full"><button type="button" role="combobox" aria-controls="radix-:R2ijjttrkva:" aria-expanded="false" aria-autocomplete="none" dir="ltr" data-state="closed" class="flex h-9 w-full items-center justify-between whitespace-nowrap rounded border border-input bg-transparent px-3 py-2 text-sm shadow-sm ring-offset-background placeholder:text-putty-dark focus:outline-none focus:ring-1 focus:ring-ring disabled:cursor-not-allowed disabled:opacity-50 [&>span]:line-clamp-1 no-underline text-white hover:text-white"><span style="pointer-events:none"></span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 opacity-50" aria-hidden="true"><path d="M4.93179 5.43179C4.75605 5.60753 4.75605 5.89245 4.93179 6.06819C5.10753 6.24392 5.39245 6.24392 5.56819 6.06819L7.49999 4.13638L9.43179 6.06819C9.60753 6.24392 9.89245 6.24392 10.0682 6.06819C10.2439 5.89245 10.2439 5.60753 10.0682 5.43179L7.81819 3.18179C7.73379 3.0974 7.61933 3.04999 7.49999 3.04999C7.38064 3.04999 7.26618 3.0974 7.18179 3.18179L4.93179 5.43179ZM10.0682 9.56819C10.2439 9.39245 10.2439 9.10753 10.0682 8.93179C9.89245 8.75606 9.60753 8.75606 9.43179 8.93179L7.49999 10.8636L5.56819 8.93179C5.39245 8.75606 5.10753 8.75606 4.93179 8.93179C4.75605 9.10753 4.75605 9.39245 4.93179 9.56819L7.18179 11.8182C7.35753 11.9939 7.64245 11.9939 7.81819 11.8182L10.0682 9.56819Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><select aria-hidden="true" tabindex="-1" style="position:absolute;border:0;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;clip:rect(0, 0, 0, 0);white-space:nowrap;word-wrap:normal"></select></div></div></div><div class="flex flex-wrap py-12"><div><img loading="lazy" decoding="async" class="hidden lg:block float-right ml-4 mb-4" src="https://images.ctfassets.net/ii9ehdcj88bc/bdmZKDIqgALjQFVHRLeYG/f3c3a51e81527436082297abec52a537/Metasploit.png" alt="Metasploit | Introduction Image" width="435" height="245"/><h2>What is Metasploit?</h2><p>Cybersecurity professionals rely on a variety of tools to help them keep their organizations and their data safe. Information security teams use Metasploit to find, exploit, and validate system vulnerabilities. The open-source framework includes exploitation tools and penetration testing tools, which help to protect an organization’s networks from hackers and other security threats. </p><p>The Metasploit framework consists of a series of interfaces, libraries, modules, tools, and plugins. These enable users to access the framework, run exploits, perform various tasks, and enhance overall functionality. </p><p>IT professionals can also use Metasploit to stage hacking scenarios, which can help them learn how to respond to advanced hacking techniques. The framework can perform the various phases of penetration testing, including information gathering, gaining access, privilege escalation, and maintaining access.<sup><a href="#5sCrIsPl0oDSu8Q754hmxj">1</a></sup> The framework can also save IT teams time by automating some of the repetitive tasks required for penetration testing. </p><p>Additionally, Metasploit's reporting features highlight the vulnerabilities that need to be prioritized. This allows computer security teams to focus on their most vulnerable areas and protect networks from threats.<sup><a href="#1vWonqbbXFXY2bWz1dypIj">2</a></sup></p><p></p></div></div><div class="fullwidth bg-putty-100"><div class="relative overflow-hidden py-3 bg-putty-light "><div class="container flex flex-col items-center justify-center text-center px-4 md:px-28 py-10 bg-putty-light"><h2 class="text-secondary font-extrabold scroll-m-20 tracking-tight text-3xl lg:text-5xl italic text-4xl lg:text-7xl font-black font-inter">Maximize Your Potential</h2><p class="md:px-24 py-3 text-base text-center ">Sign up for special offers, career resources, and recommendations that will help you grow, prepare, and advance in your career.</p><div class="flex gap-4 undefined"></div></div></div><a class="subnav-item -mt-1" name="Browse online courses related to Metasploit" id="browse-online-courses-related-to-metasploit"></a><div class="container py-3"><div dir="ltr" data-orientation="horizontal"><div data-state="active" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Course" id="radix-:Rsjjttrkva:-content-Course" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2" style="animation-duration:0s"><h2 class="text-xl lg:text-3xl font-bold">Browse online <!-- -->Metasploit<!-- --> <!-- -->Courses</h2><h4 class="font-normal my-4">Find new interests and advance your career opportunities</h4><div class="lg:grid lg:grid-cols-3 lg:gap-4 border-t-solid border-t-[1px] border-b-solid border-b-[1px] py-6 mb-6"><div class="flex"><div class="w-12 text-primary"><svg width="48" height="48" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="m23 12-2.44-2.79.34-3.69-3.61-.82-1.89-3.2L12 2.96 8.6 1.5 6.71 4.69 3.1 5.5l.34 3.7L1 12l2.44 2.79-.34 3.7 3.61.82L8.6 22.5l3.4-1.47 3.4 1.46 1.89-3.19 3.61-.82-.34-3.69L23 12Zm-12.91 4.72-3.8-3.81 1.48-1.48 2.32 2.33 5.85-5.87 1.48 1.48-7.33 7.35Z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Stand out in your field</h3><p class="text-sm">Use the knowledge and skills you have gained to drive impact at work and grow your career.</p></div></div><div class="flex"><div class="w-12 text-primary"><svg width="48" height="48" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M11.99 2C6.47 2 2 6.48 2 12s4.47 10 9.99 10C17.52 22 22 17.52 22 12S17.52 2 11.99 2zM12 20c-4.42 0-8-3.58-8-8s3.58-8 8-8 8 3.58 8 8-3.58 8-8 8zm.5-13H11v6l5.25 3.15.75-1.23-4.5-2.67z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Learn at your own pace</h3><p class="text-sm">On your computer, tablet or phone, online courses make learning flexible to fit your busy life.</p></div></div><div class="flex"><div class="w-12 text-primary"><svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Earn a valuable credential</h3><p class="text-sm">Showcase your key skills and valuable knowledge.</p></div></div></div></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Executive Education" hidden="" id="radix-:Rsjjttrkva:-content-Executive Education" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Masters" hidden="" id="radix-:Rsjjttrkva:-content-Masters" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Bachelors" hidden="" id="radix-:Rsjjttrkva:-content-Bachelors" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div class="hidden lg:flex justify-center"><div role="tablist" aria-orientation="horizontal" class="inline-flex h-12 items-center justify-center rounded py-1 text-primary w-full shadow-lg rounded-t-xl max-w-[1128px]" tabindex="-1" data-orientation="horizontal" style="outline:none"><button type="button" role="tab" aria-selected="true" aria-controls="radix-:Rsjjttrkva:-content-Course" data-state="active" id="radix-:Rsjjttrkva:-trigger-Course" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Courses<!-- --> <!-- -->(83)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-:Rsjjttrkva:-content-Executive Education" data-state="inactive" id="radix-:Rsjjttrkva:-trigger-Executive Education" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Executive Education<!-- --> <!-- -->(4)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-:Rsjjttrkva:-content-Masters" data-state="inactive" id="radix-:Rsjjttrkva:-trigger-Masters" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Master's Programs<!-- --> <!-- -->(9)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-:Rsjjttrkva:-content-Bachelors" data-state="inactive" id="radix-:Rsjjttrkva:-trigger-Bachelors" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Bachelor's Programs<!-- --> <!-- -->(4)</button></div></div><div class="lg:hidden"><button type="button" role="combobox" aria-controls="radix-:Rssjjttrkva:" aria-expanded="false" aria-autocomplete="none" dir="ltr" data-state="closed" class="h-9 w-full justify-between whitespace-nowrap rounded bg-transparent px-3 py-2 text-sm ring-offset-background placeholder:text-putty-dark focus:outline-none focus:ring-1 focus:ring-ring disabled:cursor-not-allowed disabled:opacity-50 [&>span]:line-clamp-1 flex items-center border-solid border-[1px] border-primary shadow-none text-primary no-underline"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M3 17v2h6v-2H3ZM3 5v2h10V5H3Zm10 16v-2h8v-2h-8v-2h-2v6h2ZM7 9v2H3v2h4v2h2V9H7Zm14 4v-2H11v2h10Zm-6-4h2V7h4V5h-4V3h-2v6Z" fill="currentColor"></path></svg><span style="pointer-events:none"></span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 opacity-50" aria-hidden="true"><path d="M4.93179 5.43179C4.75605 5.60753 4.75605 5.89245 4.93179 6.06819C5.10753 6.24392 5.39245 6.24392 5.56819 6.06819L7.49999 4.13638L9.43179 6.06819C9.60753 6.24392 9.89245 6.24392 10.0682 6.06819C10.2439 5.89245 10.2439 5.60753 10.0682 5.43179L7.81819 3.18179C7.73379 3.0974 7.61933 3.04999 7.49999 3.04999C7.38064 3.04999 7.26618 3.0974 7.18179 3.18179L4.93179 5.43179ZM10.0682 9.56819C10.2439 9.39245 10.2439 9.10753 10.0682 8.93179C9.89245 8.75606 9.60753 8.75606 9.43179 8.93179L7.49999 10.8636L5.56819 8.93179C5.39245 8.75606 5.10753 8.75606 4.93179 8.93179C4.75605 9.10753 4.75605 9.39245 4.93179 9.56819L7.18179 11.8182C7.35753 11.9939 7.64245 11.9939 7.81819 11.8182L10.0682 9.56819Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><select aria-hidden="true" tabindex="-1" style="position:absolute;border:0;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;clip:rect(0, 0, 0, 0);white-space:nowrap;word-wrap:normal"></select></div><div data-state="active" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Course" id="radix-:Rsjjttrkva:-content-Course" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto" style="animation-duration:0s"><h3 class="mb-4">Courses</h3><div class="hidden lg:block"><div class="gap-4 py-4 dynamic-grid flex-wrap undefined"></div></div><div class="lg:hidden"><div class="gap-4 py-4 flex overflow-x-scroll undefined"></div></div><div class="flex justify-center mx-auto mt-5"></div></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Executive Education" hidden="" id="radix-:Rsjjttrkva:-content-Executive Education" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Masters" hidden="" id="radix-:Rsjjttrkva:-content-Masters" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-:Rsjjttrkva:-trigger-Bachelors" hidden="" id="radix-:Rsjjttrkva:-content-Bachelors" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div></div></div><div class="pt-0 pb-6 fullwidth bg-putty-100"><h3 class="mb-8 mt-0 text-2xl">Related Topics</h3><div class="flex gap-3 overflow-x-auto scroll-smooth not-prose"></div><div class="pt-4"></div></div><div class="flex flex-col gap-2 pb-10"><div class="Default_content__HO8we"><div id=""><h3>Metasploit tutorial curriculum</h3><p>By taking a Metasploit tutorial, you can gain hands-on experience that helps to build your cybersecurity skill set. A Metasploit course curriculum may cover the following topics:</p><ul><li><p>Setting up a Metasploit development environment</p></li><li><p>Contributing to Metasploit</p></li><li><p>Accepting modules and enhancements</p></li><li><p>Writing exploits</p></li><li><p>Parsing an HTTP response</p></li><li><p>Reversing shells</p></li><li><p>Using Powershell in an exploit </p></li></ul><p>If you already have some experience using Metasploit, you may prefer to enroll in a class that covers its uses more in-depth. This could involve conducting vulnerability assessments, hardening, or automating exploitation activities. </p><p>Depending on the specific career you want to pursue, you may also take more advanced cybersecurity classes that include Metasploit in their coursework. edX offers many educational options for individuals interested in learning about cybersecurity, ranging from <span data-boot-camp-link="https://www.edx.org/boot-camps/cybersecurity">cybersecurity boot camps</span> to <a class="text-link underline" href="http://edx.org/bachelors/computer-data-sciences">bachelor’s degree programs in computer science</a>. </p><p></p></div></div><a class="subnav-item -mt-1" name="Explore Metasploit jobs" id="explore-metasploit-jobs"></a><div class="Default_content__HO8we"><div id=""><h2>Explore Metasploit jobs</h2><p>Metasploit is designed to perform many different cybersecurity tasks, which makes it useful in various information security roles. Any cybersecurity professional that works with penetration testing, vulnerability exploiting, and ethical hacking can benefit from learning how to use Metasploit.</p><p>Some of the positions that could benefit from knowledge of Metasploit include:</p><ul><li><p><b>Information security analysts</b>, who develop cybersecurity requirements for their organizations and apply various techniques to keep systems secure.<sup><a href="#24AWqERGJzrgNTJMBkiF2q">3</a></sup></p></li><li><p><b>Security management specialists,</b> who assess various security threats faced by their organization, coordinate cybersecurity work, and oversee the implementation of cybersecurity practices.<sup><a href="#66KoAaD2xONdnFN5WFqQ8f">4</a></sup></p></li><li><p><b>Penetration testers</b>, who assess system security, conduct system audits, and develop solutions to vulnerabilities.<sup><a href="#4me2ewRB2MAt0niZ6VbFoM">5</a></sup></p></li></ul><p>While learning how to use Metasploit can be a helpful skill, many of these roles will have additional educational and skills requirements that vary based on employer. edX can help build those skills with a variety of educational pathways including <a class="text-link underline" href="http://edx.org/bachelors/">bachelor’s degree</a> programs and <a class="text-link underline" href="http://edx.org/masters/">master’s degree</a> programs, as well as specialized <span data-boot-camp-link="http://edx.org/boot-camps/">boot camps</span>, such as cybersecurity or <span data-boot-camp-link="http://edx.org/boot-camps/coding">coding boot camps</span>. Before deciding on which option is right for you, research the professional role you hope to obtain and learn more about what potential employers expect of candidates. </p><p></p></div></div></div><div class="fullwidth max-w-none py-12 md:py-16 not-prose bg-primary-gradient"><div class="container"><h2 class="text-4xl md:text-6xl my-5 text-white italic"><span class="text-primary-foreground">More opportunities</span> <!-- -->for you to learn</h2><p class="text-lg leading-9 text-white">We've added 500+ learning opportunities to create one of the world's most comprehensive free-to-degree online learning platforms.</p><ul class="block md:grid md:grid-cols-2 md:gap-x-[100px] mx-auto lg:grid-cols-3"></ul></div></div><a class="subnav-item -mt-1" name="Metasploit FAQ " id="metasploit-f-a-q"></a><a class="subnav-item" id="frequently-asked-questions"></a><div class="flex flex-col py-4 lg:pt-16"><h2 class="mt-2 mb-4 text-3xl font-bold">Frequently Asked Questions</h2><div class="flex flex-col gap-3 [&_button]:no-underline [&_button]:text-gray-dark [&_button:hover]:text-gray-dark" data-orientation="vertical"><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rja4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:R3a4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What is Metasploit used for?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rja4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:R3a4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rla4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:R5a4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>Who uses Metasploit?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rla4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:R5a4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rna4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:R7a4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What are the advantages of Metasploit?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rna4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:R7a4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rpa4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:R9a4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>Why learn Metasploit?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rpa4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:R9a4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rra4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:Rba4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What is the difference between Metasploit and Kali Linux?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rra4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:Rba4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-:Rta4jjttrkva:" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-:Rda4jjttrkva:" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>Which is better: Metasploit or Nessus?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-:Rta4jjttrkva:" hidden="" role="region" aria-labelledby="radix-:Rda4jjttrkva:" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div><ol><li id="5sCrIsPl0oDSu8Q754hmxj"><p><a class="text-link underline external" href="https://www.rapid7.com/products/metasploit/" target="_blank" rel="noopener noreferrer">Metasploit</a><i>. Rapid7</i>. Retrieved February 15, 2023.</p></li><li id="1vWonqbbXFXY2bWz1dypIj"><p><a class="text-link underline external" href="https://www.upguard.com/blog/metasploit" target="_blank" rel="noopener noreferrer">What is Metasploit?</a> (2022). <i>UpGuard. </i>Retrieved January 9, 2023. </p></li><li id="24AWqERGJzrgNTJMBkiF2q"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-2" target="_blank" rel="noopener noreferrer">What Information Security Analysts Do</a>. <i>U.S. Bureau of Labor Statistics Occupational Handbook.</i> Retrieved February 15, 2023.</p></li><li id="66KoAaD2xONdnFN5WFqQ8f"><p><a class="text-link underline external" href="https://www.onetonline.org/link/summary/13-1199.07" target="_blank" rel="noopener noreferrer">Security Management Specialists</a>. (2022). <i>O*Net OnLine</i>. Retrieved February 15, 2023.</p></li><li id="4me2ewRB2MAt0niZ6VbFoM"><p><a class="text-link underline external" href="https://www.onetonline.org/link/summary/15-1299.04" target="_blank" rel="noopener noreferrer">Penetration Testers</a>. (2022). <i>O*Net OnLine</i>. Retrieved February 15, 2023.</p></li></ol></div></article></main></div><div class="bg-primary text-primary-foreground pt-16"><footer class="flex justify-between max-w-screen-xl mx-auto px-4 pb-4 "><div class="flex flex-col w-full"><div class="flex flex-wrap justify-between mb-6 w-full"><a href="/" class="mb-6"><img alt="edX homepage" title="edX homepage" data-ot-ignore="true" loading="lazy" width="127" height="67" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" src="/trademark-logos/edx-by-2u-white.svg"/></a><div><div class="mb-4 justify-center flex flex-row"><div class="mx-2 flex flex-col"><a href="https://www.facebook.com/edx/" target="_blank" role="button" aria-label="Visit our Facebook page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="32" height="32" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://x.com/edXOnline" target="_blank" role="button" aria-label="Visit our X page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="48" height="48" viewBox="0 0 48 48" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://www.linkedin.com/school/edx/" target="_blank" role="button" aria-label="Visit our LinkedIn page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://www.reddit.com/r/edX/" target="_blank" role="button" aria-label="Visit our Reddit page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="40" height="40" viewBox="-2 -2 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z" fill="currentColor"></path></svg></div></a></div></div></div></div><div class="my-6"><div class="flex flex-wrap md:flex-nowrap justify-between"><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Browse Courses</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/artificial-intelligence">Learn AI</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/chatgpt">Learn ChatGPT</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/spanish">Learn Spanish</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/python">Learn Python</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/excel">Learn Excel</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/software-engineering">Learn Software Engineering</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/blockchain">Learn Blockchain</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/computer-programming">Learn Computer Programming</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/economics">Learn Economics</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/architecture">Learn Architecture</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/project-management">Learn Project Management</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/business-administration">Learn Business Administration</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/learn" class="hover:underline text-[1rem] text-white hover:text-white">see more Courses</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">step-by-step guides</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-cybersecurity-analyst">Become a Cybersecurity Analyst</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-data-scientist">Become a Data Scientist</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-social-media-manager">Become a Social Media Manager</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-software-developer">Become a Software Developer</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-software-engineer-without-a-degree">Become a Software Engineer</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/become" class="hover:underline text-[1rem] text-white hover:text-white">see more Guides</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Complete your bachelor's online</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/business">Bachelor's in Business</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/computer-data-sciences">Bachelor's in Computer Science / Data Science</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/health-social-services">Bachelor's in Health and Nursing</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/online-accounting-bachelor-degree">Bachelor's in Accounting</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/online-bachelors-degree-finance">Bachelor's in Finance</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/psychology">Bachelor's in Psychology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/bachelors-in-public-health-online">Bachelor's in Public Health</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/social-work-bsw">Bachelor's in Social Work</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/bachelors" class="hover:underline text-[1rem] text-white hover:text-white">see more Undergraduate Degrees</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Earn your online graduate degree</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-mba">Master's in Business Administration</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/masters-in-public-health-online">Master's in Public Health</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-msw-programs">Master's in Social Work</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-msn-programs">Master's in Nursing</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-data-science">Master's in Data Science</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-engineering">Master's in Engineering</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-slp-programs">Master's in Speech Pathology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-slp-programs">Master's in Counseling/Psychology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/healthcare">Master's Degree in Healthcare</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/masters-in-education-online">Master's Degree in Education</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-artificial-intelligence">Master's Degree in AI</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-computer-science">Master's Degree in Computer Science</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/masters" class="hover:underline text-[1rem] text-white hover:text-white">see more Graduate Degrees</a><a href="/doctorate" class="hover:underline text-[1rem] text-white hover:text-white">see more Doctorate Degrees</a></div></div></div><div class="my-4 border-t-[1px] border-solid border-primary-foreground"></div></div><div class="flex flex-wrap justify-between"><div class="mr-12 mb-6"><span class="text-base text-left pb-6 mt-0 font-bold">edx</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://business.edx.org/partner">Partner With Us</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/about-us">About</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://business.edx.org/?_gl=1*y0gcxr*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NDczLjQ1LjAuMA..">edX For Business</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/affiliate-program">Affiliates</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="http://open.edx.org/?_gl=1*lt6kx3*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTQ5LjU5LjAuMA..">Open edX</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/advisory-groups">2U Advisory Council</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/careers">Careers</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://press.edx.org/?_gl=1*8w80my*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTgzLjI1LjAuMA..">News</a></li></ul></div><div class="mr-12 mb-6"><span class="text-base text-left pb-6 mt-0 font-bold">Connect</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/resources">Idea Hub</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://courses.edx.org/support/contact_us?_gl=1*13dq6q5*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NjYyLjYuMC4w">Contact Us</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://support.edx.org/?_gl=1*1ej7jnc*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE1MDgxLjUuMC4w">Help Center</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/policy/security">Security</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/media-kit">Media Kit</a></li></ul></div><div class="mb-6 grow"><span class="text-base text-left pb-6 mt-0 font-bold">Legal</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-terms-service">Terms of Service & Honor Code</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-privacy-policy">Privacy Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-privacy-policy/cookies">Cookie Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/accessibility">Accessibility Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/trademarks">Trademark Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/modern-slavery-statement">Modern Slavery Statement</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/sitemap">Sitemap</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="#">Your Privacy Choices</a></li></ul></div><div class="mb-6 flex"><div class="min-w-64"><label for="languageSelector" class="text-base text-left mb-2 mt-0">Choose your language</label><div class="mt-4 flex items-center"><select id="languageSelector" class="text-secondary bg-white text-base border border-gray rounded py-2 px-4 mr-2 w-full focus:border-primary"><option value="en" selected="">English</option><option value="es">Spanish</option></select><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 bg-primary text-primary-foreground shadow hover:bg-primary-hover hover:text-primary-hover-foreground h-auto lg:h-10 px-4 text-base border-2 border-primary-foreground">Apply</button></div></div></div></div><div class="flex flex-wrap-reverse justify-between"><p class="text-primary-foreground text-[1rem]">© 2024 edX LLC. All rights reserved.<br/><span>| 深圳市恒宇博科技有限公司</span></p><div class="flex gap-1"><a href="https://itunes.apple.com/us/app/edx/id945480667?mt=8&external_link=true" target="_blank" rel="noopener noreferrer"><img alt="Download on the App Store" title="Download on the App Store" data-ot-ignore="true" loading="lazy" width="120" height="40" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" srcSet="/_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=128&q=75 1x, /_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=256&q=75 2x" src="/_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=256&q=75"/></a><a href="https://play.google.com/store/apps/details?id=org.edx.mobile&external_link=true" target="_blank" rel="noopener noreferrer"><img alt="Get it on Google Play" title="Get it on Google Play" data-ot-ignore="true" loading="lazy" width="135" height="40" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" srcSet="/_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=256&q=75 1x, /_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=384&q=75 2x" src="/_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=384&q=75"/></a></div></div></div></footer></div><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"window.NREUM||(NREUM={});NREUM.info = {\"agent\":\"\",\"beacon\":\"bam.nr-data.net\",\"errorBeacon\":\"bam.nr-data.net\",\"licenseKey\":\"NRBR-29a7b8c10e12125c415\",\"applicationID\":\"574099970\",\"agentToken\":null,\"applicationTime\":29.530539,\"transactionName\":\"ZwNVMRNUC0QHVEMICl5JYAADcxdWC1JADhdbM0UMTnsATxJdRE4idTIYSjpZClQHW1I8SlwDVhcPGj5UB0NSBgpCH2o=\",\"queueTime\":0,\"ttGuid\":\"28ddfaf19ceba7b7\"}; (window.NREUM||(NREUM={})).init={privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.nr-data.net\"]},distributed_tracing:{enabled:true}};(window.NREUM||(NREUM={})).loader_config={agentID:\"594494951\",accountID:\"44163\",trustKey:\"78034\",xpid:\"UAIGV1VADQQEVFhbDgYH\",licenseKey:\"NRBR-29a7b8c10e12125c415\",applicationID:\"574099970\"};;/*! For license information please see nr-loader-spa-1.281.0.min.js.LICENSE.txt */\n(()=>{var e,t,r={8122:(e,t,r)=>{\"use strict\";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]&&\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{\"use strict\";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{\"use strict\";r.d(t,{D0:()=>p,gD:()=>m,xN:()=>g});var n=r(3333),i=r(993);const o=e=>{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var a=r(2614),s=r(944),c=r(384),u=r(8122);const d=\"[data-nr-mask]\",l=()=>{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0,level:i.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n.$v.MARKS)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(n.$v.MEASURES)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(n.$v.RESOURCES)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:a.wk,inactiveMs:a.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){o(t)?e.mask_selector=\"\".concat(t,\",\").concat(d):\"\"===t||null===t?e.mask_selector=d:(0,s.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){o(t)?e.block_selector+=\",\".concat(t):\"\"!==t&&(0,s.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,s.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0},ssl:void 0,user_actions:{enabled:!0,elementAttributes:[\"id\",\"className\",\"tagName\",\"type\"]}}},f={},h=\"All configuration objects require an agent identifier!\";function p(e){if(!e)throw new Error(h);if(!f[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return f[e]}function g(e,t){if(!e)throw new Error(h);f[e]=(0,u.a)(t,l());const r=(0,c.nY)(e);r&&(r.init=f[e])}function m(e,t){if(!e)throw new Error(h);var r=p(e);if(r){for(var n=t.split(\".\"),i=0;i<n.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{\"use strict\";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{\"use strict\";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0,harvester:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{\"use strict\";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n=\"1.281.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=>{\"use strict\";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i=\"undefined\"!=typeof window&&!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope&&(\"undefined\"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope&&(\"undefined\"!=typeof self&&self instanceof WorkerGlobalScope&&self||\"undefined\"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&\"undefined\"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{\"use strict\";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")&&(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")&&(e=e.substring(1)),0===t.indexOf(\"/\")&&(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=>{\"use strict\";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{\"use strict\";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{\"use strict\";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{\"use strict\";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{\"use strict\";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{\"use strict\";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{\"use strict\";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=>\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3&o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{\"use strict\";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{\"use strict\";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&\"\"!==r.port||(\"http:\"===t.protocol&&(r.port=\"80\"),\"https:\"===t.protocol&&(r.port=\"443\")),r.pathname&&\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=>{\"use strict\";function n(e,t){\"function\"==typeof console.debug&&console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{\"use strict\";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&\"object\"==typeof e&&(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{\"use strict\";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{\"use strict\";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if(\"object\"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=>{\"use strict\";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=>{\"use strict\";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{\"use strict\";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{\"use strict\";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object&&(a.RI&&h(document,f),c&&h(c.prototype,f),h(a.gm,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n&&(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{\"use strict\";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e&&\"function\"==typeof e&&e.apply&&!e[o])}},9300:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{\"use strict\";r.d(t,{$v:()=>u,TZ:()=>n,Zp:()=>i,kd:()=>c,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3,c=[\"PageAction\",\"UserAction\",\"BrowserPerformance\"],u={MARKS:\"experimental.marks\",MEASURES:\"experimental.measures\",RESOURCES:\"experimental.resources\"}},6774:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{\"use strict\";r.d(t,{ET:()=>o,TZ:()=>a,p_:()=>i});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=>{\"use strict\";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},3969:(e,t,r)=>{\"use strict\";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{\"use strict\";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=>{\"use strict\";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=>{\"use strict\";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=>{\"use strict\";r.d(t,{AM:()=>o,O2:()=>c,Qu:()=>u,TZ:()=>s,ih:()=>d,pP:()=>a,tC:()=>i});var n=r(860);const i=[\"click\",\"keydown\",\"submit\",\"popstate\"],o=\"api\",a=\"initialPageLoad\",s=n.K7.softNav,c={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},u={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},d={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=>{\"use strict\";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>T,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>A,uP:()=>s,wW:()=>E,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",E=\"cb\"+R,T=\"jsTime\",A=\"fetch\"},4234:(e,t,r)=>{\"use strict\";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{\"use strict\";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=>{\"use strict\";r.d(t,{j:()=>j});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"recordCustomEvent\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);const E=new Map;function T(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);a.level=n.level,a.customAttributes=n.customAttributes;const c=t[r]?.[x.Jt]||t[r];return E.set(c,a),o.inPlace(t,[r],\"wrap-logger-\",(()=>E.get(c))),i}function A(){const e=(0,h.pV)();g.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const S={};var N=r(9417),_=r(5603),O=r(5284);const I=e=>{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let P=!1;function j(e,t={},g,R){let{init:x,info:E,loader_config:j,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();E||(x=L.init,E=L.info,j=L.loader_config),(0,N.xN)(e.agentIdentifier,x||{}),(0,_.a)(e.agentIdentifier,j||{}),E.jsAttributes??={},d.bv&&(E.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,E);const H=(0,N.D0)(e.agentIdentifier),M=[E.beacon,E.errorBeacon];P||(H.proxy.assets&&(I(H.proxy.assets),M.push(H.proxy.assets)),H.proxy.beacon&&M.push(H.proxy.beacon),A(),(0,h.US)(\"activatedFeatures\",O.B),e.runSoftNavOverSpa&&=!0===H.soft_navigations.enabled&&H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?M:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");S[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=>{S[e]=t}));var E=\"api-\",A=E+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(E,n,!0,o||null===r?\"session\":void 0)(t,r)}function _(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=>{g[e]=I(E,e,!0,\"api\")})),g.addPageAction=I(E,\"addPageAction\",!0,n.K7.genericEvents),g.recordCustomEvent=I(E,\"recordCustomEvent\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)&&(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(E,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=>{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new _).get(\"object\"==typeof e?e:{})};const O=_.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(A+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i&&(0,a.p)(e+t,[r?(0,v.t)():performance.now(),...arguments],r?null:this,i,R),r?void 0:this}}function P(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,\"api\")})).catch((e=>{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=>{O[e]=I(A,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(A,\"routeName\",void 0,n.K7.softNav):I(E,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!S[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=>P()),!0):P(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=k),P=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=>{\"use strict\";r.d(t,{$J:()=>u,K7:()=>s,P3:()=>c,XX:()=>i,qY:()=>n,v4:()=>a});const n=\"events\",i=\"jserrors\",o=\"browser/blobs\",a=\"rum\",s={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:i,logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},c={[s.pageViewEvent]:1,[s.pageViewTiming]:2,[s.metrics]:3,[s.jserrors]:4,[s.spa]:5,[s.ajax]:6,[s.sessionTrace]:7,[s.softNav]:8,[s.sessionReplay]:9,[s.logging]:10,[s.genericEvents]:11},u={[s.pageViewEvent]:a,[s.pageViewTiming]:n,[s.ajax]:n,[s.spa]:n,[s.softNav]:n,[s.metrics]:i,[s.jserrors]:i,[s.sessionTrace]:o,[s.sessionReplay]:o,[s.logging]:\"browser/logs\",[s.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.281.0.min.js\"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.281.0.PROD:\",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-jmvAlmjCn64ans8tLueqHRlBI/iWekylsDWb94A77CG0ukSriVDvgD3dThx+XjUSBBBMYhFn8B1a18fViyBPEQ==\",249:\"sha512-ICY/ZrcytM/86t5KFy+9OAWVYmNNJy10EBtxoSUGjQWuZx53p/eLo+L8HfrGjvHuRHRnutqLTGSnvNttffJkaA==\",212:\"sha512-pQSn+X/RfBOvx/49HvlghaiXMLhhDQXTi13n1N2XMpDquWJgs9U0pbqE3RbAnYC9nsdaTu/RVGvneEPv1fpCxA==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc&&s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")&&(s.crossOrigin=\"anonymous\"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{\"undefined\"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&(\"load\"===r.type?\"missing\":r.type),a=r&&r.target&&r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.281.0.PROD\"]=self[\"webpackChunk:NRBA-1.281.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(){this.agentIdentifier=(0,r.LA)(16)}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}recordCustomEvent(e,t){return this.#e(\"recordCustomEvent\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),t.runtime.harvester.initializedAggregates.push(this.featAggregate),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),E=i(2843),T=i(3878),A=i(782),S=i(1863);class N extends b{static featureName=A.T;constructor(e,t=!0){super(e,A.T,t),p.RI&&((0,E.u)((()=>(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,A.T,this.ee)),!0),(0,T.sp)(\"pagehide\",(()=>(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,A.T,this.ee))),this.importAggregator(e))}}var _=i(3969);class O extends b{static featureName=_.TZ;constructor(e,t=!0){super(e,_.TZ,t),this.importAggregator(e)}}var I=i(6774),P=i(3304);class j{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,P.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new j(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError&&!/:\\d+$/.test(e.error.stack?.trim())){const t=new j(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class M extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",((e,t)=>{this.abortHandler&&(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r,t],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=>{this.abortHandler&&(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,T.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=>{this.abortHandler&&(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,T.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var D=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t&&\"function\"!==t?-1:e===p.gm?0:(0,D.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e&&e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!(\"undefined\"!=typeof FormData&&e instanceof FormData))try{return(0,P.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,T.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=>{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i&&(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,P.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){E(t,e)}),(0,T.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,T.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||\"function\"!=typeof r.onload)&&\"function\"==typeof o.end)&&o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,T.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&\"load\"===e[0]&&t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&\"load\"===e[0]&&t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&(\"onload\"===r&&(this.onload=!0),(\"load\"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=\"\"+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString&&(t=e[0].toString()),\"string\"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader&&e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&\"object\"==typeof i&&i instanceof URL&&(r=i.href),pe(this,r);var o=(\"\"+(i&&i instanceof le&&i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCaptureCalled||4!==e.readyState?null==t.status&&(t.status=0):E(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function E(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r&&null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i&&((0,x.p)(_.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Ee,Lc:Te,uP:Ae,Rz:Se}=be;class Ne extends b{static featureName=Ee;constructor(e,t=!0){super(e,Ee,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ae,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Te,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var _e=i(2614);class Oe extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(_e.H3,\"_\").concat(_e.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===_e.g.FULL||e.sessionReplayMode===_e.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee,agentRef:this.#o}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==_e.g.FULL&&this.featAggregate.initializeRecording(_e.g.FULL,!0):(this.#i=_e.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==_e.g.FULL&&(this.recorder.parent.mode=_e.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class Pe extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=>{(0,T.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,T.sp)(\"popstate\",(e=>(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var je=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,T.jT)(!1)),e.removeEventListener(\"error\",f,(0,T.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,T.jT)(!1)),e.removeEventListener(\"error\",f,(0,T.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,T.jT)(!1)),e.addEventListener(\"error\",f,(0,T.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function Me(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const De={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(De[t.debugId]++)return t;De[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:$e,e5:Je,tH:Qe,uP:et,rw:tt,Lc:rt}=je;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=Me(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Je]=~~this[Je]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on($e,m),o.on($e,m),this.ee.on(\"fn-err\",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([Qe+Ze,Qe+\"-done\",Qe+Xe+Ze,Qe+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,$e,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,Qe+Ze),v(d,Qe+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,T.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,T.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n>1)}),(0,T.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled,e.init.performance.resources.enabled];if(p.RI&&(e.init.user_actions.enabled&&(it.Zp.forEach((e=>(0,T.sp)(e,(e=>(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=>{const t=(0,v.s)((e=>{(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)}),500,{leading:!0});(0,T.sp)(e,t)}))),e.init.performance.resources.enabled&&p.gm.PerformanceObserver?.supportedEntryTypes.includes(\"resource\"))){new PerformanceObserver((e=>{e.getEntries().forEach((e=>{(0,x.p)(\"browserPerformance.resource\",[e],void 0,this.featureName,this.ee)}))})).observe({type:\"resource\",buffered:!0})}r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t){super(),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,Oe,O,M,ot,ct,Pe,nt],loaderType:\"spa\"})})()})();","id":"nr-browser-agent"}])</script><script src="/_next/static/chunks/webpack-26d6f45027cd47cc.js" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0]);self.__next_f.push([2,null])</script><script>self.__next_f.push([1,"1:HL[\"/_next/static/media/a34f9d1faa5f3315-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n2:HL[\"/_next/static/css/bed218a56490fce6.css\",\"style\"]\n3:HL[\"/_next/static/css/403d28282e775383.css\",\"style\"]\n4:HL[\"/_next/static/css/05177b9cba5d3efe.css\",\"style\"]\n5:HL[\"/_next/static/css/b4ab6e6f5f0f9ce2.css\",\"style\"]\n6:HL[\"/_next/static/css/f8b0d7642df77b70.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"7:I[12846,[],\"\"]\na:I[4707,[],\"\"]\nd:I[36423,[],\"\"]\n10:I[61060,[],\"\"]\nb:[\"locale\",\"en\",\"d\"]\nc:[\"category\",\"metasploit\",\"d\"]\n11:[]\n"])</script><script>self.__next_f.push([1,"0:[\"$\",\"$L7\",null,{\"buildId\":\"_1bA7Gu23y8_4we-ChtX5\",\"assetPrefix\":\"\",\"urlParts\":[\"\",\"learn\",\"metasploit\"],\"initialTree\":[\"\",{\"children\":[[\"locale\",\"en\",\"d\"],{\"children\":[\"learn\",{\"children\":[[\"category\",\"metasploit\",\"d\"],{\"children\":[\"__PAGE__\",{}]}]}]},\"$undefined\",\"$undefined\",true]}],\"initialSeedData\":[\"\",{\"children\":[[\"locale\",\"en\",\"d\"],{\"children\":[\"learn\",{\"children\":[[\"category\",\"metasploit\",\"d\"],{\"children\":[\"__PAGE__\",{},[[\"$L8\",\"$L9\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/05177b9cba5d3efe.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/b4ab6e6f5f0f9ce2.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/f8b0d7642df77b70.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]]],null],null]},[null,[\"$\",\"$La\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"$b\",\"children\",\"learn\",\"children\",\"$c\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$Ld\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[null,[\"$\",\"$La\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"$b\",\"children\",\"learn\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$Ld\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/bed218a56490fce6.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/403d28282e775383.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],\"$Le\"],null],null]},[null,[\"$\",\"$La\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$Ld\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[[\"$\",\"title\",null,{\"children\":\"404: This page could not be found.\"}],[\"$\",\"div\",null,{\"style\":{\"fontFamily\":\"system-ui,\\\"Segoe UI\\\",Roboto,Helvetica,Arial,sans-serif,\\\"Apple Color Emoji\\\",\\\"Segoe UI Emoji\\\"\",\"height\":\"100vh\",\"textAlign\":\"center\",\"display\":\"flex\",\"flexDirection\":\"column\",\"alignItems\":\"center\",\"justifyContent\":\"center\"},\"children\":[\"$\",\"div\",null,{\"children\":[[\"$\",\"style\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}\"}}],[\"$\",\"h1\",null,{\"className\":\"next-error-h1\",\"style\":{\"display\":\"inline-block\",\"margin\":\"0 20px 0 0\",\"padding\":\"0 23px 0 0\",\"fontSize\":24,\"fontWeight\":500,\"verticalAlign\":\"top\",\"lineHeight\":\"49px\"},\"children\":\"404\"}],[\"$\",\"div\",null,{\"style\":{\"display\":\"inline-block\"},\"children\":[\"$\",\"h2\",null,{\"style\":{\"fontSize\":14,\"fontWeight\":400,\"lineHeight\":\"49px\",\"margin\":0},\"children\":\"This page could not be found.\"}]}]]}]}]],\"notFoundStyles\":[]}]],null],\"couldBeIntercepted\":false,\"initialHead\":[null,\"$Lf\"],\"globalErrorComponent\":\"$10\",\"missingSlots\":\"$W11\"}]\n"])</script><script>self.__next_f.push([1,"12:I[88003,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8003\",\"static/chunks/8003-2972b8eea56e87df.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"6082\",\"static/chunks/app/%5Blocale%5D/not-found-3aafa877300c524c.js\"],\"\"]\n15:I[37002,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n16:I[5127,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca329"])</script><script>self.__next_f.push([1,"8.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"ClientOnly\"]\n17:I[12126,[\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"8003\",\"static/chunks/8003-2972b8eea56e87df.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"1203\",\"static/chunks/app/%5Blocale%5D/layout-bdcb92f3a05369b1.js\"],\"CohesionReady\"]\n18:I[33890,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"sta"])</script><script>self.__next_f.push([1,"tic/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"CohesionProvider\"]\n19:I[67344,[\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"8003\",\"static/chunks/8003-2972b8eea56e87df.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"1203\",\"static/chunks/app/%5Blocale%5D/layout-bdcb92f3a05369b1.js\"],\"MonarchRuleProvider\"]\n13:T9fa,"])</script><script>self.__next_f.push([1,"!(function () {\n var i = \"analytics\",\n analytics = (window[i] = window[i] || []);\n if (!analytics.initialize)\n if (analytics.invoked)\n window.console \u0026\u0026\n console.error \u0026\u0026\n console.error(\"Segment snippet included twice.\");\n else {\n analytics.invoked = !0;\n analytics.methods = [\n \"trackSubmit\",\n \"trackClick\",\n \"trackLink\",\n \"trackForm\",\n \"pageview\",\n \"identify\",\n \"reset\",\n \"group\",\n \"track\",\n \"ready\",\n \"alias\",\n \"debug\",\n \"page\",\n \"screen\",\n \"once\",\n \"off\",\n \"on\",\n \"addSourceMiddleware\",\n \"addIntegrationMiddleware\",\n \"setAnonymousId\",\n \"addDestinationMiddleware\",\n \"register\",\n ];\n analytics.factory = function (e) {\n return function () {\n if (window[i].initialized)\n return window[i][e].apply(window[i], arguments);\n var n = Array.prototype.slice.call(arguments);\n if (\n [\"track\", \"screen\", \"alias\", \"group\", \"page\", \"identify\"].indexOf(\n e\n ) \u003e -1\n ) {\n var c = document.querySelector(\"link[rel='canonical']\");\n n.push({\n __t: \"bpc\",\n c: (c \u0026\u0026 c.getAttribute(\"href\")) || void 0,\n p: location.pathname,\n u: location.href,\n s: location.search,\n t: document.title,\n r: document.referrer,\n });\n }\n n.unshift(e);\n analytics.push(n);\n return analytics;\n };\n };\n for (var n = 0; n \u003c analytics.methods.length; n++) {\n var key = analytics.methods[n];\n analytics[key] = analytics.factory(key);\n }\n analytics.load = function (key, n) {\n var t = document.createElement(\"script\");\n t.type = \"text/plain\";\n t.async = !0;\n t.id = \"segment-analytics\";\n t.setAttribute(\"data-global-segment-analytics-key\", i);\n t.setAttribute(\"class\", \"optanon-category-C0002-C0004\")\n t.src =\n \"https://cdn.segment.com/analytics.js/v1/\" +\n key +\n \"/analytics.min.js\";\n var r = document.getElementsByTagName(\"script\")[0];\n r.parentNode.insertBefore(t, r);\n analytics._loadOptions = n;\n };\n analytics._writeKey = \"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\";\n analytics.SNIPPET_VERSION = \"5.2.0\";\n analytics.load(\"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\");\n analytics.page()\n }\n})()"])</script><script>self.__next_f.push([1,"14:T68d,\n !function(co,h,e,s,i,o,n){var d='documentElement';var a='className';h[d][a]+=' preampjs fusejs';\n n.k=e;co._Cohesion=n;co._Preamp={k:s,start:new Date};co._Fuse={k:i};co._Tagular={k:o};\n [e,s,i,o].map(function(x){co[x]=co[x]||function(){(co[x].q=co[x].q||[]).push([].slice.call(arguments))}});\n var b=function(){var u=h[d][a];h[d][a]=u.replace(/ ?preampjs| ?fusejs/g,'')};\n h.addEventListener('DOMContentLoaded',function(){co.setTimeout(b,3e3);\n co._Preamp.docReady=co._Fuse.docReady=!0});var z=h.createElement('script');\n z.async=1;z.src='https://beam.edx.org/cohesion/cohesion-latest.min.js';\n z.onerror=function(){var ce='error',f='function';for(var o of co[e].q||[])o[0]===ce\u0026\u0026typeof o[1]==f\u0026\u0026o[1]();co[e]=function(n,cb){n===ce\u0026\u0026typeof cb==f\u0026\u0026cb()};b()};\n h.head.appendChild(z);}\n (window,document,'cohesion','preamp','fuse','tagular',{\"domainAllowlist\":[\"h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com\",\"www.h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com\",\"edx.org\",\"www.edx.org\"],\"tagular\":{\"sourceKey\":\"src_2euJfAVNt6Z9kQz4e9t1SQBtm8x\",\"writeKey\":\"wk_2euJfDkJVTtEVzsC8BPOb0g9dVj\",\"apiHost\":\"https://beam.edx.org/v2/t\",\"multiparty\":true,\"useBeacon\":true,\"cookieDomain\":\"edx.org\"},\"monarch\":{\"sourceId\":\"bdac7c16-924e-4180-bb35-5b2dfff6d308\",\"endpoint\":\"https://beam.edx.org/monarch\",\"token\":\"b43382aa-9f76-406c-a628-bf96086f1c28\",\"autoRequest\":{\"enabled\":false,\"suppressPlacements\":true,\"timeout\":2000}},\"consent\":{\"onetrust\":{\"enabled\":true,\"optIn\":true},\"required\":true,\"domain\":\".edx.org\"},\"fuse\":{\"enabled\":false},\"cookieDomain\":\"edx.org\"});\n 1b:Te967,"])</script><script>self.__next_f.push([1,"window.NREUM||(NREUM={});NREUM.info = {\"agent\":\"\",\"beacon\":\"bam.nr-data.net\",\"errorBeacon\":\"bam.nr-data.net\",\"licenseKey\":\"NRBR-29a7b8c10e12125c415\",\"applicationID\":\"574099970\",\"agentToken\":null,\"applicationTime\":29.530539,\"transactionName\":\"ZwNVMRNUC0QHVEMICl5JYAADcxdWC1JADhdbM0UMTnsATxJdRE4idTIYSjpZClQHW1I8SlwDVhcPGj5UB0NSBgpCH2o=\",\"queueTime\":0,\"ttGuid\":\"28ddfaf19ceba7b7\"}; (window.NREUM||(NREUM={})).init={privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.nr-data.net\"]},distributed_tracing:{enabled:true}};(window.NREUM||(NREUM={})).loader_config={agentID:\"594494951\",accountID:\"44163\",trustKey:\"78034\",xpid:\"UAIGV1VADQQEVFhbDgYH\",licenseKey:\"NRBR-29a7b8c10e12125c415\",applicationID:\"574099970\"};;/*! For license information please see nr-loader-spa-1.281.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003ep,gD:()=\u003em,xN:()=\u003eg});var n=r(3333),i=r(993);const o=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var a=r(2614),s=r(944),c=r(384),u=r(8122);const d=\"[data-nr-mask]\",l=()=\u003e{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0,level:i.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n.$v.MARKS)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(n.$v.MEASURES)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(n.$v.RESOURCES)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:a.wk,inactiveMs:a.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){o(t)?e.mask_selector=\"\".concat(t,\",\").concat(d):\"\"===t||null===t?e.mask_selector=d:(0,s.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){o(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,s.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,s.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0},ssl:void 0,user_actions:{enabled:!0,elementAttributes:[\"id\",\"className\",\"tagName\",\"type\"]}}},f={},h=\"All configuration objects require an agent identifier!\";function p(e){if(!e)throw new Error(h);if(!f[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return f[e]}function g(e,t){if(!e)throw new Error(h);f[e]=(0,u.a)(t,l());const r=(0,c.nY)(e);r\u0026\u0026(r.init=f[e])}function m(e,t){if(!e)throw new Error(h);var r=p(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0,harvester:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.281.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5284:(e,t,r)=\u003e{\"use strict\";r.d(t,{t:()=\u003ec,B:()=\u003es});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),c\u0026\u0026h(c.prototype,f),h(a.gm,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{$v:()=\u003eu,TZ:()=\u003en,Zp:()=\u003ei,kd:()=\u003ec,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3,c=[\"PageAction\",\"UserAction\",\"BrowserPerformance\"],u={MARKS:\"experimental.marks\",MEASURES:\"experimental.measures\",RESOURCES:\"experimental.resources\"}},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{ET:()=\u003eo,TZ:()=\u003ea,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},3969:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,XG:()=\u003es,rs:()=\u003ei,xV:()=\u003ea,z_:()=\u003eo});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003ec,Qu:()=\u003eu,TZ:()=\u003es,ih:()=\u003ed,pP:()=\u003ea,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\",\"popstate\"],o=\"api\",a=\"initialPageLoad\",s=n.K7.softNav,c={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},u={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},d={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eT,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eA,uP:()=\u003es,wW:()=\u003eE,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",E=\"cb\"+R,T=\"jsTime\",A=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003ej});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"recordCustomEvent\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);const E=new Map;function T(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);a.level=n.level,a.customAttributes=n.customAttributes;const c=t[r]?.[x.Jt]||t[r];return E.set(c,a),o.inPlace(t,[r],\"wrap-logger-\",(()=\u003eE.get(c))),i}function A(){const e=(0,h.pV)();g.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.api?e.exposed\u0026\u0026e.api[t]\u0026\u0026n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length\u003e1?n:n[0]}(t,...r)}))}const S={};var N=r(9417),_=r(5603),O=r(5284);const I=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let P=!1;function j(e,t={},g,R){let{init:x,info:E,loader_config:j,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();E||(x=L.init,E=L.info,j=L.loader_config),(0,N.xN)(e.agentIdentifier,x||{}),(0,_.a)(e.agentIdentifier,j||{}),E.jsAttributes??={},d.bv\u0026\u0026(E.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,E);const H=(0,N.D0)(e.agentIdentifier),M=[E.beacon,E.errorBeacon];P||(H.proxy.assets\u0026\u0026(I(H.proxy.assets),M.push(H.proxy.assets)),H.proxy.beacon\u0026\u0026M.push(H.proxy.beacon),A(),(0,h.US)(\"activatedFeatures\",O.B),e.runSoftNavOverSpa\u0026\u0026=!0===H.soft_navigations.enabled\u0026\u0026H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?M:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api\u0026\u0026(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");S[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=\u003e{S[e]=t}));var E=\"api-\",A=E+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(E,n,!0,o||null===r?\"session\":void 0)(t,r)}function _(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=\u003e{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=\u003e{g[e]=I(E,e,!0,\"api\")})),g.addPageAction=I(E,\"addPageAction\",!0,n.K7.genericEvents),g.recordCustomEvent=I(E,\"recordCustomEvent\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(E,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=\u003e{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new _).get(\"object\"==typeof e?e:{})};const O=_.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(A+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i\u0026\u0026(0,a.p)(e+t,[r?(0,v.t)():performance.now(),...arguments],r?null:this,i,R),r?void 0:this}}function P(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=\u003e{t(e),(0,c.Ze)(e,\"api\")})).catch((e=\u003e{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=\u003e{O[e]=I(A,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(A,\"routeName\",void 0,n.K7.softNav):I(E,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!S[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=\u003eP()),!0):P(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed\u0026\u0026(e.exposed=k),P=!0}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003eu,K7:()=\u003es,P3:()=\u003ec,XX:()=\u003ei,qY:()=\u003en,v4:()=\u003ea});const n=\"events\",i=\"jserrors\",o=\"browser/blobs\",a=\"rum\",s={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:i,logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},c={[s.pageViewEvent]:1,[s.pageViewTiming]:2,[s.metrics]:3,[s.jserrors]:4,[s.spa]:5,[s.ajax]:6,[s.sessionTrace]:7,[s.softNav]:8,[s.sessionReplay]:9,[s.logging]:10,[s.genericEvents]:11},u={[s.pageViewEvent]:a,[s.pageViewTiming]:n,[s.ajax]:n,[s.spa]:n,[s.softNav]:n,[s.metrics]:i,[s.jserrors]:i,[s.sessionTrace]:o,[s.sessionReplay]:o,[s.logging]:\"browser/logs\",[s.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.281.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.281.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-jmvAlmjCn64ans8tLueqHRlBI/iWekylsDWb94A77CG0ukSriVDvgD3dThx+XjUSBBBMYhFn8B1a18fViyBPEQ==\",249:\"sha512-ICY/ZrcytM/86t5KFy+9OAWVYmNNJy10EBtxoSUGjQWuZx53p/eLo+L8HfrGjvHuRHRnutqLTGSnvNttffJkaA==\",212:\"sha512-pQSn+X/RfBOvx/49HvlghaiXMLhhDQXTi13n1N2XMpDquWJgs9U0pbqE3RbAnYC9nsdaTu/RVGvneEPv1fpCxA==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.281.0.PROD\"]=self[\"webpackChunk:NRBA-1.281.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(){this.agentIdentifier=(0,r.LA)(16)}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}recordCustomEvent(e,t){return this.#e(\"recordCustomEvent\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),t.runtime.harvester.initializedAggregates.push(this.featAggregate),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),E=i(2843),T=i(3878),A=i(782),S=i(1863);class N extends b{static featureName=A.T;constructor(e,t=!0){super(e,A.T,t),p.RI\u0026\u0026((0,E.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,A.T,this.ee)),!0),(0,T.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,A.T,this.ee))),this.importAggregator(e))}}var _=i(3969);class O extends b{static featureName=_.TZ;constructor(e,t=!0){super(e,_.TZ,t),this.importAggregator(e)}}var I=i(6774),P=i(3304);class j{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,P.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new j(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new j(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class M extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",((e,t)=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r,t],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,T.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,T.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var D=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,D.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,P.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,T.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=\u003e{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,P.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){E(t,e)}),(0,T.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,T.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,T.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),pe(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCaptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):E(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function E(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i\u0026\u0026((0,x.p)(_.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Ee,Lc:Te,uP:Ae,Rz:Se}=be;class Ne extends b{static featureName=Ee;constructor(e,t=!0){super(e,Ee,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ae,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Te,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var _e=i(2614);class Oe extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(_e.H3,\"_\").concat(_e.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===_e.g.FULL||e.sessionReplayMode===_e.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee,agentRef:this.#o}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==_e.g.FULL\u0026\u0026this.featAggregate.initializeRecording(_e.g.FULL,!0):(this.#i=_e.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==_e.g.FULL\u0026\u0026(this.recorder.parent.mode=_e.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class Pe extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=\u003e{(0,T.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,T.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var je=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,T.jT)(!1)),e.removeEventListener(\"error\",f,(0,T.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,T.jT)(!1)),e.removeEventListener(\"error\",f,(0,T.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,T.jT)(!1)),e.addEventListener(\"error\",f,(0,T.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function Me(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const De={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(De[t.debugId]++)return t;De[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:$e,e5:Je,tH:Qe,uP:et,rw:tt,Lc:rt}=je;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=Me(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Je]=~~this[Je]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on($e,m),o.on($e,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([Qe+Ze,Qe+\"-done\",Qe+Xe+Ze,Qe+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,$e,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,Qe+Ze),v(d,Qe+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,T.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,T.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,T.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled,e.init.performance.resources.enabled];if(p.RI\u0026\u0026(e.init.user_actions.enabled\u0026\u0026(it.Zp.forEach((e=\u003e(0,T.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=\u003e{const t=(0,v.s)((e=\u003e{(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)}),500,{leading:!0});(0,T.sp)(e,t)}))),e.init.performance.resources.enabled\u0026\u0026p.gm.PerformanceObserver?.supportedEntryTypes.includes(\"resource\"))){new PerformanceObserver((e=\u003e{e.getEntries().forEach((e=\u003e{(0,x.p)(\"browserPerformance.resource\",[e],void 0,this.featureName,this.ee)}))})).observe({type:\"resource\",buffered:!0})}r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t){super(),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,Oe,O,M,ot,ct,Pe,nt],loaderType:\"spa\"})})()})();"])</script><script>self.__next_f.push([1,"e:[\"$\",\"html\",null,{\"lang\":\"en\",\"suppressHydrationWarning\":true,\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"link\",null,{\"rel\":\"preconnect\",\"href\":\"https://cdn.segment.com\"}],[\"$\",\"link\",null,{\"rel\":\"preconnect\",\"href\":\"https://prospect-form-plugin.2u.com\"}],[\"$\",\"$L12\",null,{\"type\":\"text/javascript\",\"src\":\"https://beam.edx.org/consent/fa169e97-be64-4cc1-bad3-9534590f9a30/OtAutoBlock.js\"}],[\"$\",\"$L12\",null,{\"src\":\"https://beam.edx.org/scripttemplates/otSDKStub.js\",\"type\":\"text/javascript\",\"data-domain-script\":\"fa169e97-be64-4cc1-bad3-9534590f9a30\"}],[\"$\",\"$L12\",null,{\"id\":\"ot-loader\",\"type\":\"text/javascript\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n function OptanonWrapper() {\\n function loadSegmentIfConsented() {\\n let activeGroups = window.OnetrustActiveGroups || \\\"\\\";\\n let requiredCategories = [\\\"C0002\\\", \\\"C0004\\\"];\\n let hasConsent = requiredCategories.every((cat) =\u003e\\n activeGroups.includes(\\\",\\\" + cat + \\\",\\\"),\\n );\\n let script = document.getElementById(\\\"segment-analytics\\\")\\n if (hasConsent \u0026\u0026 script \u0026\u0026 script.type === \\\"text/plain\\\") {\\n script.type = \\\"text/javascript\\\";\\n }\\n if (!hasConsent \u0026\u0026 script \u0026\u0026 script.type !== \\\"text/plain\\\") {\\n script.type = \\\"text/plain\\\"; // Prevent execution\\n }\\n }\\n loadSegmentIfConsented();\\n OneTrust.OnConsentChanged(loadSegmentIfConsented);\\n }\\n \"},\"strategy\":\"afterInteractive\"}],[\"$\",\"$L12\",null,{\"id\":\"script-segment\",\"dangerouslySetInnerHTML\":{\"__html\":\"$13\"},\"strategy\":\"beforeInteractive\"}],[[\"$\",\"style\",null,{\"children\":\".preampjs [data-preamp], .fusejs [data-fuse] { opacity: 0 !important}\"}],[\"$\",\"script\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"$14\"}}]],[\"$\",\"$L12\",null,{\"id\":\"script-gtm\",\"dangerouslySetInnerHTML\":{\"__html\":\"(function (w, d, s, l, i) {\\n w[l] = w[l] || [];\\n w[l].push({ \\\"gtm.start\\\": new Date().getTime(), event: \\\"gtm.js\\\" });\\n var f = d.getElementsByTagName(s)[0],\\n j = d.createElement(s),\\n dl = l != \\\"dataLayer\\\" ? \\\"\u0026l=\\\" + l : \\\"\\\";\\n j.async = true;\\n j.src = \\\"https://www.googletagmanager.com/gtm.js?id=\\\" + i + dl;\\n f.parentNode.insertBefore(j, f);\\n})(window, document, \\\"script\\\", \\\"dataLayer\\\", \\\"GTM-543ZGMK2\\\");\\n\"},\"strategy\":\"beforeInteractive\"}],[\"$\",\"$L15\",null,{\"pagetype\":\"other\"}]]}],[\"$\",\"body\",null,{\"className\":\"__className_d65c78\",\"children\":[[\"$\",\"noscript\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"\u003ciframe src=\\\"https://www.googletagmanager.com/ns.html?id=GTM-543ZGMK2\\\" height=\\\"0\\\" width=\\\"0\\\"\\n style=\\\"display:none;visibility:hidden\\\"\u003e\u003c/iframe\u003e\"}}],[\"$\",\"$L16\",null,{\"children\":[\"$\",\"$L17\",null,{}]}],[\"$\",\"$L18\",null,{\"children\":[\"$\",\"$L19\",null,{\"children\":\"$L1a\"}]}],[\"$\",\"$L12\",null,{\"id\":\"nr-browser-agent\",\"strategy\":\"beforeInteractive\",\"dangerouslySetInnerHTML\":{\"__html\":\"$1b\"}}]]}]]}]\n"])</script><script>self.__next_f.push([1,"1c:I[10575,[\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"8003\",\"static/chunks/8003-2972b8eea56e87df.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"1203\",\"static/chunks/app/%5Blocale%5D/layout-bdcb92f3a05369b1.js\"],\"default\"]\n1d:I[99653,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8003\",\"static/chunks/8003-2972b8eea56e87df.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"6816\",\"static/chunks/app/%5Blocale%5D/error-3b41dcbdabbc3d14.js\"],\"default\"]\n1a:[\"$\",\"$L1c\",null,{\"locale\":\"en\",\"now\":\"$D2025-02-20T22:36:24.768Z\",\"timeZone\":\"UTC\",\"messages\":{\"Upgrade\":{\"title\":\"Update to access this page\",\"description\":\"For the best experience it is recommended that you update to the latest version of this app now. Please update now to access the full experience.\",\"ctaHeader\":\"Choose an option:\"},\"LocaleSwitcher\":{\"label\":\"Change language\",\"en\":\"English\",\"es\":\"Spanish\"}},\"children\":[\"$\",\"$La\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"$b\",\"children\"],\"error\":\"$1d\",\"errorStyles\":[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/05177b9cba5d3efe.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],\"errorScripts\":[],\"template\":[\"$\",\"$Ld\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$L1e\",\"notFoundStyles\":[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/05177b9cba5d3efe.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]]}]}]\n"])</script><script>self.__next_f.push([1,"1f:I[50207,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n20:I[72067,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js"])</script><script>self.__next_f.push([1,"\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n22:I[65878,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"Image\"]\n23:I[93885,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23"])</script><script>self.__next_f.push([1,"555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"1e:[[\"$\",\"$L1f\",null,{\"searchParams\":\"$undefined\",\"postId\":\"$undefined\",\"cmsUrl\":\"https://cms.edx.org\"}],[\"$\",\"$L20\",null,{\"course\":\"$undefined\",\"navigation\":{\"header\":{\"logo\":{\"url\":\"/trademark-logos/edx-logo-elm.svg\",\"altText\":\"edX Online\",\"title\":\"edX Online\"},\"search\":{\"placeholder\":\"What do you want to learn?\"},\"navButton\":{\"label\":\"Learn\"},\"cta\":{\"signIn\":{\"label\":\"Sign In\",\"url\":\"https://authn.edx.org/login\"},\"register\":{\"label\":\"Register for free\",\"url\":\"https://authn.edx.org/register\"},\"business\":{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org\"}}},\"sections\":[{\"title\":\"By goal\",\"items\":[{\"label\":\"Take a course\",\"hero\":{\"title\":\"Courses\",\"cta\":{\"viewAll\":{\"label\":\"View all courses\",\"url\":\"/search?tab=course\u0026page=1\"},\"learnMore\":{\"label\":\"View all courses with certificates\",\"url\":\"/courses?q=free+online+courses\"}},\"ctaPosition\":\"left\"},\"productSummaries\":[{\"title\":\"Browse by topic\",\"links\":[{\"url\":\"/courses?q=free+ai+courses\",\"label\":\"AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+cybersecurity+courses\",\"label\":\"Cybersecurity courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+data+science+course\",\"label\":\"Data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+data+analytics+courses\",\"label\":\"Analytics courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+excel+courses\",\"label\":\"Excel courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+programming+courses\",\"label\":\"Programming courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+sql+courses\",\"label\":\"SQL courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+finance+courses\",\"label\":\"Finance courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+digital+marketing+course\",\"label\":\"Digital marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+computer+science+courses\",\"label\":\"Computer science courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+computer+science+courses\",\"label\":\"Coding courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+leadership+courses\",\"label\":\"Leadership courses\",\"isExternal\":false},{\"url\":\"/courses?q=free+accounting+courses\",\"label\":\"Accounting courses\",\"isExternal\":false},{\"url\":\"/courses?q=google+free+courses\",\"label\":\"Google courses\",\"isExternal\":false}]},{\"title\":\"Browse by skill\",\"links\":[{\"url\":\"/courses?q=ai+in+healthcare+course\",\"label\":\"AI in healthcare courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+data+science+course\",\"label\":\"Python data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+for+business+course\",\"label\":\"AI for business courses\",\"isExternal\":false},{\"url\":\"/courses?q=hr+analytics+course\",\"label\":\"HR analytics courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+machine+learning+course\",\"label\":\"Python machine learning courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+marketing+course\",\"label\":\"AI marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=business+marketing+course\",\"label\":\"Business marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+and+machine+learning+courses\",\"label\":\"AI and machine learning courses\",\"isExternal\":false},{\"url\":\"/courses?q=business+management+course\",\"label\":\"Business management courses\",\"isExternal\":false},{\"url\":\"/courses?q=html+css+course\",\"label\":\"HTML css courses\",\"isExternal\":false}]},{\"title\":\"Browse by difficulty\",\"links\":[{\"url\":\"/courses?q=excel+courses+for+beginners\",\"label\":\"Excel courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=excel+advanced+courses\",\"label\":\"Advanced Excel courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+course+for+beginners\",\"label\":\"Python courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=accounting+courses+for+beginners\",\"label\":\"Accounting courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=ai+courses+for+beginners\",\"label\":\"AI courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=data+analytics+courses+for+beginners\",\"label\":\"Data analytics courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=cybersecurity+courses+for+beginners\",\"label\":\"Cybersecurity courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=hr+courses+for+beginners\",\"label\":\"HR courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=finance+courses+for+beginners\",\"label\":\"Finance courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=coding+courses+for+beginners\",\"label\":\"Coding courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=it+courses+for+beginners\",\"label\":\"IT courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=bookkeeping+courses+for+beginners\",\"label\":\"Bookkeeping courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=computer+programming+courses+for+beginners\",\"label\":\"Computer programming courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=project+management+courses+for+beginners\",\"label\":\"Project management courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=trading+courses+for+beginners\",\"label\":\"Trading courses for beginners\",\"isExternal\":false}]},{\"title\":\"Browse by partner\",\"links\":[{\"url\":\"/courses?q=google+ai+course\",\"label\":\"Google AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=mit+ai+course\",\"label\":\"MIT AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=harvard+ai+course\",\"label\":\"Harvard AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=ibm+data+science+course\",\"label\":\"IBM data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=google+python+course\",\"label\":\"Google python courses\",\"isExternal\":false}]}]},{\"label\":\"Earn a certificate\",\"hero\":{\"title\":\"Certificates\",\"subTitle\":\"Self-paced, instructor-led courses and programs that build career-ready skills and elevate your resume.\",\"cta\":{\"viewAll\":{\"label\":\"View all certificates\",\"url\":\"/search?tab=professional-certificate\u0026page=1\"},\"learnMore\":{\"label\":\"Learn more about certificates\",\"url\":\"/certificates\"}},\"ctaPosition\":\"left\"},\"productSummaries\":[{\"title\":\"Professional Certificates\",\"description\":\"A select series of courses in high-demand fields to build your professional skill set.\",\"features\":[\"Instructor-led or self paced\",\"8-16 weeks\"],\"links\":[{\"label\":\"Browse all Professional Certificates\",\"url\":\"/search?tab=professional-certificate\",\"isExternal\":false},{\"label\":\"Browse all XSeries certificates\",\"url\":\"/search?tab=xseries\",\"isExternal\":false}]},{\"title\":\"Executive Education\",\"description\":\"Cohort-based certificate programs in career-critical skills. Aimed at building your professional development to advance or change your career.\",\"features\":[\"Instructor-led\",\"2-12 weeks\"],\"links\":[{\"label\":\"Browse all Executive Education\",\"url\":\"/search?tab=executive-education\",\"isExternal\":false}]}],\"productLists\":[{\"title\":\"Trending certificates\",\"products\":[{\"id\":\"7461d083-bf2e-55bb-af0a-79b2e389a2b8\",\"title\":\"Oxford Executive Leadership Programme\",\"url\":\"/executive-education/university-of-oxford-executive-leadership-programme\",\"owner\":{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}}},{\"id\":\"2933d0bd-43ed-52f0-95f6-12241e257a62\",\"title\":\"Nutrition Science\",\"url\":\"/executive-education/stanford-university-nutrition-science\",\"owner\":{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}}},{\"id\":\"60387e50-0bb8-58cb-be7c-28aff4fd201d\",\"title\":\"Sustainable Finance\",\"url\":\"/executive-education/university-of-cambridge-sustainable-finance\",\"owner\":{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-7e24533c111d.png\"}}},{\"id\":\"87ef0a37-88f5-4843-888c-166fc9d1644a\",\"title\":\"Agile Project Management\",\"url\":\"/certificates/professional-certificate/umd-usmx-agile-project-management\",\"owner\":{\"key\":\"USMx\",\"name\":\"University System of Maryland\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\"}}},{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"e78d61bc-aa9d-417f-b244-fed28f5737b6\",\"title\":\"Data Analyst\",\"url\":\"/certificates/professional-certificate/ibm-data-analyst\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"b9629ec9-af4e-4ea3-9a14-268209a06a76\",\"title\":\"Introduction to Kubernetes and Cloud Native Technologies\",\"url\":\"/certificates/professional-certificate/linuxfoundationx-introduction-to-kubernetes-and-cloud-native-technologies\",\"owner\":{\"key\":\"LinuxFoundationX\",\"name\":\"The Linux Foundation\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\"}}}]}],\"linkList\":{\"title\":\"Popular topics\",\"links\":[{\"label\":\"Data Science Certificates\",\"url\":\"/certificates/data-science-certificate\",\"isExternal\":false},{\"label\":\"Business Certificates\",\"url\":\"/certificates/business-certificate \",\"isExternal\":false},{\"label\":\"Data Analytics Certificates\",\"url\":\"/certificates/data-analytics-certificate\",\"isExternal\":false},{\"label\":\"Artificial Intelligence (AI) Certificates\",\"url\":\"/certificates/ai-certificates\",\"isExternal\":null},{\"label\":\"Machine Learning Certificates\",\"url\":\"/certificates/machine-learning-certificates\",\"isExternal\":false},{\"label\":\"Python Certificates\",\"url\":\"/certificates/python-certificate\",\"isExternal\":false},{\"label\":\"Project Management Certificates\",\"url\":\"/certificates/project-management-certificate\",\"isExternal\":false},{\"label\":\"Digital Marketing Certificates\",\"url\":\"/certificates/digital-marketing-certificates\",\"isExternal\":false},{\"label\":\"IT Certificates\",\"url\":\"/certificates/it-certificates\",\"isExternal\":false},{\"label\":\"Sustainability Executive Education Programs\",\"url\":\"/executive-education/sustainability\",\"isExternal\":false},{\"label\":\"Data Science Executive Education Programs\",\"url\":\"/executive-education/data-science\",\"isExternal\":false},{\"label\":\"Management Executive Education Programs\",\"url\":\"/executive-education/management\",\"isExternal\":false},{\"label\":\"Data Analytics Executive Education Programs\",\"url\":\"/executive-education/data-analytics\",\"isExternal\":false},{\"label\":\"Product Management Executive Education Programs\",\"url\":\"/executive-education/product-management\",\"isExternal\":false},{\"label\":\"Economics Executive Education Programs\",\"url\":\"/executive-education/economics\",\"isExternal\":false},{\"label\":\"Strategy Executive Education Programs\",\"url\":\"/executive-education/strategy\",\"isExternal\":false},{\"label\":\"Finance Executive Education Programs\",\"url\":\"/executive-education/finance\",\"isExternal\":false},{\"label\":\"Leadership Executive Education Programs\",\"url\":\"/executive-education/leadership\",\"isExternal\":false},{\"label\":\"FinTech Executive Education Programs\",\"url\":\"/executive-education/fintech\",\"isExternal\":false},{\"label\":\"Real Estate Executive Education Programs\",\"url\":\"/executive-education/real-estate\",\"isExternal\":false},{\"label\":\"Blockchain Executive Education Programs\",\"url\":\"/executive-education/blockchain\",\"isExternal\":false},{\"label\":\"Healthcare Executive Education Programs\",\"url\":\"/executive-education/healthcare\",\"isExternal\":false},{\"label\":\"Artificial Intelligence (AI) Executive Education Programs\",\"url\":\"/executive-education/artificial-intelligence\",\"isExternal\":false},{\"label\":\"Marketing Executive Education Programs\",\"url\":\"/executive-education/marketing\",\"isExternal\":false},{\"label\":\"Project Management Executive Education Programs\",\"url\":\"/executive-education/project-management\",\"isExternal\":false},{\"label\":\"Digital Marketing Executive Education Programs\",\"url\":\"/executive-education/digital-marketing\",\"isExternal\":false},{\"label\":\"Operations Management Executive Education Programs\",\"url\":\"/executive-education/operations-management\",\"isExternal\":false},{\"label\":\"Design Executive Education Programs\",\"url\":\"/executive-education/design\",\"isExternal\":false},{\"label\":\"Supply Chain Executive Education Programs\",\"url\":\"/executive-education/supply-chain\",\"isExternal\":false},{\"label\":\"Information Technology Executive Education Programs\",\"url\":\"/executive-education/information-technology\",\"isExternal\":false},{\"label\":\"Cybersecurity Executive Education Programs\",\"url\":\"/executive-education/cybersecurity\",\"isExternal\":false},{\"label\":\"Innovation Executive Education Programs\",\"url\":\"/executive-education/innovation\",\"isExternal\":false},{\"label\":\"Negotiation Executive Education Programs\",\"url\":\"/executive-education/negotiation\",\"isExternal\":false},{\"label\":\"Entrepreneurship Executive Education Programs\",\"url\":\"/executive-education/entrepreneurship\",\"isExternal\":false},{\"label\":\"Law Executive Education Programs\",\"url\":\"/executive-education/law\",\"isExternal\":false},{\"label\":\"Programas de Educación Ejecutiva en Transformación Digital\",\"url\":\"/executive-education/digital-transformation\",\"isExternal\":false},{\"label\":\"Human Resources Executive Education Programs\",\"url\":\"/executive-education/human-resources\",\"isExternal\":false},{\"label\":\"Talent Management Executive Education Programs\",\"url\":\"/executive-education/talent-management\",\"isExternal\":false},{\"label\":\"Sales Executive Education Programs\",\"url\":\"/executive-education/sales\",\"isExternal\":false},{\"label\":\"Accounting Executive Education Programs\",\"url\":\"/executive-education/accounting\",\"isExternal\":false},{\"label\":\"Change Management Executive Education Programs\",\"url\":\"/executive-education/change-management\",\"isExternal\":false},{\"label\":\"Risk Management Executive Education Programs\",\"url\":\"/executive-education/risk-management\",\"isExternal\":false},{\"label\":\"International Relations Executive Education Programs\",\"url\":\"/executive-education/international-relations\",\"isExternal\":false},{\"label\":\"Women's Executive Leadership Programs\",\"url\":\"/executive-education/womens-executive-leadership-program\",\"isExternal\":false}]}},{\"label\":\"Earn a degree\",\"hero\":{\"title\":\"Degrees\",\"subTitle\":\"Degree programs from top institutions around the world to enable your career transformation and advancement.\",\"cta\":{\"viewAll\":{\"label\":\"View all Degrees\",\"url\":\"/search?tab=degree-program\u0026page=1\"}},\"ctaPosition\":\"right\"},\"productSummaries\":[{\"title\":\"Master's \u0026 Doctoral\",\"description\":\"Online degree programs from top institutions taught by expert faculty.\",\"features\":[\"Instructor-led, graduate level classes\",\"1-3 years\"],\"links\":[{\"label\":\"Browse all Master's Degrees\",\"url\":\"/masters\"},{\"label\":\"Browse all Doctorate degrees\",\"url\":\"/doctorate\"}]},{\"title\":\"Bachelor's\",\"description\":\"Online undergraduate degree programs from top institutions taught by expert faculty.\",\"features\":[\"Instructor-led, online classes\",\"2-6 years\"],\"links\":[{\"label\":\"Browse all Bachelor's degrees\",\"url\":\"/bachelors\"}]},{\"title\":\"Paths to degrees\",\"description\":\"A series of graduate-level programs from top institutions, uniquely designed to advance your career by providing a deep level of learning in a specific discipline.\",\"features\":[\"Instructor-led, online classes\",\"2 - 6 months\"],\"links\":[{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"},{\"label\":\"Browse all MicroBachelors® pathways\",\"url\":\"/bachelors/microbachelors\"}]}],\"productLists\":[{\"title\":\"Trending degrees\",\"products\":[{\"id\":\"85f981c8-4e1b-4cc4-b3cc-cd2bd741b405\",\"title\":\"Master of Arts in Psychology\",\"url\":\"/masters/psychology/pepperdine-master-of-arts-in-psychology\",\"owner\":{\"key\":\"Pepperdine\",\"name\":\"Pepperdine University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9028c889-8b76-4d81-a7ec-622c024550ef-820f45a8df63.png\"}}},{\"id\":\"273b170f-af05-4036-9f51-d865910959e2\",\"title\":\"Master of Social Work\",\"url\":\"/masters/online-msw-programs/denver-master-of-social-work\",\"owner\":{\"key\":\"UniversityofDenver\",\"name\":\"University of Denver\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed4b14c6-ee2c-4a78-a97b-e73bad0485af-27577f044447.png\"}}},{\"id\":\"c106927f-09cc-4b9a-9f8c-c757db45d92a\",\"title\":\"Bachelor of Science in Economics and Management\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-economics-and-management\",\"owner\":{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}}},{\"id\":\"4a8c1f85-f7bb-4ba9-b102-b5864c921fa1\",\"title\":\"Master of Public Health\",\"url\":\"/masters/masters-in-public-health-online/unc-master-of-public-health\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}},{\"id\":\"a50e509c-44ae-4e85-9e12-85af6052c613\",\"title\":\"Doctor of Education in Leadership and Learning in Organizations\",\"url\":\"/doctorate/online-edd-programs/vanderbilt-doctor-of-education-in-leadership-and-learning-in-organizations\",\"owner\":{\"key\":\"Vanderbilt\",\"name\":\"Vanderbilt University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de684a48-2ebc-4596-b466-98ea2cc948b4-864155e2641e.png\"}}},{\"id\":\"35ec5b30-d213-4778-ab2a-ae2783c86502\",\"title\":\"Master of Science Strategic Marketing\",\"url\":\"/masters/surrey-master-of-science-strategic-marketing\",\"owner\":{\"key\":\"UOS\",\"name\":\"University of Surrey\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/fab95b1f-000b-45fe-97a9-89b449974728-7da9db5b85f8.png\"}}}]}],\"linkList\":{\"title\":\"Trending Topics\",\"links\":[{\"label\":\"Master's in Business Administration (MBA)\",\"url\":\"/masters/online-mba\"},{\"label\":\"Master's in Social Work (MSW)\",\"url\":\"/masters/online-msw-programs\"},{\"label\":\"Master's in Psychology\",\"url\":\"/masters/psychology\"},{\"label\":\"Master's in Clinical Psychology\",\"url\":\"/masters/psychology/online-masters-in-clinical-psychology\"},{\"label\":\"Master's in Marriage and Family Therapy (MFT)\",\"url\":\"/masters/psychology/online-mft-programs\"},{\"label\":\"Master's in Applied Behavior Analysis (ABA)\",\"url\":\"/masters/psychology/online-aba-programs\"},{\"label\":\"Master's in Licensed Professional Counseling (LPC)\",\"url\":\"/masters/psychology/online-lpc-programs\"},{\"label\":\"Master of Data Science (MDS)\",\"url\":\"/masters/online-masters-in-data-science\"},{\"label\":\"Master's in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"},{\"label\":\"Master's in Architecture (M.Arch)\",\"url\":\"/masters/online-masters-in-architecture\"},{\"label\":\"Master's in Speech Language Pathology (SLP)\",\"url\":\"/masters/online-slp-programs\"},{\"label\":\"Master's in Public Health (MPH)\",\"url\":\"/masters/masters-in-public-health-online\"},{\"label\":\"Master's in Education\",\"url\":\"/masters/masters-in-education-online\"},{\"label\":\"Master's in Educational Leadership\",\"url\":\"/masters/masters-in-education-online/online-masters-in-educational-leadership\"},{\"label\":\"Master's in Teaching (MAT)\",\"url\":\"/masters/online-mat-programs\"},{\"label\":\"Master's in Nursing (MSN)\",\"url\":\"/masters/online-msn-programs\"},{\"label\":\"Family Nurse Practitioner (FNP)\",\"url\":\"/masters/online-msn-programs/online-fnp-programs\"},{\"label\":\"Psychiatric Mental Health Nurse Practitioner (PMHNP)\",\"url\":\"/masters/online-msn-programs/online-pmhnp-programs\"},{\"label\":\"Acute Care Nurse Practitioner (ACNP)\",\"url\":\"/masters/online-msn-programs/online-acute-care-nurse-practitioner-programs\"},{\"label\":\"Master of Laws (LLM)\",\"url\":\"/masters/online-llm-programs\"},{\"label\":\"Master of Legal Studies\",\"url\":\"/masters/online-master-of-legal-studies\"},{\"label\":\"Master's in Counseling\",\"url\":\"/masters/counseling\"},{\"label\":\"Master's in School Counseling\",\"url\":\"/masters/counseling/online-masters-in-school-counseling\"},{\"label\":\"Master's in Mental Health Counseling\",\"url\":\"/masters/counseling/online-masters-in-mental-health-counseling\"},{\"label\":\"Master's in Counseling \u0026 Psychology\",\"url\":\"/masters/counseling-psychology\"},{\"label\":\"Master of Engineering (MEng)\",\"url\":\"/masters/online-masters-in-engineering\"},{\"label\":\"Master's in Computer Engineering\",\"url\":\"/masters/online-masters-in-engineering/online-computer-engineering-masters\"},{\"label\":\"Master's in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity\"},{\"label\":\"Master's in Information Technology (IT)\",\"url\":\"/masters/online-masters-in-information-technology\"},{\"label\":\"Master's in Information Systems\",\"url\":\"/masters/masters-in-information-systems-online\"},{\"label\":\"Master's in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science\"},{\"label\":\"Master of Library and Information Science (MLIS)\",\"url\":\"/masters/online-mlis-programs\"},{\"label\":\"Master's in International Relations\",\"url\":\"/masters/online-masters-in-international-relations\"},{\"label\":\"Master's in Communication\",\"url\":\"/masters/online-masters-in-communication\"},{\"label\":\"Master's in Design\",\"url\":\"/masters/online-masters-in-design\"},{\"label\":\"Master's in Health Administration (MHA)\",\"url\":\"/masters/online-mha\"},{\"label\":\"Master's in Business\",\"url\":\"/masters/online-masters-in-business\"},{\"label\":\"Master of Accounting\",\"url\":\"/masters/online-masters-in-accounting\"},{\"label\":\"Master's in Entrepreneurship\",\"url\":\"/masters/masters-in-entrepreneurship-online\"},{\"label\":\"Master's in Leadership\",\"url\":\"/masters/masters-in-leadership-online\"},{\"label\":\"Master's in Human Resources\",\"url\":\"/masters/online-masters-in-human-resources\"},{\"label\":\"Master's in Supply Chain Management\",\"url\":\"/masters/online-masters-in-supply-chain-management\"},{\"label\":\"Master's in Public Administration (MPA)\",\"url\":\"/masters/masters-in-public-administration-online\"},{\"label\":\"Master's in Analytics\",\"url\":\"/masters/online-masters-in-analytics\"},{\"label\":\"Maestría en Analítica de Negocios\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-business-analytics\"},{\"label\":\"Master's in Data Analytics\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-data-analytics\"},{\"label\":\"Master's in Project Management (MPM)\",\"url\":\"/masters/masters-in-project-management-online\"},{\"label\":\"Maestría en Cuidado de la Salud\",\"url\":\"/masters/healthcare\"},{\"label\":\"Master's in Nutrition\",\"url\":\"/masters/online-masters-in-nutrition\"},{\"label\":\"Licenciatura en Trabajo Social (BSW)\",\"url\":\"/bachelors/social-work-bsw\"},{\"label\":\"Bachelor of Psychology\",\"url\":\"/bachelors/psychology\"},{\"label\":\"Bachelor of Computer Science in Data Science\",\"url\":\"/bachelors/computer-data-sciences\"},{\"label\":\"Bachelor of Public Health\",\"url\":\"/bachelors/bachelors-in-public-health-online\"},{\"label\":\"Bachelor of Accounting\",\"url\":\"/bachelors/online-accounting-bachelor-degree\"},{\"label\":\"Bachelor of Finance\",\"url\":\"/bachelors/online-bachelors-degree-finance\"},{\"label\":\"Bachelor of Health and Social Service\",\"url\":\"/bachelors/health-social-services\"},{\"label\":\"Bachelor's in Business\",\"url\":\"/bachelors/business\"},{\"label\":\"Doctorate in Social Work (DSW)\",\"url\":\"/doctorate/social-work\"},{\"label\":\"Doctor of Public Health (DrPH)\",\"url\":\"/doctorate/online-drph-programs\"},{\"label\":\"Doctor of Education (EdD)\",\"url\":\"/doctorate/online-edd-programs\"},{\"label\":\"Doctor of Nursing Practice (DNP)\",\"url\":\"/doctorate/online-dnp-programs\"},{\"label\":\"Doctor of Physical Therapy (DPT)\",\"url\":\"/doctorate/online-dpt-programs\"},{\"label\":\"Doctor of Pharmacy (PharmD)\",\"url\":\"/doctorate/online-pharmd-programs\"}]}}]},{\"title\":\"By topic\",\"items\":[{\"label\":\"Artificial Intelligence\",\"hero\":{\"title\":\"Artificial Intelligence\",\"subTitle\":\"Artificial Intelligence (AI) is a unique field of study that combines computer science, robust datasets, and the ability of machines to simulate human intelligence to advance problem-solving techniques and tasks.\",\"cta\":{\"viewAll\":{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?tab=course\u0026skills.skill=Artificial+Intelligence\"},\"learnMore\":{\"label\":\"Learn more about Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"ChatGPT\",\"url\":\"/learn/chatgpt\"},{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"Computer Science\",\"url\":\"/learn/computer-science\"},{\"label\":\"Electronics\",\"url\":\"/learn/electronics\"},{\"label\":\"Automation\",\"url\":\"/learn/automation\"},{\"label\":\"Augmented Reality\",\"url\":\"/learn/augmented-reality\"},{\"label\":\"Internet of Things\",\"url\":\"/learn/iot-internet-of-things\"},{\"label\":\"Software Engineering\",\"url\":\"/learn/software-engineering\"},{\"label\":\"Data Mining\",\"url\":\"/learn/data-mining\"},{\"label\":\"Robotics\",\"url\":\"/learn/robotics\"},{\"label\":\"Deep Learning\",\"url\":\"/learn/deep-learning\"},{\"label\":\"Computer Engineering\",\"url\":\"/learn/computer-engineering\"},{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"},{\"label\":\"Natural Language Processing\",\"url\":\"/learn/natural-language-processing\"},{\"label\":\"Computer Programming\",\"url\":\"/learn/computer-programming\"},{\"label\":\"Computer Vision\",\"url\":\"/learn/computer-vision\"},{\"label\":\"Robotic Process Automation\",\"url\":\"/learn/robotic-process-automation\"},{\"label\":\"Computer Networking\",\"url\":\"/learn/computer-networking\"},{\"label\":\"Mathematical Modeling\",\"url\":\"/learn/mathematical-modeling\"},{\"label\":\"Autonomous Robotics\",\"url\":\"/learn/autonomous-robotics\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"d62627c6-2b97-5ffc-b862-2f2c4bab95cf\",\"title\":\"Large Language Models: Application through Production\",\"url\":\"/learn/computer-science/databricks-large-language-models-application-through-production\",\"owner\":{\"key\":\"Databricks\",\"name\":\"Databricks\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f396c277-2a09-46ec-b76f-32fedc4a82cc-59e1dca89c96.png\"}}},{\"id\":\"b58fc9b9-5426-56e6-9cdc-f1f872b3e816\",\"title\":\"CS50's Introduction to Artificial Intelligence with Python\",\"url\":\"/learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"df35235c-d8a5-5d87-992a-51e960aa2bb5\",\"title\":\"AI for Everyone: Master the Basics\",\"url\":\"/learn/artificial-intelligence/ibm-ai-for-everyone-master-the-basics\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}}],\"cta\":{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?q=artificial+intelligence\u0026tab=course\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"09a238fc-8b5a-5d83-8c74-2f002c3ba841\",\"title\":\"Artificial Intelligence in Health Care\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-in-health-care\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"e7388b02-2261-507f-a84e-f5a0f5d47c49\",\"title\":\"Artificial Intelligence: Implications for Business Strategy\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"396aac5e-d950-5f87-95ca-8184399edd50\",\"title\":\"Oxford Artificial Intelligence Programme\",\"url\":\"/executive-education/university-of-oxford-artificial-intelligence-programme\",\"owner\":{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}}}],\"cta\":{\"label\":\"View all Artificial Intelligence Certificates\",\"url\":\"/certificates/ai-certificates\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"title\":\"Master of Science in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"89f39d1a-bb23-4944-b6e0-b51fe25ce932\",\"title\":\"Master of Science in Artificial Intelligence (MSAI)\",\"url\":\"/masters/online-masters-in-artificial-intelligence/online-master-artificial-intelligence-utaustinx\",\"owner\":{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}}},{\"id\":\"ee60cf8f-3b6c-476f-94c1-1a16c8f50c48\",\"title\":\"Master of Science in Artificial Intelligence\",\"url\":\"/masters/maryville-university-master-of-science-in-artificial-intelligence\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Masters in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"}}]},{\"label\":\"Data Science\",\"hero\":{\"title\":\"Data Science\",\"subTitle\":\"Data Science is an interdisciplinary field which utilizes scientific methods, algorithms, and data insights to extract meaning and drive informed decision-making across industries.\",\"cta\":{\"viewAll\":{\"label\":\"View all Data Science courses\",\"url\":\"/search?tab=course\u0026skills.skill=Data+Science\"}},\"ctaPosition\":\"right\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Power BI\",\"url\":\"/learn/power-bi\"},{\"label\":\"SQL\",\"url\":\"/learn/sql\"},{\"label\":\"Analytics\",\"url\":\"/learn/analytics\"},{\"label\":\"MySQL\",\"url\":\"/learn/mysql\"},{\"label\":\"Coding\",\"url\":\"/learn/coding\"},{\"label\":\"PostgreSQL\",\"url\":\"/learn/postgresql\"},{\"label\":\"Big Data\",\"url\":\"/learn/big-data\"},{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"},{\"label\":\"Syntax\",\"url\":\"/learn/syntax\"},{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"},{\"label\":\"TensorFlow\",\"url\":\"/learn/tensorflow\"},{\"label\":\"Probability\",\"url\":\"/learn/probability\"},{\"label\":\"Regression\",\"url\":\"/learn/regression\"},{\"label\":\"Inference\",\"url\":\"/learn/inference\"},{\"label\":\"PyTorch\",\"url\":\"/learn/pytorch\"},{\"label\":\"Grafana\",\"url\":\"/learn/grafana\"},{\"label\":\"Business Intelligence\",\"url\":\"/learn/business-intelligence\"},{\"label\":\"Data Warehouse\",\"url\":\"/learn/data-warehouse\"},{\"label\":\"Data Structures\",\"url\":\"/learn/data-structures\"},{\"label\":\"Data Visualization\",\"url\":\"/learn/data-visualization\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"ad547f78-ac97-510f-9470-c9c0e6c9d348\",\"title\":\"Introduction to Analytics Modeling\",\"url\":\"/learn/data-analysis/the-georgia-institute-of-technology-introduction-to-analytics-modeling\",\"owner\":{\"key\":\"GTx\",\"name\":\"The Georgia Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\"}}},{\"id\":\"a926dd9d-d01b-5a7e-9905-c472ed4a388c\",\"title\":\"Data Science: R Basics\",\"url\":\"/learn/r-programming/harvard-university-data-science-r-basics\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"2205130f-9a8c-5988-aa70-ec37c470c2b0\",\"title\":\"Probability - The Science of Uncertainty and Data\",\"url\":\"/learn/probability/massachusetts-institute-of-technology-probability-the-science-of-uncertainty-and-data\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}}],\"cta\":{\"label\":\"View all Data Science courses\",\"url\":\"/search?q=data+science\u0026tab=course\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"3c32e3e0-b6fe-4ee4-bd4f-210c6339e074\",\"title\":\"Data Science\",\"url\":\"/certificates/professional-certificate/harvardx-data-science\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"b5598690-9bd8-4d21-b7f3-dc741b50473f\",\"title\":\"IBM Data Science\",\"url\":\"/certificates/professional-certificate/ibm-data-science\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"673ea595-1439-4a34-ad71-cc5c995c6fc6\",\"title\":\"Learning Python for Data Science\",\"url\":\"/certificates/professional-certificate/harvardx-learning-python-for-data-science\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}}],\"cta\":{\"label\":\"View all Data Science certificates\",\"url\":\"/certificates/data-science-certificate\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"721f524b-da8f-4923-83b4-a18de44fdc43\",\"title\":\"Master's Degree in Data Science\",\"url\":\"/masters/online-masters-in-data-science/online-master-data-science-utaustinx\",\"owner\":{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}}},{\"id\":\"58331700-1a02-4abe-a858-4ebe83200d15\",\"title\":\"Master of Information and Data Science\",\"url\":\"/masters/online-masters-in-data-science/ucb-master-of-information-and-data-science\",\"owner\":{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}}},{\"id\":\"70adbe06-2ef5-446e-97cf-7d26520a9697\",\"title\":\"Master of Applied Data Science\",\"url\":\"/masters/online-masters-in-data-science/unc-master-of-applied-data-science\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}}],\"cta\":{\"label\":\"View all Data Science degrees\",\"url\":\"/masters/online-masters-in-data-science\"}}]},{\"label\":\"Finance\",\"hero\":{\"title\":\"Finance\",\"subTitle\":\"Navigate the complex field of Finance, including money management, investments, and financial planning. Gain insights into market analysis and strategic decision-making, allowing for growth and profitability.\",\"cta\":{\"viewAll\":{\"label\":\"View all Finance courses\",\"url\":\"/search?skills.skill=Finance\"},\"learnMore\":{\"label\":\"Learn more about Finance\",\"url\":\"/learn/finance\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Bitcoin\",\"url\":\"/learn/bitcoin\"},{\"label\":\"Investing\",\"url\":\"/learn/investing\"},{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"},{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"},{\"label\":\"Trading\",\"url\":\"/learn/trading\"},{\"label\":\"Fintech\",\"url\":\"/learn/fintech\"},{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"},{\"label\":\"Banking\",\"url\":\"/learn/banking\"},{\"label\":\"Risk Management\",\"url\":\"/learn/risk-management\"},{\"label\":\"Venture Capital\",\"url\":\"/learn/venture-capital\"},{\"label\":\"Taxes\",\"url\":\"/learn/taxes\"},{\"label\":\"Investment Banking\",\"url\":\"/learn/investment-banking\"},{\"label\":\"Financial Management\",\"url\":\"/learn/financial-management\"},{\"label\":\"Cryptography\",\"url\":\"/learn/cryptography\"},{\"label\":\"Circular Economy\",\"url\":\"/learn/circular-economy\"},{\"label\":\"Macroeconomics\",\"url\":\"/learn/macroeconomics\"},{\"label\":\"Financial Accounting\",\"url\":\"/learn/financial-accounting\"},{\"label\":\"Financial Literacy\",\"url\":\"/learn/financial-literacy\"},{\"label\":\"Personal Finance\",\"url\":\"/learn/personal-finance\"},{\"label\":\"Corporate Finance\",\"url\":\"/learn/corporate-finance\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"c211d581-03d2-5c31-b34f-a988be4cc3a4\",\"title\":\"Introduction to Corporate Finance\",\"url\":\"/learn/corporate-finance/columbia-university-introduction-to-corporate-finance\",\"owner\":{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}}},{\"id\":\"7eb35c18-ca39-552e-9241-ed3cab2f937e\",\"title\":\"Foundations of Modern Finance I\",\"url\":\"/learn/finance/massachusetts-institute-of-technology-foundations-of-modern-finance-i\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"feb03847-e53c-501a-b1cf-ebe2ccc23f4c\",\"title\":\"Foundations of Finance\",\"url\":\"/learn/finance/university-of-cambridge-foundations-of-finance\",\"owner\":{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-fbcc652f58e1.png\"}}}],\"cta\":{\"label\":\"View all Finance courses\",\"url\":\"/search?q=finance\u0026tab=course\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"4666a4d2-1337-5324-85bf-059350078d5b\",\"title\":\"FinTech\",\"url\":\"/executive-education/harvard-university-fintech\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"e590608c-e3f8-5731-8b22-ce1b4b589b23\",\"title\":\"MBA Essentials\",\"url\":\"/executive-education/the-london-school-of-economics-and-political-science-mba-essentials\",\"owner\":{\"key\":\"LSE\",\"name\":\"The London School of Economics and Political Science\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\"}}},{\"id\":\"1859f52c-3fc0-43fe-a8a1-13660c77e9c3\",\"title\":\"Corporate Finance\",\"url\":\"/certificates/professional-certificate/columbiax-corporate-finance\",\"owner\":{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}}}],\"cta\":{\"label\":\"View all Finance certificates\",\"url\":\"/search?q=finance\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Graduate Degrees\",\"products\":[{\"id\":\"d85a67b7-2f8b-4f4a-8900-e4dd15cf64c8\",\"title\":\"Master of Science in Professional Accounting\",\"url\":\"/masters/online-masters-in-accounting/syracuse-master-of-science-in-professional-accounting\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"74f633a8-2eaa-4202-9e31-79f6868934b0\",\"title\":\"Master of Management\",\"url\":\"/masters/ucdavis-master-of-management\",\"owner\":{\"key\":\"UCDavis\",\"name\":\"University of California, Davis\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}}},{\"id\":\"518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"title\":\"Master of Science in Accounting\",\"url\":\"/masters/maryville-university-master-of-science-in-accounting\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Finance degrees\",\"url\":\"/search?q=finance+degree\u0026tab=program\"}},{\"title\":\"Undergraduate Degrees\",\"products\":[{\"id\":\"f9414209-c0ac-4572-bb46-2dde155f3a22\",\"title\":\"Bachelor of Science in Economics and Finance\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-economics-and-finance\",\"owner\":{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}}},{\"id\":\"5e15f5aa-8a0a-4362-833d-1c9875e1ebad\",\"title\":\"Bachelor of Science in Accounting and Finance\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-accounting-and-finance\",\"owner\":{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}}},{\"id\":\"da3a0dc4-f697-48fd-bc7d-44c208608dd5\",\"title\":\"Bachelor of Science in Finance\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-finance\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Finance degrees\",\"url\":\"/search?q=finance+degree\u0026tab=program\"}}]},{\"label\":\"Business Administration\",\"hero\":{\"title\":\"Business Administration\",\"subTitle\":\"Business Administration is the key to lead and manage operations, organize resources, and direct a team to achieve organizational goals with efficiency and effectiveness.\",\"cta\":{\"viewAll\":{\"label\":\"View all Business Administration Courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"},\"learnMore\":{\"label\":\"Learn more about Business Administration\",\"url\":\"/learn/business-administration\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Excel\",\"url\":\"/learn/excel\"},{\"label\":\"Marketing\",\"url\":\"/learn/marketing\"},{\"label\":\"Digital Marketing\",\"url\":\"/learn/digital-marketing\"},{\"label\":\"Entrepreneurship\",\"url\":\"/learn/entrepreneurship\"},{\"label\":\"Success\",\"url\":\"/learn/success\"},{\"label\":\"CEO\",\"url\":\"/learn/ceo\"},{\"label\":\"Management\",\"url\":\"/learn/management\"},{\"label\":\"Sales\",\"url\":\"/learn/sales\"},{\"label\":\"Accounting\",\"url\":\"/learn/accounting\"},{\"label\":\"Leadership\",\"url\":\"/learn/leadership\"},{\"label\":\"Innovation\",\"url\":\"/learn/innovation\"},{\"label\":\"Procurement\",\"url\":\"/learn/procurement\"},{\"label\":\"Scrum\",\"url\":\"/learn/scrum\"},{\"label\":\"Zapier\",\"url\":\"/learn/zapier\"},{\"label\":\"Ecommerce\",\"url\":\"/learn/ecommerce\"},{\"label\":\"Project Management\",\"url\":\"/learn/project-management\"},{\"label\":\"Agile\",\"url\":\"/learn/agile\"},{\"label\":\"ServiceNow\",\"url\":\"/learn/servicenow\"},{\"label\":\"Business Plan\",\"url\":\"/learn/business-plan\"},{\"label\":\"Retail\",\"url\":\"/learn/retail\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"6eca70a5-ef9e-5ac5-a960-16b5c619f367\",\"title\":\"Exercising Leadership: Foundational Principles\",\"url\":\"/learn/leadership/harvard-university-exercising-leadership-foundational-principles\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"03a0222e-f392-5beb-9bb5-ab4c25f37018\",\"title\":\"Financial Accounting\",\"url\":\"/learn/financial-accounting/massachusetts-institute-of-technology-financial-accounting\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"92f758de-cddd-591e-a750-6b3e9ec47c0f\",\"title\":\"Supply Chain Fundamentals\",\"url\":\"/learn/supply-chain-design/massachusetts-institute-of-technology-supply-chain-fundamentals\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}}],\"cta\":{\"label\":\"View all Business Administration courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"e590608c-e3f8-5731-8b22-ce1b4b589b23\",\"title\":\"MBA Essentials\",\"url\":\"/executive-education/the-london-school-of-economics-and-political-science-mba-essentials\",\"owner\":{\"key\":\"LSE\",\"name\":\"The London School of Economics and Political Science\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\"}}},{\"id\":\"ae9513fa-9c85-5826-948f-826244d04618\",\"title\":\"Oxford Executive Strategy Programme\",\"url\":\"/executive-education/university-of-oxford-executive-strategy-programme\",\"owner\":{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}}},{\"id\":\"ed0e908c-0aa2-5c72-b640-5f28f4147f16\",\"title\":\"Business Sustainability Management\",\"url\":\"/executive-education/university-of-cambridge-business-sustainability-management\",\"owner\":{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-fbcc652f58e1.png\"}}}],\"cta\":{\"label\":\"View all Business Administration certificates\",\"url\":\"/certificates/business-certificate\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"fe32d1c5-5e22-4f5a-8a92-71ef3d654d96\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/ucd-master-of-business-administration\",\"owner\":{\"key\":\"UCDavis\",\"name\":\"University of California, Davis\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}}},{\"id\":\"1be98dfc-6b32-4f4c-8beb-02a2b1ef9183\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/unc-master-of-business-administration\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}}],\"cta\":{\"label\":\"View all Business Administration degrees\",\"url\":\"/search?learning_type=MicroMasters\u0026learning_type=Executive+Education\u0026learning_type=Masters\u0026learning_type=MicroBachelors\u0026learning_type=Bachelors\u0026subject=Business+%26+Management\"}}]},{\"label\":\"Cybersecurity\",\"hero\":{\"title\":\"Cybersecurity\",\"subTitle\":\"Cybersecurity is a subset of information technology (IT) focused on protecting digital systems and information. Cybersecurity specialists play key roles in the protection of IT systems against unauthorized access to data systems, centers and other systems.\",\"cta\":{\"viewAll\":{\"label\":\"View all Cybersecurity Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Cyber+Security\"},\"learnMore\":{\"label\":\"Learn more about Cybersecurity\",\"url\":\"/learn/cybersecurity\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Information Security\",\"url\":\"/learn/information-security\"},{\"label\":\"Computer Security\",\"url\":\"/learn/computer-security\"},{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"},{\"label\":\"Encryption\",\"url\":\"/learn/encryption\"},{\"label\":\"Security Administration\",\"url\":\"/learn/security-administration\"},{\"label\":\"Security Software\",\"url\":\"/learn/security-software\"},{\"label\":\"Vulnerability Management\",\"url\":\"/learn/vulnerability-management\"},{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"},{\"label\":\"Data Encryption\",\"url\":\"/learn/data-encryption\"},{\"label\":\"SaaS\",\"url\":\"/learn/software-as-a-service\"},{\"label\":\"User Experience (UX)\",\"url\":\"/learn/user-experience-ux\"},{\"label\":\"Cybersecurity\",\"url\":\"/learn/cybersecurity\"},{\"label\":\"UX Design\",\"url\":\"/learn/ux-design\"},{\"label\":\"Network Security\",\"url\":\"/learn/network-security\"},{\"label\":\"Security Testing\",\"url\":\"/learn/security-testing\"},{\"label\":\"Data Management\",\"url\":\"/learn/data-management\"},{\"label\":\"Technical Analysis\",\"url\":\"/learn/technical-analysis\"},{\"label\":\"Encryption Software\",\"url\":\"https://www.edx.org/learn/encryption-software\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"1457154d-7332-535d-8f8a-6175288a53d0\",\"title\":\"CS50's Introduction to Cybersecurity\",\"url\":\"/learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"c082bec2-3ddc-5e34-b0da-dd64190dbb41\",\"title\":\"Cybersecurity Fundamentals\",\"url\":\"/learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals\",\"owner\":{\"key\":\"RITx\",\"name\":\"Rochester Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\"}}},{\"id\":\"40667c7b-c4ce-5284-8c44-fbb76f64cc18\",\"title\":\"Introduction to Cybersecurity\",\"url\":\"/learn/cybersecurity/university-of-washington-introduction-to-cybersecurity\",\"owner\":{\"key\":\"UWashingtonX\",\"name\":\"University of Washington\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity courses\",\"url\":\"/search?q=cybersecurity\u0026tab=course\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"ffc2c233-cf68-53ad-b784-71e8aa535988\",\"title\":\"Cybersecurity: Managing Risk in the Information Age\",\"url\":\"/executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"ec5c1256-cb38-5693-84e3-484e41ac32d4\",\"title\":\"Fundamentals of Cybersecurity\",\"url\":\"/executive-education/university-of-cape-town-fundamentals-of-cybersecurity\",\"owner\":{\"key\":\"UCT\",\"name\":\"University of Cape Town\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-7302375e32bd.png\"}}},{\"id\":\"f32b3450-2bc6-4704-905c-4ec08316f8b3\",\"title\":\"Cybersecurity Analyst\",\"url\":\"/certificates/professional-certificate/ibm-cybersecurity-analyst\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity certificates\",\"url\":\"/search?q=cybersecurity\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"780e11a3-0b47-424f-8a03-3f0a9072c5ec\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity/syracuse-master-of-science-in-cybersecurity\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"de971614-e9f1-4dc5-9081-5dec52d5ac4e\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/maryville-university-master-of-science-in-cybersecurity\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}},{\"id\":\"e86df75d-27f4-4a80-a2d0-8c14c4edf63f\",\"title\":\"Bachelor of Science in Cybersecurity\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-cybersecurity\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity degrees\",\"url\":\"/masters/online-masters-in-cybersecurity\"}}]},{\"label\":\"Computer Science\",\"hero\":{\"title\":\"Computer Science\",\"subTitle\":\"Computer Science focuses on the design, development, and testing of software. It uses technology to problem solve by applying algorithms and coding to operating systems, artificial intelligence, machine learning, and informatics in nearly every industry. \",\"cta\":{\"viewAll\":{\"label\":\"View all Computer Science Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Computer+Science\"},\"learnMore\":{\"label\":\"Learn more about Computer Science\",\"url\":\"/learn/computer-science\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Decoding\",\"url\":\"/learn/decoding\"},{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"},{\"label\":\"Software Development\",\"url\":\"/learn/software-development\"},{\"label\":\"Numba\",\"url\":\"/learn/numba\"},{\"label\":\"YAML\",\"url\":\"/learn/yaml\"},{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"GParted\",\"url\":\"/learn/gparted\"},{\"label\":\"Finance\",\"url\":\"/learn/finance\"},{\"label\":\"CakePHP\",\"url\":\"/learn/cakephp\"},{\"label\":\"Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}]},\"productLists\":[{\"title\":\"Courses\",\"products\":[{\"id\":\"201c5f46-3c12-5905-94fd-d52cc0c9a229\",\"title\":\"CS50's Introduction to Computer Science\",\"url\":\"/learn/computer-science/harvard-university-cs50-s-introduction-to-computer-science\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"93e0e6f4-2df6-595b-823a-f8deb034df3b\",\"title\":\"Introduction to Computer Science and Programming Using Python\",\"url\":\"/learn/computer-science/massachusetts-institute-of-technology-introduction-to-computer-science-and-programming-using-python\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"dc5d95bd-1c8b-5dd0-b247-d3ae969a1a5e\",\"title\":\"Computer Science 101\",\"url\":\"/learn/computer-science/stanford-university-computer-science-101\",\"owner\":{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}}}],\"cta\":{\"label\":\"View all Computer Science courses\",\"url\":\"/search?q=computer+science\u0026tab=course\"}},{\"title\":\"Certificates\",\"products\":[{\"id\":\"e7388b02-2261-507f-a84e-f5a0f5d47c49\",\"title\":\"Artificial Intelligence: Implications for Business Strategy\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"f9b3b50c-f470-5b6b-948f-02ee04e2db13\",\"title\":\"Machine Learning in Business\",\"url\":\"/executive-education/massachusetts-institute-of-technology-machine-learning-in-business\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}}},{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}}],\"cta\":{\"label\":\"View all Computer Science certificates\",\"url\":\"/search?q=computer+science\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"fa22a987-489d-411a-81fa-c0ca4bc58652\",\"title\":\"Master's Degree in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/online-master-science-computer-science-utaustinx\",\"owner\":{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}}},{\"id\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"title\":\"Master of Science in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"c3abf25d-a907-4e3c-b940-802d5e1744bd\",\"title\":\"Bachelor of Science in Computer Science\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-computer-science\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Computer Science degrees\",\"url\":\"/masters/online-masters-in-computer-science\"}}]},{\"label\":\"View all topics\",\"hero\":{\"title\":\"Popular topics\",\"cta\":{\"viewAll\":{\"label\":\"View all topics\",\"url\":\"/learn\"}},\"ctaPosition\":\"left\"},\"linkLists\":[{\"title\":\"Computer Programming\",\"url\":\"/learn/computer-programming\",\"links\":[{\"label\":\"Python\",\"url\":\"/learn/python\"},{\"label\":\"JavaScript\",\"url\":\"/learn/javascript\"},{\"label\":\"C\",\"url\":\"/learn/c-programming\"},{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"},{\"label\":\"Linux\",\"url\":\"/learn/linux\"}]},{\"title\":\"Data Analysis\",\"url\":\"/learn/data-analysis\",\"links\":[{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"SQL\",\"url\":\"/learn/sql\"},{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"},{\"label\":\"R\",\"url\":\"/learn/r-programming\"},{\"label\":\"Excel\",\"url\":\"/learn/excel\"}]},{\"title\":\"Economics\",\"url\":\"/learn/economics\",\"links\":[{\"label\":\"Trading\",\"url\":\"/learn/trading\"},{\"label\":\"Investing\",\"url\":\"/learn/investing\"},{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"},{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"},{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"}]},{\"title\":\"Biology\",\"url\":\"/learn/biology\",\"links\":[{\"label\":\"STEM\",\"url\":\"/learn/stem\"},{\"label\":\"Genetics\",\"url\":\"/learn/genetics\"},{\"label\":\"Neuroscience\",\"url\":\"/learn/neuroscience\"},{\"label\":\"Nutrition\",\"url\":\"/learn/nutrition\"},{\"label\":\"Human Anatomy\",\"url\":\"/learn/human-anatomy\"}]},{\"title\":\"Physics\",\"url\":\"/learn/physics\",\"links\":[{\"label\":\"Dynamics\",\"url\":\"/learn/dynamics\"},{\"label\":\"Nature\",\"url\":\"/learn/nature\"},{\"label\":\"Planets\",\"url\":\"/learn/planets\"},{\"label\":\"Architecture\",\"url\":\"/learn/architecture\"},{\"label\":\"Mechanics\",\"url\":\"/learn/mechanics\"}]},{\"title\":\"Language\",\"url\":\"/learn/language\",\"links\":[{\"label\":\"Writing\",\"url\":\"/learn/writing\"},{\"label\":\"Spanish\",\"url\":\"/learn/spanish\"},{\"label\":\"English\",\"url\":\"/learn/english\"},{\"label\":\"Italian\",\"url\":\"/learn/italian\"},{\"label\":\"Japanese\",\"url\":\"/learn/japanese\"}]},{\"title\":\"Social Science\",\"url\":\"/learn/social-science\",\"links\":[{\"label\":\"Psychology\",\"url\":\"/learn/psychology\"},{\"label\":\"Education\",\"url\":\"/learn/education\"},{\"label\":\"Politics\",\"url\":\"/learn/politics\"},{\"label\":\"Behavioral Psychology\",\"url\":\"/learn/behavioral-psychology\"},{\"label\":\"Government\",\"url\":\"/learn/government\"}]},{\"title\":\"Math\",\"url\":\"/learn/math\",\"links\":[{\"label\":\"Probability\",\"url\":\"/learn/probability\"},{\"label\":\"Algebra\",\"url\":\"/learn/algebra\"},{\"label\":\"Calculus\",\"url\":\"/learn/calculus\"},{\"label\":\"Logic\",\"url\":\"/learn/logic\"},{\"label\":\"Geometry\",\"url\":\"/learn/geometry\"}]},{\"title\":\"Humanities\",\"url\":\"/learn/humanities\",\"links\":[{\"label\":\"Music\",\"url\":\"/learn/music-arts\"},{\"label\":\"Art\",\"url\":\"/learn/art\"},{\"label\":\"Philosophy\",\"url\":\"/learn/philosophy\"},{\"label\":\"Geography\",\"url\":\"/learn/geography\"},{\"label\":\"History\",\"url\":\"/learn/history\"}]}]}]},{\"items\":[{\"label\":\"Career resources\",\"hero\":{\"title\":\"Career resources\",\"subTitle\":\"Find resources that help you make progress towards your next career goal.\",\"cta\":{\"viewAll\":{\"label\":\"Access the Career Resource Center\",\"url\":\"https://careers.edx.org/\"}},\"ctaPosition\":\"left\"},\"productResources\":[{\"title\":\"Access career tips\",\"description\":\"Explore career articles in our Idea Hub\",\"links\":[{\"label\":\"Hybrid Jobs: A 4-Minute Primer on Fast-Growing, Lucrative Career Paths\",\"url\":\"/resources/hybrid-jobs-a-4-minute-primer-on-fast-growing-lucrative-career-paths\"},{\"label\":\"How to Write an Effective CV – 5 Steps From the Experts\",\"url\":\"/resources/how-to-write-an-effective-cv-5-steps-experts\"},{\"label\":\"The Employability Skills Checklist\",\"url\":\"/resources/the-employability-skills-checklist\"},{\"label\":\"Computer science careers: Why computer science is for everyone\",\"url\":\"https://www.edx.org/resources/computer-science-careers\"},{\"label\":\"Building a career in data science and analytics\",\"url\":\"https://www.edx.org/resources/data-science-analytics-career-guide\"}],\"cta\":{\"label\":\"Go to Idea Hub\",\"url\":\"https://www.edx.org/resources\"}},{\"title\":\"How to guides\",\"description\":\"Find the next steps to start your new career\",\"links\":[{\"label\":\"How to Become a Software Developer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-developer\"},{\"label\":\"How to Become a Data Scientist\",\"url\":\"https://www.edx.org/become/how-to-become-a-data-scientist\"},{\"label\":\"How to Become a Software Engineer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-engineer-without-a-degree\"},{\"label\":\"How to Become a Social Media Manager\",\"url\":\"https://www.edx.org/become/how-to-become-a-social-media-manager\"},{\"label\":\"How to Become a Cybersecurity Analyst\",\"url\":\"https://www.edx.org/become/how-to-become-a-cybersecurity-analyst\"}],\"cta\":{\"label\":\"View all guides\",\"url\":\"https://www.edx.org/become\"}},{\"title\":\"Career paths\",\"description\":\"Gain insights to chart your own career journey.\",\"links\":null,\"cta\":{\"label\":\"Discover career paths\",\"url\":\"https://careers.edx.org/browse-by-industry\"}},{\"title\":\"Guides \u0026 templates\",\"description\":\"Use our career guides and templates to propel your career forward.\",\"links\":null,\"cta\":{\"label\":\"Access guides \u0026 templates\",\"url\":\"https://careers.edx.org/guides-and-templates\"}},{\"title\":\"Skills Quiz\",\"description\":\"Find the right skills to learn for your dream job.\",\"links\":null,\"cta\":{\"label\":\"Take the quiz\",\"url\":\"https://skills.edx.org\"}}]},{\"label\":\"Schools \u0026 Partners\",\"url\":\"/schools-partners\"}]},{\"title\":\"Still unsure?\",\"subTitle\":\"Try a course.\",\"items\":[{\"cta\":{\"label\":\"Find online courses\",\"url\":\"/courses?q=free+online+courses\"}}]}]},\"activeBanner\":{\"backgroundColor\":\"blue\",\"backgroundColorEs\":\"blue\",\"content\":[],\"contentEs\":[],\"campaignId\":\"\",\"campaignIdEs\":\"\"}}],[\"$\",\"div\",null,{\"style\":{\"minHeight\":50},\"children\":[[\"$\",\"$L12\",null,{\"src\":\"/scripts/newrelic\"}],[\"$\",\"main\",null,{\"children\":[\"$\",\"article\",null,{\"className\":\"container prose\",\"children\":[[\"$\",\"div\",null,{\"className\":\"max-w-3xl mx-auto py-14\",\"children\":[[\"$\",\"span\",null,{\"children\":\"Error code: 404\"}],[\"$\",\"h1\",null,{\"className\":\"pt-0\",\"children\":\"We can't seem to find the page you're looking for.\"}],[\"$\",\"h3\",null,{\"className\":\"font-normal \",\"children\":\"Here are some helpful links instead:\"}],[\"$\",\"ul\",null,{\"className\":\"list-none pl-0\",\"children\":[[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"/\",\"children\":\"Home\"}]}],[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"/search\",\"children\":\"Search courses and programs\"}]}],[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"https://authn.edx.org/login\",\"children\":\"Create account\"}]}]]}]]}],\"$L21\"]}]}]]}],[\"$\",\"div\",null,{\"className\":\"bg-primary text-primary-foreground pt-16\",\"children\":[\"$\",\"footer\",null,{\"className\":\"flex justify-between max-w-screen-xl mx-auto px-4 pb-4 \",\"children\":[\"$\",\"div\",null,{\"className\":\"flex flex-col w-full\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap justify-between mb-6 w-full\",\"children\":[[\"$\",\"a\",null,{\"href\":\"/\",\"className\":\"mb-6\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/trademark-logos/edx-by-2u-white.svg\",\"alt\":\"edX homepage\",\"title\":\"edX homepage\",\"width\":127,\"height\":67,\"className\":\"optanon-category-C0001\",\"data-ot-ignore\":true}]}],[\"$\",\"div\",null,{\"children\":[\"$\",\"div\",null,{\"className\":\"mb-4 justify-center flex flex-row\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.facebook.com/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Facebook page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"32\",\"height\":\"32\",\"viewBox\":\"0 0 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"1\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://x.com/edXOnline\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our X page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"48\",\"height\":\"48\",\"viewBox\":\"0 0 48 48\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"2\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.linkedin.com/school/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our LinkedIn page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"20\",\"height\":\"20\",\"viewBox\":\"0 0 20 20\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"fill-rule\":\"evenodd\",\"clip-rule\":\"evenodd\",\"d\":\"M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"3\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.reddit.com/r/edX/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Reddit page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"40\",\"height\":\"40\",\"viewBox\":\"-2 -2 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z\",\"fill\":\"currentColor\"}]}]}]}]}]]}]}]]}],false,[\"$\",\"div\",null,{\"className\":\"my-6\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap md:flex-nowrap justify-between\",\"children\":[[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Browse Courses\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Learn AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/artificial-intelligence\",\"children\":\"Learn AI\"}]}],[\"$\",\"li\",\"Learn ChatGPT\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/chatgpt\",\"children\":\"Learn ChatGPT\"}]}],[\"$\",\"li\",\"Learn Spanish\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/spanish\",\"children\":\"Learn Spanish\"}]}],[\"$\",\"li\",\"Learn Python\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/python\",\"children\":\"Learn Python\"}]}],[\"$\",\"li\",\"Learn Excel\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/excel\",\"children\":\"Learn Excel\"}]}],[\"$\",\"li\",\"Learn Software Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/software-engineering\",\"children\":\"Learn Software Engineering\"}]}],[\"$\",\"li\",\"Learn Blockchain\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/blockchain\",\"children\":\"Learn Blockchain\"}]}],[\"$\",\"li\",\"Learn Computer Programming\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/computer-programming\",\"children\":\"Learn Computer Programming\"}]}],[\"$\",\"li\",\"Learn Economics\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/economics\",\"children\":\"Learn Economics\"}]}],[\"$\",\"li\",\"Learn Architecture\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/architecture\",\"children\":\"Learn Architecture\"}]}],[\"$\",\"li\",\"Learn Project Management\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/project-management\",\"children\":\"Learn Project Management\"}]}],[\"$\",\"li\",\"Learn Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/business-administration\",\"children\":\"Learn Business Administration\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Courses\",{\"href\":\"/learn\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Courses\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"step-by-step guides\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Become a Cybersecurity Analyst\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-cybersecurity-analyst\",\"children\":\"Become a Cybersecurity Analyst\"}]}],[\"$\",\"li\",\"Become a Data Scientist\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-data-scientist\",\"children\":\"Become a Data Scientist\"}]}],[\"$\",\"li\",\"Become a Social Media Manager\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-social-media-manager\",\"children\":\"Become a Social Media Manager\"}]}],[\"$\",\"li\",\"Become a Software Developer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-developer\",\"children\":\"Become a Software Developer\"}]}],[\"$\",\"li\",\"Become a Software Engineer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-engineer-without-a-degree\",\"children\":\"Become a Software Engineer\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Guides\",{\"href\":\"/become\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Guides\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Complete your bachelor's online\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Bachelor's in Business\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/business\",\"children\":\"Bachelor's in Business\"}]}],[\"$\",\"li\",\"Bachelor's in Computer Science / Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/computer-data-sciences\",\"children\":\"Bachelor's in Computer Science / Data Science\"}]}],[\"$\",\"li\",\"Bachelor's in Health and Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/health-social-services\",\"children\":\"Bachelor's in Health and Nursing\"}]}],[\"$\",\"li\",\"Bachelor's in Accounting\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-accounting-bachelor-degree\",\"children\":\"Bachelor's in Accounting\"}]}],[\"$\",\"li\",\"Bachelor's in Finance\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-bachelors-degree-finance\",\"children\":\"Bachelor's in Finance\"}]}],[\"$\",\"li\",\"Bachelor's in Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/psychology\",\"children\":\"Bachelor's in Psychology\"}]}],[\"$\",\"li\",\"Bachelor's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/bachelors-in-public-health-online\",\"children\":\"Bachelor's in Public Health\"}]}],[\"$\",\"li\",\"Bachelor's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/social-work-bsw\",\"children\":\"Bachelor's in Social Work\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Undergraduate Degrees\",{\"href\":\"/bachelors\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Undergraduate Degrees\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Earn your online graduate degree\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Master's in Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-mba\",\"children\":\"Master's in Business Administration\"}]}],[\"$\",\"li\",\"Master's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-public-health-online\",\"children\":\"Master's in Public Health\"}]}],[\"$\",\"li\",\"Master's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msw-programs\",\"children\":\"Master's in Social Work\"}]}],[\"$\",\"li\",\"Master's in Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msn-programs\",\"children\":\"Master's in Nursing\"}]}],[\"$\",\"li\",\"Master's in Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-data-science\",\"children\":\"Master's in Data Science\"}]}],[\"$\",\"li\",\"Master's in Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-engineering\",\"children\":\"Master's in Engineering\"}]}],[\"$\",\"li\",\"Master's in Speech Pathology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Speech Pathology\"}]}],[\"$\",\"li\",\"Master's in Counseling/Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Counseling/Psychology\"}]}],[\"$\",\"li\",\"Master's Degree in Healthcare\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/healthcare\",\"children\":\"Master's Degree in Healthcare\"}]}],[\"$\",\"li\",\"Master's Degree in Education\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-education-online\",\"children\":\"Master's Degree in Education\"}]}],[\"$\",\"li\",\"Master's Degree in AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-artificial-intelligence\",\"children\":\"Master's Degree in AI\"}]}],[\"$\",\"li\",\"Master's Degree in Computer Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-computer-science\",\"children\":\"Master's Degree in Computer Science\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Graduate Degrees\",{\"href\":\"/masters\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Graduate Degrees\"}],[\"$\",\"a\",\"see more Doctorate Degrees\",{\"href\":\"/doctorate\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Doctorate Degrees\"}]]}]]}]]}],[\"$\",\"div\",null,{\"className\":\"my-4 border-t-[1px] border-solid border-primary-foreground\"}]]}],[\"$\",\"$L23\",null,{\"links\":{\"edx\":{\"title\":\"edx\",\"links\":[{\"label\":\"Partner With Us\",\"url\":\"https://business.edx.org/partner\"},{\"label\":\"About\",\"url\":\"/about-us\"},{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org/?_gl=1*y0gcxr*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NDczLjQ1LjAuMA..\"},{\"label\":\"Affiliates\",\"url\":\"/affiliate-program\"},{\"label\":\"Open edX\",\"url\":\"http://open.edx.org/?_gl=1*lt6kx3*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTQ5LjU5LjAuMA..\"},{\"label\":\"2U Advisory Council\",\"url\":\"/advisory-groups\"},{\"label\":\"Careers\",\"url\":\"/careers\"},{\"label\":\"News\",\"url\":\"https://press.edx.org/?_gl=1*8w80my*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTgzLjI1LjAuMA..\"}]},\"connect\":{\"title\":\"Connect\",\"links\":[{\"label\":\"Idea Hub\",\"url\":\"/resources\"},{\"label\":\"Contact Us\",\"url\":\"https://courses.edx.org/support/contact_us?_gl=1*13dq6q5*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NjYyLjYuMC4w\"},{\"label\":\"Help Center\",\"url\":\"https://support.edx.org/?_gl=1*1ej7jnc*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE1MDgxLjUuMC4w\"},{\"label\":\"Security\",\"url\":\"/policy/security\"},{\"label\":\"Media Kit\",\"url\":\"/media-kit\"}]},\"legal\":{\"title\":\"Legal\",\"links\":[{\"label\":\"Terms of Service \u0026 Honor Code\",\"url\":\"/edx-terms-service\"},{\"label\":\"Privacy Policy\",\"url\":\"/edx-privacy-policy\"},{\"label\":\"Cookie Policy\",\"url\":\"/edx-privacy-policy/cookies\"},{\"label\":\"Accessibility Policy\",\"url\":\"/accessibility\"},{\"label\":\"Trademark Policy\",\"url\":\"/trademarks\"},{\"label\":\"Modern Slavery Statement\",\"url\":\"/modern-slavery-statement\"},{\"label\":\"Sitemap\",\"url\":\"/sitemap\"},{\"label\":\"Your Privacy Choices\",\"url\":\"#\"}]}}}],[\"$\",\"div\",null,{\"className\":\"flex flex-wrap-reverse justify-between\",\"children\":[[\"$\",\"p\",null,{\"className\":\"text-primary-foreground text-[1rem]\",\"children\":[\"© 2024 edX LLC. All rights reserved.\",[\"$\",\"br\",null,{}],[\"$\",\"span\",null,{\"children\":\"| 深圳市恒宇博科技有限公司\"}]]}],[\"$\",\"div\",null,{\"className\":\"flex gap-1\",\"children\":[[\"$\",\"a\",null,{\"href\":\"https://itunes.apple.com/us/app/edx/id945480667?mt=8\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/images/apple-store-badge-en.png\",\"alt\":\"Download on the App Store\",\"title\":\"Download on the App Store\",\"width\":120,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}],[\"$\",\"a\",null,{\"href\":\"https://play.google.com/store/apps/details?id=org.edx.mobile\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/images/google-play-badge-en.png\",\"alt\":\"Get it on Google Play\",\"title\":\"Get it on Google Play\",\"width\":135,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}]]}]]}]]}]}]}]]\n"])</script><script>self.__next_f.push([1,"24:I[80554,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n25:T55f,\u003cp\u003eThis course harnesses science-backed techniques applicable across different learning platforms, equipping you with the strategies you need to thrive as an online learner.\u003c/p\u003e\n\u003cp\u003eIn this course, you will:\u003c/p\u003e\n\u003cp\u003eReflect on your Identity as a Learner: Learn about the history and benefits of learning online and reflect on how embarking on this new journey of learning online fits into your broader narrative as a lifelong learner. \u003c/p\u003e\n\u003cp\u003eDevelop Digital Literacy Skills: Acquire essential skills for navigating and utilizing online learning technologies effectively, including familiarity with Learning Management Systems and the unique features of the edX platform.\u003c/p\u003e\n\u003cp\u003eEnhance Metacognitive Skills: Learn to develop awareness of your own learning behaviors and thought processes, a key aspect of successful online learning.\u003c/p\u003e\n\u003cp\u003eApply Effective Study Strategies: Master a range of study strategies based on c"])</script><script>self.__next_f.push([1,"urrent research, covering awareness, balance, community engagement, and dedication to learning.\u003c/p\u003e\n\u003cp\u003eLeverage Community Resources: Understand how to effectively utilize peer interactions and community resources to enhance your learning experience.\u003c/p\u003e\n\u003cp\u003eImprove Time Management: Cultivate strong time management skills tailored for online learning, including techniques like the Pomodoro method and understanding your chronotype for optimal learning.\u003c/p\u003e26:T55f,\u003cp\u003eThis course harnesses science-backed techniques applicable across different learning platforms, equipping you with the strategies you need to thrive as an online learner.\u003c/p\u003e\n\u003cp\u003eIn this course, you will:\u003c/p\u003e\n\u003cp\u003eReflect on your Identity as a Learner: Learn about the history and benefits of learning online and reflect on how embarking on this new journey of learning online fits into your broader narrative as a lifelong learner. \u003c/p\u003e\n\u003cp\u003eDevelop Digital Literacy Skills: Acquire essential skills for navigating and utilizing online learning technologies effectively, including familiarity with Learning Management Systems and the unique features of the edX platform.\u003c/p\u003e\n\u003cp\u003eEnhance Metacognitive Skills: Learn to develop awareness of your own learning behaviors and thought processes, a key aspect of successful online learning.\u003c/p\u003e\n\u003cp\u003eApply Effective Study Strategies: Master a range of study strategies based on current research, covering awareness, balance, community engagement, and dedication to learning.\u003c/p\u003e\n\u003cp\u003eLeverage Community Resources: Understand how to effectively utilize peer interactions and community resources to enhance your learning experience.\u003c/p\u003e\n\u003cp\u003eImprove Time Management: Cultivate strong time management skills tailored for online learning, including techniques like the Pomodoro method and understanding your chronotype for optimal learning.\u003c/p\u003e27:T68d,\u003cp\u003eThis is an introductory-level course in supervised learning, with a focus on regression and classification methods. The syllabus includes: linear and polynomial regression, logistic regression and "])</script><script>self.__next_f.push([1,"linear discriminant analysis; cross-validation and the bootstrap, model selection and regularization methods (ridge and lasso); nonlinear models, splines and generalized additive models; tree-based methods, random forests and boosting; support-vector machines; neural networks and deep learning; survival models; multiple testing. Some unsupervised learning methods are discussed: principal components and clustering (k-means and hierarchical).\u003c/p\u003e\n\u003cp\u003eThis is not a math-heavy class, so we try and describe the methods without heavy reliance on formulas and complex mathematics. We focus on what we consider to be the important elements of modern data science. Computing is done in R. There are lectures devoted to R, giving tutorials from the ground up, and progressing with more detailed sessions that implement the techniques in each chapter. We also offer a separate version of the course called \u003ca href=\"https://www.edx.org/learn/data-analysis-statistics/stanford-university-statistical-learning-with-python\" rel=\"noopener\" target=\"_blank\"\u003eStatistical Learning with Python\u003c/a\u003e – the chapter lectures are the same, but the lab lectures and computing are done using Python.\u003c/p\u003e\n\u003cp\u003eThe lectures cover all the material in An Introduction to Statistical Learning, with Applications in R (second addition) by James, Witten, Hastie and Tibshirani (Springer, 2021). The pdf for this book is available for free on the \u003ca href=\"https://www.statlearning.com/\"\u003ebook website\u003c/a\u003e.\u003c/p\u003e28:T68d,\u003cp\u003eThis is an introductory-level course in supervised learning, with a focus on regression and classification methods. The syllabus includes: linear and polynomial regression, logistic regression and linear discriminant analysis; cross-validation and the bootstrap, model selection and regularization methods (ridge and lasso); nonlinear models, splines and generalized additive models; tree-based methods, random forests and boosting; support-vector machines; neural networks and deep learning; survival models; multiple testing. Some unsupervised learning metho"])</script><script>self.__next_f.push([1,"ds are discussed: principal components and clustering (k-means and hierarchical).\u003c/p\u003e\n\u003cp\u003eThis is not a math-heavy class, so we try and describe the methods without heavy reliance on formulas and complex mathematics. We focus on what we consider to be the important elements of modern data science. Computing is done in R. There are lectures devoted to R, giving tutorials from the ground up, and progressing with more detailed sessions that implement the techniques in each chapter. We also offer a separate version of the course called \u003ca href=\"https://www.edx.org/learn/data-analysis-statistics/stanford-university-statistical-learning-with-python\" rel=\"noopener\" target=\"_blank\"\u003eStatistical Learning with Python\u003c/a\u003e – the chapter lectures are the same, but the lab lectures and computing are done using Python.\u003c/p\u003e\n\u003cp\u003eThe lectures cover all the material in An Introduction to Statistical Learning, with Applications in R (second addition) by James, Witten, Hastie and Tibshirani (Springer, 2021). The pdf for this book is available for free on the \u003ca href=\"https://www.statlearning.com/\"\u003ebook website\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"21:[\"$\",\"$L24\",null,{\"title\":\"Popular courses\",\"ctaUrl\":\"/search?tab=course\",\"ctaLabel\":\"View all courses\",\"products\":[{\"productUuid\":\"0e575a39-da1e-4e33-bb3b-e96cc6ffc58e\",\"productName\":\"How to Learn Online\",\"productSlug\":\"learn/how-to-learn/edx-how-to-learn-online\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/0e575a39-da1e-4e33-bb3b-e96cc6ffc58e-403e4a4aaada.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":\"edX\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$25\",\"shortDescription\":\"\u003cp\u003eThis course will prepare you with strategies to be a successful online learner. The edX learning team has curated powerful, science-backed techniques which you can start using right away on any learning platform.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHistory, benefits, and foundational concepts of online learning\u003c/li\u003e\\n\u003cli\u003eHow to leverage your prior educational experiences for success learning online\u003c/li\u003e\\n\u003cli\u003eTechnology fundamentals for online learning, including building your digital confidence, using an LMS (Learning Management System), and making the most of online accessibility features\u003c/li\u003e\\n\u003cli\u003eStudy strategies for online learning, anchored in the ABCDs: Awareness, Balance, Community, and Dedication\u003c/li\u003e\\n\u003cli\u003eTime management skills to help integrate learning into your busy life\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"objectID\":\"6237215000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"0e575a39-da1e-4e33-bb3b-e96cc6ffc58e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"How to Learn Online\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/how-to-learn/edx-how-to-learn-online\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/0e575a39-da1e-4e33-bb3b-e96cc6ffc58e-403e4a4aaada.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Education \u0026 Teacher Training\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"edX\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"$26\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eThis course will prepare you with strategies to be a successful online learner. The edX learning team has curated powerful, science-backed techniques which you can start using right away on any learning platform.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003eHistory, benefits, and foundational concepts of online learning\u003c/li\u003e\\n\u003cli\u003eHow to leverage your prior educational experiences for success learning online\u003c/li\u003e\\n\u003cli\u003eTechnology fundamentals for online learning, including building your digital confidence, using an LMS (Learning Management System), and making the most of online accessibility features\u003c/li\u003e\\n\u003cli\u003eStudy strategies for online learning, anchored in the ABCDs: Awareness, Balance, Community, and Dedication\u003c/li\u003e\\n\u003cli\u003eTime management skills to help integrate learning into your busy life\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]}}},{\"productUuid\":\"3a31db71-de8f-45f1-ae65-11981ed9d680\",\"productName\":\"CS50's Introduction to Artificial Intelligence with Python\",\"productSlug\":\"learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/3a31db71-de8f-45f1-ae65-11981ed9d680-b801bb328333.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":\"Harvard University\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"\u003cp\u003eThis course explores the concepts and algorithms at the foundation of modern artificial intelligence, diving into the ideas that give rise to technologies like game-playing engines, handwriting recognition, and machine translation. Through hands-on projects, students gain exposure to the theory behind graph search algorithms, classification, optimization, machine learning, large language models, and other topics in artificial intelligence as they incorporate them into their own Python programs. By course’s end, students emerge with experience in libraries for machine learning as well as knowledge of artificial intelligence principles that enable them to design intelligent systems of their own.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn to use machine learning in Python in this introductory course on artificial intelligence.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003egraph search algorithms\u003c/li\u003e\\n\u003cli\u003eadversarial search\u003c/li\u003e\\n\u003cli\u003eknowledge representation\u003c/li\u003e\\n\u003cli\u003elogical inference\u003c/li\u003e\\n\u003cli\u003eprobability theory\u003c/li\u003e\\n\u003cli\u003eBayesian networks\u003c/li\u003e\\n\u003cli\u003eMarkov models\u003c/li\u003e\\n\u003cli\u003econstraint satisfaction\u003c/li\u003e\\n\u003cli\u003emachine learning\u003c/li\u003e\\n\u003cli\u003ereinforcement learning\u003c/li\u003e\\n\u003cli\u003eneural networks\u003c/li\u003e\\n\u003cli\u003enatural language processing\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"objectID\":\"6236686000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"3a31db71-de8f-45f1-ae65-11981ed9d680\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"CS50's Introduction to Artificial Intelligence with Python\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/3a31db71-de8f-45f1-ae65-11981ed9d680-b801bb328333.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Computer Science\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"Harvard University\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"\u003cp\u003eThis course explores the concepts and algorithms at the foundation of modern artificial intelligence, diving into the ideas that give rise to technologies like game-playing engines, handwriting recognition, and machine translation. Through hands-on projects, students gain exposure to the theory behind graph search algorithms, classification, optimization, machine learning, large language models, and other topics in artificial intelligence as they incorporate them into their own Python programs. By course’s end, students emerge with experience in libraries for machine learning as well as knowledge of artificial intelligence principles that enable them to design intelligent systems of their own.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eLearn to use machine learning in Python in this introductory course on artificial intelligence.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003egraph search algorithms\u003c/li\u003e\\n\u003cli\u003eadversarial search\u003c/li\u003e\\n\u003cli\u003eknowledge representation\u003c/li\u003e\\n\u003cli\u003elogical inference\u003c/li\u003e\\n\u003cli\u003eprobability theory\u003c/li\u003e\\n\u003cli\u003eBayesian networks\u003c/li\u003e\\n\u003cli\u003eMarkov models\u003c/li\u003e\\n\u003cli\u003econstraint satisfaction\u003c/li\u003e\\n\u003cli\u003emachine learning\u003c/li\u003e\\n\u003cli\u003ereinforcement learning\u003c/li\u003e\\n\u003cli\u003eneural networks\u003c/li\u003e\\n\u003cli\u003enatural language processing\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]}}},{\"productUuid\":\"ef2fc3ac-b0bc-4004-bd30-d610832d0cdd\",\"productName\":\"Statistical Learning with R\",\"productSlug\":\"learn/statistics/stanford-university-statistical-learning\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/ef2fc3ac-b0bc-4004-bd30-d610832d0cdd-b971c6b5f47b.png\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":\"Stanford University\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$27\",\"shortDescription\":\"\u003cp\u003eLearn some of the main tools used in statistical modeling and data science. We cover both traditional as well as exciting new methods, and how to use them in R. \u003cem\u003eCourse material updated in 2021 for second edition of the course textbook.\u003c/em\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eOverview of statistical learning\u003c/li\u003e\\n\u003cli\u003eLinear regression\u003c/li\u003e\\n\u003cli\u003eClassification\u003c/li\u003e\\n\u003cli\u003eResampling methods\u003c/li\u003e\\n\u003cli\u003eLinear model selection and regularization\u003c/li\u003e\\n\u003cli\u003eMoving beyond linearity\u003c/li\u003e\\n\u003cli\u003eTree-based methods\u003c/li\u003e\\n\u003cli\u003eSupport vector machines\u003c/li\u003e\\n\u003cli\u003eDeep learning\u003c/li\u003e\\n\u003cli\u003eSurvival modeling\u003c/li\u003e\\n\u003cli\u003eUnsupervised learning\u003c/li\u003e\\n\u003cli\u003eMultiple testing\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"objectID\":\"6240748000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"ef2fc3ac-b0bc-4004-bd30-d610832d0cdd\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"Statistical Learning with R\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/statistics/stanford-university-statistical-learning\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/ef2fc3ac-b0bc-4004-bd30-d610832d0cdd-b971c6b5f47b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Data Analysis \u0026 Statistics\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"Stanford University\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"$28\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eLearn some of the main tools used in statistical modeling and data science. We cover both traditional as well as exciting new methods, and how to use them in R. \u003cem\u003eCourse material updated in 2021 for second edition of the course textbook.\u003c/em\u003e\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003eOverview of statistical learning\u003c/li\u003e\\n\u003cli\u003eLinear regression\u003c/li\u003e\\n\u003cli\u003eClassification\u003c/li\u003e\\n\u003cli\u003eResampling methods\u003c/li\u003e\\n\u003cli\u003eLinear model selection and regularization\u003c/li\u003e\\n\u003cli\u003eMoving beyond linearity\u003c/li\u003e\\n\u003cli\u003eTree-based methods\u003c/li\u003e\\n\u003cli\u003eSupport vector machines\u003c/li\u003e\\n\u003cli\u003eDeep learning\u003c/li\u003e\\n\u003cli\u003eSurvival modeling\u003c/li\u003e\\n\u003cli\u003eUnsupervised learning\u003c/li\u003e\\n\u003cli\u003eMultiple testing\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]}}},{\"productUuid\":\"a01716cf-27f7-4f6d-b6fb-88394a3523c1\",\"productName\":\"Graphic Design Essentials\",\"productSlug\":\"learn/graphic-design/lci-education-graphic-design-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/a01716cf-27f7-4f6d-b6fb-88394a3523c1-bd4ca99a6788.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":\"LCI Education\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/896c0232-66fb-4b55-8fc1-2c75ba76db4c-05c9ce243e9b.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eThis \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eonline \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003ecourse from LaSalle College Vancouver will introduce you\u003c/span\u003e to the basics of design, graphic and visual communication, image making, typography and the overall creative process, starting from the client mandate to the final presentations.\u003cspan lang=\\\"EN-CA\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eUpon completion, \u003cspan lang=\\\"EN-CA\\\"\u003e you will be able to apply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThis \u003cspan lang=\\\"EN\\\"\u003eshort \u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003ecourse is for anyone looking to build or switch towards a rewarding Graphic Design career. \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eLaSalle\u003cspan lang=\\\"EN-US\\\"\u003e College's graduates have been recognized by the Association of Registered Graphic Designers (RGD), a testament to the excellence we bring to the field of graphic arts.\u003c/span\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAcquire the essential skills to become a working Graphic Designer from the basics of color theory to presenting a project to a client.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eApply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eUse visual language, understand composition, create presentations and communication plans, \u003c/span\u003einterpret and design a visual composition. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eAnalyze a client mandate and develop \u003c/span\u003eideas\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"objectID\":\"6239232000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"a01716cf-27f7-4f6d-b6fb-88394a3523c1\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"Graphic Design Essentials\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/graphic-design/lci-education-graphic-design-essentials\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/a01716cf-27f7-4f6d-b6fb-88394a3523c1-bd4ca99a6788.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Communication\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"LCI Education\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/organization/logos/896c0232-66fb-4b55-8fc1-2c75ba76db4c-05c9ce243e9b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eThis \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eonline \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003ecourse from LaSalle College Vancouver will introduce you\u003c/span\u003e to the basics of design, graphic and visual communication, image making, typography and the overall creative process, starting from the client mandate to the final presentations.\u003cspan lang=\\\"EN-CA\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eUpon completion, \u003cspan lang=\\\"EN-CA\\\"\u003e you will be able to apply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThis \u003cspan lang=\\\"EN\\\"\u003eshort \u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003ecourse is for anyone looking to build or switch towards a rewarding Graphic Design career. \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eLaSalle\u003cspan lang=\\\"EN-US\\\"\u003e College's graduates have been recognized by the Association of Registered Graphic Designers (RGD), a testament to the excellence we bring to the field of graphic arts.\u003c/span\u003e\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eAcquire the essential skills to become a working Graphic Designer from the basics of color theory to presenting a project to a client.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eApply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eUse visual language, understand composition, create presentations and communication plans, \u003c/span\u003einterpret and design a visual composition. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eAnalyze a client mandate and develop \u003c/span\u003eideas\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]}}}]}]\n"])</script><script>self.__next_f.push([1,"f:[[\"$\",\"meta\",\"0\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}],[\"$\",\"meta\",\"1\",{\"charSet\":\"utf-8\"}],[\"$\",\"title\",\"2\",{\"children\":\"Best Online Metasploit Courses and Programs | edX\"}],[\"$\",\"meta\",\"3\",{\"name\":\"description\",\"content\":\"Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career.\"}],[\"$\",\"link\",\"4\",{\"rel\":\"canonical\",\"href\":\"https://www.edx.org/learn/metasploit\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:title\",\"content\":\"Best Online Metasploit Courses and Programs | edX\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:description\",\"content\":\"Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career.\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:url\",\"content\":\"https://www.edx.org/learn/metasploit\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:site_name\",\"content\":\"edX\"}],[\"$\",\"meta\",\"9\",{\"property\":\"og:locale\",\"content\":\"EN_US\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:card\",\"content\":\"summary\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:creator\",\"content\":\"@edXOnline\"}],[\"$\",\"meta\",\"12\",{\"name\":\"twitter:title\",\"content\":\"Best Online Metasploit Courses and Programs\"}],[\"$\",\"meta\",\"13\",{\"name\":\"twitter:description\",\"content\":\"Explore Metasploit courses. Learn how to use Metasploit’s penetration testing software tools to advance your computer security career.\"}],[\"$\",\"link\",\"14\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"16x16\"}],[\"$\",\"meta\",\"15\",{\"name\":\"next-size-adjust\"}]]\n8:null\n"])</script><script>self.__next_f.push([1,"312:I[10217,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n313:I[75121,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc."])</script><script>self.__next_f.push([1,"js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n315:I[27270,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n316:I[86276,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb8"])</script><script>self.__next_f.push([1,"3e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n317:I[87508,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n318:I[22549,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/80"])</script><script>self.__next_f.push([1,"82-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"Accordion\"]\n319:I[22549,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"AccordionItem\"]\n31a:I[22549,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"st"])</script><script>self.__next_f.push([1,"atic/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"AccordionTrigger\"]\n31b:I[22549,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"AccordionContent\"]\n2b:{\"url\":\"/trademark-logos/edx-logo-elm.svg\",\"altText\":\"edX Online\",\"title\":\"edX Online\"}\n2c:{\"placeholder"])</script><script>self.__next_f.push([1,"\":\"What do you want to learn?\"}\n2d:{\"label\":\"Learn\"}\n2f:{\"label\":\"Sign In\",\"url\":\"https://authn.edx.org/login\"}\n30:{\"label\":\"Register for free\",\"url\":\"https://authn.edx.org/register\"}\n31:{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org\"}\n2e:{\"signIn\":\"$2f\",\"register\":\"$30\",\"business\":\"$31\"}\n2a:{\"logo\":\"$2b\",\"search\":\"$2c\",\"navButton\":\"$2d\",\"cta\":\"$2e\"}\n38:{\"label\":\"View all courses\",\"url\":\"/search?tab=course\u0026page=1\"}\n39:{\"label\":\"View all courses with certificates\",\"url\":\"/courses?q=free+online+courses\"}\n37:{\"viewAll\":\"$38\",\"learnMore\":\"$39\"}\n36:{\"title\":\"Courses\",\"cta\":\"$37\",\"ctaPosition\":\"left\"}\n3d:{\"url\":\"/courses?q=free+ai+courses\",\"label\":\"AI courses\",\"isExternal\":false}\n3e:{\"url\":\"/courses?q=free+cybersecurity+courses\",\"label\":\"Cybersecurity courses\",\"isExternal\":false}\n3f:{\"url\":\"/courses?q=free+data+science+course\",\"label\":\"Data science courses\",\"isExternal\":false}\n40:{\"url\":\"/courses?q=free+data+analytics+courses\",\"label\":\"Analytics courses\",\"isExternal\":false}\n41:{\"url\":\"/courses?q=free+excel+courses\",\"label\":\"Excel courses\",\"isExternal\":false}\n42:{\"url\":\"/courses?q=free+programming+courses\",\"label\":\"Programming courses\",\"isExternal\":false}\n43:{\"url\":\"/courses?q=free+sql+courses\",\"label\":\"SQL courses\",\"isExternal\":false}\n44:{\"url\":\"/courses?q=free+finance+courses\",\"label\":\"Finance courses\",\"isExternal\":false}\n45:{\"url\":\"/courses?q=free+digital+marketing+course\",\"label\":\"Digital marketing courses\",\"isExternal\":false}\n46:{\"url\":\"/courses?q=free+computer+science+courses\",\"label\":\"Computer science courses\",\"isExternal\":false}\n47:{\"url\":\"/courses?q=free+computer+science+courses\",\"label\":\"Coding courses\",\"isExternal\":false}\n48:{\"url\":\"/courses?q=free+leadership+courses\",\"label\":\"Leadership courses\",\"isExternal\":false}\n49:{\"url\":\"/courses?q=free+accounting+courses\",\"label\":\"Accounting courses\",\"isExternal\":false}\n4a:{\"url\":\"/courses?q=google+free+courses\",\"label\":\"Google courses\",\"isExternal\":false}\n3c:[\"$3d\",\"$3e\",\"$3f\",\"$40\",\"$41\",\"$42\",\"$43\",\"$44\",\"$45\",\"$46\",\"$47\",\"$48\",\"$49\",\"$4a\"]\n3b:{\"title\":"])</script><script>self.__next_f.push([1,"\"Browse by topic\",\"links\":\"$3c\"}\n4d:{\"url\":\"/courses?q=ai+in+healthcare+course\",\"label\":\"AI in healthcare courses\",\"isExternal\":false}\n4e:{\"url\":\"/courses?q=python+data+science+course\",\"label\":\"Python data science courses\",\"isExternal\":false}\n4f:{\"url\":\"/courses?q=ai+for+business+course\",\"label\":\"AI for business courses\",\"isExternal\":false}\n50:{\"url\":\"/courses?q=hr+analytics+course\",\"label\":\"HR analytics courses\",\"isExternal\":false}\n51:{\"url\":\"/courses?q=python+machine+learning+course\",\"label\":\"Python machine learning courses\",\"isExternal\":false}\n52:{\"url\":\"/courses?q=ai+marketing+course\",\"label\":\"AI marketing courses\",\"isExternal\":false}\n53:{\"url\":\"/courses?q=business+marketing+course\",\"label\":\"Business marketing courses\",\"isExternal\":false}\n54:{\"url\":\"/courses?q=ai+and+machine+learning+courses\",\"label\":\"AI and machine learning courses\",\"isExternal\":false}\n55:{\"url\":\"/courses?q=business+management+course\",\"label\":\"Business management courses\",\"isExternal\":false}\n56:{\"url\":\"/courses?q=html+css+course\",\"label\":\"HTML css courses\",\"isExternal\":false}\n4c:[\"$4d\",\"$4e\",\"$4f\",\"$50\",\"$51\",\"$52\",\"$53\",\"$54\",\"$55\",\"$56\"]\n4b:{\"title\":\"Browse by skill\",\"links\":\"$4c\"}\n59:{\"url\":\"/courses?q=excel+courses+for+beginners\",\"label\":\"Excel courses for beginners\",\"isExternal\":false}\n5a:{\"url\":\"/courses?q=excel+advanced+courses\",\"label\":\"Advanced Excel courses\",\"isExternal\":false}\n5b:{\"url\":\"/courses?q=python+course+for+beginners\",\"label\":\"Python courses for beginners\",\"isExternal\":false}\n5c:{\"url\":\"/courses?q=accounting+courses+for+beginners\",\"label\":\"Accounting courses for beginners\",\"isExternal\":false}\n5d:{\"url\":\"/courses?q=ai+courses+for+beginners\",\"label\":\"AI courses for beginners\",\"isExternal\":false}\n5e:{\"url\":\"/courses?q=data+analytics+courses+for+beginners\",\"label\":\"Data analytics courses for beginners\",\"isExternal\":false}\n5f:{\"url\":\"/courses?q=cybersecurity+courses+for+beginners\",\"label\":\"Cybersecurity courses for beginners\",\"isExternal\":false}\n60:{\"url\":\"/courses?q=hr+courses+for+beginners\",\"label\":\"HR courses for beginners\""])</script><script>self.__next_f.push([1,",\"isExternal\":false}\n61:{\"url\":\"/courses?q=finance+courses+for+beginners\",\"label\":\"Finance courses for beginners\",\"isExternal\":false}\n62:{\"url\":\"/courses?q=coding+courses+for+beginners\",\"label\":\"Coding courses for beginners\",\"isExternal\":false}\n63:{\"url\":\"/courses?q=it+courses+for+beginners\",\"label\":\"IT courses for beginners\",\"isExternal\":false}\n64:{\"url\":\"/courses?q=bookkeeping+courses+for+beginners\",\"label\":\"Bookkeeping courses for beginners\",\"isExternal\":false}\n65:{\"url\":\"/courses?q=computer+programming+courses+for+beginners\",\"label\":\"Computer programming courses for beginners\",\"isExternal\":false}\n66:{\"url\":\"/courses?q=project+management+courses+for+beginners\",\"label\":\"Project management courses for beginners\",\"isExternal\":false}\n67:{\"url\":\"/courses?q=trading+courses+for+beginners\",\"label\":\"Trading courses for beginners\",\"isExternal\":false}\n58:[\"$59\",\"$5a\",\"$5b\",\"$5c\",\"$5d\",\"$5e\",\"$5f\",\"$60\",\"$61\",\"$62\",\"$63\",\"$64\",\"$65\",\"$66\",\"$67\"]\n57:{\"title\":\"Browse by difficulty\",\"links\":\"$58\"}\n6a:{\"url\":\"/courses?q=google+ai+course\",\"label\":\"Google AI courses\",\"isExternal\":false}\n6b:{\"url\":\"/courses?q=mit+ai+course\",\"label\":\"MIT AI courses\",\"isExternal\":false}\n6c:{\"url\":\"/courses?q=harvard+ai+course\",\"label\":\"Harvard AI courses\",\"isExternal\":false}\n6d:{\"url\":\"/courses?q=ibm+data+science+course\",\"label\":\"IBM data science courses\",\"isExternal\":false}\n6e:{\"url\":\"/courses?q=google+python+course\",\"label\":\"Google python courses\",\"isExternal\":false}\n69:[\"$6a\",\"$6b\",\"$6c\",\"$6d\",\"$6e\"]\n68:{\"title\":\"Browse by partner\",\"links\":\"$69\"}\n3a:[\"$3b\",\"$4b\",\"$57\",\"$68\"]\n35:{\"label\":\"Take a course\",\"hero\":\"$36\",\"productSummaries\":\"$3a\"}\n72:{\"label\":\"View all certificates\",\"url\":\"/search?tab=professional-certificate\u0026page=1\"}\n73:{\"label\":\"Learn more about certificates\",\"url\":\"/certificates\"}\n71:{\"viewAll\":\"$72\",\"learnMore\":\"$73\"}\n70:{\"title\":\"Certificates\",\"subTitle\":\"Self-paced, instructor-led courses and programs that build career-ready skills and elevate your resume.\",\"cta\":\"$71\",\"ctaPosition\":\"left\"}\n76:[\"Instructor-led or self paced\",\"8-"])</script><script>self.__next_f.push([1,"16 weeks\"]\n78:{\"label\":\"Browse all Professional Certificates\",\"url\":\"/search?tab=professional-certificate\",\"isExternal\":false}\n79:{\"label\":\"Browse all XSeries certificates\",\"url\":\"/search?tab=xseries\",\"isExternal\":false}\n77:[\"$78\",\"$79\"]\n75:{\"title\":\"Professional Certificates\",\"description\":\"A select series of courses in high-demand fields to build your professional skill set.\",\"features\":\"$76\",\"links\":\"$77\"}\n7b:[\"Instructor-led\",\"2-12 weeks\"]\n7d:{\"label\":\"Browse all Executive Education\",\"url\":\"/search?tab=executive-education\",\"isExternal\":false}\n7c:[\"$7d\"]\n7a:{\"title\":\"Executive Education\",\"description\":\"Cohort-based certificate programs in career-critical skills. Aimed at building your professional development to advance or change your career.\",\"features\":\"$7b\",\"links\":\"$7c\"}\n74:[\"$75\",\"$7a\"]\n83:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}\n82:{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":\"$83\"}\n81:{\"id\":\"7461d083-bf2e-55bb-af0a-79b2e389a2b8\",\"title\":\"Oxford Executive Leadership Programme\",\"url\":\"/executive-education/university-of-oxford-executive-leadership-programme\",\"owner\":\"$82\"}\n86:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}\n85:{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":\"$86\"}\n84:{\"id\":\"2933d0bd-43ed-52f0-95f6-12241e257a62\",\"title\":\"Nutrition Science\",\"url\":\"/executive-education/stanford-university-nutrition-science\",\"owner\":\"$85\"}\n89:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-7e24533c111d.png\"}\n88:{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":\"$89\"}\n87:{\"id\":\"60387e50-0bb8-58cb-be7c-28aff4fd201d\",\"title\":\"Sustainable Finance\",\"url\":\"/executive-education/university-of-cambridge-sustainable-finance\",\"owner\":\"$88\"}\n8c:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\"}\n8b:{\"key\":\"USMx\",\"name\":\"Un"])</script><script>self.__next_f.push([1,"iversity System of Maryland\",\"logo\":\"$8c\"}\n8a:{\"id\":\"87ef0a37-88f5-4843-888c-166fc9d1644a\",\"title\":\"Agile Project Management\",\"url\":\"/certificates/professional-certificate/umd-usmx-agile-project-management\",\"owner\":\"$8b\"}\n8f:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n8e:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$8f\"}\n8d:{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":\"$8e\"}\n92:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}\n91:{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":\"$92\"}\n90:{\"id\":\"e78d61bc-aa9d-417f-b244-fed28f5737b6\",\"title\":\"Data Analyst\",\"url\":\"/certificates/professional-certificate/ibm-data-analyst\",\"owner\":\"$91\"}\n95:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\"}\n94:{\"key\":\"LinuxFoundationX\",\"name\":\"The Linux Foundation\",\"logo\":\"$95\"}\n93:{\"id\":\"b9629ec9-af4e-4ea3-9a14-268209a06a76\",\"title\":\"Introduction to Kubernetes and Cloud Native Technologies\",\"url\":\"/certificates/professional-certificate/linuxfoundationx-introduction-to-kubernetes-and-cloud-native-technologies\",\"owner\":\"$94\"}\n80:[\"$81\",\"$84\",\"$87\",\"$8a\",\"$8d\",\"$90\",\"$93\"]\n7f:{\"title\":\"Trending certificates\",\"products\":\"$80\"}\n7e:[\"$7f\"]\n98:{\"label\":\"Data Science Certificates\",\"url\":\"/certificates/data-science-certificate\",\"isExternal\":false}\n99:{\"label\":\"Business Certificates\",\"url\":\"/certificates/business-certificate \",\"isExternal\":false}\n9a:{\"label\":\"Data Analytics Certificates\",\"url\":\"/certificates/data-analytics-certificate\",\"isExternal\":false}\n9b:{\"label\":\"Artificial Intelligence (AI) Certificates\",\"url\":\"/certificates/ai-certificates\",\"isExternal\":null}\n9c:{\"label\":\"Machine Learning Certificates\",\"url\":\"/certificates/machine-learning-certificates\",\"isExternal\":false}\n9d:{\"l"])</script><script>self.__next_f.push([1,"abel\":\"Python Certificates\",\"url\":\"/certificates/python-certificate\",\"isExternal\":false}\n9e:{\"label\":\"Project Management Certificates\",\"url\":\"/certificates/project-management-certificate\",\"isExternal\":false}\n9f:{\"label\":\"Digital Marketing Certificates\",\"url\":\"/certificates/digital-marketing-certificates\",\"isExternal\":false}\na0:{\"label\":\"IT Certificates\",\"url\":\"/certificates/it-certificates\",\"isExternal\":false}\na1:{\"label\":\"Sustainability Executive Education Programs\",\"url\":\"/executive-education/sustainability\",\"isExternal\":false}\na2:{\"label\":\"Data Science Executive Education Programs\",\"url\":\"/executive-education/data-science\",\"isExternal\":false}\na3:{\"label\":\"Management Executive Education Programs\",\"url\":\"/executive-education/management\",\"isExternal\":false}\na4:{\"label\":\"Data Analytics Executive Education Programs\",\"url\":\"/executive-education/data-analytics\",\"isExternal\":false}\na5:{\"label\":\"Product Management Executive Education Programs\",\"url\":\"/executive-education/product-management\",\"isExternal\":false}\na6:{\"label\":\"Economics Executive Education Programs\",\"url\":\"/executive-education/economics\",\"isExternal\":false}\na7:{\"label\":\"Strategy Executive Education Programs\",\"url\":\"/executive-education/strategy\",\"isExternal\":false}\na8:{\"label\":\"Finance Executive Education Programs\",\"url\":\"/executive-education/finance\",\"isExternal\":false}\na9:{\"label\":\"Leadership Executive Education Programs\",\"url\":\"/executive-education/leadership\",\"isExternal\":false}\naa:{\"label\":\"FinTech Executive Education Programs\",\"url\":\"/executive-education/fintech\",\"isExternal\":false}\nab:{\"label\":\"Real Estate Executive Education Programs\",\"url\":\"/executive-education/real-estate\",\"isExternal\":false}\nac:{\"label\":\"Blockchain Executive Education Programs\",\"url\":\"/executive-education/blockchain\",\"isExternal\":false}\nad:{\"label\":\"Healthcare Executive Education Programs\",\"url\":\"/executive-education/healthcare\",\"isExternal\":false}\nae:{\"label\":\"Artificial Intelligence (AI) Executive Education Programs\",\"url\":\"/executive-education/artificial-intelligence\",\"isExte"])</script><script>self.__next_f.push([1,"rnal\":false}\naf:{\"label\":\"Marketing Executive Education Programs\",\"url\":\"/executive-education/marketing\",\"isExternal\":false}\nb0:{\"label\":\"Project Management Executive Education Programs\",\"url\":\"/executive-education/project-management\",\"isExternal\":false}\nb1:{\"label\":\"Digital Marketing Executive Education Programs\",\"url\":\"/executive-education/digital-marketing\",\"isExternal\":false}\nb2:{\"label\":\"Operations Management Executive Education Programs\",\"url\":\"/executive-education/operations-management\",\"isExternal\":false}\nb3:{\"label\":\"Design Executive Education Programs\",\"url\":\"/executive-education/design\",\"isExternal\":false}\nb4:{\"label\":\"Supply Chain Executive Education Programs\",\"url\":\"/executive-education/supply-chain\",\"isExternal\":false}\nb5:{\"label\":\"Information Technology Executive Education Programs\",\"url\":\"/executive-education/information-technology\",\"isExternal\":false}\nb6:{\"label\":\"Cybersecurity Executive Education Programs\",\"url\":\"/executive-education/cybersecurity\",\"isExternal\":false}\nb7:{\"label\":\"Innovation Executive Education Programs\",\"url\":\"/executive-education/innovation\",\"isExternal\":false}\nb8:{\"label\":\"Negotiation Executive Education Programs\",\"url\":\"/executive-education/negotiation\",\"isExternal\":false}\nb9:{\"label\":\"Entrepreneurship Executive Education Programs\",\"url\":\"/executive-education/entrepreneurship\",\"isExternal\":false}\nba:{\"label\":\"Law Executive Education Programs\",\"url\":\"/executive-education/law\",\"isExternal\":false}\nbb:{\"label\":\"Programas de Educación Ejecutiva en Transformación Digital\",\"url\":\"/executive-education/digital-transformation\",\"isExternal\":false}\nbc:{\"label\":\"Human Resources Executive Education Programs\",\"url\":\"/executive-education/human-resources\",\"isExternal\":false}\nbd:{\"label\":\"Talent Management Executive Education Programs\",\"url\":\"/executive-education/talent-management\",\"isExternal\":false}\nbe:{\"label\":\"Sales Executive Education Programs\",\"url\":\"/executive-education/sales\",\"isExternal\":false}\nbf:{\"label\":\"Accounting Executive Education Programs\",\"url\":\"/executive-education/accoun"])</script><script>self.__next_f.push([1,"ting\",\"isExternal\":false}\nc0:{\"label\":\"Change Management Executive Education Programs\",\"url\":\"/executive-education/change-management\",\"isExternal\":false}\nc1:{\"label\":\"Risk Management Executive Education Programs\",\"url\":\"/executive-education/risk-management\",\"isExternal\":false}\nc2:{\"label\":\"International Relations Executive Education Programs\",\"url\":\"/executive-education/international-relations\",\"isExternal\":false}\nc3:{\"label\":\"Women's Executive Leadership Programs\",\"url\":\"/executive-education/womens-executive-leadership-program\",\"isExternal\":false}\n97:[\"$98\",\"$99\",\"$9a\",\"$9b\",\"$9c\",\"$9d\",\"$9e\",\"$9f\",\"$a0\",\"$a1\",\"$a2\",\"$a3\",\"$a4\",\"$a5\",\"$a6\",\"$a7\",\"$a8\",\"$a9\",\"$aa\",\"$ab\",\"$ac\",\"$ad\",\"$ae\",\"$af\",\"$b0\",\"$b1\",\"$b2\",\"$b3\",\"$b4\",\"$b5\",\"$b6\",\"$b7\",\"$b8\",\"$b9\",\"$ba\",\"$bb\",\"$bc\",\"$bd\",\"$be\",\"$bf\",\"$c0\",\"$c1\",\"$c2\",\"$c3\"]\n96:{\"title\":\"Popular topics\",\"links\":\"$97\"}\n6f:{\"label\":\"Earn a certificate\",\"hero\":\"$70\",\"productSummaries\":\"$74\",\"productLists\":\"$7e\",\"linkList\":\"$96\"}\nc7:{\"label\":\"View all Degrees\",\"url\":\"/search?tab=degree-program\u0026page=1\"}\nc6:{\"viewAll\":\"$c7\"}\nc5:{\"title\":\"Degrees\",\"subTitle\":\"Degree programs from top institutions around the world to enable your career transformation and advancement.\",\"cta\":\"$c6\",\"ctaPosition\":\"right\"}\nca:[\"Instructor-led, graduate level classes\",\"1-3 years\"]\ncc:{\"label\":\"Browse all Master's Degrees\",\"url\":\"/masters\"}\ncd:{\"label\":\"Browse all Doctorate degrees\",\"url\":\"/doctorate\"}\ncb:[\"$cc\",\"$cd\"]\nc9:{\"title\":\"Master's \u0026 Doctoral\",\"description\":\"Online degree programs from top institutions taught by expert faculty.\",\"features\":\"$ca\",\"links\":\"$cb\"}\ncf:[\"Instructor-led, online classes\",\"2-6 years\"]\nd1:{\"label\":\"Browse all Bachelor's degrees\",\"url\":\"/bachelors\"}\nd0:[\"$d1\"]\nce:{\"title\":\"Bachelor's\",\"description\":\"Online undergraduate degree programs from top institutions taught by expert faculty.\",\"features\":\"$cf\",\"links\":\"$d0\"}\nd3:[\"Instructor-led, online classes\",\"2 - 6 months\"]\nd5:{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"}\nd6:{\"label\":\"Browse all Micro"])</script><script>self.__next_f.push([1,"Bachelors® pathways\",\"url\":\"/bachelors/microbachelors\"}\nd4:[\"$d5\",\"$d6\"]\nd2:{\"title\":\"Paths to degrees\",\"description\":\"A series of graduate-level programs from top institutions, uniquely designed to advance your career by providing a deep level of learning in a specific discipline.\",\"features\":\"$d3\",\"links\":\"$d4\"}\nc8:[\"$c9\",\"$ce\",\"$d2\"]\ndc:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9028c889-8b76-4d81-a7ec-622c024550ef-820f45a8df63.png\"}\ndb:{\"key\":\"Pepperdine\",\"name\":\"Pepperdine University\",\"logo\":\"$dc\"}\nda:{\"id\":\"85f981c8-4e1b-4cc4-b3cc-cd2bd741b405\",\"title\":\"Master of Arts in Psychology\",\"url\":\"/masters/psychology/pepperdine-master-of-arts-in-psychology\",\"owner\":\"$db\"}\ndf:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed4b14c6-ee2c-4a78-a97b-e73bad0485af-27577f044447.png\"}\nde:{\"key\":\"UniversityofDenver\",\"name\":\"University of Denver\",\"logo\":\"$df\"}\ndd:{\"id\":\"273b170f-af05-4036-9f51-d865910959e2\",\"title\":\"Master of Social Work\",\"url\":\"/masters/online-msw-programs/denver-master-of-social-work\",\"owner\":\"$de\"}\ne2:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}\ne1:{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":\"$e2\"}\ne0:{\"id\":\"c106927f-09cc-4b9a-9f8c-c757db45d92a\",\"title\":\"Bachelor of Science in Economics and Management\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-economics-and-management\",\"owner\":\"$e1\"}\ne5:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}\ne4:{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":\"$e5\"}\ne3:{\"id\":\"4a8c1f85-f7bb-4ba9-b102-b5864c921fa1\",\"title\":\"Master of Public Health\",\"url\":\"/masters/masters-in-public-health-online/unc-master-of-public-health\",\"owner\":\"$e4\"}\ne8:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de684a48-2ebc-4596-b466-98ea2cc948b4-864155e2641e.png\"}\ne7:{\"key\":\"Vanderbilt\",\"name\":\"Vanderbilt University\",\"logo\":\"$e8\"}\ne6:{\"id\":\"a50e5"])</script><script>self.__next_f.push([1,"09c-44ae-4e85-9e12-85af6052c613\",\"title\":\"Doctor of Education in Leadership and Learning in Organizations\",\"url\":\"/doctorate/online-edd-programs/vanderbilt-doctor-of-education-in-leadership-and-learning-in-organizations\",\"owner\":\"$e7\"}\neb:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/fab95b1f-000b-45fe-97a9-89b449974728-7da9db5b85f8.png\"}\nea:{\"key\":\"UOS\",\"name\":\"University of Surrey\",\"logo\":\"$eb\"}\ne9:{\"id\":\"35ec5b30-d213-4778-ab2a-ae2783c86502\",\"title\":\"Master of Science Strategic Marketing\",\"url\":\"/masters/surrey-master-of-science-strategic-marketing\",\"owner\":\"$ea\"}\nd9:[\"$da\",\"$dd\",\"$e0\",\"$e3\",\"$e6\",\"$e9\"]\nd8:{\"title\":\"Trending degrees\",\"products\":\"$d9\"}\nd7:[\"$d8\"]\nee:{\"label\":\"Master's in Business Administration (MBA)\",\"url\":\"/masters/online-mba\"}\nef:{\"label\":\"Master's in Social Work (MSW)\",\"url\":\"/masters/online-msw-programs\"}\nf0:{\"label\":\"Master's in Psychology\",\"url\":\"/masters/psychology\"}\nf1:{\"label\":\"Master's in Clinical Psychology\",\"url\":\"/masters/psychology/online-masters-in-clinical-psychology\"}\nf2:{\"label\":\"Master's in Marriage and Family Therapy (MFT)\",\"url\":\"/masters/psychology/online-mft-programs\"}\nf3:{\"label\":\"Master's in Applied Behavior Analysis (ABA)\",\"url\":\"/masters/psychology/online-aba-programs\"}\nf4:{\"label\":\"Master's in Licensed Professional Counseling (LPC)\",\"url\":\"/masters/psychology/online-lpc-programs\"}\nf5:{\"label\":\"Master of Data Science (MDS)\",\"url\":\"/masters/online-masters-in-data-science\"}\nf6:{\"label\":\"Master's in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"}\nf7:{\"label\":\"Master's in Architecture (M.Arch)\",\"url\":\"/masters/online-masters-in-architecture\"}\nf8:{\"label\":\"Master's in Speech Language Pathology (SLP)\",\"url\":\"/masters/online-slp-programs\"}\nf9:{\"label\":\"Master's in Public Health (MPH)\",\"url\":\"/masters/masters-in-public-health-online\"}\nfa:{\"label\":\"Master's in Education\",\"url\":\"/masters/masters-in-education-online\"}\nfb:{\"label\":\"Master's in Educational Leadership\",\"url\":\"/masters/masters-in-education-online/online-masters-"])</script><script>self.__next_f.push([1,"in-educational-leadership\"}\nfc:{\"label\":\"Master's in Teaching (MAT)\",\"url\":\"/masters/online-mat-programs\"}\nfd:{\"label\":\"Master's in Nursing (MSN)\",\"url\":\"/masters/online-msn-programs\"}\nfe:{\"label\":\"Family Nurse Practitioner (FNP)\",\"url\":\"/masters/online-msn-programs/online-fnp-programs\"}\nff:{\"label\":\"Psychiatric Mental Health Nurse Practitioner (PMHNP)\",\"url\":\"/masters/online-msn-programs/online-pmhnp-programs\"}\n100:{\"label\":\"Acute Care Nurse Practitioner (ACNP)\",\"url\":\"/masters/online-msn-programs/online-acute-care-nurse-practitioner-programs\"}\n101:{\"label\":\"Master of Laws (LLM)\",\"url\":\"/masters/online-llm-programs\"}\n102:{\"label\":\"Master of Legal Studies\",\"url\":\"/masters/online-master-of-legal-studies\"}\n103:{\"label\":\"Master's in Counseling\",\"url\":\"/masters/counseling\"}\n104:{\"label\":\"Master's in School Counseling\",\"url\":\"/masters/counseling/online-masters-in-school-counseling\"}\n105:{\"label\":\"Master's in Mental Health Counseling\",\"url\":\"/masters/counseling/online-masters-in-mental-health-counseling\"}\n106:{\"label\":\"Master's in Counseling \u0026 Psychology\",\"url\":\"/masters/counseling-psychology\"}\n107:{\"label\":\"Master of Engineering (MEng)\",\"url\":\"/masters/online-masters-in-engineering\"}\n108:{\"label\":\"Master's in Computer Engineering\",\"url\":\"/masters/online-masters-in-engineering/online-computer-engineering-masters\"}\n109:{\"label\":\"Master's in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity\"}\n10a:{\"label\":\"Master's in Information Technology (IT)\",\"url\":\"/masters/online-masters-in-information-technology\"}\n10b:{\"label\":\"Master's in Information Systems\",\"url\":\"/masters/masters-in-information-systems-online\"}\n10c:{\"label\":\"Master's in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science\"}\n10d:{\"label\":\"Master of Library and Information Science (MLIS)\",\"url\":\"/masters/online-mlis-programs\"}\n10e:{\"label\":\"Master's in International Relations\",\"url\":\"/masters/online-masters-in-international-relations\"}\n10f:{\"label\":\"Master's in Communication\",\"url\":\"/masters/online-masters-in-communication\"}\n110:{\"la"])</script><script>self.__next_f.push([1,"bel\":\"Master's in Design\",\"url\":\"/masters/online-masters-in-design\"}\n111:{\"label\":\"Master's in Health Administration (MHA)\",\"url\":\"/masters/online-mha\"}\n112:{\"label\":\"Master's in Business\",\"url\":\"/masters/online-masters-in-business\"}\n113:{\"label\":\"Master of Accounting\",\"url\":\"/masters/online-masters-in-accounting\"}\n114:{\"label\":\"Master's in Entrepreneurship\",\"url\":\"/masters/masters-in-entrepreneurship-online\"}\n115:{\"label\":\"Master's in Leadership\",\"url\":\"/masters/masters-in-leadership-online\"}\n116:{\"label\":\"Master's in Human Resources\",\"url\":\"/masters/online-masters-in-human-resources\"}\n117:{\"label\":\"Master's in Supply Chain Management\",\"url\":\"/masters/online-masters-in-supply-chain-management\"}\n118:{\"label\":\"Master's in Public Administration (MPA)\",\"url\":\"/masters/masters-in-public-administration-online\"}\n119:{\"label\":\"Master's in Analytics\",\"url\":\"/masters/online-masters-in-analytics\"}\n11a:{\"label\":\"Maestría en Analítica de Negocios\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-business-analytics\"}\n11b:{\"label\":\"Master's in Data Analytics\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-data-analytics\"}\n11c:{\"label\":\"Master's in Project Management (MPM)\",\"url\":\"/masters/masters-in-project-management-online\"}\n11d:{\"label\":\"Maestría en Cuidado de la Salud\",\"url\":\"/masters/healthcare\"}\n11e:{\"label\":\"Master's in Nutrition\",\"url\":\"/masters/online-masters-in-nutrition\"}\n11f:{\"label\":\"Licenciatura en Trabajo Social (BSW)\",\"url\":\"/bachelors/social-work-bsw\"}\n120:{\"label\":\"Bachelor of Psychology\",\"url\":\"/bachelors/psychology\"}\n121:{\"label\":\"Bachelor of Computer Science in Data Science\",\"url\":\"/bachelors/computer-data-sciences\"}\n122:{\"label\":\"Bachelor of Public Health\",\"url\":\"/bachelors/bachelors-in-public-health-online\"}\n123:{\"label\":\"Bachelor of Accounting\",\"url\":\"/bachelors/online-accounting-bachelor-degree\"}\n124:{\"label\":\"Bachelor of Finance\",\"url\":\"/bachelors/online-bachelors-degree-finance\"}\n125:{\"label\":\"Bachelor of Health and Social Service\",\"url\":\"/bachelors/health-social-servic"])</script><script>self.__next_f.push([1,"es\"}\n126:{\"label\":\"Bachelor's in Business\",\"url\":\"/bachelors/business\"}\n127:{\"label\":\"Doctorate in Social Work (DSW)\",\"url\":\"/doctorate/social-work\"}\n128:{\"label\":\"Doctor of Public Health (DrPH)\",\"url\":\"/doctorate/online-drph-programs\"}\n129:{\"label\":\"Doctor of Education (EdD)\",\"url\":\"/doctorate/online-edd-programs\"}\n12a:{\"label\":\"Doctor of Nursing Practice (DNP)\",\"url\":\"/doctorate/online-dnp-programs\"}\n12b:{\"label\":\"Doctor of Physical Therapy (DPT)\",\"url\":\"/doctorate/online-dpt-programs\"}\n12c:{\"label\":\"Doctor of Pharmacy (PharmD)\",\"url\":\"/doctorate/online-pharmd-programs\"}\ned:[\"$ee\",\"$ef\",\"$f0\",\"$f1\",\"$f2\",\"$f3\",\"$f4\",\"$f5\",\"$f6\",\"$f7\",\"$f8\",\"$f9\",\"$fa\",\"$fb\",\"$fc\",\"$fd\",\"$fe\",\"$ff\",\"$100\",\"$101\",\"$102\",\"$103\",\"$104\",\"$105\",\"$106\",\"$107\",\"$108\",\"$109\",\"$10a\",\"$10b\",\"$10c\",\"$10d\",\"$10e\",\"$10f\",\"$110\",\"$111\",\"$112\",\"$113\",\"$114\",\"$115\",\"$116\",\"$117\",\"$118\",\"$119\",\"$11a\",\"$11b\",\"$11c\",\"$11d\",\"$11e\",\"$11f\",\"$120\",\"$121\",\"$122\",\"$123\",\"$124\",\"$125\",\"$126\",\"$127\",\"$128\",\"$129\",\"$12a\",\"$12b\",\"$12c\"]\nec:{\"title\":\"Trending Topics\",\"links\":\"$ed\"}\nc4:{\"label\":\"Earn a degree\",\"hero\":\"$c5\",\"productSummaries\":\"$c8\",\"productLists\":\"$d7\",\"linkList\":\"$ec\"}\n34:[\"$35\",\"$6f\",\"$c4\"]\n33:{\"title\":\"By goal\",\"items\":\"$34\"}\n132:{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?tab=course\u0026skills.skill=Artificial+Intelligence\"}\n133:{\"label\":\"Learn more about Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}\n131:{\"viewAll\":\"$132\",\"learnMore\":\"$133\"}\n130:{\"title\":\"Artificial Intelligence\",\"subTitle\":\"Artificial Intelligence (AI) is a unique field of study that combines computer science, robust datasets, and the ability of machines to simulate human intelligence to advance problem-solving techniques and tasks.\",\"cta\":\"$131\",\"ctaPosition\":\"left\"}\n136:{\"label\":\"ChatGPT\",\"url\":\"/learn/chatgpt\"}\n137:{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"}\n138:{\"label\":\"Computer Science\",\"url\":\"/learn/computer-science\"}\n139:{\"label\":\"Electronics\",\"url\":\"/learn/electronics\"}\n13a:{\"label\":\"Automation\",\"url\":\"/learn"])</script><script>self.__next_f.push([1,"/automation\"}\n13b:{\"label\":\"Augmented Reality\",\"url\":\"/learn/augmented-reality\"}\n13c:{\"label\":\"Internet of Things\",\"url\":\"/learn/iot-internet-of-things\"}\n13d:{\"label\":\"Software Engineering\",\"url\":\"/learn/software-engineering\"}\n13e:{\"label\":\"Data Mining\",\"url\":\"/learn/data-mining\"}\n13f:{\"label\":\"Robotics\",\"url\":\"/learn/robotics\"}\n140:{\"label\":\"Deep Learning\",\"url\":\"/learn/deep-learning\"}\n141:{\"label\":\"Computer Engineering\",\"url\":\"/learn/computer-engineering\"}\n142:{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"}\n143:{\"label\":\"Natural Language Processing\",\"url\":\"/learn/natural-language-processing\"}\n144:{\"label\":\"Computer Programming\",\"url\":\"/learn/computer-programming\"}\n145:{\"label\":\"Computer Vision\",\"url\":\"/learn/computer-vision\"}\n146:{\"label\":\"Robotic Process Automation\",\"url\":\"/learn/robotic-process-automation\"}\n147:{\"label\":\"Computer Networking\",\"url\":\"/learn/computer-networking\"}\n148:{\"label\":\"Mathematical Modeling\",\"url\":\"/learn/mathematical-modeling\"}\n149:{\"label\":\"Autonomous Robotics\",\"url\":\"/learn/autonomous-robotics\"}\n135:[\"$136\",\"$137\",\"$138\",\"$139\",\"$13a\",\"$13b\",\"$13c\",\"$13d\",\"$13e\",\"$13f\",\"$140\",\"$141\",\"$142\",\"$143\",\"$144\",\"$145\",\"$146\",\"$147\",\"$148\",\"$149\"]\n134:{\"title\":\"Related Topics\",\"links\":\"$135\"}\n14f:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f396c277-2a09-46ec-b76f-32fedc4a82cc-59e1dca89c96.png\"}\n14e:{\"key\":\"Databricks\",\"name\":\"Databricks\",\"logo\":\"$14f\"}\n14d:{\"id\":\"d62627c6-2b97-5ffc-b862-2f2c4bab95cf\",\"title\":\"Large Language Models: Application through Production\",\"url\":\"/learn/computer-science/databricks-large-language-models-application-through-production\",\"owner\":\"$14e\"}\n152:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n151:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$152\"}\n150:{\"id\":\"b58fc9b9-5426-56e6-9cdc-f1f872b3e816\",\"title\":\"CS50's Introduction to Artificial Intelligence with Python\",\"url\":\"/learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-"])</script><script>self.__next_f.push([1,"with-python\",\"owner\":\"$151\"}\n155:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}\n154:{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":\"$155\"}\n153:{\"id\":\"df35235c-d8a5-5d87-992a-51e960aa2bb5\",\"title\":\"AI for Everyone: Master the Basics\",\"url\":\"/learn/artificial-intelligence/ibm-ai-for-everyone-master-the-basics\",\"owner\":\"$154\"}\n14c:[\"$14d\",\"$150\",\"$153\"]\n156:{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?q=artificial+intelligence\u0026tab=course\"}\n14b:{\"title\":\"Courses\",\"products\":\"$14c\",\"cta\":\"$156\"}\n15b:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n15a:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$15b\"}\n159:{\"id\":\"09a238fc-8b5a-5d83-8c74-2f002c3ba841\",\"title\":\"Artificial Intelligence in Health Care\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-in-health-care\",\"owner\":\"$15a\"}\n15e:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n15d:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$15e\"}\n15c:{\"id\":\"e7388b02-2261-507f-a84e-f5a0f5d47c49\",\"title\":\"Artificial Intelligence: Implications for Business Strategy\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy\",\"owner\":\"$15d\"}\n161:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}\n160:{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":\"$161\"}\n15f:{\"id\":\"396aac5e-d950-5f87-95ca-8184399edd50\",\"title\":\"Oxford Artificial Intelligence Programme\",\"url\":\"/executive-education/university-of-oxford-artificial-intelligence-programme\",\"owner\":\"$160\"}\n158:[\"$159\",\"$15c\",\"$15f\"]\n162:{\"label\":\"View all Artificial Intelligence Certificates\",\"url\":\"/certificates/ai-certificates\"}\n157:{\"title\":\"Certificates\",\"products\":\"$158\",\"cta\":\"$162\"}\n167:{\"url\":\"h"])</script><script>self.__next_f.push([1,"ttps://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}\n166:{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":\"$167\"}\n165:{\"id\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"title\":\"Master of Science in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"owner\":\"$166\"}\n16a:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}\n169:{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":\"$16a\"}\n168:{\"id\":\"89f39d1a-bb23-4944-b6e0-b51fe25ce932\",\"title\":\"Master of Science in Artificial Intelligence (MSAI)\",\"url\":\"/masters/online-masters-in-artificial-intelligence/online-master-artificial-intelligence-utaustinx\",\"owner\":\"$169\"}\n16d:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n16c:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$16d\"}\n16b:{\"id\":\"ee60cf8f-3b6c-476f-94c1-1a16c8f50c48\",\"title\":\"Master of Science in Artificial Intelligence\",\"url\":\"/masters/maryville-university-master-of-science-in-artificial-intelligence\",\"owner\":\"$16c\"}\n164:[\"$165\",\"$168\",\"$16b\"]\n16e:{\"label\":\"View all Masters in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"}\n163:{\"title\":\"Degrees\",\"products\":\"$164\",\"cta\":\"$16e\"}\n14a:[\"$14b\",\"$157\",\"$163\"]\n12f:{\"label\":\"Artificial Intelligence\",\"hero\":\"$130\",\"linkList\":\"$134\",\"productLists\":\"$14a\"}\n172:{\"label\":\"View all Data Science courses\",\"url\":\"/search?tab=course\u0026skills.skill=Data+Science\"}\n171:{\"viewAll\":\"$172\"}\n170:{\"title\":\"Data Science\",\"subTitle\":\"Data Science is an interdisciplinary field which utilizes scientific methods, algorithms, and data insights to extract meaning and drive informed decision-making across industries.\",\"cta\":\"$171\",\"ctaPosition\":\"right\"}\n175:{\"label\":\"Power BI\",\"url\":\"/learn/power-bi\"}\n176:{\"label\":\"SQL\",\"url\":\"/learn/sql\"}\n177:{\"label\":\"Analytics\",\"url\":"])</script><script>self.__next_f.push([1,"\"/learn/analytics\"}\n178:{\"label\":\"MySQL\",\"url\":\"/learn/mysql\"}\n179:{\"label\":\"Coding\",\"url\":\"/learn/coding\"}\n17a:{\"label\":\"PostgreSQL\",\"url\":\"/learn/postgresql\"}\n17b:{\"label\":\"Big Data\",\"url\":\"/learn/big-data\"}\n17c:{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"}\n17d:{\"label\":\"Syntax\",\"url\":\"/learn/syntax\"}\n17e:{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"}\n17f:{\"label\":\"TensorFlow\",\"url\":\"/learn/tensorflow\"}\n180:{\"label\":\"Probability\",\"url\":\"/learn/probability\"}\n181:{\"label\":\"Regression\",\"url\":\"/learn/regression\"}\n182:{\"label\":\"Inference\",\"url\":\"/learn/inference\"}\n183:{\"label\":\"PyTorch\",\"url\":\"/learn/pytorch\"}\n184:{\"label\":\"Grafana\",\"url\":\"/learn/grafana\"}\n185:{\"label\":\"Business Intelligence\",\"url\":\"/learn/business-intelligence\"}\n186:{\"label\":\"Data Warehouse\",\"url\":\"/learn/data-warehouse\"}\n187:{\"label\":\"Data Structures\",\"url\":\"/learn/data-structures\"}\n188:{\"label\":\"Data Visualization\",\"url\":\"/learn/data-visualization\"}\n174:[\"$175\",\"$176\",\"$177\",\"$178\",\"$179\",\"$17a\",\"$17b\",\"$17c\",\"$17d\",\"$17e\",\"$17f\",\"$180\",\"$181\",\"$182\",\"$183\",\"$184\",\"$185\",\"$186\",\"$187\",\"$188\"]\n173:{\"title\":\"Related Topics\",\"links\":\"$174\"}\n18e:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\"}\n18d:{\"key\":\"GTx\",\"name\":\"The Georgia Institute of Technology\",\"logo\":\"$18e\"}\n18c:{\"id\":\"ad547f78-ac97-510f-9470-c9c0e6c9d348\",\"title\":\"Introduction to Analytics Modeling\",\"url\":\"/learn/data-analysis/the-georgia-institute-of-technology-introduction-to-analytics-modeling\",\"owner\":\"$18d\"}\n191:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n190:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$191\"}\n18f:{\"id\":\"a926dd9d-d01b-5a7e-9905-c472ed4a388c\",\"title\":\"Data Science: R Basics\",\"url\":\"/learn/r-programming/harvard-university-data-science-r-basics\",\"owner\":\"$190\"}\n194:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n193:{\"key\":\"MITx\",\"name\":"])</script><script>self.__next_f.push([1,"\"Massachusetts Institute of Technology\",\"logo\":\"$194\"}\n192:{\"id\":\"2205130f-9a8c-5988-aa70-ec37c470c2b0\",\"title\":\"Probability - The Science of Uncertainty and Data\",\"url\":\"/learn/probability/massachusetts-institute-of-technology-probability-the-science-of-uncertainty-and-data\",\"owner\":\"$193\"}\n18b:[\"$18c\",\"$18f\",\"$192\"]\n195:{\"label\":\"View all Data Science courses\",\"url\":\"/search?q=data+science\u0026tab=course\"}\n18a:{\"title\":\"Courses\",\"products\":\"$18b\",\"cta\":\"$195\"}\n19a:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n199:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$19a\"}\n198:{\"id\":\"3c32e3e0-b6fe-4ee4-bd4f-210c6339e074\",\"title\":\"Data Science\",\"url\":\"/certificates/professional-certificate/harvardx-data-science\",\"owner\":\"$199\"}\n19d:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}\n19c:{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":\"$19d\"}\n19b:{\"id\":\"b5598690-9bd8-4d21-b7f3-dc741b50473f\",\"title\":\"IBM Data Science\",\"url\":\"/certificates/professional-certificate/ibm-data-science\",\"owner\":\"$19c\"}\n1a0:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n19f:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$1a0\"}\n19e:{\"id\":\"673ea595-1439-4a34-ad71-cc5c995c6fc6\",\"title\":\"Learning Python for Data Science\",\"url\":\"/certificates/professional-certificate/harvardx-learning-python-for-data-science\",\"owner\":\"$19f\"}\n197:[\"$198\",\"$19b\",\"$19e\"]\n1a1:{\"label\":\"View all Data Science certificates\",\"url\":\"/certificates/data-science-certificate\"}\n196:{\"title\":\"Certificates\",\"products\":\"$197\",\"cta\":\"$1a1\"}\n1a6:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}\n1a5:{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":\"$1a6\"}\n1a4:{\"id\":\"721f524b-da8f-4923-83b4-a18de44fdc43\",\"title\":\"Master's Degree in Data Science\",\"url\":\"/masters/online-masters-in-data-science/online-"])</script><script>self.__next_f.push([1,"master-data-science-utaustinx\",\"owner\":\"$1a5\"}\n1a9:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}\n1a8:{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":\"$1a9\"}\n1a7:{\"id\":\"58331700-1a02-4abe-a858-4ebe83200d15\",\"title\":\"Master of Information and Data Science\",\"url\":\"/masters/online-masters-in-data-science/ucb-master-of-information-and-data-science\",\"owner\":\"$1a8\"}\n1ac:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}\n1ab:{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":\"$1ac\"}\n1aa:{\"id\":\"70adbe06-2ef5-446e-97cf-7d26520a9697\",\"title\":\"Master of Applied Data Science\",\"url\":\"/masters/online-masters-in-data-science/unc-master-of-applied-data-science\",\"owner\":\"$1ab\"}\n1a3:[\"$1a4\",\"$1a7\",\"$1aa\"]\n1ad:{\"label\":\"View all Data Science degrees\",\"url\":\"/masters/online-masters-in-data-science\"}\n1a2:{\"title\":\"Degrees\",\"products\":\"$1a3\",\"cta\":\"$1ad\"}\n189:[\"$18a\",\"$196\",\"$1a2\"]\n16f:{\"label\":\"Data Science\",\"hero\":\"$170\",\"linkList\":\"$173\",\"productLists\":\"$189\"}\n1b1:{\"label\":\"View all Finance courses\",\"url\":\"/search?skills.skill=Finance\"}\n1b2:{\"label\":\"Learn more about Finance\",\"url\":\"/learn/finance\"}\n1b0:{\"viewAll\":\"$1b1\",\"learnMore\":\"$1b2\"}\n1af:{\"title\":\"Finance\",\"subTitle\":\"Navigate the complex field of Finance, including money management, investments, and financial planning. Gain insights into market analysis and strategic decision-making, allowing for growth and profitability.\",\"cta\":\"$1b0\",\"ctaPosition\":\"left\"}\n1b5:{\"label\":\"Bitcoin\",\"url\":\"/learn/bitcoin\"}\n1b6:{\"label\":\"Investing\",\"url\":\"/learn/investing\"}\n1b7:{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"}\n1b8:{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"}\n1b9:{\"label\":\"Trading\",\"url\":\"/learn/trading\"}\n1ba:{\"label\":\"Fintech\",\"url\":\"/learn/fintech\"}\n1bb:{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"}\n1bc:{\"label\":\"Banking\",\"url\":\"/learn/banking\"}\n1bd:{\"label\":\"Risk Management\",\"url\":\"/le"])</script><script>self.__next_f.push([1,"arn/risk-management\"}\n1be:{\"label\":\"Venture Capital\",\"url\":\"/learn/venture-capital\"}\n1bf:{\"label\":\"Taxes\",\"url\":\"/learn/taxes\"}\n1c0:{\"label\":\"Investment Banking\",\"url\":\"/learn/investment-banking\"}\n1c1:{\"label\":\"Financial Management\",\"url\":\"/learn/financial-management\"}\n1c2:{\"label\":\"Cryptography\",\"url\":\"/learn/cryptography\"}\n1c3:{\"label\":\"Circular Economy\",\"url\":\"/learn/circular-economy\"}\n1c4:{\"label\":\"Macroeconomics\",\"url\":\"/learn/macroeconomics\"}\n1c5:{\"label\":\"Financial Accounting\",\"url\":\"/learn/financial-accounting\"}\n1c6:{\"label\":\"Financial Literacy\",\"url\":\"/learn/financial-literacy\"}\n1c7:{\"label\":\"Personal Finance\",\"url\":\"/learn/personal-finance\"}\n1c8:{\"label\":\"Corporate Finance\",\"url\":\"/learn/corporate-finance\"}\n1b4:[\"$1b5\",\"$1b6\",\"$1b7\",\"$1b8\",\"$1b9\",\"$1ba\",\"$1bb\",\"$1bc\",\"$1bd\",\"$1be\",\"$1bf\",\"$1c0\",\"$1c1\",\"$1c2\",\"$1c3\",\"$1c4\",\"$1c5\",\"$1c6\",\"$1c7\",\"$1c8\"]\n1b3:{\"title\":\"Related Topics\",\"links\":\"$1b4\"}\n1ce:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}\n1cd:{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":\"$1ce\"}\n1cc:{\"id\":\"c211d581-03d2-5c31-b34f-a988be4cc3a4\",\"title\":\"Introduction to Corporate Finance\",\"url\":\"/learn/corporate-finance/columbia-university-introduction-to-corporate-finance\",\"owner\":\"$1cd\"}\n1d1:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n1d0:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$1d1\"}\n1cf:{\"id\":\"7eb35c18-ca39-552e-9241-ed3cab2f937e\",\"title\":\"Foundations of Modern Finance I\",\"url\":\"/learn/finance/massachusetts-institute-of-technology-foundations-of-modern-finance-i\",\"owner\":\"$1d0\"}\n1d4:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-fbcc652f58e1.png\"}\n1d3:{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":\"$1d4\"}\n1d2:{\"id\":\"feb03847-e53c-501a-b1cf-ebe2ccc23f4c\",\"title\":\"Foundations of Finance\",\"url\":\"/learn/finance/university-of-cambridge-foundatio"])</script><script>self.__next_f.push([1,"ns-of-finance\",\"owner\":\"$1d3\"}\n1cb:[\"$1cc\",\"$1cf\",\"$1d2\"]\n1d5:{\"label\":\"View all Finance courses\",\"url\":\"/search?q=finance\u0026tab=course\"}\n1ca:{\"title\":\"Courses\",\"products\":\"$1cb\",\"cta\":\"$1d5\"}\n1da:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n1d9:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$1da\"}\n1d8:{\"id\":\"4666a4d2-1337-5324-85bf-059350078d5b\",\"title\":\"FinTech\",\"url\":\"/executive-education/harvard-university-fintech\",\"owner\":\"$1d9\"}\n1dd:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\"}\n1dc:{\"key\":\"LSE\",\"name\":\"The London School of Economics and Political Science\",\"logo\":\"$1dd\"}\n1db:{\"id\":\"e590608c-e3f8-5731-8b22-ce1b4b589b23\",\"title\":\"MBA Essentials\",\"url\":\"/executive-education/the-london-school-of-economics-and-political-science-mba-essentials\",\"owner\":\"$1dc\"}\n1e0:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}\n1df:{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":\"$1e0\"}\n1de:{\"id\":\"1859f52c-3fc0-43fe-a8a1-13660c77e9c3\",\"title\":\"Corporate Finance\",\"url\":\"/certificates/professional-certificate/columbiax-corporate-finance\",\"owner\":\"$1df\"}\n1d7:[\"$1d8\",\"$1db\",\"$1de\"]\n1e1:{\"label\":\"View all Finance certificates\",\"url\":\"/search?q=finance\u0026tab=program\u0026program_type=Professional+Certificate\"}\n1d6:{\"title\":\"Certificates\",\"products\":\"$1d7\",\"cta\":\"$1e1\"}\n1e6:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}\n1e5:{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":\"$1e6\"}\n1e4:{\"id\":\"d85a67b7-2f8b-4f4a-8900-e4dd15cf64c8\",\"title\":\"Master of Science in Professional Accounting\",\"url\":\"/masters/online-masters-in-accounting/syracuse-master-of-science-in-professional-accounting\",\"owner\":\"$1e5\"}\n1e9:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}\n1e8:{\"key\":\"UCDavis\",\""])</script><script>self.__next_f.push([1,"name\":\"University of California, Davis\",\"logo\":\"$1e9\"}\n1e7:{\"id\":\"74f633a8-2eaa-4202-9e31-79f6868934b0\",\"title\":\"Master of Management\",\"url\":\"/masters/ucdavis-master-of-management\",\"owner\":\"$1e8\"}\n1ec:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n1eb:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$1ec\"}\n1ea:{\"id\":\"518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"title\":\"Master of Science in Accounting\",\"url\":\"/masters/maryville-university-master-of-science-in-accounting\",\"owner\":\"$1eb\"}\n1e3:[\"$1e4\",\"$1e7\",\"$1ea\"]\n1ed:{\"label\":\"View all Finance degrees\",\"url\":\"/search?q=finance+degree\u0026tab=program\"}\n1e2:{\"title\":\"Graduate Degrees\",\"products\":\"$1e3\",\"cta\":\"$1ed\"}\n1f2:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}\n1f1:{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":\"$1f2\"}\n1f0:{\"id\":\"f9414209-c0ac-4572-bb46-2dde155f3a22\",\"title\":\"Bachelor of Science in Economics and Finance\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-economics-and-finance\",\"owner\":\"$1f1\"}\n1f5:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}\n1f4:{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":\"$1f5\"}\n1f3:{\"id\":\"5e15f5aa-8a0a-4362-833d-1c9875e1ebad\",\"title\":\"Bachelor of Science in Accounting and Finance\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-accounting-and-finance\",\"owner\":\"$1f4\"}\n1f8:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n1f7:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$1f8\"}\n1f6:{\"id\":\"da3a0dc4-f697-48fd-bc7d-44c208608dd5\",\"title\":\"Bachelor of Science in Finance\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-finance\",\"owner\":\"$1f7\"}\n1ef:[\"$1f0\",\"$1f3\",\"$1f6\"]\n1f9:{\"label\":\"View all Finance degrees\",\"url\":\"/search?q=finance+degree\u0026tab=program\"}\n1ee:{\"title\":\"Undergr"])</script><script>self.__next_f.push([1,"aduate Degrees\",\"products\":\"$1ef\",\"cta\":\"$1f9\"}\n1c9:[\"$1ca\",\"$1d6\",\"$1e2\",\"$1ee\"]\n1ae:{\"label\":\"Finance\",\"hero\":\"$1af\",\"linkList\":\"$1b3\",\"productLists\":\"$1c9\"}\n1fd:{\"label\":\"View all Business Administration Courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"}\n1fe:{\"label\":\"Learn more about Business Administration\",\"url\":\"/learn/business-administration\"}\n1fc:{\"viewAll\":\"$1fd\",\"learnMore\":\"$1fe\"}\n1fb:{\"title\":\"Business Administration\",\"subTitle\":\"Business Administration is the key to lead and manage operations, organize resources, and direct a team to achieve organizational goals with efficiency and effectiveness.\",\"cta\":\"$1fc\",\"ctaPosition\":\"left\"}\n201:{\"label\":\"Excel\",\"url\":\"/learn/excel\"}\n202:{\"label\":\"Marketing\",\"url\":\"/learn/marketing\"}\n203:{\"label\":\"Digital Marketing\",\"url\":\"/learn/digital-marketing\"}\n204:{\"label\":\"Entrepreneurship\",\"url\":\"/learn/entrepreneurship\"}\n205:{\"label\":\"Success\",\"url\":\"/learn/success\"}\n206:{\"label\":\"CEO\",\"url\":\"/learn/ceo\"}\n207:{\"label\":\"Management\",\"url\":\"/learn/management\"}\n208:{\"label\":\"Sales\",\"url\":\"/learn/sales\"}\n209:{\"label\":\"Accounting\",\"url\":\"/learn/accounting\"}\n20a:{\"label\":\"Leadership\",\"url\":\"/learn/leadership\"}\n20b:{\"label\":\"Innovation\",\"url\":\"/learn/innovation\"}\n20c:{\"label\":\"Procurement\",\"url\":\"/learn/procurement\"}\n20d:{\"label\":\"Scrum\",\"url\":\"/learn/scrum\"}\n20e:{\"label\":\"Zapier\",\"url\":\"/learn/zapier\"}\n20f:{\"label\":\"Ecommerce\",\"url\":\"/learn/ecommerce\"}\n210:{\"label\":\"Project Management\",\"url\":\"/learn/project-management\"}\n211:{\"label\":\"Agile\",\"url\":\"/learn/agile\"}\n212:{\"label\":\"ServiceNow\",\"url\":\"/learn/servicenow\"}\n213:{\"label\":\"Business Plan\",\"url\":\"/learn/business-plan\"}\n214:{\"label\":\"Retail\",\"url\":\"/learn/retail\"}\n200:[\"$201\",\"$202\",\"$203\",\"$204\",\"$205\",\"$206\",\"$207\",\"$208\",\"$209\",\"$20a\",\"$20b\",\"$20c\",\"$20d\",\"$20e\",\"$20f\",\"$210\",\"$211\",\"$212\",\"$213\",\"$214\"]\n1ff:{\"title\":\"Related Topics\",\"links\":\"$200\"}\n21a:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n219:{\"key\":\"HarvardX\",\"name\":\"Ha"])</script><script>self.__next_f.push([1,"rvard University\",\"logo\":\"$21a\"}\n218:{\"id\":\"6eca70a5-ef9e-5ac5-a960-16b5c619f367\",\"title\":\"Exercising Leadership: Foundational Principles\",\"url\":\"/learn/leadership/harvard-university-exercising-leadership-foundational-principles\",\"owner\":\"$219\"}\n21d:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n21c:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$21d\"}\n21b:{\"id\":\"03a0222e-f392-5beb-9bb5-ab4c25f37018\",\"title\":\"Financial Accounting\",\"url\":\"/learn/financial-accounting/massachusetts-institute-of-technology-financial-accounting\",\"owner\":\"$21c\"}\n220:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n21f:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$220\"}\n21e:{\"id\":\"92f758de-cddd-591e-a750-6b3e9ec47c0f\",\"title\":\"Supply Chain Fundamentals\",\"url\":\"/learn/supply-chain-design/massachusetts-institute-of-technology-supply-chain-fundamentals\",\"owner\":\"$21f\"}\n217:[\"$218\",\"$21b\",\"$21e\"]\n221:{\"label\":\"View all Business Administration courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"}\n216:{\"title\":\"Courses\",\"products\":\"$217\",\"cta\":\"$221\"}\n226:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\"}\n225:{\"key\":\"LSE\",\"name\":\"The London School of Economics and Political Science\",\"logo\":\"$226\"}\n224:{\"id\":\"e590608c-e3f8-5731-8b22-ce1b4b589b23\",\"title\":\"MBA Essentials\",\"url\":\"/executive-education/the-london-school-of-economics-and-political-science-mba-essentials\",\"owner\":\"$225\"}\n229:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}\n228:{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":\"$229\"}\n227:{\"id\":\"ae9513fa-9c85-5826-948f-826244d04618\",\"title\":\"Oxford Executive Strategy Programme\",\"url\":\"/executive-education/university-of-oxford-executive-strategy-programme\",\"owner\":\"$228\"}\n22c:{\"url\":\"https://prod-dis"])</script><script>self.__next_f.push([1,"covery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-fbcc652f58e1.png\"}\n22b:{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":\"$22c\"}\n22a:{\"id\":\"ed0e908c-0aa2-5c72-b640-5f28f4147f16\",\"title\":\"Business Sustainability Management\",\"url\":\"/executive-education/university-of-cambridge-business-sustainability-management\",\"owner\":\"$22b\"}\n223:[\"$224\",\"$227\",\"$22a\"]\n22d:{\"label\":\"View all Business Administration certificates\",\"url\":\"/certificates/business-certificate\"}\n222:{\"title\":\"Certificates\",\"products\":\"$223\",\"cta\":\"$22d\"}\n232:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}\n231:{\"key\":\"UCDavis\",\"name\":\"University of California, Davis\",\"logo\":\"$232\"}\n230:{\"id\":\"fe32d1c5-5e22-4f5a-8a92-71ef3d654d96\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/ucd-master-of-business-administration\",\"owner\":\"$231\"}\n235:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}\n234:{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":\"$235\"}\n233:{\"id\":\"1be98dfc-6b32-4f4c-8beb-02a2b1ef9183\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/unc-master-of-business-administration\",\"owner\":\"$234\"}\n22f:[\"$230\",\"$233\"]\n236:{\"label\":\"View all Business Administration degrees\",\"url\":\"/search?learning_type=MicroMasters\u0026learning_type=Executive+Education\u0026learning_type=Masters\u0026learning_type=MicroBachelors\u0026learning_type=Bachelors\u0026subject=Business+%26+Management\"}\n22e:{\"title\":\"Degrees\",\"products\":\"$22f\",\"cta\":\"$236\"}\n215:[\"$216\",\"$222\",\"$22e\"]\n1fa:{\"label\":\"Business Administration\",\"hero\":\"$1fb\",\"linkList\":\"$1ff\",\"productLists\":\"$215\"}\n23a:{\"label\":\"View all Cybersecurity Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Cyber+Security\"}\n23b:{\"label\":\"Learn more about Cybersecurity\",\"url\":\"/learn/cybersecurity\"}\n239:{\"viewAll\":\"$23a\",\"learnMore\":\"$23b\"}\n238:{\"title\":\"Cybersecurity\",\"subTitle\":\"Cybersecurity is a s"])</script><script>self.__next_f.push([1,"ubset of information technology (IT) focused on protecting digital systems and information. Cybersecurity specialists play key roles in the protection of IT systems against unauthorized access to data systems, centers and other systems.\",\"cta\":\"$239\",\"ctaPosition\":\"left\"}\n23e:{\"label\":\"Information Security\",\"url\":\"/learn/information-security\"}\n23f:{\"label\":\"Computer Security\",\"url\":\"/learn/computer-security\"}\n240:{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"}\n241:{\"label\":\"Encryption\",\"url\":\"/learn/encryption\"}\n242:{\"label\":\"Security Administration\",\"url\":\"/learn/security-administration\"}\n243:{\"label\":\"Security Software\",\"url\":\"/learn/security-software\"}\n244:{\"label\":\"Vulnerability Management\",\"url\":\"/learn/vulnerability-management\"}\n245:{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"}\n246:{\"label\":\"Data Encryption\",\"url\":\"/learn/data-encryption\"}\n247:{\"label\":\"SaaS\",\"url\":\"/learn/software-as-a-service\"}\n248:{\"label\":\"User Experience (UX)\",\"url\":\"/learn/user-experience-ux\"}\n249:{\"label\":\"Cybersecurity\",\"url\":\"/learn/cybersecurity\"}\n24a:{\"label\":\"UX Design\",\"url\":\"/learn/ux-design\"}\n24b:{\"label\":\"Network Security\",\"url\":\"/learn/network-security\"}\n24c:{\"label\":\"Security Testing\",\"url\":\"/learn/security-testing\"}\n24d:{\"label\":\"Data Management\",\"url\":\"/learn/data-management\"}\n24e:{\"label\":\"Technical Analysis\",\"url\":\"/learn/technical-analysis\"}\n24f:{\"label\":\"Encryption Software\",\"url\":\"https://www.edx.org/learn/encryption-software\"}\n23d:[\"$23e\",\"$23f\",\"$240\",\"$241\",\"$242\",\"$243\",\"$244\",\"$245\",\"$246\",\"$247\",\"$248\",\"$249\",\"$24a\",\"$24b\",\"$24c\",\"$24d\",\"$24e\",\"$24f\"]\n23c:{\"title\":\"Related Topics\",\"links\":\"$23d\"}\n255:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n254:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$255\"}\n253:{\"id\":\"1457154d-7332-535d-8f8a-6175288a53d0\",\"title\":\"CS50's Introduction to Cybersecurity\",\"url\":\"/learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity\",\"owner\":\"$254\"}"])</script><script>self.__next_f.push([1,"\n258:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\"}\n257:{\"key\":\"RITx\",\"name\":\"Rochester Institute of Technology\",\"logo\":\"$258\"}\n256:{\"id\":\"c082bec2-3ddc-5e34-b0da-dd64190dbb41\",\"title\":\"Cybersecurity Fundamentals\",\"url\":\"/learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals\",\"owner\":\"$257\"}\n25b:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\"}\n25a:{\"key\":\"UWashingtonX\",\"name\":\"University of Washington\",\"logo\":\"$25b\"}\n259:{\"id\":\"40667c7b-c4ce-5284-8c44-fbb76f64cc18\",\"title\":\"Introduction to Cybersecurity\",\"url\":\"/learn/cybersecurity/university-of-washington-introduction-to-cybersecurity\",\"owner\":\"$25a\"}\n252:[\"$253\",\"$256\",\"$259\"]\n25c:{\"label\":\"View all Cybersecurity courses\",\"url\":\"/search?q=cybersecurity\u0026tab=course\"}\n251:{\"title\":\"Courses\",\"products\":\"$252\",\"cta\":\"$25c\"}\n261:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n260:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$261\"}\n25f:{\"id\":\"ffc2c233-cf68-53ad-b784-71e8aa535988\",\"title\":\"Cybersecurity: Managing Risk in the Information Age\",\"url\":\"/executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age\",\"owner\":\"$260\"}\n264:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-7302375e32bd.png\"}\n263:{\"key\":\"UCT\",\"name\":\"University of Cape Town\",\"logo\":\"$264\"}\n262:{\"id\":\"ec5c1256-cb38-5693-84e3-484e41ac32d4\",\"title\":\"Fundamentals of Cybersecurity\",\"url\":\"/executive-education/university-of-cape-town-fundamentals-of-cybersecurity\",\"owner\":\"$263\"}\n267:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}\n266:{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":\"$267\"}\n265:{\"id\":\"f32b3450-2bc6-4704-905c-4ec08316f8b3\",\"title\":\"Cybersecurity Analyst\",\"url\":\"/certificates/professional-certificate/ibm-cybersecurity"])</script><script>self.__next_f.push([1,"-analyst\",\"owner\":\"$266\"}\n25e:[\"$25f\",\"$262\",\"$265\"]\n268:{\"label\":\"View all Cybersecurity certificates\",\"url\":\"/search?q=cybersecurity\u0026tab=program\u0026program_type=Professional+Certificate\"}\n25d:{\"title\":\"Certificates\",\"products\":\"$25e\",\"cta\":\"$268\"}\n26d:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}\n26c:{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":\"$26d\"}\n26b:{\"id\":\"780e11a3-0b47-424f-8a03-3f0a9072c5ec\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity/syracuse-master-of-science-in-cybersecurity\",\"owner\":\"$26c\"}\n270:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n26f:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$270\"}\n26e:{\"id\":\"de971614-e9f1-4dc5-9081-5dec52d5ac4e\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/maryville-university-master-of-science-in-cybersecurity\",\"owner\":\"$26f\"}\n273:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n272:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$273\"}\n271:{\"id\":\"e86df75d-27f4-4a80-a2d0-8c14c4edf63f\",\"title\":\"Bachelor of Science in Cybersecurity\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-cybersecurity\",\"owner\":\"$272\"}\n26a:[\"$26b\",\"$26e\",\"$271\"]\n274:{\"label\":\"View all Cybersecurity degrees\",\"url\":\"/masters/online-masters-in-cybersecurity\"}\n269:{\"title\":\"Degrees\",\"products\":\"$26a\",\"cta\":\"$274\"}\n250:[\"$251\",\"$25d\",\"$269\"]\n237:{\"label\":\"Cybersecurity\",\"hero\":\"$238\",\"linkList\":\"$23c\",\"productLists\":\"$250\"}\n278:{\"label\":\"View all Computer Science Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Computer+Science\"}\n279:{\"label\":\"Learn more about Computer Science\",\"url\":\"/learn/computer-science\"}\n277:{\"viewAll\":\"$278\",\"learnMore\":\"$279\"}\n276:{\"title\":\"Computer Science\",\"subTitle\":\"Computer Science focuses on the design, development, and testing of software. It use"])</script><script>self.__next_f.push([1,"s technology to problem solve by applying algorithms and coding to operating systems, artificial intelligence, machine learning, and informatics in nearly every industry. \",\"cta\":\"$277\",\"ctaPosition\":\"left\"}\n27c:{\"label\":\"Decoding\",\"url\":\"/learn/decoding\"}\n27d:{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"}\n27e:{\"label\":\"Software Development\",\"url\":\"/learn/software-development\"}\n27f:{\"label\":\"Numba\",\"url\":\"/learn/numba\"}\n280:{\"label\":\"YAML\",\"url\":\"/learn/yaml\"}\n281:{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"}\n282:{\"label\":\"GParted\",\"url\":\"/learn/gparted\"}\n283:{\"label\":\"Finance\",\"url\":\"/learn/finance\"}\n284:{\"label\":\"CakePHP\",\"url\":\"/learn/cakephp\"}\n285:{\"label\":\"Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}\n27b:[\"$27c\",\"$27d\",\"$27e\",\"$27f\",\"$280\",\"$281\",\"$282\",\"$283\",\"$284\",\"$285\"]\n27a:{\"title\":\"Related Topics\",\"links\":\"$27b\"}\n28b:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n28a:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$28b\"}\n289:{\"id\":\"201c5f46-3c12-5905-94fd-d52cc0c9a229\",\"title\":\"CS50's Introduction to Computer Science\",\"url\":\"/learn/computer-science/harvard-university-cs50-s-introduction-to-computer-science\",\"owner\":\"$28a\"}\n28e:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n28d:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$28e\"}\n28c:{\"id\":\"93e0e6f4-2df6-595b-823a-f8deb034df3b\",\"title\":\"Introduction to Computer Science and Programming Using Python\",\"url\":\"/learn/computer-science/massachusetts-institute-of-technology-introduction-to-computer-science-and-programming-using-python\",\"owner\":\"$28d\"}\n291:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}\n290:{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":\"$291\"}\n28f:{\"id\":\"dc5d95bd-1c8b-5dd0-b247-d3ae969a1a5e\",\"title\":\"Computer Science 101\",\"url\":\"/lear"])</script><script>self.__next_f.push([1,"n/computer-science/stanford-university-computer-science-101\",\"owner\":\"$290\"}\n288:[\"$289\",\"$28c\",\"$28f\"]\n292:{\"label\":\"View all Computer Science courses\",\"url\":\"/search?q=computer+science\u0026tab=course\"}\n287:{\"title\":\"Courses\",\"products\":\"$288\",\"cta\":\"$292\"}\n297:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n296:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$297\"}\n295:{\"id\":\"e7388b02-2261-507f-a84e-f5a0f5d47c49\",\"title\":\"Artificial Intelligence: Implications for Business Strategy\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy\",\"owner\":\"$296\"}\n29a:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-74256c21f26d.png\"}\n299:{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":\"$29a\"}\n298:{\"id\":\"f9b3b50c-f470-5b6b-948f-02ee04e2db13\",\"title\":\"Machine Learning in Business\",\"url\":\"/executive-education/massachusetts-institute-of-technology-machine-learning-in-business\",\"owner\":\"$299\"}\n29d:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}\n29c:{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":\"$29d\"}\n29b:{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":\"$29c\"}\n294:[\"$295\",\"$298\",\"$29b\"]\n29e:{\"label\":\"View all Computer Science certificates\",\"url\":\"/search?q=computer+science\u0026tab=program\u0026program_type=Professional+Certificate\"}\n293:{\"title\":\"Certificates\",\"products\":\"$294\",\"cta\":\"$29e\"}\n2a3:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\"}\n2a2:{\"key\":\"UTAustinX\",\"name\":\"The University of Texas at Austin\",\"logo\":\"$2a3\"}\n2a1:{\"id\":\"fa22a987-489d-411a-81fa-c0ca4bc58652\",\"title\":\"Master's Degree in Computer Scien"])</script><script>self.__next_f.push([1,"ce\",\"url\":\"/masters/online-masters-in-computer-science/online-master-science-computer-science-utaustinx\",\"owner\":\"$2a2\"}\n2a6:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}\n2a5:{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":\"$2a6\"}\n2a4:{\"id\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"title\":\"Master of Science in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"owner\":\"$2a5\"}\n2a9:{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}\n2a8:{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":\"$2a9\"}\n2a7:{\"id\":\"c3abf25d-a907-4e3c-b940-802d5e1744bd\",\"title\":\"Bachelor of Science in Computer Science\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-computer-science\",\"owner\":\"$2a8\"}\n2a0:[\"$2a1\",\"$2a4\",\"$2a7\"]\n2aa:{\"label\":\"View all Computer Science degrees\",\"url\":\"/masters/online-masters-in-computer-science\"}\n29f:{\"title\":\"Degrees\",\"products\":\"$2a0\",\"cta\":\"$2aa\"}\n286:[\"$287\",\"$293\",\"$29f\"]\n275:{\"label\":\"Computer Science\",\"hero\":\"$276\",\"linkList\":\"$27a\",\"productLists\":\"$286\"}\n2ae:{\"label\":\"View all topics\",\"url\":\"/learn\"}\n2ad:{\"viewAll\":\"$2ae\"}\n2ac:{\"title\":\"Popular topics\",\"cta\":\"$2ad\",\"ctaPosition\":\"left\"}\n2b2:{\"label\":\"Python\",\"url\":\"/learn/python\"}\n2b3:{\"label\":\"JavaScript\",\"url\":\"/learn/javascript\"}\n2b4:{\"label\":\"C\",\"url\":\"/learn/c-programming\"}\n2b5:{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"}\n2b6:{\"label\":\"Linux\",\"url\":\"/learn/linux\"}\n2b1:[\"$2b2\",\"$2b3\",\"$2b4\",\"$2b5\",\"$2b6\"]\n2b0:{\"title\":\"Computer Programming\",\"url\":\"/learn/computer-programming\",\"links\":\"$2b1\"}\n2b9:{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"}\n2ba:{\"label\":\"SQL\",\"url\":\"/learn/sql\"}\n2bb:{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"}\n2bc:{\"label\":\"R\",\"url\":\"/learn/r-programming\"}\n2bd:{\"label\":\"Excel\",\"url\":\"/learn/excel\"}\n2b8:[\"$2b9\",\"$2ba\",\"$2bb\",\"$2bc\",\"$2bd\"]\n2b7:{\"title\":\"Data Analysis\",\"url\":\"/lear"])</script><script>self.__next_f.push([1,"n/data-analysis\",\"links\":\"$2b8\"}\n2c0:{\"label\":\"Trading\",\"url\":\"/learn/trading\"}\n2c1:{\"label\":\"Investing\",\"url\":\"/learn/investing\"}\n2c2:{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"}\n2c3:{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"}\n2c4:{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"}\n2bf:[\"$2c0\",\"$2c1\",\"$2c2\",\"$2c3\",\"$2c4\"]\n2be:{\"title\":\"Economics\",\"url\":\"/learn/economics\",\"links\":\"$2bf\"}\n2c7:{\"label\":\"STEM\",\"url\":\"/learn/stem\"}\n2c8:{\"label\":\"Genetics\",\"url\":\"/learn/genetics\"}\n2c9:{\"label\":\"Neuroscience\",\"url\":\"/learn/neuroscience\"}\n2ca:{\"label\":\"Nutrition\",\"url\":\"/learn/nutrition\"}\n2cb:{\"label\":\"Human Anatomy\",\"url\":\"/learn/human-anatomy\"}\n2c6:[\"$2c7\",\"$2c8\",\"$2c9\",\"$2ca\",\"$2cb\"]\n2c5:{\"title\":\"Biology\",\"url\":\"/learn/biology\",\"links\":\"$2c6\"}\n2ce:{\"label\":\"Dynamics\",\"url\":\"/learn/dynamics\"}\n2cf:{\"label\":\"Nature\",\"url\":\"/learn/nature\"}\n2d0:{\"label\":\"Planets\",\"url\":\"/learn/planets\"}\n2d1:{\"label\":\"Architecture\",\"url\":\"/learn/architecture\"}\n2d2:{\"label\":\"Mechanics\",\"url\":\"/learn/mechanics\"}\n2cd:[\"$2ce\",\"$2cf\",\"$2d0\",\"$2d1\",\"$2d2\"]\n2cc:{\"title\":\"Physics\",\"url\":\"/learn/physics\",\"links\":\"$2cd\"}\n2d5:{\"label\":\"Writing\",\"url\":\"/learn/writing\"}\n2d6:{\"label\":\"Spanish\",\"url\":\"/learn/spanish\"}\n2d7:{\"label\":\"English\",\"url\":\"/learn/english\"}\n2d8:{\"label\":\"Italian\",\"url\":\"/learn/italian\"}\n2d9:{\"label\":\"Japanese\",\"url\":\"/learn/japanese\"}\n2d4:[\"$2d5\",\"$2d6\",\"$2d7\",\"$2d8\",\"$2d9\"]\n2d3:{\"title\":\"Language\",\"url\":\"/learn/language\",\"links\":\"$2d4\"}\n2dc:{\"label\":\"Psychology\",\"url\":\"/learn/psychology\"}\n2dd:{\"label\":\"Education\",\"url\":\"/learn/education\"}\n2de:{\"label\":\"Politics\",\"url\":\"/learn/politics\"}\n2df:{\"label\":\"Behavioral Psychology\",\"url\":\"/learn/behavioral-psychology\"}\n2e0:{\"label\":\"Government\",\"url\":\"/learn/government\"}\n2db:[\"$2dc\",\"$2dd\",\"$2de\",\"$2df\",\"$2e0\"]\n2da:{\"title\":\"Social Science\",\"url\":\"/learn/social-science\",\"links\":\"$2db\"}\n2e3:{\"label\":\"Probability\",\"url\":\"/learn/probability\"}\n2e4:{\"label\":\"Algebra\",\"url\":\"/learn/algebra\"}\n2e5:{\"label\":\"Calculus\",\"url\":\"/learn/calculus\"}\n2e6:{\"label\":\"Logic\",\"url\":\"/learn/logic\"}\n2e7:{"])</script><script>self.__next_f.push([1,"\"label\":\"Geometry\",\"url\":\"/learn/geometry\"}\n2e2:[\"$2e3\",\"$2e4\",\"$2e5\",\"$2e6\",\"$2e7\"]\n2e1:{\"title\":\"Math\",\"url\":\"/learn/math\",\"links\":\"$2e2\"}\n2ea:{\"label\":\"Music\",\"url\":\"/learn/music-arts\"}\n2eb:{\"label\":\"Art\",\"url\":\"/learn/art\"}\n2ec:{\"label\":\"Philosophy\",\"url\":\"/learn/philosophy\"}\n2ed:{\"label\":\"Geography\",\"url\":\"/learn/geography\"}\n2ee:{\"label\":\"History\",\"url\":\"/learn/history\"}\n2e9:[\"$2ea\",\"$2eb\",\"$2ec\",\"$2ed\",\"$2ee\"]\n2e8:{\"title\":\"Humanities\",\"url\":\"/learn/humanities\",\"links\":\"$2e9\"}\n2af:[\"$2b0\",\"$2b7\",\"$2be\",\"$2c5\",\"$2cc\",\"$2d3\",\"$2da\",\"$2e1\",\"$2e8\"]\n2ab:{\"label\":\"View all topics\",\"hero\":\"$2ac\",\"linkLists\":\"$2af\"}\n12e:[\"$12f\",\"$16f\",\"$1ae\",\"$1fa\",\"$237\",\"$275\",\"$2ab\"]\n12d:{\"title\":\"By topic\",\"items\":\"$12e\"}\n2f4:{\"label\":\"Access the Career Resource Center\",\"url\":\"https://careers.edx.org/\"}\n2f3:{\"viewAll\":\"$2f4\"}\n2f2:{\"title\":\"Career resources\",\"subTitle\":\"Find resources that help you make progress towards your next career goal.\",\"cta\":\"$2f3\",\"ctaPosition\":\"left\"}\n2f8:{\"label\":\"Hybrid Jobs: A 4-Minute Primer on Fast-Growing, Lucrative Career Paths\",\"url\":\"/resources/hybrid-jobs-a-4-minute-primer-on-fast-growing-lucrative-career-paths\"}\n2f9:{\"label\":\"How to Write an Effective CV – 5 Steps From the Experts\",\"url\":\"/resources/how-to-write-an-effective-cv-5-steps-experts\"}\n2fa:{\"label\":\"The Employability Skills Checklist\",\"url\":\"/resources/the-employability-skills-checklist\"}\n2fb:{\"label\":\"Computer science careers: Why computer science is for everyone\",\"url\":\"https://www.edx.org/resources/computer-science-careers\"}\n2fc:{\"label\":\"Building a career in data science and analytics\",\"url\":\"https://www.edx.org/resources/data-science-analytics-career-guide\"}\n2f7:[\"$2f8\",\"$2f9\",\"$2fa\",\"$2fb\",\"$2fc\"]\n2fd:{\"label\":\"Go to Idea Hub\",\"url\":\"https://www.edx.org/resources\"}\n2f6:{\"title\":\"Access career tips\",\"description\":\"Explore career articles in our Idea Hub\",\"links\":\"$2f7\",\"cta\":\"$2fd\"}\n300:{\"label\":\"How to Become a Software Developer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-developer\"}\n301:{\"label\":\"How to Be"])</script><script>self.__next_f.push([1,"come a Data Scientist\",\"url\":\"https://www.edx.org/become/how-to-become-a-data-scientist\"}\n302:{\"label\":\"How to Become a Software Engineer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-engineer-without-a-degree\"}\n303:{\"label\":\"How to Become a Social Media Manager\",\"url\":\"https://www.edx.org/become/how-to-become-a-social-media-manager\"}\n304:{\"label\":\"How to Become a Cybersecurity Analyst\",\"url\":\"https://www.edx.org/become/how-to-become-a-cybersecurity-analyst\"}\n2ff:[\"$300\",\"$301\",\"$302\",\"$303\",\"$304\"]\n305:{\"label\":\"View all guides\",\"url\":\"https://www.edx.org/become\"}\n2fe:{\"title\":\"How to guides\",\"description\":\"Find the next steps to start your new career\",\"links\":\"$2ff\",\"cta\":\"$305\"}\n307:{\"label\":\"Discover career paths\",\"url\":\"https://careers.edx.org/browse-by-industry\"}\n306:{\"title\":\"Career paths\",\"description\":\"Gain insights to chart your own career journey.\",\"links\":null,\"cta\":\"$307\"}\n309:{\"label\":\"Access guides \u0026 templates\",\"url\":\"https://careers.edx.org/guides-and-templates\"}\n308:{\"title\":\"Guides \u0026 templates\",\"description\":\"Use our career guides and templates to propel your career forward.\",\"links\":null,\"cta\":\"$309\"}\n30b:{\"label\":\"Take the quiz\",\"url\":\"https://skills.edx.org\"}\n30a:{\"title\":\"Skills Quiz\",\"description\":\"Find the right skills to learn for your dream job.\",\"links\":null,\"cta\":\"$30b\"}\n2f5:[\"$2f6\",\"$2fe\",\"$306\",\"$308\",\"$30a\"]\n2f1:{\"label\":\"Career resources\",\"hero\":\"$2f2\",\"productResources\":\"$2f5\"}\n30c:{\"label\":\"Schools \u0026 Partners\",\"url\":\"/schools-partners\"}\n2f0:[\"$2f1\",\"$30c\"]\n2ef:{\"items\":\"$2f0\"}\n310:{\"label\":\"Find online courses\",\"url\":\"/courses?q=free+online+courses\"}\n30f:{\"cta\":\"$310\"}\n30e:[\"$30f\"]\n30d:{\"title\":\"Still unsure?\",\"subTitle\":\"Try a course.\",\"items\":\"$30e\"}\n32:[\"$33\",\"$12d\",\"$2ef\",\"$30d\"]\n29:{\"header\":\"$2a\",\"sections\":\"$32\"}\n311:T119a,"])</script><script>self.__next_f.push([1,"{\"@context\":\"https://schema.org\",\"@type\":\"ItemList\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"url\":\"https://www.edx.org/learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":2,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-basics\"},{\"@type\":\"ListItem\",\"position\":3,\"url\":\"https://www.edx.org/learn/computer-programming/edx-try-it-ethical-hacking\"},{\"@type\":\"ListItem\",\"position\":4,\"url\":\"https://www.edx.org/learn/penetration-testing/ibm-penetration-testing-and-incident-response\"},{\"@type\":\"ListItem\",\"position\":5,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-beginners-guide-to-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":6,\"url\":\"https://www.edx.org/certificates/professional-certificate/ibm-cybersecurity-analyst\"},{\"@type\":\"ListItem\",\"position\":7,\"url\":\"https://www.edx.org/learn/cybersecurity/university-of-washington-introduction-to-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":8,\"url\":\"https://www.edx.org/certificates/professional-certificate/harvardx-computer-science-for-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":9,\"url\":\"https://www.edx.org/learn/cybersecurity/edx-try-it-cybersecurity-basics\"},{\"@type\":\"ListItem\",\"position\":10,\"url\":\"https://www.edx.org/learn/network-security/rochester-institute-of-technology-network-security\"},{\"@type\":\"ListItem\",\"position\":11,\"url\":\"https://www.edx.org/learn/risk-management/rochester-institute-of-technology-cybersecurity-risk-management\"},{\"@type\":\"ListItem\",\"position\":12,\"url\":\"https://www.edx.org/learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals\"},{\"@type\":\"ListItem\",\"position\":13,\"url\":\"https://www.edx.org/learn/cybersecurity/university-of-washington-building-a-cybersecurity-toolkit\"},{\"@type\":\"ListItem\",\"position\":14,\"url\":\"https://www.edx.org/learn/computer-forensics/rochester-institute-of-technology-computer-forensics\"},{\"@type\":\"ListItem\",\"position\":15,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-analyst-assessment\"},{\"@type\":\"ListItem\",\"position\":16,\"url\":\"https://www.edx.org/masters/micromasters/ritx-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":17,\"url\":\"https://www.edx.org/learn/linux/edx-try-it-learn-linux-command-line\"},{\"@type\":\"ListItem\",\"position\":18,\"url\":\"https://www.edx.org/learn/cybersecurity/university-of-washington-finding-your-cybersecurity-career-path\"},{\"@type\":\"ListItem\",\"position\":19,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-threat-intelligence-in-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":20,\"url\":\"https://www.edx.org/executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age\"},{\"@type\":\"ListItem\",\"position\":21,\"url\":\"https://www.edx.org/learn/cybersecurity/university-of-washington-cybersecurity-the-ciso-s-view\"},{\"@type\":\"ListItem\",\"position\":22,\"url\":\"https://www.edx.org/certificates/professional-certificate/uwashingtonx-essentials-cybersecurity\"},{\"@type\":\"ListItem\",\"position\":23,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-compliance-and-system-administration\"},{\"@type\":\"ListItem\",\"position\":24,\"url\":\"https://www.edx.org/learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications\"},{\"@type\":\"ListItem\",\"position\":25,\"url\":\"https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-capstone-and-case-studies\"},{\"@type\":\"ListItem\",\"position\":26,\"url\":\"https://www.edx.org/learn/computer-programming/raspberry-pi-foundation-introduction-to-cybersecurity-for-teachers\"},{\"@type\":\"ListItem\",\"position\":27,\"url\":\"https://www.edx.org/learn/computer-science/universidades-anahuac-digital-shield-cybersecurity-for-data-and-system-protection\"},{\"@type\":\"ListItem\",\"position\":28,\"url\":\"https://www.edx.org/learn/computer-science/university-system-of-maryland-cybersecurity-essentials\"},{\"@type\":\"ListItem\",\"position\":29,\"url\":\"https://www.edx.org/learn/computer-science/university-system-of-maryland-integrated-cybersecurity-from-physical-safeguards-to-digital-forensics-and-governance\"},{\"@type\":\"ListItem\",\"position\":30,\"url\":\"https://www.edx.org/learn/cybersecurity/curtin-university-cybersecurity-and-privacy-in-the-iot\"},{\"@type\":\"ListItem\",\"position\":31,\"url\":\"https://www.edx.org/learn/cybersecurity/the-university-of-texas-at-austin-try-it-cybersecurity-basics\"},{\"@type\":\"ListItem\",\"position\":32,\"url\":\"https://www.edx.org/learn/cybersecurity/tecnologico-de-monterrey-try-it-cybersecurity-basics\"}]}"])</script><script>self.__next_f.push([1,"31f:{\"label\":\"Partner With Us\",\"url\":\"https://business.edx.org/partner\"}\n320:{\"label\":\"About\",\"url\":\"/about-us\"}\n321:{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org/?_gl=1*y0gcxr*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NDczLjQ1LjAuMA..\"}\n322:{\"label\":\"Affiliates\",\"url\":\"/affiliate-program\"}\n323:{\"label\":\"Open edX\",\"url\":\"http://open.edx.org/?_gl=1*lt6kx3*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTQ5LjU5LjAuMA..\"}\n324:{\"label\":\"2U Advisory Council\",\"url\":\"/advisory-groups\"}\n325:{\"label\":\"Careers\",\"url\":\"/careers\"}\n326:{\"label\":\"News\",\"url\":\"https://press.edx.org/?_gl=1*8w80my*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTgzLjI1LjAuMA..\"}\n31e:[\"$31f\",\"$320\",\"$321\",\"$322\",\"$323\",\"$324\",\"$325\",\"$326\"]\n31d:{\"title\":\"edx\",\"links\":\"$31e\"}\n329:{\"label\":\"Idea Hub\",\"url\":\"/resources\"}\n32a:{\"label\":\"Contact Us\",\"url\":\"https://courses.edx.org/support/contact_us?_gl=1*13dq6q5*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NjYyLjYuMC4w\"}\n32b:{\"label\":\"Help Center\",\"url\":\"https://support.edx.org/?_gl=1*1ej7jnc*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE1MDgxLjUuMC4w\"}\n32c:{\"label\":\"Security\",\"url\":\"/policy/security\"}\n32d:{\"label\":\"Media Kit\",\"url\":\"/media-kit\"}\n328:[\"$329\",\"$32a\",\"$32b\",\"$32c\",\"$32d\"]\n327:{\"title\":\"Connect\",\"links\":\"$328\"}\n330:{\"label\":\"Terms of Service \u0026 Honor Code\",\"url\":\"/edx-terms-service\"}\n331:{\"label\":\"Privacy Policy\",\"url\":\"/edx-privacy-policy\"}\n332:{\"label\":\"Cookie Policy\",\"url\":\"/edx-privacy-policy/cookies\"}\n333:{\"label\":\"Accessibility Policy\",\"url\":\"/accessibility\"}\n334:{\"label\":\"Trademark Policy\",\"url\":\"/trademarks\"}\n335:{\"label\":\"Modern Slavery Statement\",\"url\":\"/modern-slavery-statement\"}\n336:{\"label\":\"Sitemap\",\"url\":\"/sitem"])</script><script>self.__next_f.push([1,"ap\"}\n337:{\"label\":\"Your Privacy Choices\",\"url\":\"#\"}\n32f:[\"$330\",\"$331\",\"$332\",\"$333\",\"$334\",\"$335\",\"$336\",\"$337\"]\n32e:{\"title\":\"Legal\",\"links\":\"$32f\"}\n31c:{\"edx\":\"$31d\",\"connect\":\"$327\",\"legal\":\"$32e\"}\n"])</script><script>self.__next_f.push([1,"9:[[\"$\",\"$L1f\",null,{\"searchParams\":{},\"postId\":644,\"cmsUrl\":\"https://cms.edx.org\"}],[\"$\",\"$L20\",null,{\"course\":\"$undefined\",\"navigation\":\"$29\",\"activeBanner\":{\"backgroundColor\":\"blue\",\"backgroundColorEs\":\"blue\",\"content\":[],\"contentEs\":[],\"campaignId\":\"\",\"campaignIdEs\":\"\"}}],[\"$\",\"div\",null,{\"style\":{\"minHeight\":50},\"children\":[[[\"$\",\"script\",\"0\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n {\\n \\\"@context\\\": \\\"https://schema.org\\\",\\n \\\"@type\\\" : \\\"Organization\\\",\\n \\\"name\\\" : \\\"edX\\\",\\n \\\"url\\\" : \\\"https://www.edx.org\\\",\\n \\\"logo\\\": \\\"/images/logos/edx-logo-elm.svg\\\",\\n \\\"sameAs\\\" : [\\n \\\"https://www.facebook.com/edX\\\",\\n \\\"https://twitter.com/edXOnline\\\",\\n \\\"https://www.linkedin.com/company/edx\\\",\\n \\\"http://www.instagram.com/edxonline\\\",\\n \\\"https://www.youtube.com/user/edxonline\\\"\\n ]\\n }\\n \"}}],[\"$\",\"script\",\"1\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"{\\\"@context\\\":\\\"https://schema.org\\\",\\\"@type\\\":\\\"BreadcrumbList\\\",\\\"itemListElement\\\":[{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":1,\\\"name\\\":\\\"Home\\\",\\\"item\\\":\\\"https://www.edx.org/\\\"},{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":2,\\\"name\\\":\\\"Learn\\\",\\\"item\\\":\\\"https://www.edx.org/learn\\\"},{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":3,\\\"name\\\":\\\"Metasploit\\\"}]}\"}}],[\"$\",\"script\",\"2\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"[{\\\"@context\\\":\\\"https://schema.org\\\",\\\"@type\\\":\\\"WebSite\\\",\\\"url\\\":\\\"https://www.edx.org/learn/metasploit\\\",\\\"name\\\":\\\"Best Online Metasploit Courses and Programs\\\",\\\"alternateName\\\":\\\"edX Online\\\"}]\"}}],[\"$\",\"script\",\"3\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"$311\"}}]],[\"$\",\"main\",null,{\"id\":\"page-id-644\",\"children\":[\"$\",\"article\",null,{\"className\":\"container prose mt-8 md:mt-auto\",\"children\":[[\"$\",\"$L15\",null,{\"pagetype\":\"learn-more\",\"children\":[]}],[\"$\",\"$L312\",null,{\"variant\":\"no-image\",\"theme\":\"secondary\",\"titleOverride\":\"Learn Metasploit with online courses and programs\",\"title\":\"Best Online Metasploit Courses and Programs\",\"path\":\"learn/metasploit\",\"image\":\"$undefined\",\"subnavItems\":[{\"id\":\"browse-online-courses-related-to-metasploit\",\"name\":\"Browse online courses related to Metasploit\"},{\"id\":\"explore-metasploit-jobs\",\"name\":\"Explore Metasploit jobs\"},{\"id\":\"metasploit-f-a-q\",\"name\":\"Metasploit FAQ \"}],\"children\":[\"$\",\"p\",null,{\"className\":\"mb-8\",\"children\":\"Metasploit is an open-source penetration framework used by IT and cybersecurity teams. If you’re planning on pursuing an IT career, you can learn Metasploit with online courses delivered through edX.\"}],\"location\":\"learn-header\",\"htmlId\":\"create-account-button\",\"hasBreadcrumbs\":\"$undefined\",\"showSlantStripe\":\"$undefined\",\"slant\":\"$undefined\",\"titleClassName\":\"$undefined\"}],[\"$\",\"div\",\"2\",{\"className\":\"flex flex-wrap py-12\",\"children\":[\"$\",\"div\",null,{\"children\":[[\"$\",\"img\",\"0\",{\"loading\":\"lazy\",\"decoding\":\"async\",\"className\":\"hidden lg:block float-right ml-4 mb-4\",\"src\":\"https://images.ctfassets.net/ii9ehdcj88bc/bdmZKDIqgALjQFVHRLeYG/f3c3a51e81527436082297abec52a537/Metasploit.png\",\"alt\":\"Metasploit | Introduction Image\",\"width\":\"435\",\"height\":\"245\",\"children\":\"$undefined\"}],[\"$\",\"h2\",\"1\",{\"children\":\"What is Metasploit?\"}],[\"$\",\"p\",\"2\",{\"children\":\"Cybersecurity professionals rely on a variety of tools to help them keep their organizations and their data safe. Information security teams use Metasploit to find, exploit, and validate system vulnerabilities. The open-source framework includes exploitation tools and penetration testing tools, which help to protect an organization’s networks from hackers and other security threats. \"}],[\"$\",\"p\",\"3\",{\"children\":\"The Metasploit framework consists of a series of interfaces, libraries, modules, tools, and plugins. These enable users to access the framework, run exploits, perform various tasks, and enhance overall functionality. \"}],[\"$\",\"p\",\"4\",{\"children\":[\"IT professionals can also use Metasploit to stage hacking scenarios, which can help them learn how to respond to advanced hacking techniques. The framework can perform the various phases of penetration testing, including information gathering, gaining access, privilege escalation, and maintaining access.\",[\"$\",\"sup\",\"1\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#5sCrIsPl0oDSu8Q754hmxj\",\"children\":\"1\"}]}],\" The framework can also save IT teams time by automating some of the repetitive tasks required for penetration testing. \"]}],[\"$\",\"p\",\"5\",{\"children\":[\"Additionally, Metasploit's reporting features highlight the vulnerabilities that need to be prioritized. This allows computer security teams to focus on their most vulnerable areas and protect networks from threats.\",[\"$\",\"sup\",\"1\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#1vWonqbbXFXY2bWz1dypIj\",\"children\":\"2\"}]}]]}],[\"$\",\"p\",\"6\",{\"children\":\"$undefined\"}]]}]}],[\"$\",\"div\",\"3\",{\"className\":\"fullwidth bg-putty-100\",\"children\":[[\"$\",\"$L313\",null,{\"theme\":\"gray\",\"children\":[]}],[\"$\",\"a\",\"1\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Browse online courses related to Metasploit\",\"id\":\"browse-online-courses-related-to-metasploit\",\"children\":\"$undefined\"}],\"$L314\",[\"$\",\"div\",null,{\"className\":\"pt-0 pb-6 fullwidth bg-putty-100\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"mb-8 mt-0 text-2xl\",\"children\":\"Related Topics\"}],[\"$\",\"div\",null,{\"className\":\"flex gap-3 overflow-x-auto scroll-smooth not-prose\",\"children\":[\"$\",\"$L16\",null,{\"children\":[[\"$\",\"$L315\",\".$0\",{\"href\":\"/learn/information-technology\",\"text\":\"Information Technology\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"information technology\",\"position\":\"1\"}],[\"$\",\"$L315\",\".$1\",{\"href\":\"/learn/windows-10-security\",\"text\":\"Windows 10 Security\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"windows 10 security\",\"position\":\"2\"}],[\"$\",\"$L315\",\".$2\",{\"href\":\"/learn/hackerone\",\"text\":\"HackerOne\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"hackerone\",\"position\":\"3\"}],[\"$\",\"$L315\",\".$3\",{\"href\":\"/learn/coding\",\"text\":\"Coding\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"coding\",\"position\":\"4\"}],[\"$\",\"$L315\",\".$4\",{\"href\":\"/learn/computer-science\",\"text\":\"Computer Science\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"computer science\",\"position\":\"5\"}],[\"$\",\"$L315\",\".$5\",{\"href\":\"/learn/finance\",\"text\":\"Finance\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"finance\",\"position\":\"6\"}],[\"$\",\"$L315\",\".$6\",{\"href\":\"/learn/computer-networking\",\"text\":\"Computer Networking\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"computer networking\",\"position\":\"7\"}],[\"$\",\"$L315\",\".$7\",{\"href\":\"/learn/operating-systems\",\"text\":\"Operating Systems\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"operating systems\",\"position\":\"8\"}],[\"$\",\"$L315\",\".$8\",{\"href\":\"/learn/kali-linux\",\"text\":\"Kali Linux\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"kali linux\",\"position\":\"9\"}],[\"$\",\"$L315\",\".$9\",{\"href\":\"/learn/data-management\",\"text\":\"Data Management\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"data management\",\"position\":\"10\"}]]}]}],[\"$\",\"div\",null,{\"className\":\"pt-4\",\"children\":[\"$\",\"$L16\",null,{\"children\":[\"$\",\"$L315\",null,{\"href\":\"/learn\",\"text\":\"View all topics\",\"html_id\":\"view-all-topics-link\",\"location\":\"related-topics\",\"class_name\":\"text-gray-dark text-sm underline hover:text-[1f1f1f]\"}]}]}]]}],[\"$\",\"div\",\"4\",{\"className\":\"flex flex-col gap-2 pb-10\",\"children\":[[\"$\",\"$L316\",null,{\"id\":\"$undefined\",\"children\":[\"$\",\"div\",null,{\"id\":\"\",\"children\":[[\"$\",\"h3\",\"0\",{\"children\":\"Metasploit tutorial curriculum\"}],[\"$\",\"p\",\"1\",{\"children\":\"By taking a Metasploit tutorial, you can gain hands-on experience that helps to build your cybersecurity skill set. A Metasploit course curriculum may cover the following topics:\"}],[\"$\",\"ul\",\"2\",{\"children\":[[\"$\",\"li\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Setting up a Metasploit development environment\"}]}],[\"$\",\"li\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Contributing to Metasploit\"}]}],[\"$\",\"li\",\"2\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Accepting modules and enhancements\"}]}],[\"$\",\"li\",\"3\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Writing exploits\"}]}],[\"$\",\"li\",\"4\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Parsing an HTTP response\"}]}],[\"$\",\"li\",\"5\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Reversing shells\"}]}],[\"$\",\"li\",\"6\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Using Powershell in an exploit \"}]}]]}],[\"$\",\"p\",\"3\",{\"children\":\"If you already have some experience using Metasploit, you may prefer to enroll in a class that covers its uses more in-depth. This could involve conducting vulnerability assessments, hardening, or automating exploitation activities. \"}],[\"$\",\"p\",\"4\",{\"children\":[\"Depending on the specific career you want to pursue, you may also take more advanced cybersecurity classes that include Metasploit in their coursework. edX offers many educational options for individuals interested in learning about cybersecurity, ranging from \",[\"$\",\"span\",\"1\",{\"data-boot-camp-link\":\"https://www.edx.org/boot-camps/cybersecurity\",\"children\":\"cybersecurity boot camps\"}],\" to \",[\"$\",\"a\",\"3\",{\"className\":\"text-link underline\",\"href\":\"http://edx.org/bachelors/computer-data-sciences\",\"children\":\"bachelor’s degree programs in computer science\"}],\". \"]}],[\"$\",\"p\",\"5\",{\"children\":\"$undefined\"}]]}]}],[\"$\",\"a\",\"1\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Explore Metasploit jobs\",\"id\":\"explore-metasploit-jobs\",\"children\":\"$undefined\"}],[\"$\",\"$L316\",null,{\"id\":\"$undefined\",\"children\":[\"$\",\"div\",null,{\"id\":\"\",\"children\":[[\"$\",\"h2\",\"0\",{\"children\":\"Explore Metasploit jobs\"}],[\"$\",\"p\",\"1\",{\"children\":\"Metasploit is designed to perform many different cybersecurity tasks, which makes it useful in various information security roles. Any cybersecurity professional that works with penetration testing, vulnerability exploiting, and ethical hacking can benefit from learning how to use Metasploit.\"}],[\"$\",\"p\",\"2\",{\"children\":\"Some of the positions that could benefit from knowledge of Metasploit include:\"}],[\"$\",\"ul\",\"3\",{\"children\":[[\"$\",\"li\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Information security analysts\"}],\", who develop cybersecurity requirements for their organizations and apply various techniques to keep systems secure.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#24AWqERGJzrgNTJMBkiF2q\",\"children\":\"3\"}]}]]}]}],[\"$\",\"li\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Security management specialists,\"}],\" who assess various security threats faced by their organization, coordinate cybersecurity work, and oversee the implementation of cybersecurity practices.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#66KoAaD2xONdnFN5WFqQ8f\",\"children\":\"4\"}]}]]}]}],[\"$\",\"li\",\"2\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Penetration testers\"}],\", who assess system security, conduct system audits, and develop solutions to vulnerabilities.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#4me2ewRB2MAt0niZ6VbFoM\",\"children\":\"5\"}]}]]}]}]]}],[\"$\",\"p\",\"4\",{\"children\":[\"While learning how to use Metasploit can be a helpful skill, many of these roles will have additional educational and skills requirements that vary based on employer. edX can help build those skills with a variety of educational pathways including \",[\"$\",\"a\",\"1\",{\"className\":\"text-link underline\",\"href\":\"http://edx.org/bachelors/\",\"children\":\"bachelor’s degree\"}],\" programs and \",[\"$\",\"a\",\"3\",{\"className\":\"text-link underline\",\"href\":\"http://edx.org/masters/\",\"children\":\"master’s degree\"}],\" programs, as well as specialized \",[\"$\",\"span\",\"5\",{\"data-boot-camp-link\":\"http://edx.org/boot-camps/\",\"children\":\"boot camps\"}],\", such as cybersecurity or \",[\"$\",\"span\",\"7\",{\"data-boot-camp-link\":\"http://edx.org/boot-camps/coding\",\"children\":\"coding boot camps\"}],\". Before deciding on which option is right for you, research the professional role you hope to obtain and learn more about what potential employers expect of candidates. \"]}],[\"$\",\"p\",\"5\",{\"children\":\"$undefined\"}]]}]}]]}],[\"$\",\"$L317\",null,{\"theme\":\"gradient\",\"children\":[],\"columns\":4}],[\"$\",\"a\",\"6\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Metasploit FAQ \",\"id\":\"metasploit-f-a-q\",\"children\":\"$undefined\"}],[[\"$\",\"a\",null,{\"className\":\"subnav-item\",\"id\":\"frequently-asked-questions\"}],[\"$\",\"div\",null,{\"className\":\"flex flex-col py-4 lg:pt-16\",\"children\":[[\"$\",\"h2\",null,{\"className\":\"mt-2 mb-4 text-3xl font-bold\",\"children\":\"Frequently Asked Questions\"}],[\"$\",\"$L318\",null,{\"type\":\"multiple\",\"className\":\"flex flex-col gap-3 [\u0026_button]:no-underline [\u0026_button]:text-gray-dark [\u0026_button:hover]:text-gray-dark\",\"children\":[[\"$\",\"$L319\",null,{\"value\":\"What is Metasploit used for?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What is Metasploit used for?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Metasploit is a cybersecurity framework known for its penetration testing automation capabilities. Metasploit is used by companies, including their IT teams and security engineers, to evaluate a system’s defenses against cyberattacks. Hackers and cybercriminals may also use Metasploit to run IT reconnaissance to learn information about companies and systems that they want to attack.\"}]}]]}],[\"$\",\"$L319\",null,{\"value\":\"Who uses Metasploit?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"Who uses Metasploit?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[[\"$\",\"p\",\"0\",{\"children\":\"Several different groups of people may use Metasploit, including penetration testers and security engineers. IT teams may use the tool to evaluate a system’s defenses and identify weakness against cyberattacks. Ethical hackers may also use Metasploit to identify security weaknesses and improve security. \"}],[\"$\",\"p\",\"1\",{\"children\":\"$undefined\"}]]}]]}],[\"$\",\"$L319\",null,{\"value\":\"What are the advantages of Metasploit?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What are the advantages of Metasploit?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[[\"$\",\"p\",\"0\",{\"children\":\"Metasploit framework is open-source software. It is also easy to use and simple to apply to different projects. Cybersecurity professionals can customize the framework and use it with nearly any operating system.\"}],[\"$\",\"p\",\"1\",{\"children\":\"$undefined\"}]]}]]}],[\"$\",\"$L319\",null,{\"value\":\"Why learn Metasploit?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"Why learn Metasploit?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Metasploit can help cybersecurity professionals identify hidden network vulnerabilities. The tool supports real-world scenarios and task automation, so it enables IT and cybersecurity teams to work more efficiently and thoroughly. The tool’s reporting features help businesses to make well-informed decisions about which vulnerabilities to prioritize, enhancing their network security. Metasploit is also widely available and open-source.\"}]}]]}],[\"$\",\"$L319\",null,{\"value\":\"What is the difference between Metasploit and Kali Linux?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What is the difference between Metasploit and Kali Linux?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Kali Linux is a version of the Linux operating system that features a graphical user interface. It also features many built-in tools, including penetration testing tools. Metasploit Framework is one of those tools that is pre-installed on Kali Linux.\"}]}]]}],[\"$\",\"$L319\",null,{\"value\":\"Which is better: Metasploit or Nessus?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L31a\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"Which is better: Metasploit or Nessus?\"}]]}],[\"$\",\"$L31b\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Nessus is a vulnerability scanner that can be used to identify security issues in a network. An IT team can use Nessus to identify issues in a network’s defenses, so the team knows what they need to fix. Metasploit can be used to identify vulnerabilities, enact real-world hacking scenarios, and learn about advanced hacking technologies. Metasploit supports all of the phases of penetration testing, and its task automation capabilities can help to streamline the process.\"}]}]]}]]}]]}]],[\"$\",\"ol\",\"8\",{\"children\":[[\"$\",\"li\",\"0\",{\"id\":\"5sCrIsPl0oDSu8Q754hmxj\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.rapid7.com/products/metasploit/\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Metasploit\"}],[\"$\",\"i\",\"1\",{\"children\":\". Rapid7\"}],\". Retrieved February 15, 2023.\"]}]}],[\"$\",\"li\",\"1\",{\"id\":\"1vWonqbbXFXY2bWz1dypIj\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.upguard.com/blog/metasploit\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"What is Metasploit?\"}],\" (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"UpGuard. \"}],\"Retrieved January 9, 2023. \"]}]}],[\"$\",\"li\",\"2\",{\"id\":\"24AWqERGJzrgNTJMBkiF2q\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-2\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"What Information Security Analysts Do\"}],\". \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics Occupational Handbook.\"}],\" Retrieved February 15, 2023.\"]}]}],[\"$\",\"li\",\"3\",{\"id\":\"66KoAaD2xONdnFN5WFqQ8f\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.onetonline.org/link/summary/13-1199.07\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Security Management Specialists\"}],\". (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"O*Net OnLine\"}],\". Retrieved February 15, 2023.\"]}]}],[\"$\",\"li\",\"4\",{\"id\":\"4me2ewRB2MAt0niZ6VbFoM\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.onetonline.org/link/summary/15-1299.04\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Penetration Testers\"}],\". (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"O*Net OnLine\"}],\". Retrieved February 15, 2023.\"]}]}]]}]]}]]}]}]]}],[\"$\",\"div\",null,{\"className\":\"bg-primary text-primary-foreground pt-16\",\"children\":[\"$\",\"footer\",null,{\"className\":\"flex justify-between max-w-screen-xl mx-auto px-4 pb-4 \",\"children\":[\"$\",\"div\",null,{\"className\":\"flex flex-col w-full\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap justify-between mb-6 w-full\",\"children\":[[\"$\",\"a\",null,{\"href\":\"/\",\"className\":\"mb-6\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/trademark-logos/edx-by-2u-white.svg\",\"alt\":\"edX homepage\",\"title\":\"edX homepage\",\"width\":127,\"height\":67,\"className\":\"optanon-category-C0001\",\"data-ot-ignore\":true}]}],[\"$\",\"div\",null,{\"children\":[\"$\",\"div\",null,{\"className\":\"mb-4 justify-center flex flex-row\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.facebook.com/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Facebook page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"32\",\"height\":\"32\",\"viewBox\":\"0 0 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"1\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://x.com/edXOnline\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our X page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"48\",\"height\":\"48\",\"viewBox\":\"0 0 48 48\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"2\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.linkedin.com/school/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our LinkedIn page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"20\",\"height\":\"20\",\"viewBox\":\"0 0 20 20\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"fill-rule\":\"evenodd\",\"clip-rule\":\"evenodd\",\"d\":\"M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"3\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.reddit.com/r/edX/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Reddit page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"40\",\"height\":\"40\",\"viewBox\":\"-2 -2 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z\",\"fill\":\"currentColor\"}]}]}]}]}]]}]}]]}],false,[\"$\",\"div\",null,{\"className\":\"my-6\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap md:flex-nowrap justify-between\",\"children\":[[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Browse Courses\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Learn AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/artificial-intelligence\",\"children\":\"Learn AI\"}]}],[\"$\",\"li\",\"Learn ChatGPT\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/chatgpt\",\"children\":\"Learn ChatGPT\"}]}],[\"$\",\"li\",\"Learn Spanish\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/spanish\",\"children\":\"Learn Spanish\"}]}],[\"$\",\"li\",\"Learn Python\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/python\",\"children\":\"Learn Python\"}]}],[\"$\",\"li\",\"Learn Excel\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/excel\",\"children\":\"Learn Excel\"}]}],[\"$\",\"li\",\"Learn Software Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/software-engineering\",\"children\":\"Learn Software Engineering\"}]}],[\"$\",\"li\",\"Learn Blockchain\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/blockchain\",\"children\":\"Learn Blockchain\"}]}],[\"$\",\"li\",\"Learn Computer Programming\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/computer-programming\",\"children\":\"Learn Computer Programming\"}]}],[\"$\",\"li\",\"Learn Economics\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/economics\",\"children\":\"Learn Economics\"}]}],[\"$\",\"li\",\"Learn Architecture\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/architecture\",\"children\":\"Learn Architecture\"}]}],[\"$\",\"li\",\"Learn Project Management\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/project-management\",\"children\":\"Learn Project Management\"}]}],[\"$\",\"li\",\"Learn Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/business-administration\",\"children\":\"Learn Business Administration\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Courses\",{\"href\":\"/learn\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Courses\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"step-by-step guides\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Become a Cybersecurity Analyst\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-cybersecurity-analyst\",\"children\":\"Become a Cybersecurity Analyst\"}]}],[\"$\",\"li\",\"Become a Data Scientist\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-data-scientist\",\"children\":\"Become a Data Scientist\"}]}],[\"$\",\"li\",\"Become a Social Media Manager\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-social-media-manager\",\"children\":\"Become a Social Media Manager\"}]}],[\"$\",\"li\",\"Become a Software Developer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-developer\",\"children\":\"Become a Software Developer\"}]}],[\"$\",\"li\",\"Become a Software Engineer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-engineer-without-a-degree\",\"children\":\"Become a Software Engineer\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Guides\",{\"href\":\"/become\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Guides\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Complete your bachelor's online\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Bachelor's in Business\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/business\",\"children\":\"Bachelor's in Business\"}]}],[\"$\",\"li\",\"Bachelor's in Computer Science / Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/computer-data-sciences\",\"children\":\"Bachelor's in Computer Science / Data Science\"}]}],[\"$\",\"li\",\"Bachelor's in Health and Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/health-social-services\",\"children\":\"Bachelor's in Health and Nursing\"}]}],[\"$\",\"li\",\"Bachelor's in Accounting\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-accounting-bachelor-degree\",\"children\":\"Bachelor's in Accounting\"}]}],[\"$\",\"li\",\"Bachelor's in Finance\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-bachelors-degree-finance\",\"children\":\"Bachelor's in Finance\"}]}],[\"$\",\"li\",\"Bachelor's in Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/psychology\",\"children\":\"Bachelor's in Psychology\"}]}],[\"$\",\"li\",\"Bachelor's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/bachelors-in-public-health-online\",\"children\":\"Bachelor's in Public Health\"}]}],[\"$\",\"li\",\"Bachelor's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/social-work-bsw\",\"children\":\"Bachelor's in Social Work\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Undergraduate Degrees\",{\"href\":\"/bachelors\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Undergraduate Degrees\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Earn your online graduate degree\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Master's in Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-mba\",\"children\":\"Master's in Business Administration\"}]}],[\"$\",\"li\",\"Master's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-public-health-online\",\"children\":\"Master's in Public Health\"}]}],[\"$\",\"li\",\"Master's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msw-programs\",\"children\":\"Master's in Social Work\"}]}],[\"$\",\"li\",\"Master's in Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msn-programs\",\"children\":\"Master's in Nursing\"}]}],[\"$\",\"li\",\"Master's in Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-data-science\",\"children\":\"Master's in Data Science\"}]}],[\"$\",\"li\",\"Master's in Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-engineering\",\"children\":\"Master's in Engineering\"}]}],[\"$\",\"li\",\"Master's in Speech Pathology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Speech Pathology\"}]}],[\"$\",\"li\",\"Master's in Counseling/Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Counseling/Psychology\"}]}],[\"$\",\"li\",\"Master's Degree in Healthcare\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/healthcare\",\"children\":\"Master's Degree in Healthcare\"}]}],[\"$\",\"li\",\"Master's Degree in Education\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-education-online\",\"children\":\"Master's Degree in Education\"}]}],[\"$\",\"li\",\"Master's Degree in AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-artificial-intelligence\",\"children\":\"Master's Degree in AI\"}]}],[\"$\",\"li\",\"Master's Degree in Computer Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-computer-science\",\"children\":\"Master's Degree in Computer Science\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Graduate Degrees\",{\"href\":\"/masters\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Graduate Degrees\"}],[\"$\",\"a\",\"see more Doctorate Degrees\",{\"href\":\"/doctorate\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Doctorate Degrees\"}]]}]]}]]}],[\"$\",\"div\",null,{\"className\":\"my-4 border-t-[1px] border-solid border-primary-foreground\"}]]}],[\"$\",\"$L23\",null,{\"links\":\"$31c\"}],[\"$\",\"div\",null,{\"className\":\"flex flex-wrap-reverse justify-between\",\"children\":[[\"$\",\"p\",null,{\"className\":\"text-primary-foreground text-[1rem]\",\"children\":[\"© 2024 edX LLC. All rights reserved.\",[\"$\",\"br\",null,{}],[\"$\",\"span\",null,{\"children\":\"| 深圳市恒宇博科技有限公司\"}]]}],[\"$\",\"div\",null,{\"className\":\"flex gap-1\",\"children\":[[\"$\",\"a\",null,{\"href\":\"https://itunes.apple.com/us/app/edx/id945480667?mt=8\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/images/apple-store-badge-en.png\",\"alt\":\"Download on the App Store\",\"title\":\"Download on the App Store\",\"width\":120,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}],[\"$\",\"a\",null,{\"href\":\"https://play.google.com/store/apps/details?id=org.edx.mobile\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L22\",null,{\"src\":\"/images/google-play-badge-en.png\",\"alt\":\"Get it on Google Play\",\"title\":\"Get it on Google Play\",\"width\":135,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}]]}]]}]]}]}]}]]\n"])</script><script>self.__next_f.push([1,"338:I[85135,[\"8310\",\"static/chunks/0e5ce63c-e4012ad3e28fdbed.js\",\"5571\",\"static/chunks/c233e9bd-865e5bc301f09aaf.js\",\"2404\",\"static/chunks/a4634e51-1ae34582fa2bb120.js\",\"6290\",\"static/chunks/6290-14a62ddd57f81ba6.js\",\"9177\",\"static/chunks/9177-4f779ab065ca3298.js\",\"5878\",\"static/chunks/5878-e3c69aff2e273e23.js\",\"3069\",\"static/chunks/3069-556a3605b335d482.js\",\"4858\",\"static/chunks/4858-aef93864f4abb320.js\",\"8890\",\"static/chunks/8890-cd2934b2aa3b89dc.js\",\"3402\",\"static/chunks/3402-f8625ce91eb27ea6.js\",\"8082\",\"static/chunks/8082-143f9f9fdf5b9192.js\",\"4980\",\"static/chunks/4980-d730333976453575.js\",\"32\",\"static/chunks/32-bafec80821f44ed5.js\",\"6686\",\"static/chunks/6686-f007b1e2101fda62.js\",\"9366\",\"static/chunks/9366-e6a7fb83e1c23555.js\",\"3397\",\"static/chunks/3397-dd13dd89c81e42c8.js\",\"2628\",\"static/chunks/2628-8d231bd404df8976.js\",\"554\",\"static/chunks/554-025495b6bf8e1dac.js\",\"121\",\"static/chunks/121-00c8365f8c57a8cc.js\",\"3564\",\"static/chunks/3564-dbea25076659e35b.js\",\"5099\",\"static/chunks/5099-9a5433902d87437e.js\",\"6928\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-176642ac87704917.js\"],\"default\"]\n339:Ta6d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe US Bureau of Labor Statistics projects a 23% increase in cybersecurity jobs to 2033. The demand for cybersecurity analysts is growing ever stronger!\r\nWhat do cybersecurity analysts do? Cybersecurity analysts protect an organization's digital assets by identifying, analyzing, and mitigating security threats, ensuring data and systems remain secure against cyberattacks. \r\n \r\n\u003cp\u003eThis IBM Cybersecurity Professional Certificate has been designed by industry experts to provide you with the job-ready cybersecurity and digital forensic skills you need to jumpstart your cybersecurity career. No prior cybersecurity experience is required. \r\n\r\n\u003cp\u003eTo begin, you’ll build your foundational knowledge of cybersecurity essentials, tools, and technologies, operating systems, networking fundamentals, and the basics of cyberattacks. You’ll explore database fundamentals and vulnerabilities and learn about the steps a cybersecurity analyst would take to prevent, manage, and mitigate cybersecurity attacks. Plus, you’ll learn about cybersecurity architecture, compliance frameworks, standards, and regulations. \r\n\r\n\u003cp\u003eYou’ll also explore gen AI for cybersecurity and build valuable skills and hands-on experience in penetration testing, incident response, forensics, and threat intelligence. You’ll work on real-world projects developing cybersecurity plans and compliance frameworks, giving you great practical work to talk about in interviews. Plus, you’ll use real-world case studies that demonstrate that you can: \r\n\u003cul\u003e\r\n\u003cli\u003eApply incident response methodologies and forensics practices.\u003c/li\u003e \r\n\u003cli\u003eUse industry-specific security tools.\u003c/li\u003e \r\n\u003cli\u003eApply cybersecurity industry standards and best practices that mitigate risks, enhance security, and ensure compliance through audit processes.\u003c/li\u003e \r\n\u003cli\u003eUse gen AI tools to boost cybersecurity effectiveness and productivity.\u003c/li\u003e \r\n\u003cli\u003eInvestigate a real-world security breach by identifying the attack, vulnerabilities, costs, and prevention.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e \r\n\r\n\u003cp\u003eTake advantage of the insights provided by seasoned industry experts to guide your job search, resume creation, and Interviewing to help you land your first cybersecurity role. This program will also prepare you to take and earn a 30% discount on the CompTIA Security+ and CySA+ certification exams. After successfully completing this program, you’ll have an industry-recognized IBM Professional Certificate that you can add to your resume and portfolio.\u003c/p\u003e\r\n\r\n\u003cp\u003eIf you’re looking to kickstart your cybersecurity career as a sought-after analyst, ENROLL TODAY, and look forward to being job-ready in less than 6 months!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"33a:T724,\u003cp\u003eThis is a self-paced, free introductory course on ethical hacking — or, as it’s sometimes called, white hat hacking. Ethical hackers are the guardians of organizations, whose purpose is to identify vulnerabilities within an organization's systems. By exploiting these weaknesses, they provide invaluable insights to help organizations fortify their defenses and prevent cyber attacks. Ethical hackers simulate real-world scenarios to evaluate an organization's security posture and may use the same technical tools as cyber criminals, or unethical hackers, but rest assured every step of their work is completely legal and serves a greater purpose. By understanding the methods and mindset of cyber criminals, ethical hackers possess a unique perspective that enables them to proactively identify and address potential risks. \u003c/p\u003e\n\u003cp\u003eAs an aspiring ethical hacker, whose goal is to fight cyber criminals, you will first and foremost need to learn how to behave and operate like an ethical cybersecurity professional. In this free course, you’ll start out with basics, such as: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCyber kill chain methodology\u003c/li\u003e\n\u003cli\u003eHacking concepts\u003c/li\u003e\n\u003cli\u003eHacker classes\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eYou will gain hands-on experience in identifying vulnerabilities and analyzing their impact, and learn to think like a hacker to develop the skills necessary to safeguard organizations from malicious threats, keeping in mind, however, that your intentions in using these in the future will be to help rather than harm.\u003c/p\u003e\n\u003cp\u003eThere are many career options available for an ethical hacker:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ePenetration tester\u003c/li\u003e\n\u003cli\u003eSecurity consultant\u003c/li\u003e\n\u003cli\u003eSecurity analyst\u003c/li\u003e\n\u003cli\u003eIncident responder\u003c/li\u003e\n\u003cli\u003eCybersecurity engineer\u003c/li\u003e\n\u003cli\u003eVulnerability assessor\u003c/li\u003e\n\u003cli\u003eSecurity researcher\u003c/li\u003e\n\u003cli\u003eSecurity architect\u003c/li\u003e\n\u003c/ul\u003e33b:T4f7,\u003cp\u003eWith more than 328 million terabytes of data produced each day, the potential threat of security and data breaches worldwide is constantly looming. Considering more than 500 billion data records were"])</script><script>self.__next_f.push([1," compromised in 2023 alone, businesses and individuals grapple with the new reality that hacking and breaches are becoming more sophisticated by the minute.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn this changing landscape, those who are well equipped to not only manage threats or compromised systems, but also anticipate and prevent such attacks, will position themselves and their organizations for long term success.\u003c/p\u003e\r\n\r\n\u003cp\u003eBy combining two of HarvardX’s most popular courses, CS50's Introduction to Computer Science and CS50's Introduction to Cybersecurity, learners will engage with a unique blend of programming skills, computer science fundamentals, and specialized insights into the world of cybersecurity.\u003c/p\u003e\r\n\r\n\u003cp\u003eRegister today to explore the convergence of data science and cybersecurity in this CS50 Professional Certificate Program, where you will understand the threats and opportunities in the cybersecurity space, gaining the ability to make timely decisions when facing risk, predict vulnerabilities, and enable preemptive measures to safeguard against looming threats.\u003c/p\u003e33c:T4ad,\u003cp\u003eCyberattacks have surged by 71% and are predicted to continue increasing. This alarming statistic highlights the continued demand for cybersecurity professionals. Jumpstart your cybersecurity career with this introductory IBM course, which introduces you to fundamental cybersecurity concepts, threats, and preventive measures. \u003c/p\u003e\n\u003cp\u003eExplore the evolution of cybersecurity and the motivations of the actors behind cyberattacks, including types such as malware, ransomware, and other security threats. You'll also relate critical thinking to common cybersecurity practices and architecture. \u003c/p\u003e\n\u003cp\u003eHear from industry experts regarding their own careers, skills, perspectives, and experiences. Frameworks, standards, and organizations play a fundamental role in cybersecurity, which you will also investigate. \u003c/p\u003e\n\u003cp\u003eThroughout, you’ll build practical knowledge and technical expertise through hands-on labs. Your final project will enable you to effectively demo"])</script><script>self.__next_f.push([1,"nstrate your understanding of cybersecurity principles. \u003c/p\u003e\n\u003cp\u003eThis course is for anyone who wants to know the basics of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.\u003c/p\u003e33d:T462,The history of Cybersecurity; types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals; key terminology, basic system concepts and tools as an introduction to the Cybersecurity field.,Key cybersecurity roles in an organization, processes and examples of each process, describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux; and understand the concept of Virtualization.,The background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization.,The basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.,The concepts of endpoint security and patch management and finally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company.33e:T660,\u003cp\u003eThe cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture. \u003c/p\u003e\n\u003cp\u003eDuring the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, a"])</script><script>self.__next_f.push([1,"nd integrate AI into threat intelligence. Plus, you’ll learn to leverage cyber threat intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods. \u003c/p\u003e\n\u003cp\u003eTo complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity. \u003c/p\u003e\n\u003cp\u003eThis course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course. \u003c/p\u003e\n\u003cp\u003eIf you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.\u003c/p\u003e33f:T44f,\u003cp\u003eAre you interested in working in cybersecurity but unsure if it's the right career choice for you?\u003c/p\u003e\r\n\r\n\u003cp\u003eThis professional certificate program will introduce you to the field of cybersecurity, as you learn about its landscape, numerous sectors and various roles, competencies and career pathways.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou will learn about the role of the Chief Information Security Office (CISO) as you study the policies, procedures, practices and technologies put in place to mitigate organizational and systems vulnerabilities to cyberattack.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou will also learn about the type of skills needed from a cybersecurity professional, outside of technical proficiency. And lastly, you will be given the opportunity to complete a self-assessment to determine which career path in cybersecurity is right for you.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe goal of this program is to help you better understand cybersecurity and the opportunities within this field as they apply to you. The program is intended for learners who wish to identify their specific optimal niche and create a plan for entry into this exci"])</script><script>self.__next_f.push([1,"ting field.\u003c/p\u003e340:T863,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.\u003c/p\u003e\n\u003cp\u003eIn this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.\u003c/p\u003e\n\u003cp\u003eThe goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.\u003c/p\u003e\n\u003cp\u003eFirst, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.\u003c/p\u003e\n\u003cp\u003eSecond, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.\u003c/p\u003e\n\u003cp\u003eThird, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.\u003c/p\u003e\n\u003cp\u003eFinally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.\u003c/p\u003e\n\u003cp\u003eThis offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"341:T4c1,\u003cp\u003eTechnologies are always being defeated.\u003c/p\u003e\n\u003cp\u003eIf you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency.\u003c/p\u003e\n\u003cp\u003eCybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day.\u003c/p\u003e\n\u003cp\u003eThe purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving.\u003c/p\u003e\n\u003cp\u003eStudents will learn from thought leaders from both the academic and practitioner communities.\u003c/p\u003e342:T4fe,\u003cp\u003eCyberthreats present a constant challenge today, costing billions and affecting everyone, from governments to small businesses. Are you ready to contribute to the solution? \u003c/p\u003e\n\u003cp\u003eThis course will provide you with a deep understanding of cybersecurity principles, industry standards, regulations, and audit processes. You will explore the fundamental concepts of information security and compliance, covering topics such as governance, risk, compliance, cybersecurity frameworks, and process management. \u003c/p\u003e\n\u003cp\u003eYou will also learn about IT service management and explore the NIST Risk Management Framework and artificial intelligence (AI) ethical considerations. You will gain insights into cybersecurity laws and regulations, focusing on both US and global perspectives, including HIPPA, GDPR, and PCI DSS. "])</script><script>self.__next_f.push([1,"Additionally, you will familiarize yourself with the audit processes using the COBIT framework and SOC reports. You will also explore prominent standards such as OWASP, ISO, and IEEE, learning how to apply them effectively. \u003c/p\u003e\n\u003cp\u003eThroughout this five-module self-paced course, you will engage in interactive activities to apply your knowledge in real-world scenarios. You will also complete a final project to test your skills and showcase your understanding.\u003c/p\u003e343:T5d5,\u003cp\u003eGenerative AI is transforming cybersecurity, enabling faster threat detection, proactive defense strategies, and advanced solutions to combat sophisticated attacks. This course builds skills in valuable generative AII techniques and tools that help cybersecurity professionals effectively handle complex cybersecurity challenges. \u003c/p\u003e\n\u003cp\u003eDuring the course, you’ll explore undetected vulnerabilities by leveraging AI and machine learning. You’ll learn the foundational principles of gen AI and their practical applications in cybersecurity, including user and entity behavior analytics (UEBA), threat intelligence, report summarization, automated playbooks, countering phishing, malware, misinformation, and deepfakes. Plus, you’ll look at natural language processing attack techniques, such as prompt injection, and the strategies to counteract them. \u003c/p\u003e\n\u003cp\u003eYou’ll learn how generative AI transforms Security Information and Event Management (SIEM) and Security Operations Center (SOC) workflows. The course covers how generative AI enhances incident response, threat detection, and vulnerability management. \u003c/p\u003e\n\u003cp\u003eYou’ll also review the latest advancements in gen AI for cyber defense and threat prediction. Plus, you’ll complete real-world practical exercises, hands-on labs, and a final project where you’ll apply your skills. \u003c/p\u003e\n\u003cp\u003eIf you’re an existing or aspiring cybersecurity professional looking to add in-demand gen AI skills to your resume, enroll today!\u003c/p\u003e344:T4b9,\u003cp\u003eThis course is one of the 5 courses of an introductory business infor"])</script><script>self.__next_f.push([1,"mation systems series, designed to introduce you to the amazing world of Information Technology.\u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way.\u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam.\u003c/p\u003e\n\u003cp\u003eIn this Computer Science course we will deal with cybersecurity and various other social aspects of ICT, such as its effect on globalization, business strategy and other economic processes, ergonomics, cloud computing and professionalcareers in the field of ICT.\u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish).\u003c/p\u003e345:T4c8,\u003cp\u003eReady to power up your portfolio with real-world experience in cybersecurity analysis that employers look for? This capstone course will have you analyzing a cybersecurity challenge like a pro and giving you hands-on experience dealing with a breach response you can talk about in interviews. \u003c/p\u003e\n\u003cp\u003eDuring this course, you’ll be immersed in the core principles and practices of breach response and cybersecurity management. You’ll dive into phishing, vishing, point-of-sale (PoS) breaches, insider threats, AI-related breaches, ransomware attacks, and how attackers exploit vulnerabilities. You’ll also explore how organizations respond to these incidents and implement strategies to prevent future threats. \u003c/p\u003e\n\u003cp\u003eGuided by industry experts, you’ll then get hands-on working on incident response, digital forensics, penetration testing, and compliance. Through engaging case studies and "])</script><script>self.__next_f.push([1,"structured templates, you’ll develop critical skills in breach management, plus you’ll propose enhancements to real-world response strategies. \u003c/p\u003e\n\u003cp\u003eIf you’re looking to gain the practical experience employers look for and expand your expertise, ENROLL TODAY and get ready to boost your resume in just 6 weeks.\u003c/p\u003e346:T514,\u003cp\u003eDigital Shield: Cybersecurity for Data and Systems Protection\" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems.\u003c/p\u003e\n\u003cp\u003eThis MOOC was created in collaboration with CYBERPRO Global, a leading international provider of cyber education programs with over a decade of experience in training security personnel and delivering large-scale technological projects. Its aim is to educate participants on the fundamental concepts of information security and cybersecurity, including techniques and tactics necessary to protect information and computer systems from potential threats.\u003c/p\u003e\n\u003cp\u003eParticipants will gain the ability to understand the basics of information security, including identifying vulnerabilities and threats, preventing cyber attacks, and implementing security measures and controls. They will also learn the primary techniques used by cybersecurity professionals to protect computer systems.\u003c/p\u003e\n\u003cp\u003e\"Digital Shield: Cybersecurity for Data and Systems Protection\" provides the key concepts, skills, and knowledge necessary to effectively protect computer systems against cyber threats and ensures a strong foundational level to enhance education in the field of information security.\u003c/p\u003e347:T1730,"])</script><script>self.__next_f.push([1,"\u003cp\u003eBegin your journey into the realm of Cybersecurity with our premier course, built around the TAME Range Cyber Training and Simulation Platform. This state-of-the-art learning environment - developed by Israel Aerospace Industries (IAI) - a world leader in Cybersecurity - provides immersive and invaluable hands-on experience. Equip yourself with the knowledge and expertise to navigate the complex Cyber landscape and tackle real-world threats head-on.\u003c/p\u003e\n\u003cp\u003eWhy Choose This Course?\u003c/p\u003e\n\u003cp\u003eReal-World Scenarios and Simulations: TAME Range simulates a wide array of Cyber threats, from malware and advanced persistent threats (APT) to DDoS attacks. This range of scenarios allows students to develop a broad set of skills, preparing them for a multitude of Cyber challenges.\u003c/p\u003e\n\u003cp\u003eCritical Thinking and Problem Solving: The dynamic nature of the Cyber scenarios in the TAME Range Simulation Platform challenge students to think on their feet and develop creative problem-solving skills. \u003c/p\u003e\n\u003cp\u003eConfidence in Handling Real Threats: After training on a platform that simulates real-world threats so closely, students build confidence in their ability to handle actual Cybersecurity challenges in their professional careers.\u003c/p\u003e\n\u003cp\u003eAdaptability to Learner's Pace: Students work through simulations at their own pace, ensuring they fully understand one scenario before moving on to the next. \u003c/p\u003e\n\u003cp\u003eDeveloped by IAI: Israel Aerospace Industries is a global leader in advanced technologies including defense, aerospace, and Cybersecurity. The world-class technological expertise of IAI validates the effectiveness and sophistication of the TAME Range Platform. \u003c/p\u003e\n\u003cp\u003eContinuous Improvement: A dedicated R\u0026amp;D department in the Cyber Division of Israel Aerospace ensures that the platform is not static. TAME Range evolves, adapts, and improves continuously, aligning with the dynamic nature of the cyber threat landscape \u003c/p\u003e\n\u003cp\u003eCourse Highlights: \u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003eComprehensive modules covering cyber threats, defense strategies, resilience building, and more. \u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003cbr\u003e\u003c/br\u003e\u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003eReal-time feedback to refine your strategies and improve decision-making on the spot. \u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003cbr\u003e\u003c/br\u003e\u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003eExposure to ethical dimensions of cybersecurity, enhancing your understanding of the broader implications of cyber actions. \u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003cbr\u003e\u003c/br\u003e\u003c/span\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003eTraining that emphasizes critical thinking, creative problem-solving, and adaptability. \u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #00262b; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003e\n\nRegister now for an unparalleled cybersecurity learning experience. Whether you're new to the field or an experienced professional, this course promises to be a transformative learning experience. \u003c/span\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan style=\"font-size: 12pt; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; text-wrap: wrap;\"\u003e\u003c/span\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"348:T501,\u003cul\u003e\n\u003cli\u003eExpertise utilizing the TAME Range Cyber Training and Simulation Platform \u003c/li\u003e\n\u003cli\u003eReal-world threat identification and mitigation strategies\u003c/li\u003e\n\u003cli\u003eMalware, APTs, and DDoS attack simulations \u003c/li\u003e\n\u003cli\u003eDevelopment of a broad Cybersecurity skillset \u003c/li\u003e\n\u003cli\u003eEnhancement of critical thinking and problem-solving\u003c/li\u003e\n\u003cli\u003eCreative solutions for dynamic Cyber attack/defend scenarios \u003c/li\u003e\n\u003cli\u003eConfidence building in real-world Cybersecurity situations\u003c/li\u003e\n\u003cli\u003ePaced learning and complex scenario understanding\u003c/li\u003e\n\u003cli\u003eIn-depth knowledge of Cyber threats and defense\u003c/li\u003e\n\u003cli\u003eReal-time feedback for strategy refinement\u003c/li\u003e\n\u003cli\u003eEthical dimensions of Cybersecurity actions \u003c/li\u003e\n\u003cli\u003eQuick decision making in real-world Cyber situations\u003c/li\u003e\n\u003cli\u003eExposure to network and cloud resilience building techniques\u003c/li\u003e\n\u003cli\u003eComprehensive modules: threats, strategies, and more\u003c/li\u003e\n\u003cli\u003eEmphasis on adaptability in Cyber problem-solving\u003c/li\u003e\n\u003cli\u003eTracking progress with platform assessment tools \u003c/li\u003e\n\u003cli\u003eReal world relevance - preparing for actual career challenges\u003c/li\u003e\n\u003cli\u003eResponding to threats in real-time, making decisions under pressure\u003c/li\u003e\n\u003cli\u003eExposure to the latest Cybersecurity tools and techniques\u003c/li\u003e\n\u003cli\u003eGrasping the broader implications of Cyber actions\u003c/li\u003e\n\u003c/ul\u003e349:T556,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eWith the rise of digital and AI-driven disruption, the demand for cybersecurity professionals continues to soar globally. But how can you stand out when there are so many talented candidates in the field? \u003c/span\u003e\u003cspan lang=\"EN\"\u003eThis course gives you the guidance you need to catch the eye of employers throughout the recruitment process. \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eDuring the course, you’ll fine-tune your understanding of cybersecurity roles, career opportunities, and the skills you need on your resume. You’ll learn the best way to search for jobs, build your portfolio, and draft an elevator pitch. You’ll create your resume, draft a cover letter based on job requirements, and learn how to prepare for "])</script><script>self.__next_f.push([1,"interviews. Plus, you’ll review potential interview questions and responses, and look at the post-interview actions you need to take to achieve success. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIndustry experts will also share insights, offering tips on networking, interview techniques, solving coding challenges, and handling interview questions. Plus, you'll also have opportunities to practice and assess your knowledge along the way. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIf you’re ready to start applying for an exciting cybersecurity role, ENROLL TODAY and give yourself the best chance of getting your dream job!\u003c/p\u003e34a:T43d,\u003cp\u003eCybersecurity as a profession is projected to grow much faster than the national average for all occupations.1 Want to break into the field?\u003c/p\u003e\n\u003cp\u003eThis beginner-friendly and asynchronous course will help you jumpstart your cybersecurity career. Engage in an online learning experience tailored to your experience level.\u003c/p\u003e\n\u003cp\u003eIn it, you will learn to think like a cyber pro, at your own pace. Study the key elements of the CIA Triad, cryptography basics, and the daily responsibilities of cybersecurity professionals working in the field today.\u003c/p\u003e\n\u003cp\u003eKey concepts covered in this course include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCybersecurity\u003c/li\u003e\n\u003cli\u003eCIA Triad\u003c/li\u003e\n\u003cli\u003eCryptography\u003c/li\u003e\n\u003cli\u003ePlaintext\u003c/li\u003e\n\u003cli\u003eCiphertext\u003c/li\u003e\n\u003cli\u003eEncryption\u003c/li\u003e\n\u003cli\u003eDecryption\u003c/li\u003e\n\u003cli\u003eCipher\u003c/li\u003e\n\u003cli\u003eKey\u003c/li\u003e\n\u003cli\u003eCaesar Cipher\u003c/li\u003e\n\u003cli\u003eSymmetric encryption\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eNo prior experience or technical installations is required to join or complete this course.\u003c/p\u003e\n\u003cp\u003eFootnote:\u003c/p\u003e\n\u003cp\u003e1 Occupational Outlook Handbook: Information Security Analysts. (2022). U.S. Bureau of Labor Statistics. March 14, 2023.\u003c/p\u003e34b:Tca2,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEC-Council’s Essentials Series is a Cybersecurity certificate series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are 3 foundational, industry recognized Cybersecurity certification programs, that help students and early career professionals learn real-world skills required in today’s entry-level cybersecurity field. The Essentials Series was designed to educate cybersecurity beginners in a range of techniques and topics across industry verticals, such as securing local networks, combating cybercrime and cyber threats, mitigating network security breaches, ethical hacking, cyber-attacks from hackers, conducting forensic investigations, and more.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe Essential Series includes three beginner level courses, each covering essential skills in Network Defense, Ethical Hacking, and Digital Forensics. This course series is designed for today's entry-level careers in information security, network defense, and digital forensics and is ideal for computer science and computer network learners aspiring to pursue a career in cybersecurity.\u003c/p\u003e\r\n\r\n\u003cp\u003eAll 3 Essentials Series courses are closely aligned to specific work roles within the National Initiative of Cybersecurity Education (NICE) framework. In result, students taking Essentials Series courses should be able to clearly determine which work roles in today’s industry they are prepared for with each cybersecurity certification.\u003c/p\u003e\r\n\r\n\u003cp\u003eEach course offers an industry certification exam. Exams for each course are 2 hours and consist of 75 multiple choice questions.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eNetwork Defense Essentials\u003c/p\u003e\u003c/b\u003e\r\n\r\n\u003cp\u003eNetwork Defense Essentials covers the fundamental concepts of information security and network defense across operating systems, computer network, security breaches, and local networks. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eEthical Hacking Essentials\u003c/p\u003e\u003c/b\u003e\r\n\r\n\u003cp\u003eEthical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking, penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to cyberattacks and cyber threats, as well as security breaches, phishing, password cracking, web application attacks, IoT and OT attacks, cloud computing, pen testing fundamentals, and more.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eDigital Forensics Essentials\u003c/p\u003e\u003c/b\u003e\r\n\r\n\u003cp\u003eDigital Forensics Essentials helps learners increase their competency and expertise in digital forensics and cybercrime, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Cyberattacks and threats, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics.\u003c/p\u003e\r\n\r\n\u003cp\u003e"])</script><script>self.__next_f.push([1,"34c:T509,\u003cp\u003e\u003cem\u003eWith cyberattacks increasingly targeting databases and the average cost of a data breach nearing $5 million, businesses are urgently seeking skilled cybersecurity experts to protect against such threats. This course equips you with essential database security skills that are in high demand.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eYou'll start by understanding key database concepts, including relational and non-relational databases, and mastering SQL basics. You'’ll practice creating and executing SQL statements and build foundational knowledge in relational data management, roles, and permissions.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eThe course covers crucial security measures such as encryption, hashing, masking, tokenization, and permission restrictions.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eYou'll also learn about user profiles, password policies , and privileges, and how to design and implement effective security and auditing models.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eAdditionally, you'll explore database injection vulnerabilities, including OS command and SQL\u003c/em\u003e \u003cem\u003einjections.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eAs you progress, you will gain hands-on experience through practical labs focusing on user management and\u003c/em\u003e ___access control. This course will help you to develop critical database security skills that will make you stand out to employers._\u003c/p\u003e34d:T4d8,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThis course will give you the necessary background for developing cybersecurity skills and understanding threat intelligence in cybersecurity.\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThroughout the course, you will gain a comprehensive understanding of network defensive tactics and explore practical examples of how to protect networks from potential threats. You will delve into the concepts and tools of data loss prevention and endpoint protection, to equip yourself with strategies to safeguard critical data. Additionally, you will have the opportunity to explore a data loss prevention tool and learn how to effectively classify data within your database environment and enhance data security measures.\u003cspan lang"])</script><script>self.__next_f.push([1,"=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis course also covers essential security vulnerability scanning technologies and tools, enabling you to identify potential weaknesses in systems and applications. You will recognize various application security threats and common vulnerabilities. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEnroll in this course today in order to establish the necessary foundation for developing cybersecurity expertise as part of the IBM Cybersecurity Analyst Professional Certificate program.\u003c/p\u003e34e:T43c,\u003cp\u003eThis course provides details on how card payments are processed, including differences between older ‘magnetic stripe’ transactions and newer EMV (or ‘chip’) based transactions. Using this as a base, the course outlines specifically how payment solutions are being implemented around the world on smartphones and mobile devices, the differences between mobile acceptance and mobile issuance, and how other types of payment methods and payment processes may be implemented on these devices. This includes discussions of tokenization and token service providers, their relationship to financial institutions and merchants, as well as card transactions using card readers, contactless payments, and the rise of mobile apps, mobile wallets, and the ledger systems that are often used to manage these processes. Topics of mobile security, security standards, cryptography, protection of sensitive data, potential data breaches, malware, and key management are touched upon at a high level, but primary focus is provided to the mobile payments eco-system and implementations.\u003c/p\u003e34f:T4de,\u003cp\u003eIn this course you will learn how to think systematically and critically about the concepts and challenges informing implementation of any mobile payments strategy. You will come to understand the core issues that underlie the changing landscape of payments and how to secure digital transactions by learning:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ethe principle components of open and closed loop payment systems\u003c/li\u003e\n\u003cli\u003ethe difference between MagStripe and EMV paymen"])</script><script>self.__next_f.push([1,"ts and threat models associated with each\u003c/li\u003e\n\u003cli\u003ethe differences and similarities between contact and contactless payments using EMV\u003c/li\u003e\n\u003cli\u003ewhat the core standards for payments are and how they are changing\u003c/li\u003e\n\u003cli\u003ethe different types of cardholder authentication\u003c/li\u003e\n\u003cli\u003ethe differences between mobile issuance and mobile acquiring and the role that financial institutions play in each\u003c/li\u003e\n\u003cli\u003ethe roles that tokenization and token service providers play in mobile payments\u003c/li\u003e\n\u003cli\u003eabout the migration away from dedicated payment terminals and what that means for the future\u003c/li\u003e\n\u003cli\u003eabout securing enrollment and implementation of mobile applications \u003c/li\u003e\n\u003cli\u003ewhat the key drivers for change are in the area of payments and how these are shaping the emerging patterns for fraud\u003c/li\u003e\n\u003c/ul\u003e350:T5fc,\u003cp\u003eThis course is a variant of HarvardUniversity's introduction to computer science, CS50, designed especially for lawyers (and law students). Whereas CS50 itself takes a bottom-up approach, emphasizing mastery of low-level concepts and implementation details thereof, this course takes a top-down approach, emphasizing mastery of high-level concepts and design decisions related thereto. Ultimately, it equips students with a deeper understanding of the legal implications of technological decisions made by clients. \u003c/p\u003e\n\u003cp\u003eThrough a mix of technical instruction and discussion of case studies, this course empowers students to be informed contributors to technology-driven conversations. In addition, it prepares students to formulate technology-informed legal arguments and opinions. Along the way, it equips students with hands-on experience with Python and SQL, languages via which they can mine data for answers themselves. \u003c/p\u003e\n\u003cp\u003eTopics include algorithms, cloud computing, databases, networking, privacy, programming, scalability, security, and more, with a particular emphasis on understanding how the work developers do and the technological solutions they employ may impact clients. Students emerge from this course with first-"])</script><script>self.__next_f.push([1,"hand appreciation of how it all works and all the more confident in the factors that should guide their decision-making. \u003c/p\u003e\n\u003cp\u003eKeywords:law firm, computer programming, programming skills, computer programmers, patent attorney, legal practice, legal services, legal education, patent law\u003c/p\u003e351:Tb86,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course takes you through the first eight lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. \u003c/p\u003e\n\u003cp\u003eIn this course, you’ll take the first steps toward being a solid HCI practitioner and researcher. You’ll learn the fundamentals of how HCI relates to fields like user experience design, user interface design, human factors engineering, and psychology. You’ll also learn how human-computer interaction has influence across application domains like healthcare and education; technology development like virtual and augmented reality; and broader ideas like context-sensitive computing and information visualization. \u003c/p\u003e\n\u003cp\u003eYou’ll then dive into the fundamentals of human-computer interaction. You’ll learn three views of the user’s role in interface design: the behaviorist ‘processor’ view, the cognitivist ‘predictor’ view, and the situationist ‘participant’ view. You’ll discover how these different views of the user’s role affect the scope we use to evaluate interaction. These perspectives will be crucial as you move forward in designing interfaces to ensure you’re considering what goes on inside the user’s head, as well as in the environment around them. \u003c/p\u003e\n\u003cp\u003eYou’ll then learn the gulfs of execution and evaluation, which determine how easily the user can accomplish their goals in a system and how well they can understand the results of their actions. All of user interface design can be seen as taking steps to bridge these gulfs. You’ll also investigate the notion of direct manipulation, which shortens the distance between the user and the objects they are manipulating in the interface. With these tools, you’ll be well-equipped to start designing effective interfaces. \u003c/p\u003e\n\u003cp\u003eYou’ll then take a deeper dive into what humans are even capable of accomplishing. You’ll learn the limitations of human sensing and memory and how we must be aware of the cognitive load we introduce on the user while using our interfaces. Cognitive load can have an enormous impact on a user’s satisfaction with an interface, and must be kept in mind as you begin your career as a designer. \u003c/p\u003e\n\u003cp\u003eYou’ll finally conclude with an overview of the major design principles in human-computer interaction. Curated from the work of Don Norman, Jakob Nielsen, Ronald Mace, Larry Constantine, and Lucy Lockwood, these design principles cover revolutionary ideas in the design of interfaces: discoverability, affordances, perceptibility, constraints, error tolerance, and more. These principles are crucial whether you move forward as a designer, an evaluator, a front-end engineer, or any other role in technology design. \u003c/p\u003e\n\u003cp\u003eBy the end of the course, you’ll have an understanding of where HCI sits in the broader field, a grasp of the goals of HCI, and a foundation in core principles that inform interface design.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"352:T42e,\u003cul\u003e\n\u003cli\u003eThe overall goals of human-computer interaction.\u003c/li\u003e\n\u003cli\u003eThe relationship between HCI, user experience design, human factors engineering, and psychology.\u003c/li\u003e\n\u003cli\u003eThe relevance of HCI to domains like healthcare, education, and cybersecurity.\u003c/li\u003e\n\u003cli\u003eThe trends in HCI technology including virtual reality, augmented reality, and robotics.\u003c/li\u003e\n\u003cli\u003eThe emerging ideas in HCI research, such as context-sensitive computing, gesture-based interaction, and social computing.\u003c/li\u003e\n\u003cli\u003eThe three main schools of thought in HCI: the processor, predictor, and participant views.\u003c/li\u003e\n\u003cli\u003eThe feedback cycle in user interaction, including gulfs of execution and evaluation.\u003c/li\u003e\n\u003cli\u003eThe notion of directness in interaction, and the role of direct manipulation.\u003c/li\u003e\n\u003cli\u003eThe strengths and limitations of the human user, including sensation and memory.\u003c/li\u003e\n\u003cli\u003eThe role of design principles and heuristics in user interface design.\u003c/li\u003e\n\u003cli\u003eThe most important principles for design, including discoverability, affordances, perceptibility, and error tolerance.\u003c/li\u003e\n\u003c/ul\u003e353:T79a,\u003cp\u003eWe have witnessed the power of mechanization in the early nineteen century, automation in the seventies, information and the internet in the last decades. But now, the adaptation of connected intelligence into the business and social fabrics is advancing at an astonishing speed, which will completely change the way we conduct business. \u003c/p\u003e\n\u003cp\u003eIn this course,we will discuss changes/predictions we forsee in the future, such as: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe credit card business will fade out gradually\u003c/li\u003e\n\u003cli\u003eAll currency will be bitcoin\u003c/li\u003e\n\u003cli\u003eWhereas traditional internet gives rise to digital divide, the mobile internet will narrow the wealth gap\u003c/li\u003e\n\u003cli\u003eMost e-business models will become obsolete, leaving customer to factory (C2F)\u003c/li\u003e\n\u003cli\u003eNo more talents to hide except partners\u003c/li\u003e\n\u003cli\u003eMobile phones will be outdated and replaced by augmented virtual reality (AVR)\u003c/li\u003e\n\u003cli\u003eBig corporates will transform to big platforms\u003c/li\u003e\n\u003cli\u003eThe birth of real In"])</script><script>self.__next_f.push([1,"ternet economics\u003c/li\u003e\n\u003cli\u003eThe death of global manufacturing to networked and dispersed manufacturing\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course will explain how these changes will be brought about by the extensive use of digital intelligence, which will be available on mobile, internet, and pervasive computing as homes, offices and factories become a well knitted cyber-physical system. \u003c/p\u003e\n\u003cp\u003eEnabling tools such as Cloud Computing, Big Data, Internet of Things and Cyber Physical Systems are introduced. Automation, intelligence and collaborations are also discussed with particular reference to smart manufacturing, smart products/services and smart cities, and their opportunities and challenges. \u003c/p\u003e\n\u003cp\u003eThis is not a technical course; instead part of the focus is on organizational readiness, skills gaps and competencies for knowledge workers to fully leverage the power of Industry 4.0. \u003c/p\u003e\n\u003cp\u003eSuitable for learners from all disciplines and interested in the mega changes to our society.\u003c/p\u003e354:T6e7,\u003cp\u003eWith the cost of cyber breaches skyrocketing, robust cyber defense architecture is more critical than ever. Businesses need talented professionals with the right cyber defense skills! This course provides a comprehensive guide to detecting, responding to, and preventing cyberattacks across multiple security domains. \u003c/p\u003e\n\u003cp\u003eDuring the course, you’ll learn how to detect cyber threats using SIEM and XDR systems and utilizing advanced monitoring, analysis, and threat hunting techniques. You’ll gain insights into SOAR systems, automation, and orchestration, as well as breach notifications. You’ll build your understanding of IAM as the new perimeter of security and explore concepts like multifactor authentication (MFA) and privileged access management (PAM). \u003c/p\u003e\n\u003cp\u003eAdditionally, you’ll delve into network security, looking at firewalls, VPNs, and SASE, alongside application security practices such as secure coding, vulnerability testing, and DevSecOps. Plus, you’ll learn about data security through governance, compliance, detecti"])</script><script>self.__next_f.push([1,"on, and response strategies. \u003c/p\u003e\n\u003cp\u003eThe course culminates in a hands-on final project where you'll design a secure network architecture and analyze real-world cybersecurity tools. Plus, a case study featuring IBM’s security solutions will deepen your understanding before you complete a final exam that will test your grasp of the fundamentals and key security concepts. \u003c/p\u003e\n\u003cp\u003eIf you’re looking to build the job-ready skills in cyber defense architecture employers need, ENROLL TODAY and get ready to add in-demand skills to your resume in just 5 weeks! \u003c/p\u003e\n\u003cp\u003ePrerequisites: To enroll for this course you need to have a basic knowledge of networks, cloud computing, security concepts, and terminology.\u003c/p\u003e355:T81a,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\"Introduction to DevSecOps for Managers\" is being offered at an inflection point in society. It has never been more fundamental in understanding how to not only rapidly deliver software that accomplishes businesses and mission objectives, but to also do so securely. This requires a firm understanding of not only the technology, but the culture and processes as well. The course focuses on providing managers and leaders with the foundational knowledge required to lead digital organizations through their DevSecOps journey and transformation.\u003c/p\u003e\n\u003cp\u003eThis course is designed for any software manager, including those both experienced and new to the field of software development, who is seeking to continuously improve their knowledge. The course was created specifically to serve a wide range of backgrounds, targeting both those with very little prior knowledge of DevSecOps, while also challenging those who have years of experience. No prior technical knowledge is assumed as part of this course, as it is intended to form or improve a foundation for any software leader.\u003c/p\u003e\n\u003cp\u003eThe course starts off by discussing what DevSecOps is and why it is important. It then provides an overview of DevSecOps technologies and principles using a simple-to-follow “Tech like I’m 10” approach. Next, the course covers topics such as value stream management, platform as product, and engineering organization improvement, all driving towards defining Continuous Delivery and explaining why it is so foundational for any organization. The course also focuses on culture, metrics, cybersecurity, and agile contracting.\u003c/p\u003e\n\u003cp\u003eThis course prepares technical program managers for software-intensive jobs and roles. It outlines the fundamentals required in order to successfully transform any software development organization into a digital leader. This course will accelerate your journey as you continue to learn and grow your understanding of modern software delivery and security, as well as the complexities around managing development, security, and operations teams.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"356:T4b2,\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eSummarize the business and mission case for WHY DevSecOps is important for any organization\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eGet a historical perspective on Agile, Customer Discovery, Value Stream Mapping, DevOps, and DevSecOps\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eGet a high level understanding of the technologies and terms required to be a successful manager, such as containers, microservices, kubernetes, service mesh, and many more\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eExplain what a value stream is and why it is important to map\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDiscuss how organizational structures impact organizational outcomes\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDiscuss the importance of treating Platform as a Product\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUnderstand how to lead continuous organizational improvement \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUnderstand continuous delivery, its value, and how to implement within any organization\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDiscuss the importance of and how to lay a foundation of the right culture\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDiscuss the importance of establishing the right metrics\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUnderstand basic principles within cybersecurity\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDiscuss core concepts of Agile Contracting with a specific focus on government contracts\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e357:T9bc,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course takes you through the last nine lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. \u003c/p\u003e\n\u003cp\u003eIn this final course in the professional certificate, you’ll complete your understanding of the design life cycle, and learn about the modern relevance of human-computer interaction. \u003c/p\u003e\n\u003cp\u003eYou’ll begin by learning about evaluation. This is the critical final step of the design life cycle, where we put our prototypes in front of real users (or strong approximations thereof) to get feedback on their quality. You’ll learn about three methods for evaluation: first, qualitative evaluation lets you get direct feedback on the strengths and weaknesses of your interface from real users. Second, quantitative evaluation lets you make strong claims about the effectiveness of your interface or the validity of your theories of interaction. Third, heuristic evaluation lets you inject evaluation much more completely into the design process, persistently putting yourself into the mindset of a user to investigate an interface. \u003c/p\u003e\n\u003cp\u003eThen, you’ll learn how human-computer interaction relates to a modern trend in software development, Agile design. HCI and Agile development have a deep symbiosis in the way they each value rapid feedback. Moreover, modern technologies have allowed high-fidelity prototypes to be developed with the relative ease of low-fidelity prototypes in the past, allowing even better feedback and evaluation to come in throughout the design process. \u003c/p\u003e\n\u003cp\u003eAfter wrapping up your understanding of the design life cycle and its iterative nature, you’ll turn your attention to a deeper dive into the modern state of human-computer interaction. You’ll have the chance to explore cutting-edge research in HCI, from technologies like extended reality to domains like cybersecurity to ideas like gesture-based interaction. HCI is a dynamic and evolving field, and any education it would not be complete without a chance to look at what’s happening today. \u003c/p\u003e\n\u003cp\u003eFinally, you’ll conclude by looking at how far you’ve come and what you could do next. From other MOOCs to graduate degrees in the field, there are enormous possibilities for further studies in HCI. \u003c/p\u003e\n\u003cp\u003eBy the end of this course, you’ll have an understanding of the importance of evaluation in the design life cycle, as well as an understanding of where HCI sits in modern development and research.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"358:T999,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.\u003c/p\u003e\r\n\u003cp\u003eSystems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.\u003c/p\u003e\r\n\u003cp\u003eThe course covers five main areas:\u003c/p\u003e\r\n\u003col\u003e\r\n\u003cli\u003eIntroduction to key concepts in security economics. Here, we provide an overview of how information security is shaped by economic mechanisms, such as misaligned incentives, information asymmetry, and externalities.\u003c/li\u003e\r\n\u003cli\u003eMeasuring cybersecurity. We introduce state of the art security and IT metrics and conceptualize the characteristics of a security metric, its challenges and advantages.\u003c/li\u003e\r\n\u003cli\u003eEconomics of information security investment. We discuss and apply different economic models that help determine the costs and benefits of security investments in network security.\u003c/li\u003e\r\n\u003cli\u003eSecurity market failures. We discuss market failures that may lead to cybersecurity investment levels that are insufficient from society\u0026rsquo;s perspective and other forms of unsafe behaviour in cyber space.\u003c/li\u003e\r\n\u003cli\u003eBehavioural economics for information security, policy and regulation. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment.\u003c/li\u003e\r\n\u003c/ol\u003e\r\n\u003cp\u003eAfter finishing this course, you will be able to apply economic analysis and data analytics to cybersecurity. You will understand the role played by incentives on the adoption and effectiveness of security mechanisms, and on the design of technical, market-based, and regulatory solutions to different security threats.\u003c/p\u003e\r\n\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"359:T7a3,\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003cbr /\u003e\n1. Intro\u003cbr /\u003e\n2. Installing Gaia\u003cbr /\u003e\n3. Running the First Time Wizard.\u003cbr /\u003e\n4. Installing SmartConsole\u003cbr /\u003e\n5. Establish SIC\u003cbr /\u003e\n6. Create \u0026amp; installing Policy\u003cbr /\u003e\n7. Enable application control blade\u003cbr /\u003e\n8. Enable IDA blade\u003cbr /\u003e\n9. Enable HTTPS Inspection\u003cbr /\u003e\n10. Enable Autonomous Threat Prevention\u003cbr /\u003e\n11. Adding License\u003cbr /\u003e\n12. CPUSE SmartConsole\u003cbr /\u003e\n13. Gathering cpinfo\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT, and remote users.\u003c/p\u003e\n\u003cp\u003eCheck Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN, and IOT security to protect you against the most sophisticated cyber-attacks.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e35a:T7a3,\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Mark"])</script><script>self.__next_f.push([1,"et! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003cbr /\u003e\n1. Intro\u003cbr /\u003e\n2. Installing Gaia\u003cbr /\u003e\n3. Running the First Time Wizard.\u003cbr /\u003e\n4. Installing SmartConsole\u003cbr /\u003e\n5. Establish SIC\u003cbr /\u003e\n6. Create \u0026amp; installing Policy\u003cbr /\u003e\n7. Enable application control blade\u003cbr /\u003e\n8. Enable IDA blade\u003cbr /\u003e\n9. Enable HTTPS Inspection\u003cbr /\u003e\n10. Enable Autonomous Threat Prevention\u003cbr /\u003e\n11. Adding License\u003cbr /\u003e\n12. CPUSE SmartConsole\u003cbr /\u003e\n13. Gathering cpinfo\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT, and remote users.\u003c/p\u003e\n\u003cp\u003eCheck Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN, and IOT security to protect you against the most sophisticated cyber-attacks.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e35b:T8b1,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"35c:T60f,\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e35d:T8b1,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"35e:T65a,\u003cp\u003eIn this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLesson 1 - What is Posture Management? \u003cul\u003e\n\u003cli\u003eIn this lesson we will learn what posture management is, why you would need a posture management solution, and how a posture management solution will be used to secure your assets in the cloud.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 2 – What are the Cloud Security Challenges? \u003cul\u003e\n\u003cli\u003eIn this lesson we will look at key cybersecurity challenges that customers face when they move their assets into the cloud and how a posture management solution can help address these challenges.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 3 - What is Check Point CloudGuard Posture Management? \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to discuss the Check Point CloudGuard Posture Management solution and why it is the Global leader in cloud protection.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 4 - How does CloudGuard Posture Management Work? \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to break down how CloudGuard Posture Management works, how it functions and how to get started.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 5 – CloudGuard Posture Management Course Summary \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to summarize the CloudGuard training course\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 6 – Posture Management Demo Lab \u003cul\u003e\n\u003cli\u003eThis final lesson is a demonstration Lab. We are going to go over the CloudGuard Console interface and navigate through the main key topics discussed in the lecture videos.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e35f:T65a,\u003cp\u003eIn this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLesson 1 - What is Posture Management? \u003cul\u003e\n\u003cli\u003eIn this lesson we will learn what posture management is, why you would need a posture management solution, and how a posture m"])</script><script>self.__next_f.push([1,"anagement solution will be used to secure your assets in the cloud.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 2 – What are the Cloud Security Challenges? \u003cul\u003e\n\u003cli\u003eIn this lesson we will look at key cybersecurity challenges that customers face when they move their assets into the cloud and how a posture management solution can help address these challenges.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 3 - What is Check Point CloudGuard Posture Management? \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to discuss the Check Point CloudGuard Posture Management solution and why it is the Global leader in cloud protection.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 4 - How does CloudGuard Posture Management Work? \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to break down how CloudGuard Posture Management works, how it functions and how to get started.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 5 – CloudGuard Posture Management Course Summary \u003cul\u003e\n\u003cli\u003eIn this lesson we are going to summarize the CloudGuard training course\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003eLesson 6 – Posture Management Demo Lab \u003cul\u003e\n\u003cli\u003eThis final lesson is a demonstration Lab. We are going to go over the CloudGuard Console interface and navigate through the main key topics discussed in the lecture videos.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e360:T687,\u003cp\u003eNow is a great time to launch a rewarding career in Information Technology (IT) support - no experience or degree is required to get started. The US Bureau of Labor Statistics forecasts a 9% growth in jobs through 2030, averaging 70,000 openings each year, and a medium salary of $58,000 annually for an entry-level Computer Support Specialist. With over 400,000 US job openings, Computer Tech Support Specialists are in high demand.\u003c/p\u003e \r\n \r\n\u003cp\u003eIn this self-paced, certificate program for beginners, you will learn IT support and build competency in IT fundamentals topics, including hardware, operating systems, software, system administration, programming, databases, networking, cybersecurity, and cloud computing, as well as critical skills covered such as customer service and troubleshooting. Mastery of the"])</script><script>self.__next_f.push([1,"se skills is essential for IT Helpdesk Support and also provides multiple options to grow your career as they are required skills for many technology jobs, including Software Engineer, Data Analyst, and Data Scientist.\u003c/p\u003e\r\n \r\n\u003cp\u003eThis Professional Certificate program from IBM is built by experts to prepare you for an entry-level job in Technical Support. If you can dedicate a few hours per week, you can complete the program in 3 to 6 months. By the end of the program, you will be equipped with job-ready skills employers look for, whether you are just starting out your IT career or changing jobs.\u003c/p\u003e\r\n\r\n\u003cp\u003eWhen you successfully complete the program you’ll receive dual credentials, IBM Digital Badges for each course to help your profile stand out, as well as a Professional Certificate to showcase your job readiness to potential employers.\u003c/p\u003e361:Ta9a,"])</script><script>self.__next_f.push([1,"\u003cp\u003eGartner has forecast that global IT spending is set to surge and the demand for IT project managers is rising sharply! This IBM IT Project Management Professional Certificate gives aspiring IT project managers, project coordinators, IT support specialists, and entry-level IT professionals the in-demand skills employers need to drive successful, business-aligned technology initiatives. No prior experience required.\u003c/p\u003e\r\n\r\n\u003cp\u003eWhat do IT project managers do? IT project managers plan, coordinate, and oversee technology projects, ensuring they meet business goals, stay within budget, and are completed on schedule. They work closely with cross-functional teams to manage resources, assess risks, and address challenges, all while aligning project outcomes with an organization’s strategic objectives.\r\nDuring this program, you’ll gain the essential skills and tools you need to excel as an IT project manager. Starting with the foundational concepts of project management, you’ll learn how to plan, manage, and track projects effectively while mastering key communication and leadership techniques that help ensure project success.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou’ll dive into both traditional and Agile methodologies., You’ll explore adaptive planning, iterative development, and continuous improvement, all of which are vital for delivering value to customers early and often. Additionally, you'll gain a solid understanding of the technical skills needed for IT project management, including key concepts in hardware, operating systems, software, cybersecurity, and cloud computing.\u003c/p\u003e \r\n\r\n\u003cp\u003eThroughout the program, you’ll apply these concepts in real-world scenarios, practicing how to set up projects for success, manage risks, and address challenges that arise during the project lifecycle. You’ll dive into software engineering fundamentals, including the Software Development Lifecycle (SDLC), tools, technologies, and stacks, giving you a comprehensive understanding of the tech landscape.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program also prepares you to gain certification such as the industry-recognized Certified Associate in Project Management (CAPM) exam from PMI. And, as you progress, you'll build hands-on skills, such as creating project timelines, managing resources, and handling client communications.\u003c/p\u003e \r\n\r\n\u003cp\u003eThe program then culminates in a capstone project where you’ll demonstrate your end-to-end knowledge of IT project management, showcasing your ability to manage and lead successful IT projects while ensuring business alignment and positive outcomes.\u003c/p\u003e\r\n\r\n\u003cp\u003eIf you’re keen to kickstart a rewarding IT project management career, ENROLL TODAY and prepare to power up your resume for success!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"362:T977,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAlmost all software is under attack today, and many organizations are unprepared in their defense. This professional certificate program, developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation, is geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, focusing on practical steps that can be taken, even with limited resources to improve information security. The program enables software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired. The best practices covered in the course apply to all software developers, and it includes information especially useful to those who use or develop open source software.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program discusses risks and requirements, design principles, and evaluating code (such as packages) for reuse. It then focuses on key implementation issues: input validation (such as why allowlists and not denylists should be used), processing data securely, calling out to other programs, sending output, cryptography, error handling, and incident response. This is followed by a discussion on various kinds of verification issues, including tests, including security testing and penetration testing, and security tools. It ends with a discussion on deployment and handling vulnerability reports.\u003c/p\u003e \r\n\r\n\u003cp\u003eThe training courses included in this program focus on practical steps that you (as a developer) can take to counter most common kinds of attacks. It does not focus on how to attack systems, how attacks work, or longer-term research.\u003c/p\u003e \r\n\r\n\u003cp\u003eModern software development depends on open source software, with open source now being pervasive in data centers, consumer devices, and services. It is important that those responsible for cybersecurity are able to understand and verify the security of the open source chain of contributors and dependencies. Thanks to the involvement of OpenSSF, a cross-industry collaboration that brings together leaders to improve the security of open source software by building a broader community, targeted initiatives, and best practices, this program provides specific tips on how to use and develop open source securely.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"363:T5c8,\u003cp\u003eElevate your career with our internationally recognised Foundations of Financial Crime Prevention Professional Certificate. This course equips you with a strong understanding of financial crime, including fraud, bribery, corruption, identity theft, and cybercrime. With such knowledge, you'll be prepared to tackle the escalating challenges in the financial crime landscape and make a significant contribution to safeguarding business interests.\u003c/p\u003e\r\n\r\n\u003cp\u003eCreated by the subject matter experts within the International Compliance Association, this certificate program not only teaches you what the financial crime risks are but the ways in which they can be mitigated through effective risk assessments, strategies and policies. You'll further learn how to navigate the complex landscape of financial crime and uphold ethical standards within your organisation.\u003c/p\u003e\r\n\r\n\u003cp\u003eBy completing this course, you're setting the stage for a successful career in a multitude of roles, such as regulatory compliance officer, fraud investigator, anti-money laundering specialist, and risk manager. These roles could be in various sectors, including banking and finance, law, gaming, real estate, and cybersecurity. This course provides the knowledge needed to excel in these roles and advance in your career.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn a world where financial crime can have devastating financial, reputational and social consequences, this course is designed to empower you to make a real difference.\u003c/p\u003e364:T4da,\u003cp\u003eThe Professional Certificate in Software Defined Networking will upskill professionals in cutting-edge technologies such as Software Defined Networking (SDN), Network Function Virtualisation (NFV), and Intent Based Networking, and demonstrate how to apply these skills for network automation in industry.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program provides a roadmap for networking professionals and software developers to upskill in advanced networking and network automation. Learners will engage with a range of tools in SDN and network automation.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe pr"])</script><script>self.__next_f.push([1,"ogram provides work-enabled learning, as the teaching methodology is aligned with research and innovations in SDN/NFV at the Cisco-Curtin Centre for Networks, so you will learn what is required by industry. Learners will have the ability to apply advanced networking skills on practical testbeds.\u003c/p\u003e\r\n\r\n\u003cp\u003eAs this program has been developed in collaboration with Cisco, verified learners will be provided with additional, free access to the following Cisco Network Academy courses:\r\n\u003cul\u003e\r\n\u003cli\u003eNetworking essentials\u003c/li\u003e\r\n\u003cli\u003eCybersecurity essentials\u003c/li\u003e\r\n\u003cli\u003eCCNA: Enterprise Networking, Security, and Automation\u003c/li\u003e\r\n\u003cli\u003eProgramming essentials in Python\u003c/li\u003e\r\n\u003cli\u003eDevNet\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003c/p\u003e365:T8bb,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cem\u003ePlease Note: Learners who successfully complete this IBM course can earn a skill badge —a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!\u003c/em\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eBegin your cloud computing mastery with this easy-to-follow, self-paced course. Gain the essential knowledge needed to understand cloud computing from a business perspective and as a hands-on cloud practitioner.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis course immerses you in the world of notable cloud service providers, including AWS, Google, IBM, and Microsoft. Explore their offered services and examine real-world applications through industry-specific case studies. You'll also dive into cloud adoption and its connection with technologies such as blockchain, analytics, and AI.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eDiscover the diverse cloud service models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)—and deployment models—public, private, and hybrid. You'll grasp the core elements of cloud infrastructure, including VMs, networking, storage types, and CDNs. You’ll learn about emerging trends like Hybrid Multicloud, Microservices, Serverless, DevOps, Cloud Native, and Application Modernization. Learn the basics of cloud security, monitoring, and understand various roles in the cloud industry.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThroughout the course, you’ll hear from subject matter experts who will share their insights into Cloud technology and work as a Cloud Practitioner.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eYou'll gain hands-on experience, having deployed an application on IBM Cloud—a shareable project that makes for an impressive employment portfolio addition!\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eWhether you're an executive, manager, student, or professional seeking familiarity with cloud computing terminology and concepts, or you aim for a solid grounding in cloud computing for a career as a cloud engineer, full stack developer, DevOps engineer, service reliability engineer, or cybersecurity analyst, this course is your starting point.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"366:T4b8,\u003cp\u003eIn total, 51% of organizations are planning to increase security investments as a result of a breach (IBM Report). Companies need skilled IT support and cybersecurity professionals now more than ever. Whether you’re just starting out or switching to tech, this course provides the critical operating systems (OS) knowledge you need to move forward. \u003c/p\u003e\n\u003cp\u003eOS is fundamental to all aspects of computing. In this course, you’ll learn foundational concepts common to all OS and the unique aspects of Windows, Linux, and macOS. \u003c/p\u003e\n\u003cp\u003eYou’ll explore OS file systems and the associated security features. You'll discover the macOS features that revolutionized OS functionality. Moreover, you’ll investigate virtualization and containerization. \u003c/p\u003e\n\u003cp\u003eAdditionally, through labs and a final project, you’ll get hands-on managing virus and threat protection, configuring user accounts and permissions with command-line tools, and securing systems against threats. \u003c/p\u003e\n\u003cp\u003eIf you’re looking to get started in IT or cybersecurity, enroll today to gain essential knowledge in OS that enables you to work toward a career in cybersecurity, system administration, network engineering, or IT support.\u003c/p\u003e367:T711,\u003cp\u003e\u003cem\u003eTech for Good\u003c/em\u003e was developed by UNESCO and Cetic.br/NIC.br, the Brazilian Network Information Center’s Regional Center for Studies on the Development of the Information Society. It brings together thought leaders and changemakers in the fields of information and communication technologies (ICT) and sustainable development to show how \u003cstrong\u003edigital technologies are empowering billions of people around the world\u003c/strong\u003e by providing access to education, healthcare, banking, and government services; and how “big data” is being used to inform smarter, evidence-based policies to improve people’s lives in fundamental ways. \u003c/p\u003e\n\u003cp\u003eIt also addresses the \u003cstrong\u003enew challenges that technology can introduce\u003c/strong\u003e , such as privacy, data management, risks to cybersecurity, e-waste, and the wideni"])</script><script>self.__next_f.push([1,"ng of social divides. Ultimately, \u003cem\u003eTech for Good\u003c/em\u003e looks at the ways in which stakeholders are coming together to answer big questions about what our future will look like in a hyper-digitized world. \u003c/p\u003e\n\u003cp\u003eThis course is for: \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eTechnology specialists\u003c/strong\u003e who want to understand more about how ICT is being used to improve people’s lives around the world.\u003cbr /\u003e\n\u003cstrong\u003eSustainable development practitioners\u003c/strong\u003e who need to understand the opportunities and limitations of technology in a development context.\u003cbr /\u003e\n\u003cstrong\u003eAdvanced undergraduates and graduate students\u003c/strong\u003e interested in the key concepts and practices of this exciting and ever-changing field. \u003c/p\u003e\n\u003cp\u003ePlease note that the course is free to audit, but there is a fee if you choose to pursue a Verified Certificate. \u003ca href=\"https://support.edx.org/hc/en-us/articles/215167857-Does-edX-offer-financial-assistance-How-do-I-apply-\"\u003eFinancial assistance\u003c/a\u003e is available through edX.\u003c/p\u003e368:T521,\u003cp\u003eThe US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part of the team that keeps networks secure.\u003c/p\u003e\n\u003cp\u003eThis course provides practical hands-on computer networking and network security experience that employers want. Through innovative hands-on labs, you’ll learn how to secure a small home office network (SOHO), install and configure DHCP, and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system.\u003c/p\u003e\n\u003cp\u003eAdditionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routing. You’ll learn about layer 2 and 3 addressing, routers, and routing tables.\u003c/p\u003e\n\u003cp\u003ePlus, you’ll develop knowledge of cybersecurity analyst tools for data protection, endpoint protection, and Security information and event management (SIEM), which you can apply to an organization’s compliance and threat intelligence needs, which is cruci"])</script><script>self.__next_f.push([1,"al in today’s cybersecurity landscape.\u003c/p\u003e\n\u003cp\u003eYou’ll complete a final project where you will demonstrate your ability to perform network and security planning tasks.\u003c/p\u003e\n\u003cp\u003eNetworking and network security skills pay. Invest in yourself and enroll today!\u003c/p\u003e369:T671,\u003cp\u003eWith 25 million more project professionals being needed globally by 2030 (Project Management Institute), the demand for talented individuals with good underpinning IT knowledge is exploding. This Information Technology (IT) Fundamentals course is designed specifically for non-technical professionals who want to collaborate effectively with IT teams and make informed decisions. \u003c/p\u003e\n\u003cp\u003eIn this course, you'll learn the essentials of hardware, operating systems, and the foundational concepts of software, programming, and databases. You’ll explore how different types of hardware function, from printers to display devices, and how operating systems manage files and folders. Plus, you’ll discover the basics of software applications, web browsers, programming languages, and how databases store and manipulate data. \u003c/p\u003e\n\u003cp\u003eYou'll also gain an understanding of networking, including network topologies, cables, and how to manage network settings. You’ll learn about storage solutions, from local devices to hosted systems. Plus, you’ll be introduced to cybersecurity fundamentals, covering key concepts like data integrity, threat management, and safe browsing practices. \u003c/p\u003e\n\u003cp\u003eAs you learn, you’ll work on hands-on labs that enable you to apply your new skills in a practical setting. And you’ll test your knowledge with a comprehensive assessment and gain insights into troubleshooting and ticketing systems for IT support. \u003c/p\u003e\n\u003cp\u003eIf you’re a project-oriented professional looking to build a strong, non-technical understanding of IT for your job, ENROLL TODAY and build the job-ready IT skills you need in just 6 weeks.\u003c/p\u003e36a:T6c6,\u003cp\u003e¿Has oído hablar de los ataques que reciben las grandes compañías o los bancos a través de sus sistemas informá"])</script><script>self.__next_f.push([1,"ticos? ¿Sabes detectar un archivo infectado por un virus? O ¿conoces medidas de seguridad para proteger un equipo o una red de ciber-ataques?\u003c/p\u003e\n\u003cp\u003eDe acuerdo con una investigación de Cybersecurity Workforce Study (2018), existe un déficit de más de cien mil profesionales con competencias para proteger los sistemas informáticos de instituciones públicas y privadas en América Latina y el Caribe, y se tiene previsto que este siga en aumento.\u003c/p\u003e\n\u003cp\u003eEste curso ofrecido por la Universidad Carlos III de Madrid y el Banco Interamericano de Desarrollo (BID), presenta una introducción a la ciberseguridad desde diferentes aspectos de esta disciplina.\u003c/p\u003e\n\u003cp\u003eAprenderás cuáles son las principales amenazas de seguridad cibernética existentes y cómo protegerte contra ellas desde un enfoque práctico, en el que se proporciona el material necesario para comprender mejor los ataques y establecer contramedidas apropiadas.\u003c/p\u003e\n\u003cp\u003eImpartido por instructores con años de experiencia en el campo de la seguridad informática, este curso allanará el camino hacia el área de seguridad de las profesiones relacionadas con tecnologías de la información (TI).\u003c/p\u003e\n\u003cp\u003eLos estudiantes que obtengan el certificado en este curso también recibirán una insignia digital. Las insignias digitales te permiten compartir fácilmente, y de forma más confiable, las habilidades o el conocimiento adquirido.\u003c/p\u003e\n\u003cp\u003ePara más informaciones sobre las insignias digitales, visitar el sitio \u003ca href=\"https://cursos.iadb.org/es/indes/credenciales-digitales\"\u003ehttps://cursos.iadb.org/es/indes/credenciales-digitales\u003c/a\u003e.\u003c/p\u003e36b:Tc4f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course will teach you how to digitalize the 'conventional' grid and which digital technologies you can use for this, including but not limited to, AI, machine learning, blockchain and computer simulations.\u003c/p\u003e\n\u003cp\u003eEven though the power grid has been the main driver of the rapid advancement of technology in the past decades, the engineering of the grid is outdated by today's standards. Equipment is still hardwired and analogue, there is limited data acquisition, and many control actions are performed manually. Subsequently, it becomes harder to ensure similar system quality and efficient operations when more renewables are added to the grid. The next big leap, therefore, is to revamp and digitalize the energy system. \u003cbr /\u003e\nWe invited five prominent industry leaders to share industry perspectives, case studies and applications of digitalization in the fields of Grid Operations, Electric Power Systems, Power Distribution, Electrical Systems, Control Systems and Cybersecurity, but also in Consultancy and Software Development. Our guest speakers are: Philip Gladek (CEO of Spectral), Bas Kruimer (Business Director Digital Grid Operations at DNV), Martin Wevers (Grid Planner at TenneT), Evelyn Heylen (Head of research at Centrica) and Antoine Marot (Lead AI Scientist at RTE). \u003cbr /\u003e\nYou will also get hands-on experience through solving an optimal scheduling problem, noting the differences between different numerical simulation methods and applying machine learning to predict system overloads.\u003c/p\u003e\n\u003cp\u003eThis course is aimed at professionals in the energy industry who want to broaden their perspective and discover alternative approaches to energy integration in an intelligent way such as:\u003cbr /\u003e\n- grid operators, electrical systems managers, control systems managers, power engineers\u003cbr /\u003e\n- cybersecurity consultants, software developers, artificial intelligence managers/ scientists, energy consultants\u003cbr /\u003e\n- project managers, planners, policy makers etc.\u003cbr /\u003e\nAny other enthusiasts with the desire to learn more about current practices of the power grid, novel digital technologies and trends to deploy them can also enrol in this course.\u003c/p\u003e\n\u003cp\u003e\u003cem\u003e\"At DNV, our vision is to be a trusted voice to tackle global transformations. The energy transition is vital to decelerate climate change. Integrating energy systems in an intelligent way is a critical skill for the engineers, project managers, planners, policymakers, and scientists of the future.\u003c/em\u003e\u003cbr /\u003e\n\u003cem\u003eThe course “Digitalization of intelligent and integrated energy systems” comes at the right time to tackle the challenges and complexity of today’s energy systems. It provides you with a powerful framework to digitalize energy systems by using AI, machine learning, simulations, digital twins and sheds light on cyber security matters. It helps you to integrate electric cars, heat, gas and electricity into the energy system. I would highly recommend this innovative course to everyone who is interested in the digital transformation of the energy system.\"\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eBas Kruimer, Business Director Digital Grid Operations, Energy Systems, DNV\u003c/p\u003e"])</script><script>self.__next_f.push([1,"36c:T659,\u003cp\u003e\u003cspan lang=\"EN-SG\"\u003eThe New Space sector is a fast-growing market, boosting the historical institutional space exploration economy. The roughly 366 billion USD global space industry in 2019 is estimated to surge to over $1 trillion by 2040. The current growth in the development of space infrastructures and production of data from space is opening a full range of new applications for new customers. New business models for space encompass launchers, satellite manufacturers, in-orbit servicing, telecommunication, cybersecurity, earth observation analytics, and many more.\u003c/span\u003e\u003cspan lang=\"EN-SG\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eSpace4Impact, eSpace, E2MC and Space Innovation joined forces to launch this online course on New Space Economy. The course contains more than 30 videos from space experts from various space domains, including professors, scientists, representatives of public institutions and international organizations, entrepreneurs, and investors.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eJoin the new space boom. Whether you are an entrepreneur, student or career jumper, this course gives you a detailed overview of the new space economy. \u003cspan lang=\"EN-SG\"\u003eYou will learn about current and future space infrastructures that enable various applications, such as telecommunication, broadcasting, geolocation, Earth Observation or in space manufacturing. You will learn how space data can enable new products and services to final customers on Earth. Last but not least, you will learn about how space can make Earth more sustainable and how to make sure to keep space sustainable in return.\u003c/span\u003e\u003c/p\u003e36d:T74e,\u003cp\u003eFinTech has started a global revolution in the financial services industry, and the transformation will only increase in coming years. There are many ways in which FinTech can improve the lives of people around the world; however, those same technologies can also be used to enslave, coerce, track, and control people. Accordingly, it is appropriate and necessary to consider the implications of the in"])</script><script>self.__next_f.push([1,"troduction of these technologies so that they are utilized properly, regulated sufficiently, and their adoption does not come at the expense of societal growth. \u003c/p\u003e\n\u003cp\u003eThis 6-week online coursecovers 6 modules, representing the full spectrum of finance, technology, and the introduction of FinTech solutions globally. We will ask questions that are not often asked or addressed when new technologies are adopted. Why should we adopt FinTech solutions, and what are the best ways to introduce disruptive technologies? How does blockchain technology change the way we provide financial services, and how should blockchain technology be governed? Is FinTech creating risks in cybersecurity and how can technology help us prevent financial crimes? As Artificial Intelligence (AI) is developed and adopted, will human biases and prejudices be built into such mechanisms? And at a larger scope, should FinTech lead to a decentralized, democratized system of finance, or will existing institutions adopt FinTech strategies to cement their existing hold on the financial markets? \u003c/p\u003e\n\u003cp\u003eThrough discussing and attempting to answer these questions, you will understand better how the introduction of these technologies can benefit or harm society. And through considering the proper application or introduction of such technologies, you will learn to make better decisions as an individual and organization when facing the question: is FinTech our savior or a villain?\u003c/p\u003e36e:T7c0,\u003cp\u003eMany of the most pressing challenges we are experiencing today are global. Consider climate change, supply chains, or cybersecurity for example – these challenges, like many others, don’t stop or start at the borders of any particular country.\u003c/p\u003e\n\u003cp\u003eDealing with global challenges such as these is often complicated and involves a great number of different actors and approaches – we use the concept of global governance to describe the collective activities taking place to manage these challenges. \u003c/p\u003e\n\u003cp\u003eWhile the concept of global governance can be difficult "])</script><script>self.__next_f.push([1,"to grasp due to the plurality of actors and processes involved, this MOOC will help you gain a full understanding of this phenomenon as well as see how it works in practice. \u003c/p\u003e\n\u003cp\u003eThroughout the MOOC, you will uncover the key actors engaged in global governance from national governments and regional organizations like the European Union to private actors such as businesses and citizens. \u003c/p\u003e\n\u003cp\u003eAlong the way, you will also learn how approaches to global governance have shifted in recent years as traditional, international law models have given way to a variety of bottom-up and informal processes. \u003c/p\u003e\n\u003cp\u003eThen you will see how these concepts and ideas apply in real governance contexts such as the governance of global pandemics, sustainable trade, outer space, and human rights. \u003c/p\u003e\n\u003cp\u003eFinally, you will also learn how global governance is analyzed and theorized, exploring the distinction between “hard” and “soft” law or the concepts of regime architecture and complexity.\u003c/p\u003e\n\u003cp\u003eWhether you are interested in understanding or solving global problems as a policymaker, a business entrepreneur, or a citizen – this MOOC will provide the necessary foundation for understanding, analyzing and identifying how global governance shapes the world.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFunded by the Horizon 2020 Framework Programme of the European Union.\u003c/strong\u003e \u003cstrong\u003eGrant agreement number 822654.\u003c/strong\u003e\u003c/p\u003e36f:T409,\u003cul\u003e\n\u003cli\u003eLearn what ‘global governance’ means, and how it tackles global challenges and pursues a global agenda, such as the Sustainable Development Goals\u003c/li\u003e\n\u003cli\u003eDiscover the key actors engaged in global governance, including formal and informal intergovernmental international organizations, regional organizations, businesses, citizens and multistakeholder initiatives\u003c/li\u003e\n\u003cli\u003eBecome acquainted with various tools and approaches of global governance, including hard and soft law, regulatory standards, and voluntary commitments\u003c/li\u003e\n\u003cli\u003eUnderstand how global governance is evolving as international organizations face ne"])</script><script>self.__next_f.push([1,"w challenges and informal international lawmaking becomes commonplace \u003c/li\u003e\n\u003cli\u003eGain insight into how global governance works in practice with a specific focus on global health crises such as Covid-19, sustainable development, space governance and other governance challenges\u003c/li\u003e\n\u003cli\u003eLearn how to analyze and assess global governance through key theoretical concepts such as regime complexity\u003c/li\u003e\n\u003c/ul\u003e370:T988,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 1 - Program introduction\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 2 – Introduction to Workload protection and application security\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 1: Introduction to cybersecurity in the cloud\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 2: Security challenges of cloud workloads\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 3: CloudGuard Workload Protection\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 3 - CloudGuard Workload Protection - Container Security\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 1: Recap\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 2: Runtime Protection\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 3: Image Assurance\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 4: Admission Control\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 5: Threat Intelligence\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 6: Posture Management\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 7: Deployment\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 8: Deployment troubleshooting\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 4 - Shifting protection to the left with CloudGuard ShiftLeft\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 1: Introduction to shifting security to the left\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 2: Deployment\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 5 – CloudGuard Workload protection - Serverless Security\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 1: Serverless security\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 2: CloudGuard Serverless Security for AWS Lambda\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 3: Deployment\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 6 – CloudGuard Application Security and API Protection\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 1: Introduction to application security and API protection\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 2: The CloudGuard AppSec solution\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 3: Architecture and deployment considerations\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 4: Deployment process\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 5: Deployment\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 6: Setting up API protection\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLesson 7: Data and customization of AppSec policy\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eChapter 7 – Program summary\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eCheck Point CloudGuard provides unified cloud native security for all your assets and workloads, giving you the confidence to automate security, prevent threats, and manage posture – everywhere – across your multi-cloud environment.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"371:T4cf,\u003cp\u003eSame as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels.\u003c/p\u003e\n\u003cp\u003eIn this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.\u003c/p\u003e372:T888,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn an era where cyber threats are becoming increasingly sophisticated and pervasive, traditional security models that rely on perimeter defenses are no longer adequate to protect sensitive data and critical systems. This e-lesson on \u003cstrong\u003eZero Trust Architecture (ZTA)\u003c/strong\u003e offers a comprehensive exploration of the Zero Trust security model, which fundamentally shifts the approach to cybersecurity by adopting the principle of \"never trust, always verify.\"\u003c/p\u003e\n\u003cp\u003eThroughout this course, participants will delve into the core concepts of Zero Trust, beginning with an understanding of its foundational philosophy. The course will explain why organizations must assume that threats can originate from both outside and inside their networks, necessitating a more rigorous approach to security. Learners will explore the importance of identity verification, where every user and device must be authenticated and authorized before gaining access to resources, regardless of their location.\u003c/p\u003e\n\u003cp\u003eKey components of a Zero Trust framework will be examined in detail, including micro-segmentation, which involves dividing the network into smaller, isolated segments to limit lateral movement by potential attackers. Participants will also learn about secure access controls, which enforce the principle of least privilege, ensuring that users have only the access necessary to perform their job functions.\u003c/p\u003e\n\u003cp\u003eThe course will highlight the integration of advanced technologies that support Zero Trust initiatives, such as multi-factor authentication (MFA), threat intelligence, and continuous monitoring. Participants will gain insights into how these technologies work together to create a dynamic security environment that adapts to emerging threats in real-time.\u003c/p\u003e\n\u003cp\u003eBy the end of this e-lesson, learners will be equipped with a robust understanding of Zero Trust Architecture and its critical role in modern cybersecurity strategies. They will leave with actionable insights and tools to help them advocate for and implement Zero Trust principles within their organizations, ultimately enhancing their security posture and resilience against evolving cyber threats.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"373:Tb87,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHow are you thriving or surviving in your remote work environment?\u003c/p\u003e\n\u003cp\u003eRemote working has long been an option for many organizations and employees. However, with the COVID-19 pandemic, many more organizations were forced to rapidly shift to remote work. While there are many benefits of remote working, including reduced commute, greater employee flexibility, increased productivity, lower operational costs, and a larger pool of global job applicants, virtual work can introduce new challenges. Employees and companies alike have learned to temporarily survive in a remote work environment; but, remote work is here to stay and will likely be a permanent fixture that transforms many organizations in one form or another. Everyone will need to develop the skills, competencies, tools, and mindsets to thrive in the remote environment.\u003c/p\u003e\n\u003cp\u003eRemote work affects an entire organization. For individual contributors, it means having to learn to collaborate effectively with colleagues you rarely see in person. For managers, it means knowing how to lead fully remote teams, developing ways to keep your teams motivated, connected, and productive. For leaders, shifting to remote-work solutions means rapidly advancing your digital footprint, using cloud storage, considering cybersecurity risks, and deploying new tools to increase productivity among your workforce.\u003c/p\u003e\n\u003cp\u003eIn Remote Work Revolution for Everyone, you will learn to excel in the virtual-work landscape. Using the Harvard Business School case method of real-world examples, Professor Tsedal Neeley will not only provide actionable recommendations but also explain the theories and concepts behind them. You will learn how to build trust, increase productivity, use digital tools intelligently, and remain fully aligned with your remote team. By the end of the course, you will create actionable steps to “relaunch” your team—focusing on new ways to stay connected, be collaborative, and remain productive—while meeting your own personal and organizational goals.\u003c/p\u003e\n\u003cp\u003eRemote Work Revolution for Everyone will teach you best practices for working remotely. This course is based on Professor Neeley’s book— \u003cem\u003eThe Remote Work Revolution: Succeeding from Anywhere\u003c/em\u003e. Praise for the book includes:\u003c/p\u003e\n\u003cp\u003e\u003cem\u003e\"Neeley draws on her nearly 2 decades of research to answer the critical questions regarding how we best build productive and enjoyable virtual routines into our post-COVID-19 professional lives. Few of us are going back to the way we worked. Read her book and begin to prepare for the other side of this pandemic now.\" - Larry Culp, CEO of GE\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003e\"I often talk about the importance of trust when it comes to work: the trust of your employees, and building trust with your customers. This book provides a blueprint for how to build and maintain that trust and connection in a digital environment.\" - Eric S. Yuan, Founder \u0026amp; CEO, Zoom\u003c/em\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"374:T45b,\u003cp\u003eQuantum computing is expected to impact all industries, ranging from cybersecurity to medicine. It provides a promise to solve many problems faster and more efficiently than classical computers. This course will introduce you to the core concepts related to quantum computing and give you an opportunity to explore IBM Q Experience Visual Composer. This graphical quantum programming tool lets you build quantum circuits and run them on real quantum hardware or simulators.\u003c/p\u003e\n\u003cp\u003eGeared towards anyone new to the field of quantum computing, this course is intended for a large audience, ranging from high school students to working professionals who do not have prior knowledge about quantum computing or those wishing to strengthen their foundational knowledge.\u003c/p\u003e\n\u003cp\u003eThis course discusses the basics of quantum computing. You will gain an understanding of the technology landscape—the present state and the future potential of quantum computing. You will also learn how to create quantum circuits for various quantum algorithms and be able to interact with quantum hardware using IBM Q Visual Composer.\u003c/p\u003e375:T7fc,\u003cp\u003eThe Arctic: a region of frigid waters, tundra, and prolonged periods of light and darkness. While it may seem desolate, the Circumpolar North holds a wealth of resources and opportunities for nations and the Indigenous peoples who live there. Many challenges also exist, including shipping management, oil and gas production, mining activities, fisheries management, protection of threatened species, and significant defense-related difficulties, all within the context of dramatic climate change. This online course will provide a baseline understanding of security circumstances and management, as well as the variety of actors involved.\u003c/p\u003e\n\u003cp\u003eArctic Security Fundamentals also explores the security situation of the Arctic through a focus on the key stakeholders responsible for diplomacy and defense. Although the post-Cold War Circumpolar North has remained mostly stable, rapid changes in climate and tech"])</script><script>self.__next_f.push([1,"nology have created new conditions requiring increased attention and management.\u003c/p\u003e\n\u003cp\u003eCourse participants will learn about the complex landscape of international norms and processes governing security in the Circumpolar North, as well as the balance of diplomacy and defense that nations employ to manage priority interests. Students will explore how the three realms of international relations—cooperation, competition, and conflict—interact in this unique environment.\u003c/p\u003e\n\u003cp\u003eThis course is for:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eSecurity specialists interested in learning more about the Circumpolar North\u003c/li\u003e\n\u003cli\u003eMembers of defense-related institutes and organizations who want to know more about international security and/or the Arctic\u003c/li\u003e\n\u003cli\u003eProfessionals in industries that rely upon Arctic resources and knowledge\u003c/li\u003e\n\u003cli\u003eUndergraduate and graduate students who hope to specialize in regional studies\u003c/li\u003e\n\u003cli\u003eThose interested in emergency management as it applies to arctic contexts, and anyone interested in security contexts generally including cybersecurity, regional security, homeland security, and human security.\u003c/li\u003e\n\u003c/ul\u003e376:T9a7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eUrban planners, policy makers and managers have an important role in making cities and communities more sustainable and resilient by incentivizing and developing smart solutions. Medellín in Colombia is a good example of how effective governance and cooperation with citizens led to the remake of the city and transformed it to a safer environment with a thriving economy. But how can those initiatives be sustained and governed? How can we deal with the challenges along the way, like effective stakeholders’ engagement, conflicting interests, decision-making under deep uncertainty, interdependent problems, spatial justice, and the transformation towards a digital society? To sum it up: building smart sustainable cities initiatives requires a strong governance capacity and new approaches!\u003c/p\u003e\n\u003cp\u003eThis course will:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eprovide the principles for incentivising, planning, developing and managing sustainable smart city initiatives\u003c/li\u003e\n\u003cli\u003epresent an overview of the drivers and barriers for SSC development\u003c/li\u003e\n\u003cli\u003epresent sustainability challenges and tools for SSC development\u003c/li\u003e\n\u003cli\u003eshow practical recommendations to strengthen SSC governance capacity\u003c/li\u003e\n\u003cli\u003eintroduce a smart city governance roadmap\u003c/li\u003e\n\u003cli\u003eexplain the conditions for effective stakeholder engagement and ways to organize co-creation pathways\u003c/li\u003e\n\u003cli\u003eclarify the regulatory and legal framework for SSC including privacy and cybersecurity issues\u003c/li\u003e\n\u003cli\u003edescribe the conditions to implement digital innovation that benefit citizens including data governance\u003c/li\u003e\n\u003cli\u003eshow the importance of close monitoring and assessing SSC projects including data reliability and algorithms\u003c/li\u003e\n\u003cli\u003eequip you with knowledge and learnings from case studies from various projects that were carried out in Lain America, next to familiarizing you with common challenges that arise in the process. These cases range from urban transportation to participatory budgeting, safety and waste management applications, but always making the connection with the governance and sustainability aspects.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe course will be moderated in English, Spanish and Portuguese.\u003c/p\u003e\n\u003cp\u003eThis MOOC is a spin-off of the EU-funded Cap4City project. This course has been developed, and will be delivered by experts in the field of Smart Sustainable Cities from twelve different universities in Latin America and Europe. You will find more information on the instructors while you navigate the course.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"377:T806,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.\u003c/p\u003e\n\u003cp\u003eWith remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.\u003c/p\u003e\n\u003cp\u003eCheck Point Harmony is the industry’s first unified security solution for users' devices and access.\u003cbr /\u003e\nIt protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.\u003c/p\u003e\n\u003cp\u003eThe course modules are:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eIntroduction\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-the Flow\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-Accessing the Endpoint Server\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Windows\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Linux\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Visibility\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Change Policy\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Upgrade\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Remove a client\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCommunication\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eCommunication-Port, Services, and URLs\u003c/li\u003e\n\u003cli\u003eExclusions\u003c/li\u003e\n\u003cli\u003eSummary\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"378:T564,\u003cp\u003eHarmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.\u003c/p\u003e\n\u003cp\u003eWith remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.\u003c/p\u003e\n\u003cp\u003eCheck Point Harmony is the industry’s first unified security solution for users' devices and access.\u003cbr /\u003e\nIt protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.\u003c/p\u003e\n\u003cp\u003eThe course modules are:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eIntroduction\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-the Flow\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-Accessing the Endpoint Server\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Windows\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Linux\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Visibility\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Change Policy\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Upgrade\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Remove a client\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCommunication\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eCommunication-Port, Services, and URLs\u003c/li\u003e\n\u003cli\u003eExclusions\u003c/li\u003e\n\u003cli\u003eSummary\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003c/ol\u003e379:Tcaa,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eThis course will soon be retired. Last day to enroll is 12/31/2022 at 00:00 UTC.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThis is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/information-security-introduction-to-information-security\"\u003eInformation Security - Introduction to Information Security\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/information-security-authentication-and-access-control\"\u003eInformation Security - Authentication and Access Control\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/information-security-advanced-topics\"\u003eInformation Security - Advanced Topics\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/network-security-introduction-to-network-security\"\u003eNetwork Security - Introduction to Network Security\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/network-security-protocols\"\u003eNetwork Security - Protocols\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/network-security-advanced-topics\"\u003eNetwork Security - Advanced Topics\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/penetration-testing-discovering-vulnerabilities\"\u003ePenetration Testing - Discovering Vulnerabilities\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/penetration-testing-exploitation\"\u003ePenetration Testing - Exploitation\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/penetration-testing-post-exploitation\"\u003ePenetration Testing - Post Exploitation\u003c/a\u003e\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eThese topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.\u003c/p\u003e\n\u003cp\u003eThis is a self-paced course that provides a continuation of network security topics. Among the topics covered are cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security, and Wireless Security. The material is essential in later classes that will develop ethical hacking skills. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing techniques today. Next, we take what we learned about cryptography and apply it as a tool against attackers. Specifically, we'll discuss IP Security, TLS/SSL, and its use in Virtual Private Networks. We follow up with coverage of Layer 2 security and vulnerabilities, such as MAC attacks, VLAN hopping attacks, DHCP attacks, ARP attacks, spoofing attacks, and attacks on other protocols. We'll also go over common countermeasures to these attacks. We conclude the course with an overview of how WiFi works, basic terminology and architecture, and how wireless networks are secured.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eIndustry Certification Preparation\u003c/strong\u003e\u003cbr /\u003e\nThis program covers much of the material that is assessed on the \u003ca href=\"https://www.comptia.org/certifications/security\"\u003eCompTIA’s Security+ certification exam\u003c/a\u003e. Upon program completion, verified track learners will receive a 36% discount code for the CompTIA Security+ exam.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"37a:T818,"])</script><script>self.__next_f.push([1,"\u003col\u003e\n\u003cli\u003eDefine and apply a substitution cipher\u003c/li\u003e\n\u003cli\u003eDefine cryptanalysis\u003c/li\u003e\n\u003cli\u003eExplain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.\u003c/li\u003e\n\u003cli\u003eDescribe at least two strategies for breaking an encryption scheme\u003c/li\u003e\n\u003cli\u003eIdentify the differences between public key encryption, symmetric key encryption, and hashing\u003c/li\u003e\n\u003cli\u003eList and summarize the characteristics of good ciphers\u003c/li\u003e\n\u003cli\u003eDescribe the vulnerabilities of stream ciphers\u003c/li\u003e\n\u003cli\u003eDefine AES and explain why it is recommended over 3DES\u003c/li\u003e\n\u003cli\u003eDefine cipher block chaining\u003c/li\u003e\n\u003cli\u003eList the steps in creating an RSA public/private key pair\u003c/li\u003e\n\u003cli\u003eExplain why RSA is secure\u003c/li\u003e\n\u003cli\u003eDefine message integrity and explain how it is ensured\u003c/li\u003e\n\u003cli\u003eDefine IPSec and list its services\u003c/li\u003e\n\u003cli\u003eDefine authentication header and ESP\u003c/li\u003e\n\u003cli\u003eExplain the primary goal of IKE and describe its sub-protocols\u003c/li\u003e\n\u003cli\u003eSummarize the five steps of IPSec Operation\u003c/li\u003e\n\u003cli\u003eSummarize the history of SSL\u003c/li\u003e\n\u003cli\u003eExplain how closure alerts can prevent a truncation attack\u003c/li\u003e\n\u003cli\u003eIdentify the protocols that make up the SSL architecture\u003c/li\u003e\n\u003cli\u003eDescribe how SSL/TLS provides protected channels\u003c/li\u003e\n\u003cli\u003eState the differences between IPSec and SSL VPN connections\u003c/li\u003e\n\u003cli\u003eExplain why it's important to consider Layer 2 security\u003c/li\u003e\n\u003cli\u003eDefine common Layer 2 attacks\u003c/li\u003e\n\u003cli\u003eIdentify tools used in Layer 2 attacks\u003c/li\u003e\n\u003cli\u003eDescribe countermeasures to Layer 2 attacks and security best practices to prevent attacks\u003c/li\u003e\n\u003cli\u003eExplain the differences between the 2.4GHz and 5GHz spectrums\u003c/li\u003e\n\u003cli\u003eProvide definitions of basic wireless terms\u003c/li\u003e\n\u003cli\u003eExplain how 802.11ac differs from earlier 802.11 standards\u003c/li\u003e\n\u003cli\u003eIdentify and define the types of 802.11 frames\u003c/li\u003e\n\u003cli\u003eList and define the states of 802.11 sessions\u003c/li\u003e\n\u003cli\u003eList the steps in establishing an 802.11 session\u003c/li\u003e\n\u003cli\u003eSummarize the existing wireless security protocols and state which protocols should not be used\u003c/li\u003e\n\u003cli\u003eSummarize WPA, WPA Enterprise, and generalized WiFi attacks\u003c/li\u003e\n\u003c/ol\u003e"])</script><script>self.__next_f.push([1,"37b:T41d,The fundamental guidelines and heuristics of user interface design to inform the creation of strong user interfaces, from major principles like discoverability and affordances to frameworks like distributed cognition and task analysis.,The stages of the design life cycle, including needfinding and requirements gathering; individual and group brainstorming; low- to high-fidelity prototyping; and qualitative, quantitative, and heuristic evaluation of human-computer interfaces.,The power of human-computer interaction in the modern world and the role it can play in promoting equity, accessibility, and progress.,The application of modern development frameworks and theories like the Agile Method, Universal Design, Activity Theory, and Value-Sensitive Design to the creation of computational interfaces.,The state of the art in HCI, including emerging technologies like virtual reality, augmented reality, and wearable devices; new ideas like context-sensitive interfaces and social computing; and application areas like healthcare and cybersecurity.37c:Ta88,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLearn the fundamentals of Human Computer Interaction in this four-course certificate.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis course begins with an introduction to the field of Human-Computer Interaction as a whole and where it sits in the context of related and similar fields like Human Factors Engineering and User Experience Design. Here, you’ll learn just enough of the history of HCI to get started having real conversations about the field.\u003c/p\u003e\r\n\r\n\u003cp\u003eThen, you’ll learn the fundamental design principles of human-computer interaction. You’ll start with the fundamental feedback cycle that underlies all interactions between users and interfaces. With that in mind, you’ll then learn the design principles developed by visionaries in the field like Don Norman, Jakob Nielsen, Larry Constantine, and Lucy Lockwood. From there, you’ll move into more advanced theories of HCI, including situated action and distributed cognition, then conclude by looking at how interface design can impact social change.\u003c/p\u003e\r\n\r\n\u003cp\u003eAfter you’ve learned the fundamental principles and theories of HCI, you’ll move onto the design life cycle. The design life cycle covers how you iteratively gather requirements, brainstorm alternatives, prototype interfaces, and gather user feedback quickly to make fast progress in designing and improving user interfaces. You’ll cover the basics of how to develop a good survey, conduct an informative interview, and control for bias throughout your needfinding processes. You’ll then learn about running effective brainstorming sessions, and then prototyping at the just-right level of fidelity for your current confidence in your designs. Finally, you’ll learn how to evaluate those prototypes with real users, gathering their feedback for a new run through the design life cycle.\u003c/p\u003e\r\n\r\n\u003cp\u003eAfter that, we’ll briefly look at the current state of human-computer interaction, focusing on three areas: technologies like virtual and augmented reality, ideas like gesture- or touch-based interaction, and application areas like healthcare and security. In this exploration, we’ll rely heavily on cutting-edge papers and publications from the ever-changing field of HCI.\u003c/p\u003e\r\n\r\n\u003cp\u003eThen finally, we’ll recap the entire course contents, and tell you what to do next to further your HCI education: whether it’s pursuing a Master’s or PhD in the field, taking follow-up MOOCs, or beginning your own HCI research career.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe material in this course is borrowed from Georgia Tech’s CS6750: Human-Computer Interaction, part of its online Master of Science in Computer Science program. You’ll watch the exact same lectures as students in the for-credit program.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"37d:T83a,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eThis course will soon be retired. Last day to enroll is 9/9/2024\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDiscover the power of business blockchains and distributed ledger technologies with an overview of Hyperledger andits key frameworks. All over the global market there are ledgers that organizations and individuals alike must trust. Blockchain technologies record promises, trades, transactions or simply items we never want to disappear, allowing everyone in an ecosystem to keep a copy of the common system of record.\u003c/p\u003e\n\u003cp\u003eThis introductory course is carefully curated for nontechnical, business-oriented audiences. It examines blockchains for the enterprise and a number of pertinent use cases from the Hyperledger Foundation, a global cross-industry community of communities hosted by The Linux Foundation and advancing business blockchain technologies. The Hyperledger Foundation is incubating and promoting enterprise grade, open source business blockchain software, on top of which anyone can set up apps to meet cross-industry needs.\u003c/p\u003e\n\u003cp\u003eThe course covers key features of blockchain technologies and the differentiators between various types of Hyperledger projects. We'll start with ‘what is blockchain’ and open the discussion to identifying suitable blockchain use cases for your business requirements. We will then take a deeper dive into the enterprise-ready Hyperledger blockchain technologies.\u003c/p\u003e\n\u003cp\u003eStudents will gain an understanding of how blockchains work and how they can create value for their business through cost-savings and efficiencies, in terms of speed and simplicity. They will view how information is generated, stored, and shared in various blockchains, as well as gain tools to evaluate whether or not a blockchain solution would be suitable for their particular business case.\u003c/p\u003e\n\u003cp\u003eIndustries today are using blockchain technologies to increase efficiency and solve business problems associated with data privacy, security, information sharing, and inclusion. Be on the cutting edge; learn about these innovative technologies and bring unique value to your business.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"37e:T5a4,\u003cp dir=\"ltr\"\u003eVol ou perte de données, fraude financière, espionnage, votre environnement d’étude ou de travail n’est pas à l’abri des cybermenaces !\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nLes établissements d’enseignements supérieurs font face à des défis uniques en matière de cybersécurité. Leur ouverture sur le monde, la quantité de données produite et leurs vastes réseaux d’utilisateurs en font des cibles attrayantes pour les pirates informatiques. \u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nSi des moyens technologiques sont mis en place pour les protéger, ce sont bien souvent les humains qui sont ciblés par ces attaques. \u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nCe MOOC La cybersécurité en milieu universitaire a pour but de vous accompagner dans la mise en place de bonnes pratiques de cybersécurité dans votre environnement d’étude ou de travail, tout comme dans votre vie personnelle. Grâce à des vidéos d’experts, des tutoriels et des mises en situation, vous serez capable d’appréhender les enjeux de cybersécurité qui touchent les établissements d’enseignement et de recherche et de mettre en place des gestes simples pour vous protéger efficacement. \u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nCe cours en ligne ouvert à tous (massive open online course ou MOOC) est basé sur des expériences concrètes, des données probantes issues de la recherche, et développé suivant des concepts pédagogiques de sensibilisation à la cybersécurité.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e37f:T839,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCyberattacks and threats are no longer a case of if, but rather when. Cybercriminals can use phishing emails to gain passwords and credit card details, install malware that disrupts or destroys a computer network, or even use ransomware to hold information hostage. What can you do to protect your business? The Cybersecurity: Managing Risk in the Information Age online short course from Harvard’s Office of the Vice Provost for Advances in Learning (VPAL), in association with HarvardX, offers an in-depth exploration of this complex landscape. This course will help you grow your ability to guard the integrity and confidentiality of your company’s digital information. You’ll learn how to identify and manage operational, litigation, and reputational risk. As you progress through the program, you’ll gain the tools and confidence to conduct vulnerability assessments and locate weaknesses within your organization’s networks, systems, and data, and develop strategies for responding to a cyberattack.Cybersecurity isn’t an IT or tech department responsibility, it’s an organization-wide imperative. That’s why this cybersecurity course is aimed at business leaders and executives, as well as specialists in web security, security administration, or information security roles. In fact, it’s for any professional who wants to understand the full implications of a cyber breach, and have the skills to communicate this to their company and stakeholders. The C-suite or senior management team will learn how to lead their organization in a time of rapidly increasing cyber risk. These leaders will also gain insight into setting an appropriate budget that allows the experts to prepare for and mitigate cyberattacks. This program is also suitably in-depth for cybersecurity professionals – risk analysts, technology specialists, and information security professionals. It unpacks the most common types of cyberattacks, provides strategies for protecting an organization from a threat and its associated risks, and will help professionals develop and lead a cybersecurity plan.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"380:T59f,\u003cp\u003eThe digital age has revolutionized the way that organizations do business. Unfortunately, however, it has also exposed companies, and their customers, to many new risks. With cyberattacks now a real threat in Africa and beyond, there’s a need across industries for professionals with the skills to address online security vulnerabilities.\u003c/p\u003e\n\u003cp\u003eThe University of Cape Town (UCT) Fundamentals of Cybersecurity online short course introduces you to the key elements of cybersecurity management, from both a South African and international perspective. Learn to become the defender of sensitive company data and learn how to make sound decisions to support your organization in both thwarting attacks and responding appropriately to incidents.\u003c/p\u003e\n\u003cp\u003eThis course is beneficial for employees at all levels, both technical and managerial, who currently work within cybersecurity. Those new to the industry or within administrative or information security roles will gain the latest knowledge of cybersecurity and develop a competitive edge within the growing job market. Management professionals will explore the regulations and legislation that affects cybersecurity, and learn to develop dedicated cybersecurity training programs and incident policies. All professionals will have the opportunity to gain the confidence and skills to identify threats and implement the necessary measures to protect an organization from cyber risks.\u003c/p\u003e381:T85d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAs the digital environment expands, methods behind cyberattacks become increasingly sophisticated, and the threats themselves take on new forms. Consumers are exceedingly conscientious about the protection of their shared data. And leading companies are learning that preserving trust is integral to customer experience, and a potent tool for strengthening their competitive advantage. In fact, many outperforming organizations distinguish themselves by sharpening their operational and strategic efforts in one specific area: cybersecurity.1\u003c/p\u003e\n\u003cp\u003eThe Institute for Management Development (IMD) Cybersecurity Risk and Strategy online program takes a practical, non-technical approach to help you understand and navigate the evolving cybersecurity landscape. Over five weeks, you’ll gain the tools to effectively leverage current data protection regulations and build on the security systems you already have in place. Guided by industry experts, you’ll explore the future of cybersecurity in relation to the mainstream adoption of artificial intelligence (AI) and the internet of things (IoT). Finally, you’ll evaluate whether your organization is prepared for what's to come and develop an action plan to identify, prepare for, and respond to various cyberthreats. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003e1\u003ca href=\"https://www.ibm.com/thought-leadership/institute-business-value/report/ceo\" target=\"_blank\"\u003e _IBM\u003c/em\u003e\u003c/a\u003e \u003cem\u003e(2021).\u003c/em\u003e \u003cbr /\u003e\n_\u003c/p\u003e\n\u003cp\u003eThis program expands on basic cybersecurity concepts and practices to explore senior-level planning and decision-making. As a result, it’s ideally suited to those who have an interest in the connection between business value and cybersecurity management, whether they have technical experience or not. Business leaders who are tasked with promoting greater security awareness, or non-technical executives who recognize the importance of prioritizing security, will gain insight into the operational realities of cybersecurity implementation strategies. Additionally, people in management positions will learn to motivate for the adoption of better cybersecurity strategies in their organizations.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"382:T56f,\u003cp\u003eInformation technology (IT) plays a vital role in improving efficiencies in business environments. Its impact lies in its ability to facilitate new business models and provide richer ways of communicating with suppliers and customers. However, considering the rapid rate at which the IT industry evolves, professionals need to regularly update their knowledge and skills to effectively manage the disruption this field presents. \u003c/p\u003e\n\u003cp\u003eOn the University of Cape Town (UCT) IT Management online short course, you’ll be equipped with the practical skills and tools required to lead your business’s IT operations. Experience a case-based approach to IT management that integrates core conceptual knowledge with practical, real-world managerial themes. Gain the knowledge to oversee IT infrastructure and processes, and guide an IT team through the challenges presented by digital transformation.\u003c/p\u003e\n\u003cp\u003eThis highly practical course is suited to both aspiring and established IT managers looking to create business value through IT systems in any industry. Those already leading an IT team can take this course to update their skills and stay up to speed with the latest IT trends and developments. Similarly, IT administrators, officers, and technicians may want to register to gain new and relevant knowledge and improve their chances of successfully moving into a managerial role.\u003c/p\u003e383:T579,he goal of the Master of Science in Cybersecurity program is to develop cybersecurity professionals who have a strong foundation of technical knowledge in computer security, network security, and information security. Our program builds the knowledge and skills of security professionals to effectively protect the safety of our communities, companies, and the nation.\r\n\r\nUNLEASH YOUR POTENTIAL: Counter complex threats, gain hands-on experience, master cutting-edge tools, learn from industry experts, and prepare for industry-recognized CompTIA professional certifications.\r\nBE A PROTECTOR: Join the ranks of cyber warriors and safeguard"])</script><script>self.__next_f.push([1," businesses, organizations, and nations against malicious threats.\r\nDEFEND against cybercrime and ensure a secure digital future through collaboration, communication, and ethical considerations in the field of cybersecurity.\r\nCULTIVATE teamwork skills and effective communication techniques, preparing you to work seamlessly within interdisciplinary teams and effectively convey complex security concepts to diverse stakeholders\r\nDEMAND ON THE RISE: With the increasing number of cybersecurity attacks, the need for skilled professionals has never been greater. In the United States alone, there are over 700,000 open cybersecurity positions waiting to be filled.\r\nTHRIVING JOB MARKET: Cybersecurity is growing at more than twice the rate of the overall economy.384:T639,\u003cp\u003eIf you’re a leader at heart, you’re in the right place. Management and \r\nleadership skills are in demand across industries, and that means there’s \r\nplenty of opportunity for people like you to step up and build the skills \r\nto help maintain an efficient and effective work environment.\u003c/p\u003e\r\n\r\n\u003cp\u003eReal leadership starts with one brave decision, and we want to embolden you \r\nto make your next big career move. Earn your online Master of Arts in Management and Leadership degree from Maryville, and you can be the catalyst behind stronger, more \r\nsuccessful, more organized teams.\u003c/p\u003e\r\n\r\n\u003cp\u003eWe designed our program to be accessible regardless of your academic and \r\nprofessional background. We’ll help you establish a strong foundation in \r\nbusiness, then focus on developing in-demand leadership skills and \r\nqualities like communication, team-building, critical thinking, \r\ndecision-making, and problem-solving.\u003c/p\u003e\r\n\r\n\u003cp\u003eIf you’re ready to move forward in your career, start here. Our program \r\nfocuses on practical, real-world learning opportunities, and it features eight concentrations and/or certificates in Cybersecurity, Health Administration, Human Resource Management, \r\nInformation Technology, Marketing, Project Management, Software \r\nDevelopment, or D"])</script><script>self.__next_f.push([1,"ata Analytics. You’ll learn from experienced faculty in a \r\nprogram designed with input from top employers, so you can build practical, \r\nrelevant skills that you can apply to your career.\u003c/p\u003e\r\n\r\n\u003cp\u003eDon’t just prepare for the next step in your career. Prepare for every step.\u003c/p\u003e\r\n\r\n\u003cp\u003eGet Curriculum Details\u003c/p\u003e385:T559,\u003cp\u003eOur online MBA program was created for you.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe business world needs bold and visionary leaders. That’s why Maryville University created the online Master of Business Administration — a faster, more convenient, and affordable way to earn an MBA.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn as little as 12 months, you can get the online MBA degree you need to qualify for top-level leadership roles in any organization, in virtually any field. When you enroll in the St. Louis, Missouri-based online MBA program at Maryville, you will enjoy the same high-quality education as our on-campus students. You’ll take the same rigorous courses rooted in reality and research, and you’ll learn from the same expert faculty who are passionate about helping you advance in your career. Plus you’ll have the flexibility to complete your coursework from anywhere in the U.S.\u003c/p\u003e\r\n\r\n\u003cp\u003eWhat’s more, you’ll have the ability to customize your online MBA degree with a choice of 12 concentrations in some of today’s hottest fields.\u003c/p\u003e\r\n\r\n\u003cp\u003eSee for yourself. Everything about our online MBA program is designed to help you redefine your role in today’s business world. If you are ready to take the next brave step toward fulfilling your potential as a capable and confident business leader — on your own time, on your terms — then \r\nMaryville University is open for business.\u003c/p\u003e386:T4c2,Technology powers our world, touching every aspect of our lives. So it’s no \r\nwonder that qualified computer science professionals are in such high \r\ndemand.\r\n\r\nNow you can start your technology career strong with an online Bachelor of \r\nScience in Computer Science from Maryville University. Designed with input \r\nfrom top employers, along wi"])</script><script>self.__next_f.push([1,"th experienced instructors from our John E. \r\nSimon School of Business and College of Arts and Sciences, our flexible, \r\nstate-of-the-art program can help you gain the technical, problem-solving, \r\nand critical thinking skills you need to pursue top jobs in tech.\r\n\r\nBuild your foundation in key competencies such as computer architecture, \r\nsecurity, programming, and web design. Benefit from experiential learning \r\nopportunities so you can apply what you’ve learned in real-world \r\nprofessional settings. And tailor your education to your interests and \r\ngoals with a choice of six computer science certificates built right into \r\nthe curriculum.\r\n\r\nWhen you earn your B.S. in computer science degree from Maryville, you put \r\nyourself in a position to build the world of tomorrow and embark on an \r\nexciting and financially rewarding career.\r\n\r\nGet Curriculum Details"])</script><script>self.__next_f.push([1,"314:[\"$\",\"$L338\",null,{\"title\":\"Metasploit\",\"topic\":\"Cybersecurity\",\"categories\":[{\"productType\":\"Course\",\"categoryLabel\":\"Courses\",\"products\":[{\"productUuid\":\"88391405-e329-495d-bf72-5de13bbf1846\",\"productName\":\"CS50's Introduction to Cybersecurity\",\"productSlug\":\"learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/88391405-e329-495d-bf72-5de13bbf1846-be5135562618.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Ethics\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"\u003cp\u003eThis is CS50's introduction to cybersecurity for technical and non-technical audiences alike. Learn how to protect your own data, devices, and systems from today's threats and how to recognize and evaluate tomorrow's as well, both at home and at work. Learn to view cybersecurity not in absolute terms but relative, a function of risks and rewards (for an adversary) and costs and benefits (for you). Learn to recognize cybersecurity as a trade-off with usability itself. Course presents both high-level and low-level examples of threats, providing students with all they need know technically to understand both. Assignments inspired by real-world events.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAn introduction to cybersecurity for technical and non-technical audiences alike.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ehacking, cracking\u003c/li\u003e\\n\u003cli\u003esocial engineering, phishing attacks\u003c/li\u003e\\n\u003cli\u003epasscodes, passwords, SSO\u003c/li\u003e\\n\u003cli\u003ebrute-force attacks, dictionary attacks\u003c/li\u003e\\n\u003cli\u003ebiometrics\u003c/li\u003e\\n\u003cli\u003emulti-factor authentication, password managers\u003c/li\u003e\\n\u003cli\u003eethical hacking\u003c/li\u003e\\n\u003cli\u003e(distributed) denial-of-service attacks\u003c/li\u003e\\n\u003cli\u003eviruses, worms, botnets\u003c/li\u003e\\n\u003cli\u003eSQL injection attacks\u003c/li\u003e\\n\u003cli\u003eport-scanning\u003c/li\u003e\\n\u003cli\u003eproxies, firewalls\u003c/li\u003e\\n\u003cli\u003eautomatic updates\u003c/li\u003e\\n\u003cli\u003eclosed-source, open-source software\u003c/li\u003e\\n\u003cli\u003ebuffer-overflow attacks\u003c/li\u003e\\n\u003cli\u003esecure deletion\u003c/li\u003e\\n\u003cli\u003ehashing, salting\u003c/li\u003e\\n\u003cli\u003esecret-key, public-key encryption, digital signatures\u003c/li\u003e\\n\u003cli\u003efull-disk encryption, ransomware\u003c/li\u003e\\n\u003cli\u003ecookies, sessions, incognito mode\u003c/li\u003e\\n\u003cli\u003eanonymization, de-identification\u003c/li\u003e\\n\u003cli\u003everification\u003c/li\u003e\\n\u003cli\u003eoperating systems, app stores\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-88391405-e329-495d-bf72-5de13bbf1846\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+CS50CS+Cybersecurity\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cc2b4496-bccb-4ddc-b6d9-a6ad7d05d28f\",\"productName\":\"Beginners Guide to Cybersecurity\",\"productSlug\":\"learn/cybersecurity/ibm-beginners-guide-to-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/cc2b4496-bccb-4ddc-b6d9-a6ad7d05d28f-2378c1db3bb6.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"\u003cp\u003eA tech talent shortage continues as organizations adopt higher security standards to address the ongoing risk of threats and breaches. This course builds key skills to address common security threats and risks and provides best practices to guard against them.\u003c/p\u003e\\n\u003cp\u003eThis course is designed for everyone, especially those interested in a Cyber Analyst I or an entry-level Cloud \u0026amp; Security Engineer role, as well as Tech Support. Diving into the world of cybersecurity, you’ll gain critical skills employers need, including identifying security threats, understanding encryption uses, demonstrating safe browsing techniques, implementing email security best practices. and identifying and becoming familiar with various types of cybersecurity risks and threats. This course is ideal for technical support roles, often on the front lines of defense for cybersecurity issues.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course is designed for beginners to build critical skills to address common security threats, and adopt best practices for reducing risks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eRecognize the importance of data security, maintaining data integrity, and confidentiality.\u003c/li\u003e\\n\u003cli\u003eDemonstrate the installation of software updates and patches.\u003c/li\u003e\\n\u003cli\u003eIdentify preferred practices for authentication, encryption, and device security.\u003c/li\u003e\\n\u003cli\u003eDiscuss types of security threats, breaches, malware, social engineering, and other attack vectors.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-cc2b4496-bccb-4ddc-b6d9-a6ad7d05d28f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0221EN+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"57e4cbf4-6b8a-4cd2-a164-380453d5c424\",\"productName\":\"Cybersecurity Analyst\",\"productSlug\":\"certificates/professional-certificate/ibm-cybersecurity-analyst\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/57e4cbf4-6b8a-4cd2-a164-380453d5c424-796bf387799a.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"Job-ready cybersecurity analyst skills employers need in less than 6 months. Career guidance from seasoned experts. No prior experience required!,How to apply incident response methodologies and forensics practices and use industry-specific security and cybersecurity tools.,How to apply cybersecurity industry standards and best practices that mitigate risks, enhance security, and ensure compliance through audit processes.,When and how to use generative AI tools to boost your cybersecurity effectiveness and productivity.,How to investigate a real-world security breach by identifying the attack, vulnerabilities, costs, and steps for future prevention.\",\"shortDescription\":\"Get job-ready as cybersecurity analyst. Build the skills employers need in digital forensics, threat intelligence, AI tools, and compliance frameworks. Gain practical experience tackling attacks, analyzing breaches, and applying industry standards.\",\"productOverview\":\"$339\",\"objectId\":\"program-57e4cbf4-6b8a-4cd2-a164-380453d5c424\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":14,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8776d574-3bd3-4670-80a0-3a369bb18696\",\"productName\":\"Try It: Ethical Hacking\",\"productSlug\":\"learn/computer-programming/edx-try-it-ethical-hacking\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8776d574-3bd3-4670-80a0-3a369bb18696-16ff86b5076d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"edX\"],\"partnerKeys\":[\"edX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$33a\",\"shortDescription\":\"\u003cp\u003eWant to know more about ethical hacking? Sign up for our free course and learn about ethical hacking and offensive security. The course is conveniently self-paced, and will also introduce you to the legal boundaries that distinguish “ethical” from “unethical” hacking, and the careers ethical hackers can pursue.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBasics of ethical hacking\u003c/li\u003e\\n\u003cli\u003eBasics of offensive security\u003c/li\u003e\\n\u003cli\u003eDifferences between ethical and unethical hackers \u003c/li\u003e\\n\u003cli\u003eCommon vulnerabilities associated with web applications online\u003c/li\u003e\\n\u003cli\u003eWays to exploit found vulnerabilities online to determine security risk\u003c/li\u003e\\n\u003cli\u003eCareer paths for ethical hackers\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8776d574-3bd3-4670-80a0-3a369bb18696\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:edX+BCT-ethical-hacking+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"54c7ce9c-5a40-4e12-ab87-d562833387c4\",\"productName\":\"Computer Science for Cybersecurity\",\"productSlug\":\"certificates/professional-certificate/harvardx-computer-science-for-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/54c7ce9c-5a40-4e12-ab87-d562833387c4-69178d6d7a34.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Business \u0026 Management\",\"Ethics\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"A broad and robust understanding of computer science and programming.,How to think algorithmically and solve programming problems efficiently.,Fundamental concepts of cybersecurity threats, including hacking, cracking, and phishing.,Security measures and strategies, including multi-factor authentication, password managers, encryption techniques, firewalls, and secure deletion to protect data, devices, and systems.,Trade-offs between cybersecurity, usability, and convenience, and how to evaluate risks and rewards in both personal and professional contexts.\",\"shortDescription\":\"Explore the convergence of data and cybersecurity in this CS50 Professional Certificate Program, gaining hands-on experience and enhancing your problem solving skills.\",\"productOverview\":\"$33b\",\"objectId\":\"program-54c7ce9c-5a40-4e12-ab87-d562833387c4\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"53e0b3db-0712-495f-9ce6-f12045373a5b\",\"productName\":\"Cybersecurity Basics: Tools and Cyberattacks\",\"productSlug\":\"learn/cybersecurity/ibm-cybersecurity-basics-tools-and-cyberattacks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/53e0b3db-0712-495f-9ce6-f12045373a5b-c07ca535b451.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$33c\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eJumpstart your cybersecurity career with this introductory course.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBegin your journey in a cybersecurity-related profession with the fundamental concepts in this course \u003c/li\u003e\\n\u003cli\u003eHow to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets \u003c/li\u003e\\n\u003cli\u003eTo identify various security threats and common cybersecurity best practices \u003c/li\u003e\\n\u003cli\u003eTo understand authentication and identity management concepts for safeguarding your organization\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-53e0b3db-0712-495f-9ce6-f12045373a5b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.1.0+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8ac6657e-a06a-4a47-aba7-5c86b5811fa1\",\"productName\":\"Cybersecurity\",\"productSlug\":\"masters/micromasters/ritx-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8ac6657e-a06a-4a47-aba7-5c86b5811fa1-0801b0375fc9.png\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"How to setup and secure basic computer systems and networks,Information security risk management framework and methodologies,How to implement network security solutions and detect intrusions,How to conduct a digital forensics investigation admissible to a court\",\"shortDescription\":\"Launch your career in a high demand industry that projects 2 million new jobs annually by earning a Cybersecurity MicroMasters® program credential from RIT.\",\"productOverview\":\"\u003cp\u003e\u003cimg style=\\\"max-height:175px\\\" align=\\\"right\\\" alt=\\\"\\\" src=\\\"https://www.edx.org/sites/default/files/edx-prize-logo-2018-nominee.png\\\"/\u003eGain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments. \u003c/p\u003e \\r\\n \u003cp\u003eIn this Cybersecurity MicroMasters program, you will learn: \\r\\n\u003cul\u003e\u003cli\u003eFundamentals of networks;\u003c/li\u003e \\r\\n\u003cli\u003eSystems administration;\u003c/li\u003e \\r\\n\u003cli\u003eHow to protect computer networks and other systems by mitigating vulnerabilities and monitoring intrusions;\u003c/li\u003e \u003cli\u003eHow to perform digital forensic analysis of cybercrime by gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization;\u003c/li\u003e \\r\\n\u003cli\u003eTechniques of risk analysis;\u003c/li\u003e \\r\\n\u003cli\u003eRisk assessment and vulnerability assessment. \u003c/li\u003e\u003c/ul\u003e\u003c/p\u003e\",\"objectId\":\"program-8ac6657e-a06a-4a47-aba7-5c86b5811fa1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"50ae40e5-e055-4dfd-b6de-de702f0a1003\",\"productName\":\"IBM Cybersecurity Fundamentals\",\"productSlug\":\"certificates/professional-certificate/ibm-cybersecurity-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/50ae40e5-e055-4dfd-b6de-de702f0a1003-ee57ae4a8950.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$33d\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eThere are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eThroughout this professional certificate program, you will learn concepts around cybersecurity tools and processes, system administration, operating system and the basics of security compliance and industry standards.\u003c/p\u003e\\r\\n \\r\\n\u003cp\u003eThe instructors are IBMers with a worldwide perspective. They will share the skills they need to secure IBM and its clients’ security systems.\u003c/p\u003e\",\"objectId\":\"program-50ae40e5-e055-4dfd-b6de-de702f0a1003\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"030f3b32-99e9-460e-a1d0-dc8cb61de5e0\",\"productName\":\"Cyber Defense: Penetration Testing, Threat Hunting, and Cryptography\",\"productSlug\":\"learn/penetration-testing/ibm-cyber-defense-penetration-testing-threat-hunting-and-cryptography\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/030f3b32-99e9-460e-a1d0-dc8cb61de5e0-4d943e6aa0e5.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$33e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThis course focuses on the basics of penetration testing, threat hunting, and cryptography. It enables learners to gain an understanding of different vulnerabilities and techniques to mitigate and remediate against those vulnerabilities.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIn-demand penetration and threat-hunting skills, supported by hands-on practice that employers are looking for on a resume. \u003c/li\u003e\\n\u003cli\u003eHands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK. \u003c/li\u003e\\n\u003cli\u003eHow to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence. \u003c/li\u003e\\n\u003cli\u003eUse cryptography and cryptanalysis techniques such as encryption and hashing to ensure data integrity and confidentiality.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-030f3b32-99e9-460e-a1d0-dc8cb61de5e0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.5.0+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"236ea439-1b6a-42c8-ad87-eef0d779aa4f\",\"productName\":\"Cybersecurity Analyst Assessment: Security+ \u0026 CySA+ Practice\",\"productSlug\":\"learn/cybersecurity/ibm-cybersecurity-analyst-assessment-security-and-cysa-practice\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/236ea439-1b6a-42c8-ad87-eef0d779aa4f-86809b030dca.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eComplete the IBM Cybersecurity Analyst Professional Certificate with this final assessment! \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eIn taking this final course, you will be showing your accumulated knowledge of cybersecurity skills. You will demonstrate your proficiency in cybersecurity tools and concepts including: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRoles and \u003c/span\u003eresponsibilities\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eSystem administration\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eNetwork security and vulnerabilities\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003ePenetration testing and incident response\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThreat intelligence\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eBefore completing this final assessment, it is highly recommended that you complete the previous seven courses in the IBM Cybersecurity Analyst Professional Certificate.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eShowcase your expertise in Cybersecurity fundamentals in this final assessment of the IBM Cybersecurity Analyst Professional Certificate!\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eApply fundamental cybersecurity skills for a final assessment\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDemonstrate proficiency in identifying cyber threats and risks\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eShowcase your knowledge of network security and testing for vulnerabilities\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eExhibit an understanding of important concepts and tools utilized by successful cybersecurity analysts \u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-236ea439-1b6a-42c8-ad87-eef0d779aa4f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.8.0+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"db4c2a32-da56-48c1-b33e-d4924d855510\",\"productName\":\"Introduction to Cybersecurity\",\"productSlug\":\"learn/cybersecurity/university-of-washington-introduction-to-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/db4c2a32-da56-48c1-b33e-d4924d855510-582c75ee2561.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"\u003cp\u003eThis course serves as an introduction to the exciting field of cybersecurity.\u003c/p\u003e\\n\u003cp\u003eAs our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cybersecurity.\u003c/p\u003e\\n\u003cp\u003eIn this course, you will gain an overview of the cybersecurity landscape as well as national (USA) and international perspectives on the field. We will cover the legal environment that impacts cybersecurity as well as predominant threat actors.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAn introduction to cybersecurity, ideal for learners who are curious about the world of Internet security and who want to be literate in the field.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDefine and use key terms and concepts in the field of cybersecurity;\u003c/li\u003e\\n\u003cli\u003eIdentify and distinguish threat actors and their motivations;\u003c/li\u003e\\n\u003cli\u003eMatch appropriate types of controls to the actions of different threat actors;\u003c/li\u003e\\n\u003cli\u003eDescribe the differences and interactions among international agencies related to cybersecurity;\u003c/li\u003e\\n\u003cli\u003eDescribe at least two potential legal challenges to cybersecurity in your country.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-db4c2a32-da56-48c1-b33e-d4924d855510\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB001x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5931b9af-b058-4612-9108-2301741a0740\",\"productName\":\"Essentials of Cybersecurity\",\"productSlug\":\"certificates/professional-certificate/uwashingtonx-essentials-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/5931b9af-b058-4612-9108-2301741a0740-925ffcadccf5.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"Describe the vast array of roles and sectors within the Cybersecurity industry;,Explain the relationship between management and technology in cybersecurity protection;,Identify appropriate types of security controls to the actions of different and evolving threat actors;,Apply terminology and basic concepts of cybersecurity;,Assess own knowledge, skill, and abilities toward identifying a career path in cybersecurity.\",\"shortDescription\":\"An introduction to the expanding world of cybersecurity and the opportunity to find your niche in this exciting, in-demand field.\",\"productOverview\":\"$33f\",\"objectId\":\"program-5931b9af-b058-4612-9108-2301741a0740\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bb90d02a-a562-4632-a0af-e72987f27fea\",\"productName\":\"Cybersecurity Fundamentals\",\"productSlug\":\"learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bb90d02a-a562-4632-a0af-e72987f27fea-8b470ba34e03.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eIn this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.\u003c/p\u003e\\n\u003cp\u003eYou will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.\u003c/p\u003e\\n\u003cp\u003eThis offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eNetwork and system administration fundamentals\u003c/li\u003e\\n\u003cli\u003eInformation assurance fundamentals such as confidentiality, integrity and availability, etc.\u003c/li\u003e\\n\u003cli\u003eBasic cryptography concepts\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bb90d02a-a562-4632-a0af-e72987f27fea\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER501x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c913261b-8081-4f28-9c10-0079b616ab39\",\"productName\":\"Cybersecurity Risk Management\",\"productSlug\":\"learn/risk-management/rochester-institute-of-technology-cybersecurity-risk-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c913261b-8081-4f28-9c10-0079b616ab39-9b5fb6076d7d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"$340\",\"shortDescription\":\"\u003cp\u003eLearn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eInformation security risk management framework and methodologies\u003c/li\u003e\\n\u003cli\u003eIdentifying and modeling information security risks\u003c/li\u003e\\n\u003cli\u003eQualitative and quantitative risk assessment methods\u003c/li\u003e\\n\u003cli\u003eArticulating information security risks as business consequences\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c913261b-8081-4f28-9c10-0079b616ab39\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER503x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d2868c46-5a91-4766-a2a4-891bcc5af93b\",\"productName\":\"Building a Cybersecurity Toolkit\",\"productSlug\":\"learn/cybersecurity/university-of-washington-building-a-cybersecurity-toolkit\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d2868c46-5a91-4766-a2a4-891bcc5af93b-1375602e8c65.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"$341\",\"shortDescription\":\"\u003cp\u003eDevelop a set of skills and characteristics that expand beyond technical proficiency to become a successful cybersecurity professional.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIdentify what tools and skills are necessary to form today’s Professional Cybersecurity toolkit;\u003c/li\u003e\\n\u003cli\u003eMatch appropriate tools to different purposes in the cybersecurity management process;\u003c/li\u003e\\n\u003cli\u003eSynthesize insights gained in course exploration of toolkit skill sets, working toward self-evaluation of talents and interests aligned to cybersecurity’s array of roles\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d2868c46-5a91-4766-a2a4-891bcc5af93b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB003x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"88721641-d27b-43ed-9fb9-4450d8dd8d5d\",\"productName\":\"Cybersecurity: The CISO's View\",\"productSlug\":\"learn/cybersecurity/university-of-washington-cybersecurity-the-ciso-s-view\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/88721641-d27b-43ed-9fb9-4450d8dd8d5d-7abc6f234b6b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"\u003cp\u003eThe Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company’s employees as well as its customers depend upon.\u003c/p\u003e\\n\u003cp\u003eThis course delves into the role that the CISO plays in cybersecurity operations.\u003c/p\u003e\\n\u003cp\u003eThroughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals' point of view? How do we keep information secure?\u003c/p\u003e\\n\u003cp\u003eCoursework will fully explore the CISO’s view from the top, as well as the position’s toolkit, which includes policy, procedures and practices, technologies, awareness training, and audit. It will also dive into the approaches taken in private industry, government, academia, and the military.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn about cybersecurity operations and the role played by the Chief Information Security Officer (CISO) in the industry.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIdentify the four domains of cybersecurity and the differences between their rules, regulations, and desired outcomes;\u003c/li\u003e\\n\u003cli\u003eExplain the role of the CISO across all domains, and the differences between CISO roles among the domains;\u003c/li\u003e\\n\u003cli\u003eIdentify cybersecurity specific tools for their appropriate domains and situations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-88721641-d27b-43ed-9fb9-4450d8dd8d5d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB002x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6bc0aff3-4ff1-4a1a-a93c-38dd2168becd\",\"productName\":\"Finding Your Cybersecurity Career Path\",\"productSlug\":\"learn/cybersecurity/university-of-washington-finding-your-cybersecurity-career-path\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6bc0aff3-4ff1-4a1a-a93c-38dd2168becd-f937c427d965.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"\u003cp\u003eIn this course, you will focus on the pathways to cybersecurity career success. You will determine your own incoming skills, talent, and deep interests to apply toward a meaningful and informed exploration of 32 Digital Pathways of Cybersecurity.\u003c/p\u003e\\n\u003cp\u003eYou will complete a self-assessment comprised of elements needed to determine essential next steps on your career path.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn about different career pathways in cybersecurity and complete a self-assessment project to better understand the right path for you.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eUnderstand a multitude of cybersecurity career path opportunities\u003c/li\u003e\\n\u003cli\u003eApply problem-solving skills toward self-evaluation of compatibility with career pathways\u003c/li\u003e\\n\u003cli\u003eNarrow your exploration to the most compatible job path(s) in cybersecurity\u003c/li\u003e\\n\u003cli\u003eAssess knowledge, skills, and abilities in relation to the specific (and emerging) requirements for those paths\u003c/li\u003e\\n\u003cli\u003eDiscover and identify training and other next steps needed to satisfy requirements and meet goals in cybersecurity pathways\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6bc0aff3-4ff1-4a1a-a93c-38dd2168becd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB004x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"19e590bd-9f4e-4de8-8484-af605cfe2256\",\"productName\":\"Cybersecurity Compliance and Framework\",\"productSlug\":\"learn/cybersecurity/ibm-cybersecurity-compliance-and-system-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/19e590bd-9f4e-4de8-8484-af605cfe2256-0610e74358f6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$342\",\"shortDescription\":\"\u003cp\u003eThis course focuses on cybersecurity principles, industry standards, regulations, and audit processes. It details the fundamental concepts of information security and compliance, covering governance, risk, cybersecurity frameworks, and process management.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDefine fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process. \u003c/li\u003e\\n\u003cli\u003eIdentify cybersecurity laws and regulations, both at a national and international level, and comprehend their implications for organizations.\u003c/li\u003e\\n\u003cli\u003eExplore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports. \u003c/li\u003e\\n\u003cli\u003eApply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-19e590bd-9f4e-4de8-8484-af605cfe2256\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.3.0+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cb549c48-8501-4dc8-8cb8-5680dd924017\",\"productName\":\"Launch your Cybersecurity Career\",\"productSlug\":\"learn/computer-science/ibm-introduction-to-cybersecurity-careers\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/cb549c48-8501-4dc8-8cb8-5680dd924017-4a419d953742.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"\u003cp\u003eIn today’s digital world, there is currently a great demand for cybersecurity professionals. It is the right time to launch into a cybersecurity career. \u003c/p\u003e\\n\u003cp\u003eBy the end of the course, you will be able to address the widening employment gap in cybersecurity, detailing the various roles and responsibilities associated with different career levels. You will learn the importance of both technical and soft skills, providing a balanced approach to professional development. \u003c/p\u003e\\n\u003cp\u003eYou will gain familiarity with the most recognized certifications in this field provided by organizations such as CompTIA, ISC2 like A+ and CISSP. In addition, you will also learn about the preparation process to be adopted for these certification exams. This course is suitable for anyone and does not require a cybersecurity background. You will also get insights from a few cybersecurity experts on the various career paths available in the cybersecurity profession.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course gives an insight into the various career options available in the cybersecurity field. It is designed to give you the knowledge required to find and secure the right career for you in the information and security (Infosec) industry.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCompare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level. \u003c/li\u003e\\n\u003cli\u003eMap IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity \u003c/li\u003e\\n\u003cli\u003eIdentify the required certifications such as Security+, A+, CISSP, and CEH for different job roles and the contents of each certification \u003c/li\u003e\\n\u003cli\u003eGive some tips on how to select and prepare for your career path at different levels of cybersecurity career.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-cb549c48-8501-4dc8-8cb8-5680dd924017\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+SE0100EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"fc678a33-db0c-4038-88e4-07d8effa97d0\",\"productName\":\"Mastering Generative AI for Cybersecurity\",\"productSlug\":\"learn/computer-science/ibm-mastering-generative-ai-for-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/fc678a33-db0c-4038-88e4-07d8effa97d0-679fe779008d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$343\",\"shortDescription\":\"\u003cp\u003eLearn how to leverage the power of generative AI in cybersecurity, including UEBA, threat intelligence, phishing, malware, misinformation, deepfakes, and SIEM and SOC tasks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLeveraging the power of gen AI in cybersecurity, including UEBA, threat intelligence, report summarization, and playbooks. \u003c/li\u003e\\n\u003cli\u003eUsing generative AI in countering cybersecurity threats like phishing and malware. \u003c/li\u003e\\n\u003cli\u003eStreamlining SIEM and SOC tasks with generative AI to optimize operational efficiency and threat management. \u003c/li\u003e\\n\u003cli\u003eIntegrating generative AI in cybersecurity operations, such as incident response, threat detection, and vulnerability management.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-fc678a33-db0c-4038-88e4-07d8effa97d0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+AI0275EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d4aa0e1a-a7b2-402b-9540-091e974f6151\",\"productName\":\"IT Fundamentals for Business Professionals: Cybersecurity and social implications\",\"productSlug\":\"learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d4aa0e1a-a7b2-402b-9540-091e974f6151-8282c60294a9.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$344\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn about cybersecurity, careers, and social implications of IT\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course you will learn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe effects of ICT in processes such as globalization, e-commerce, business strategy, competition and outsourcing, among others\u003c/li\u003e\\n\u003cli\u003eCybersecurity concepts related to intellectual property, privacy, hackers; threats and how to defend us against them.\u003c/li\u003e\\n\u003cli\u003eThe phenomenon of Web 2.0 and social networks\u003c/li\u003e\\n\u003cli\u003eThe different professional careers that can be chosen in the world of IT\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d4aa0e1a-a7b2-402b-9540-091e974f6151\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.5x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8ae69dfc-e046-4642-90f8-4cca167fb51a\",\"productName\":\"Teach teens computing: Cybersecurity\",\"productSlug\":\"learn/computer-programming/raspberry-pi-foundation-introduction-to-cybersecurity-for-teachers\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8ae69dfc-e046-4642-90f8-4cca167fb51a-ad83132fbb13.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Computer Science\"],\"partnerName\":[\"Raspberry Pi Foundation\"],\"partnerKeys\":[\"RaspberryPiFoundation\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0d58600d-bb5f-4036-b222-b770d238331a-f11f10a8cbbc.png\",\"fullDescription\":\"\u003cp\u003eTeaching cybersecurity in schools is an important way to help students stay safe while using technology. This course introduces teachers to the core ideas of cybersecurity that should be taught in the classroom.\u003c/p\u003e\\n\u003cp\u003eYou will learn about the different attacks that individuals and devices are vulnerable to and how to prevent them. You will explore malware, malicious bots, SQL injections, and physical threats to data. You will also build your knowledge of the different tools that protect data and websites. These include strong passwords, biometrics, two-factor authentication, and firewalls.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore key concepts of cybersecurity to teach students aged 14 to 16 with this online course.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOver the following three weeks, you will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExplain the meanings of terms describing common cyberattacks, such as phishing, pharming, shoulder surfing, and blagging\u003c/li\u003e\\n\u003cli\u003eEvaluate the strength of a password\u003c/li\u003e\\n\u003cli\u003eExplain the protections offered to users by the Misuse of Computer Act\u003c/li\u003e\\n\u003cli\u003eDescribe different types of cyber attack, such as an SQL injection attack, and how these can be protected against or mitigated\u003c/li\u003e\\n\u003cli\u003eClassify different types of malware\u003c/li\u003e\\n\u003cli\u003eExplain how antivirus software works\u003c/li\u003e\\n\u003cli\u003eExplain the processes used to protect a network\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8ae69dfc-e046-4642-90f8-4cca167fb51a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RaspberryPiFoundation+CYBER+1T2023b\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d9e3e49f-f550-438b-afee-63630c0f88b0\",\"productName\":\"Cybersecurity Essentials\",\"productSlug\":\"learn/computer-science/university-system-of-maryland-cybersecurity-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d9e3e49f-f550-438b-afee-63630c0f88b0-e6d09efbb1ae.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Maryland Baltimore County\",\"University System of Maryland\"],\"partnerKeys\":[\"UMBC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/097ca727-d3f4-43d0-8baf-9baf23c1314b-29d4b0840da2.png\",\"fullDescription\":\"\u003cp\u003eThe course discusses the cybersecurity TRIAD, social engineering, identity and access management (IAM), cryptography, common network attacks, and secure network design. It provides students with a foundation for getting started in the cybersecurity field.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course introduces basic cybersecurity concepts.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eThe cybersecurity TRIAD\u003c/li\u003e\\n\u003cli\u003eSocial engineering techniques and how to protect from them\u003c/li\u003e\\n\u003cli\u003eCryptography techniques\u003c/li\u003e\\n\u003cli\u003eTypes of network attacks\u003c/li\u003e\\n\u003cli\u003eProtecting networks with firewalls\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-d9e3e49f-f550-438b-afee-63630c0f88b0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+IS6591+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bba0897d-ac7a-498d-8fd1-b1fbefe6795b\",\"productName\":\"Cybersecurity Capstone and Case Studies\",\"productSlug\":\"learn/cybersecurity/ibm-cybersecurity-capstone-and-case-studies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bba0897d-ac7a-498d-8fd1-b1fbefe6795b-45ce9ccc6424.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$345\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eGet the practical cybersecurity analysis experience employers look for with this immersive, hands-on capstone course. \u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHands-on experience analyzing cybersecurity incidents to identify threat tactics and assess vulnerabilities you can talk about in interviews \u003c/li\u003e\\n\u003cli\u003eDemonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios \u003c/li\u003e\\n\u003cli\u003eExpertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures \u003c/li\u003e\\n\u003cli\u003ePractical experience applying breach analysis and reporting skills to solve real-world data breach scenarios\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bba0897d-ac7a-498d-8fd1-b1fbefe6795b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.7.0+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"aea32c0b-0d17-4ead-8996-a880b32aa433\",\"productName\":\"Cybersecurity and Privacy in the IoT\",\"productSlug\":\"learn/cybersecurity/curtin-university-cybersecurity-and-privacy-in-the-iot\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/aea32c0b-0d17-4ead-8996-a880b32aa433-b67cdf2e7e3d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Design\",\"Ethics\"],\"partnerName\":[\"Curtin University\"],\"partnerKeys\":[\"CurtinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/afb92a21-674a-4636-b83b-17e3fef7243d-82515dc77939.png\",\"fullDescription\":\"\u003cp\u003e\u003cstrong\u003eThis course will soon be retired. The last day to enroll is 02/25/2025 at 15:59 UTC.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eAs the Internet of Things (IoT) continues to grow so will the number of privacy and security concerns and issues. As a professional working in the field, it is essential to understand the potential security risks and how to best mitigate them.\u003c/p\u003e\\n\u003cp\u003eIn this course, you will learn about security and privacy issues in IoT environments. We’ll explore the organizational risks posed by IoT networks, and the principles of IoT device vulnerabilities. We’ll also look at software and hardware IoT Applications for industry.\u003c/p\u003e\\n\u003cp\u003eWith billions of devices tracking our every move, privacy is a critical issue. We will explore and discuss the social and commercial implications the IoT brings to society.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn about the security and privacy implications of the IoT and how to design a secure system.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify and analyse IoT security and privacy risks\u003c/li\u003e\\n\u003cli\u003eConcept design for secure hardware and software\u003c/li\u003e\\n\u003cli\u003eAnalyse the social and privacy impacts of the IoT.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-aea32c0b-0d17-4ead-8996-a880b32aa433\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CurtinX+IOT5x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ef06893e-564b-43e5-9987-8a80e4271d41\",\"productName\":\"Integrated Cybersecurity: From Physical Safeguards to Digital Forensics and Governance\",\"productSlug\":\"learn/computer-science/university-system-of-maryland-integrated-cybersecurity-from-physical-safeguards-to-digital-forensics-and-governance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ef06893e-564b-43e5-9987-8a80e4271d41-85a73d894081.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Maryland Baltimore County\",\"University System of Maryland\"],\"partnerKeys\":[\"UMBC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/097ca727-d3f4-43d0-8baf-9baf23c1314b-29d4b0840da2.png\",\"fullDescription\":\"\u003cp\u003eThis course is designed to provide an understanding of key cybersecurity concepts. The modules you'll explore include Physical Security, where you will learn about effective data destruction techniques and the importance of physical access control to protect critical assets; Security Assessment, to understand how to conduct thorough vulnerability scans and identify potential security weaknesses; Incident Response and Digital Forensics: to discover the tools and techniques used for incident detection and response, and how to apply digital forensic concepts to investigate security breaches; and Security Standards and Policies: to gain insights into the frameworks and standards that guide cybersecurity practices and ensure regulatory compliance.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course examines a wide range of topics in cybersecurity, including physical security, physical access control, vulnerability scans, digital forensics, and security standards and frameworks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify and implement secure data destruction techniques. \u003c/li\u003e\\n\u003cli\u003eDescribe and enforce physical access control measures. \u003c/li\u003e\\n\u003cli\u003eDefine and ensure high availability and scalability in information systems. \u003c/li\u003e\\n\u003cli\u003eUse various tools to conduct comprehensive vulnerability scans. \u003c/li\u003e\\n\u003cli\u003eIdentify and utilize resources for effective incident detection. \u003c/li\u003e\\n\u003cli\u003eApply digital forensic concepts to real-world scenarios.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ef06893e-564b-43e5-9987-8a80e4271d41\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+IS6593+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"afff6081-0330-4d86-8c8a-83ee077b56c2\",\"productName\":\"Digital Shield: Cybersecurity for Data and System Protection\",\"productSlug\":\"learn/computer-science/universidades-anahuac-digital-shield-cybersecurity-for-data-and-system-protection\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/afff6081-0330-4d86-8c8a-83ee077b56c2-8e2ad8f0d8ff.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$346\",\"shortDescription\":\"\u003cp\u003eThis course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the fundamentals of information security and cybersecurity\u003c/li\u003e\\n\u003cli\u003eIdentify concepts related to security threats and vulnerabilities\u003c/li\u003e\\n\u003cli\u003eUnderstand risk management strategies and regulatory compliance\u003c/li\u003e\\n\u003cli\u003eAnalyze strategies and controls for network security\u003c/li\u003e\\n\u003cli\u003eIdentify various types of malware and the associated controls for prevention\u003c/li\u003e\\n\u003cli\u003eDevelop strategies for safe internet browsing\u003c/li\u003e\\n\u003cli\u003eIdentify various social engineering techniques and strategies to prevent victim from falling to social engineering attack\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-afff6081-0330-4d86-8c8a-83ee077b56c2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.MO.13x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f22aafce-b7fa-4bec-8ad5-fbfa77d0994c\",\"productName\":\"Fundamentals of Cybersecurity with the TAME Range Training Platform\",\"productSlug\":\"learn/cybersecurity/the-international-center-for-cyber-professions-master-cybersecurity-with-the-tame-range-training-platform\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f22aafce-b7fa-4bec-8ad5-fbfa77d0994c-e7a84cd5eb01.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The International Center for Cyber Professions\"],\"partnerKeys\":[\"ICCP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9fcce7d5-737c-40cb-81c8-0cb8b2e688de-e098cba6690d.png\",\"fullDescription\":\"$347\",\"shortDescription\":\"\u003cp\u003eOur Cybersecurity course, based on the TAME Range Cyber Training Platform, offers students a comprehensive, real-world, hands-on cyber education, ensuring they are well prepared to face the dynamic challenges in the professional field of Cybersecurity.\u003c/p\u003e\",\"productOverview\":\"$348\",\"objectId\":\"course-f22aafce-b7fa-4bec-8ad5-fbfa77d0994c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ICCP+FOC40H+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/f22aafce-b7fa-4bec-8ad5-fbfa77d0994c-d9e777e6859e.png\"},{\"productUuid\":\"e74204ce-9ff1-461d-a40e-3b358989da7e\",\"productName\":\"Ace Your Cybersecurity Job Search: Resume \u0026 Interview Tips\",\"productSlug\":\"learn/computer-science/ibm-ace-your-cybersecurity-job-search-resume-interview-tips\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e74204ce-9ff1-461d-a40e-3b358989da7e-4ba1085bbc30.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$349\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eGet \u003c/span\u003einterview ready with expert guidance for your next cybersecurity job application. Plus, create a resume and portfolio that will stand out to employers.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eGet interview-ready and craft an eye-catching resume that will stand out to employers in just 4 weeks. \u003c/li\u003e\\n\u003cli\u003eFine-tune your understanding of the NICE framework, cybersecurity roles, career opportunities, and required skills to highlight on your resume. \u003c/li\u003e\\n\u003cli\u003eCreate your resume, portfolio, and elevator pitch, and draft a cover letter tailored to job requirements. \u003c/li\u003e\\n\u003cli\u003ePrepare for various interview question types, including industry-specific, skills-based, and behavioral questions to improve your interview performance. \u003c/li\u003e\\n\u003cli\u003eUnderstand the best practices for post-interview strategies, salary negotiation, and how to position yourself for career growth.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e74204ce-9ff1-461d-a40e-3b358989da7e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+SE0175EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ada7a9ec-3cfa-48db-86d0-16b11fc262a6\",\"productName\":\"Try It: Cybersecurity Basics\",\"productSlug\":\"learn/cybersecurity/edx-try-it-cybersecurity-basics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ada7a9ec-3cfa-48db-86d0-16b11fc262a6-805c8d424037.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"edX\"],\"partnerKeys\":[\"edX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$34a\",\"shortDescription\":\"\u003cp\u003eDo you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eRecognize the basics and the importance of cybersecurity.\u003c/li\u003e\\n\u003cli\u003eDefine and apply the CIA Triad to different scenarios.\u003c/li\u003e\\n\u003cli\u003eExamine cryptography basics and how they apply to cybersecurity.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ada7a9ec-3cfa-48db-86d0-16b11fc262a6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:edX+BCT-cyber-basics+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b7a5320e-1845-481a-9db2-acbfff715ccf\",\"productName\":\"Cybersecurity Essentials\",\"productSlug\":\"certificates/professional-certificate/ec-council-cybersecurity-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/b7a5320e-1845-481a-9db2-acbfff715ccf-ae876800c84f.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"EC-Council\"],\"partnerKeys\":[\"EC-Council\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f309112-a97b-4f8a-8dbb-a89e247d0bc3-d603c7bd13bb.png\",\"fullDescription\":\"Network defense countermeasures and strategies to defend hackers and maintain a secure critical infrastructure.,Understand modern day cyberattacks, security breaches, threats, and real-world hacking techniques used by malicious hackers.,Investigate cyberattacks and incidents within the dark web, email, and malware, also implementing defeating anti-forensics techniques.\",\"shortDescription\":\"Learn skills in network defense, ethical hacking, and digital forensics. Each offers an industry recognized Cybersecurity certification that helps students and early career professionals learn real-world skills required in today’s cybersecurity field.\",\"productOverview\":\"$34b\",\"objectId\":\"program-b7a5320e-1845-481a-9db2-acbfff715ccf\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1c6f7157-3148-4359-b6f2-6c2e4f527151\",\"productName\":\"Principles of Cybersecurity\",\"productSlug\":\"masters/micromasters/usmx-principles-of-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/1c6f7157-3148-4359-b6f2-6c2e4f527151-5823c786e072.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University System of Maryland\",\"University of Maryland Baltimore County\"],\"partnerKeys\":[\"USMx\",\"UMBC\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\",\"fullDescription\":\"Describe the principles of cybersecurity.,Identify cybersecurity issues in a specific organization.,Describe the significant components of incident response, disaster recovery, and business continuity.,Identify the most appropriate authentication factors for a given application.,Describe cryptography tools.\",\"shortDescription\":\"This micromasters is an introduction to cybersecurity.\",\"productOverview\":\"\u003cp\u003eThis MicroMasters provides an introduction to cybersecurity. It focuses on the theory and practice of cybersecurity concepts, shedding light on hacking, theft, and exploitation of information assets. Topics include identity and access management, cryptography, network attacks, wireless security, application security, cloud security, and risk management.\u003c/p\u003e\",\"objectId\":\"program-1c6f7157-3148-4359-b6f2-6c2e4f527151\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"261191da-df4a-480e-b51e-574c1311df9a\",\"productName\":\"Database Basics and Security\",\"productSlug\":\"learn/network-security/ibm-database-basics-and-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/261191da-df4a-480e-b51e-574c1311df9a-b4888be99211.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$34c\",\"shortDescription\":\"\u003cp\u003eThis course is intended to help you prepare for a career in database security. \u003c/p\u003e\\n\u003cp\u003eLearn to secure data, manage roles and permissions, and handle injection vulnerabilities to protect databases from costly breaches and gain in-demand cybersecurity skills.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eExplore the essential data management skills that make you job-ready, with a focus on data protection techniques to effectively protect sensitive information. \u003c/li\u003e\\n\u003cli\u003eDescribe how to configure and manage database user profiles, set up password policies, and assign privileges and roles. \u003c/li\u003e\\n\u003cli\u003eAnalyze potential vulnerabilities in databases, including OS command and SQL injection, and learn how to protect against such security threats. \u003c/li\u003e\\n\u003cli\u003eDevelop robust database and application auditing models to ensure transparency and security in data management processes.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-261191da-df4a-480e-b51e-574c1311df9a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.4.0+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8b6bd604-70ec-4b82-b3e8-ae7588cdbea8\",\"productName\":\"Cyber Incident Response and Investigation\",\"productSlug\":\"learn/cybersecurity/ibm-cyber-incident-response-and-investigation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8b6bd604-70ec-4b82-b3e8-ae7588cdbea8-be325f17e974.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$34d\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eGain an understanding of network defensive tactics, network access controls, as well as network monitoring tools. This course is part of the IBM Cybersecurity Analyst Professional Certificate!\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eExplain key concepts in threat intelligence\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRecognize different security threats in applications as well as common vulnerabilities \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDescribe network defensive tactics, data loss prevention, and endpoint protection concepts and tools \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDifferentiate between various scanning technologies and how they apply to \u003c/span\u003ecybersecurity\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8b6bd604-70ec-4b82-b3e8-ae7588cdbea8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.6.0+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5aedd74e-bd8c-4828-8b10-4bdab15df7d3\",\"productName\":\"Cyber Risk Supervision\",\"productSlug\":\"learn/economics/the-international-monetary-fund-cyber-risk-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5aedd74e-bd8c-4828-8b10-4bdab15df7d3-b8543912f234.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"The International Monetary Fund\"],\"partnerKeys\":[\"IMFx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a655d538-b1e8-4f66-a99d-cf4682d2c17b-111a45d036cc.png\",\"fullDescription\":\"\u003cp\u003eAs the reliance of the financial sector on Information Technology and the interconnectedness of systems continue to rise, cybersecurity has become a financial stability risk. Financial supervisors need to understand the nature of the risk, learn the essential concepts of cyber risk management, and acquire basic skills needed for effective regulation and supervision.\u003c/p\u003e\\n\u003cp\u003eTo this end, the course will lay out the cyber risk landscape for financial institutions, core principles of sound risk management based on the understanding of IT architectures, and approaches to regulations and effective supervisory practices. Course developed with the financial support of the Financial Sector Stability Fund (FSSF) and the Government of Japan.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAs the reliance of the financial sector on Information Technology and the interconnectedness of systems continue to rise, cybersecurity has become a financial stability risk. Financial supervisors need to understand the nature of the risk, learn the essential concepts of cyber risk management, and acquire basic skills needed for effective regulation and supervision.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon completion of this course, participants should be able to: Demonstrate an understanding of the cyber threat landscape Identify key drivers of cyber risk Explain approaches to cyber risk management Assess risk management practices Understand the concepts in framing cyber risk regulations Learn elements of cyber risk supervision Identify key situations that require expert supervision\u003c/p\u003e\",\"objectId\":\"course-5aedd74e-bd8c-4828-8b10-4bdab15df7d3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IMFx+CRSx+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6bddeb2f-57d0-4fdb-9d70-ef9706592a4c\",\"productName\":\"Try It: Learn Linux Command Line\",\"productSlug\":\"learn/linux/edx-try-it-learn-linux-command-line\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6bddeb2f-57d0-4fdb-9d70-ef9706592a4c-baabbc8d9125.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"edX\"],\"partnerKeys\":[\"edX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"\u003cp\u003eThe command line is a versatile, text-based interface; IT and cybersecurity specialists can accomplish a multitude of tasks on their machines by giving computer lines text-based commands. This introductory course from edX will illustrate common commands that IT and cyber professionals use to search and find important files within the computer operating system known as Linux. In this free intro course, you will learn: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe command-line interface and the terminal\u003c/li\u003e\\n\u003cli\u003eThe differences between a GUI and a terminal\u003c/li\u003e\\n\u003cli\u003eAdvantages of the terminal\u003c/li\u003e\\n\u003cli\u003eFile system navigation commands\u003c/li\u003e\\n\u003cli\u003eDirectories, files, and data points\u003c/li\u003e\\n\u003cli\u003eThe “find” command\u003c/li\u003e\\n\u003cli\u003eThe “grep” command\u003c/li\u003e\\n\u003cli\u003eBy the end of the course, you will be able to:\u003c/li\u003e\\n\u003cli\u003eUse Linux terminal commands. \u003c/li\u003e\\n\u003cli\u003eNavigate and find important files, directories, and data points.\u003c/li\u003e\\n\u003cli\u003eCommunicate how cybersecurity professionals use basic commands to complete a security investigation.\u003c/li\u003e\\n\u003c/ul\u003e\",\"shortDescription\":\"\u003cp\u003eIf you are looking to get into cybersecurity or IT, learning the Linux command line would be a great starting point.\u003c/p\u003e\\n\u003cp\u003eLinux command line powers much of the internet’s infrastructure, and learning basic security commands can help you advance your cybersecurity career. Gain highly marketable skills in this free, no-risk introductory course.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to navigate the command-line interface.\u003c/li\u003e\\n\u003cli\u003eHow to use terminal commands.\u003c/li\u003e\\n\u003cli\u003eHow to find important files, directories, and data points.\u003c/li\u003e\\n\u003cli\u003eHow to use basic security commands. \u003c/li\u003e\\n\u003cli\u003eHow to apply this skill to your career.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6bddeb2f-57d0-4fdb-9d70-ef9706592a4c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:edX+BCT-linux-command+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"97112c48-401e-47b7-9da7-dfeb2ebcb3ba\",\"productName\":\"Mobile Payment Security\",\"productSlug\":\"learn/cybersecurity/new-york-university-mobile-payment-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/97112c48-401e-47b7-9da7-dfeb2ebcb3ba-ec6355646e62.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Business \u0026 Management\"],\"partnerName\":[\"New York University\"],\"partnerKeys\":[\"NYUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/dc6d25de-0dac-43e6-a915-e362bf8b4403-917c4e000b69.png\",\"fullDescription\":\"$34e\",\"shortDescription\":\"\u003cp\u003eThis cybersecurity course for professionals explores the core concepts of mobile payment security. Whether you are an analyst, architect, or administrator, this course will help you uncover the issues that inform any mobile payment implementation.\u003c/p\u003e\",\"productOverview\":\"$34f\",\"objectId\":\"course-97112c48-401e-47b7-9da7-dfeb2ebcb3ba\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:NYUx+CSEDX221+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"23ed8d2e-5ca3-47d4-9971-ec7749c5c18b\",\"productName\":\"Digital Technology and Innovation\",\"productSlug\":\"learn/digital-transformation/indiana-university-digital-technology-and-innovation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-4add34fa66fa.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Indiana University\"],\"partnerKeys\":[\"IUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8946fb40-f288-4e05-9275-9e9b4689bda8-e58c545e2296.png\",\"fullDescription\":\"\u003cp\u003e\u003cstrong\u003eThis course will be retired.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eIn developing the digital ecosystem, a CIO adds value by strategically infusing business with innovative digital technologies. This requires an understanding of the range of technologies that are transforming the way business is done. Additionally, a successful CIO must be able to manage the adoption, implementation, and diffusion of tech within an organization. This includes analyzing the role of innovation and executing change strategies.\u003c/p\u003e\\n\u003cp\u003eThis course helps prepare professionals for digital transformation skills at the intersection of business and technology.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLook at digital technology and innovation from the perspective of a chief information officer (CIO). Learn about Agile frameworks, cybersecurity and risk management, IT investments, and vendor management.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe role of the CIO\u003c/li\u003e\\n\u003cli\u003eKey topics in IT management, including management of IT investments, IT portfolios, vendors, talent, and organizational change\u003c/li\u003e\\n\u003cli\u003eIT project management including the role of Agile frameworks\u003c/li\u003e\\n\u003cli\u003eCybersecurity and risk management\u003c/li\u003e\\n\u003cli\u003eEnterprise data management, business analytics, and machine learning\u003c/li\u003e\\n\u003cli\u003eThe role of emerging technologies. such as blockchain and distributed trust, artificial intelligence, and robotic process automation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-23ed8d2e-5ca3-47d4-9971-ec7749c5c18b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IUx+BUKD-X591+2T2023a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"315ce06a-d9f7-4c7e-ac11-1fe99e20893e\",\"productName\":\"CS50's Computer Science for Lawyers\",\"productSlug\":\"learn/computer-science/harvard-university-cs50-s-computer-science-for-lawyers\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/315ce06a-d9f7-4c7e-ac11-1fe99e20893e-07b519ab21bc.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Law\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$350\",\"shortDescription\":\"\u003cp\u003eThis course is a variant of Harvard University's introduction to computer science, CS50, designed especially for lawyers (and law students).\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eComputational Thinking\u003c/li\u003e\\n\u003cli\u003eProgramming Languages\u003c/li\u003e\\n\u003cli\u003eAlgorithms, Data Structures\u003c/li\u003e\\n\u003cli\u003eCryptography\u003c/li\u003e\\n\u003cli\u003eCybersecurity\u003c/li\u003e\\n\u003cli\u003eInternet Technologies, Cloud Computing\u003c/li\u003e\\n\u003cli\u003eWeb Programming\u003c/li\u003e\\n\u003cli\u003eDatabase Design\u003c/li\u003e\\n\u003cli\u003eCybersecurity, continued\u003c/li\u003e\\n\u003cli\u003eChallenges at the Intersection of Law and Technology\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-315ce06a-d9f7-4c7e-ac11-1fe99e20893e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+CS50L+Law\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4d3258fc-bcee-4c37-bf7a-9f22524bf4a7\",\"productName\":\"Human-Computer Interaction I: Fundamentals \u0026 Design Principles\",\"productSlug\":\"learn/human-computer-interaction/the-georgia-institute-of-technology-human-computer-interaction-i-fundamentals-design-principles\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-050cbdf42229.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$351\",\"shortDescription\":\"\u003cp\u003eLearn the principles of Human-Computer Interaction to create intuitive, usable interfaces, with established design principles like feedback cycles, direct manipulation, affordances, signifiers, and more.\u003c/p\u003e\",\"productOverview\":\"$352\",\"objectId\":\"course-4d3258fc-bcee-4c37-bf7a-9f22524bf4a7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HCIxI+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ee591393-3e24-456f-b569-266843f60149\",\"productName\":\"Industry 4.0: How to Revolutionize your Business\",\"productSlug\":\"learn/industrial-engineering/the-hong-kong-polytechnic-university-industry-4-0-how-to-revolutionize-your-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ee591393-3e24-456f-b569-266843f60149-cc82de257f3b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Engineering\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"$353\",\"shortDescription\":\"\u003cp\u003eAn introduction to the fourth industrial revolution, it's major systems and technologies and how new products and services will impact business and society.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the various stages of industrial revolutions\u003c/li\u003e\\n\u003cli\u003eUnderstand the Future of Work and the skills needed\u003c/li\u003e\\n\u003cli\u003eThe drivers, enablers and compelling forces for Industry 4.0’s advancement\u003c/li\u003e\\n\u003cli\u003eSmart factories and howthey compare to existing ones\u003c/li\u003e\\n\u003cli\u003eUnderstand whatInternet of Thing (IoT) and Industrial Internet of Things (IIoT)\u003c/li\u003e\\n\u003cli\u003ePredictive Analysis, Big Data leading to data-driven decisions and automation\u003c/li\u003e\\n\u003cli\u003eCyber Physical Systems and other major systems in Industry 4.0\u003c/li\u003e\\n\u003cli\u003eUnderstand the role and importance of data and cloud computing\u003c/li\u003e\\n\u003cli\u003eHow to use the Cloud to support human-machine collaborative efforts\u003c/li\u003e\\n\u003cli\u003eThe use of collaborative robots\u003c/li\u003e\\n\u003cli\u003eExamples of smart automations, products and services\u003c/li\u003e\\n\u003cli\u003eThe challenges in cybersecurity and how to reduce them\u003c/li\u003e\\n\u003cli\u003eHow organizations and knowledge workers can better prepare for Industry 4.0\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ee591393-3e24-456f-b569-266843f60149\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+I4.0x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6f1b2799-5dc5-4161-bf32-240df6af2924\",\"productName\":\"Cyber Defense Architecture\",\"productSlug\":\"learn/computer-science/ibm-cybersecurity-architecture\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6f1b2799-5dc5-4161-bf32-240df6af2924-c031b06ed1db.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$354\",\"shortDescription\":\"\u003cp\u003eGet job-ready skills in cyber defense architecture and hands-on experience using tools and practices employers are looking for.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eJob-ready skills in cyber defense architecture supported by hands-on experience employers value in just 5 weeks. \u003c/li\u003e\\n\u003cli\u003eThe five foundational cybersecurity principles and the confidentiality, integrity, and availability (CIA) triad. \u003c/li\u003e\\n\u003cli\u003eVarious security domains, including identity and access management (IAM), endpoint security, network security, application security, and data security. \u003c/li\u003e\\n\u003cli\u003eThe core areas a cybersecurity architect must address to design a secure enterprise solution. \u003c/li\u003e\\n\u003cli\u003eHow to apply network security improvement techni\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6f1b2799-5dc5-4161-bf32-240df6af2924\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0112EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"469322bd-be3c-4fb4-a214-651aeca2bed7\",\"productName\":\"Introduction to DevSecOps for Managers\",\"productSlug\":\"learn/devsecops/the-linux-foundation-introduction-to-devsecops-for-managers\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/469322bd-be3c-4fb4-a214-651aeca2bed7-d362ce383d2f.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"$355\",\"shortDescription\":\"\u003cp\u003eGet an overview of the history, terminology, processes, and tools used to adopt Continuous Delivery and DevSecOps within any organization.\u003c/p\u003e\",\"productOverview\":\"$356\",\"objectId\":\"course-469322bd-be3c-4fb4-a214-651aeca2bed7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:LinuxFoundationX+LFS180x+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d72cb271-b1ed-4881-bc87-dbcc16708307\",\"productName\":\"Human-Computer Interaction IV: Evaluation, Agile Methods \u0026 Beyond\",\"productSlug\":\"learn/human-computer-interaction/the-georgia-institute-of-technology-human-computer-interaction-iv-evaluation-agile-methods-beyond\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d72cb271-b1ed-4881-bc87-dbcc16708307-b03f50bdd766.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$357\",\"shortDescription\":\"\u003cp\u003eComplete your understand of the design life cycle by learning to take interface ideas, prototype them quickly, and evaluate them with real users. Finally, tie principles and methods together and learn the next steps you could take in HCI.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eMethods for qualitative evaluation, including think-aloud studies and post-hoc interviews.\u003c/li\u003e\\n\u003cli\u003eMethods for empirical evaluation, including hypothesis testing and experimental design.\u003c/li\u003e\\n\u003cli\u003eMethods for heuristic evaluation, such as cognitive walkthroughs and task analysis.\u003c/li\u003e\\n\u003cli\u003eThe symbiosis between HCI and Agile development cycles.\u003c/li\u003e\\n\u003cli\u003eThe current state of HCI technologies such as extended reality, mobile devices, and robotics.\u003c/li\u003e\\n\u003cli\u003eThe current state of HCI in domains like education, healthcare, and cybersecurity.\u003c/li\u003e\\n\u003cli\u003eThe significant sub-schools of HCI such as social computing, computer-supported collaborative work, and information visualization.\u003c/li\u003e\\n\u003cli\u003eWhat you can expect to do next in HCI.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d72cb271-b1ed-4881-bc87-dbcc16708307\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HCIxIV+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c\",\"productName\":\"Humanitarian Action in the Digital Age\",\"productSlug\":\"learn/computer-programming/ecole-polytechnique-federale-de-lausanne-humanitarian-action-in-the-digital-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c-e3c92e427041.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Humanities\"],\"partnerName\":[\"École polytechnique fédérale de Lausanne\"],\"partnerKeys\":[\"EPFLx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f244695-7416-4c6c-a2a9-97769b6acb56-a2dc5dd735ab.png\",\"fullDescription\":\"\u003cp\u003eAs humanitarian practitioner, you are interested in technology but you feel it should be used more responsibly? You are worried people tend to jump on opportunities without properly considering risks? This MOOC is for you!\u003c/p\u003e\\n\u003cp\u003eThis course will first introduce you to the basics of computer and data science and help you understand what happens underneath the surface when using a computer, the internet or social media. You will then dive into some more complex technologies like artificial intelligence, cryptography or distributed ledgers. Equipped with this knowledge, you will then explore with world-leading experts how to use technology responsibly, covering topics such as accountability, ethics, data protection, the do no harm principle and inclusion.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThe first MOOC about responsible use of technology for humanitarians. Learn about technology and identify risks and opportunities when designing digital solutions.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis MOOC will initially provide you with a holistic understanding of Information and Communication Technologies (ICT) – including:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComputers, network, internet and cloud computing\u003c/li\u003e\\n\u003cli\u003eSoftware, data and digital transformation\u003c/li\u003e\\n\u003cli\u003eCryptography, cybersecurity and privacy\u003c/li\u003e\\n\u003cli\u003eArtificial Intelligence and Distributed Ledgers\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eOnce you have a better grasp of technology, you will explore these topics through a humanitarian lens:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eEthics, accountability and the “do no harm” principle\u003c/li\u003e\\n\u003cli\u003eChallenges for humanitarian principles in the digital age\u003c/li\u003e\\n\u003cli\u003eData protection and cybersecurity\u003c/li\u003e\\n\u003cli\u003eDigital inclusion and human centered design.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EPFLx+DHA+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"267becdc-0e84-4341-8976-2c27ac6c079d\",\"productName\":\"Cyber Security Economics\",\"productSlug\":\"learn/cybersecurity/delft-university-of-technology-cyber-security-economics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/267becdc-0e84-4341-8976-2c27ac6c079d-b82729981b0c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Social Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$358\",\"shortDescription\":\"Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eSound understanding of the economics of cybersecurity as a systems discipline, from security policies (modelling what ought to be protected) to mechanisms (how to implement the protection goals)\u003c/li\u003e\\r\\n\u003cli\u003eHow to design security metrics to capture information security issues\u003c/li\u003e\\r\\n\u003cli\u003eHow the design of effective policies to enhance and maintain cybersecurity must take into account a complex set of incentives facing not only the providers and users of the Internet and computer software, but also those of potential attackers\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-267becdc-0e84-4341-8976-2c27ac6c079d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+Secon101x+3T_2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8cdc3419-2ba3-492f-af12-6be4eb8e2b63\",\"productName\":\"Check Point Jump Start: Quantum Management\",\"productSlug\":\"learn/cybersecurity/check-point-software-technologies-ltd-check-point-jump-start-quantum-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8cdc3419-2ba3-492f-af12-6be4eb8e2b63-7aa6734455e2.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$359\",\"shortDescription\":\"\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.This course includes these modules:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003e\\n\u003cp\u003eIntro\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInstalling Gaia\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eRunning the First Time Wizard.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInstalling SmartConsole\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstablish SIC\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCreate \u0026amp; installing Policy\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable application control blade\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable IDA blade\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable HTTPS Inspection\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable Autonomous Threat Prevention\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAdding License\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCPUSE SmartConsole\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eGathering cpinfo\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ol\u003e\\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\",\"productOverview\":\"$35a\",\"objectId\":\"course-8cdc3419-2ba3-492f-af12-6be4eb8e2b63\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs09+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/8cdc3419-2ba3-492f-af12-6be4eb8e2b63-38fa27562737.png\"},{\"productUuid\":\"126d971a-6bb6-45a0-b7e7-cb5aca63c437\",\"productName\":\"Check Point Jump Start: Harmony Mobile\",\"productSlug\":\"learn/computer-programming/check-point-software-technologies-ltd-check-point-jump-start-harmony-mobile\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/126d971a-6bb6-45a0-b7e7-cb5aca63c437-2b224581fcec.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$35b\",\"shortDescription\":\"$35c\",\"productOverview\":\"$35d\",\"objectId\":\"course-126d971a-6bb6-45a0-b7e7-cb5aca63c437\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs10+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/126d971a-6bb6-45a0-b7e7-cb5aca63c437-9413d93574a7.png\"},{\"productUuid\":\"23de0af4-bd77-4404-93d5-b83919397f00\",\"productName\":\"Check Point Jump Start: CloudGuard Posture Management\",\"productSlug\":\"learn/computer-security/check-point-software-technologies-ltd-check-point-jump-start-cloudguard-posture-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/23de0af4-bd77-4404-93d5-b83919397f00-20782659bb9b.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$35e\",\"shortDescription\":\"\u003cp\u003eIn this course, you will learn about what is Posture Management, why you need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud Protection.\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLesson 1 - What is Posture Management?\u003c/li\u003e\\n\u003cli\u003eLesson 2 – What are the Cloud Security Challenges?\u003c/li\u003e\\n\u003cli\u003eLesson 3 - What is Check Point CloudGuard Posture Management?\u003c/li\u003e\\n\u003cli\u003eLesson 4 - How does CloudGuard Posture Management Work?\u003c/li\u003e\\n\u003cli\u003eLesson 5 – CloudGuard Posture Management Course Summary\u003c/li\u003e\\n\u003cli\u003eLesson 6 – Posture Management Demo Lab\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"$35f\",\"objectId\":\"course-23de0af4-bd77-4404-93d5-b83919397f00\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs06+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6fcfceea-c85e-45e1-9319-af55bb739e41\",\"productName\":\"Information Technology (IT) Support PC\",\"productSlug\":\"certificates/professional-certificate/ibm-information-technology-support\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6fcfceea-c85e-45e1-9319-af55bb739e41-f654753399d3.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"Develop key technical knowledge and up-to-date skills in preparation for a rewarding career in IT and technical support.,Demonstrate in-demand hardware and software skills that help users select, install, and configure their devices, operating systems, and applications.,Build essential computer networking, cybersecurity, and cloud computing skills that IT Support and Helpdesk specialists need to be successful.,Practice customer service and troubleshooting skills through hands-on labs, demos, and interactive exercises to become job-ready.\",\"shortDescription\":\"\",\"productOverview\":\"$360\",\"objectId\":\"program-6fcfceea-c85e-45e1-9319-af55bb739e41\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":7,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c6912ab6-168f-4b52-ad44-d706eb779b30\",\"productName\":\"IT Project Manager\",\"productSlug\":\"certificates/professional-certificate/ibm-it-project-manager\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c6912ab6-168f-4b52-ad44-d706eb779b30-9e521b49fc2b.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"IBM\",\"SkillUp EdTech LLC\"],\"partnerKeys\":[\"IBM\",\"SkillUp-EdTech\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"Gain comprehensive, job-ready IT project management skills employers are looking for in just 4 months. No prior experience required.,Master essential project management techniques, including planning, tracking, and managing projects to ensure successful outcomes.,Understand Agile and Scrum methodologies, focusing on adaptive planning, iterative development, and continuous improvement to enhance project delivery.,Develop a strong technical foundation in IT concepts such as hardware, software, cybersecurity, and cloud computing, crucial for overseeing IT projects.,Learn how to apply practical skills to real-world scenarios, handling project timelines, resources, and challenges within the IT project lifecycle.\",\"shortDescription\":\"Get job-ready IT project management skills, including Agile, SDLC and technical expertise, plus prepare for the industry-recognized CAPM certification in just 4 months. No prior experience required.\",\"productOverview\":\"$361\",\"objectId\":\"program-c6912ab6-168f-4b52-ad44-d706eb779b30\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":11,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/c6912ab6-168f-4b52-ad44-d706eb779b30-4babe548496c.png\"},{\"productUuid\":\"b4a39986-e5b2-418d-9c07-9e42cc88a611\",\"productName\":\"Secure Software Development Fundamentals\",\"productSlug\":\"certificates/professional-certificate/linuxfoundationx-secure-software-development-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/b4a39986-e5b2-418d-9c07-9e42cc88a611-03dc0da3e6a4.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"Security basics: Learn about risk management, the “CIA” triad, and requirements.,Secure design principles: Discuss principles such as “least privilege” and how to apply these principles.,Supply chain evaluation: Learn tips on how to choose packages to reuse, and how to reuse them so that you can rapidly be alerted \u0026 update the software.,Implementation: Learn how to implement more secure software (how to do input validation, process data securely, call out to other programs, and send output), and more specialized approaches (such as basics of cryptography and handling problems).,Security Verification: Learn how to examine software, include some key tool types, how to apply them in continuous integration (CI).,Fielding: Learn how to deploy and operate secure software, handle vulnerability reports, and how to rapidly update when reused components have publicly-known vulnerabilities.,Learn how to securely use and develop open source software.\",\"shortDescription\":\"Learn to develop secure software to reduce the damage and speed the response when a vulnerability is exploited\",\"productOverview\":\"$362\",\"objectId\":\"program-b4a39986-e5b2-418d-9c07-9e42cc88a611\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"85c0b1b3-5b87-42a0-abc9-8c3fbcacc4a3\",\"productName\":\"The Foundations of Financial Crime Prevention\",\"productSlug\":\"certificates/professional-certificate/ica-the-foundations-of-financial-crime-prevention\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/85c0b1b3-5b87-42a0-abc9-8c3fbcacc4a3-6068e1b99f74.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Law\",\"Ethics\",\"Economics \u0026 Finance\"],\"partnerName\":[\"International Compliance Association\"],\"partnerKeys\":[\"ICA\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2fbf20d4-e3c3-4d2f-a0b2-4ce3221a5a93-08d4306ee81f.png\",\"fullDescription\":\"Understand what financial crime is, its associated risks, and how to mitigate them.,Learn about fraud controls in banking and various fraud typologies.,Gain insights into identity theft and cybercrime to safeguard against these threats.,Delve into the complexities of bribery and corruption, and how such practices can be prevented.,Understand the importance of a robust fraud response policy and other combative measures to financial crime.\",\"shortDescription\":\"Master your understanding of financial crime, fraud, bribery, and corruption and how to identify and manage these risks effectively.\",\"productOverview\":\"$363\",\"objectId\":\"program-85c0b1b3-5b87-42a0-abc9-8c3fbcacc4a3\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9a18f293-0cb9-447a-a0ec-532c527bb72e\",\"productName\":\"Database Management Systems\",\"productSlug\":\"masters/micromasters/umbc-database-management-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/9a18f293-0cb9-447a-a0ec-532c527bb72e-c08c19fab1d8.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Maryland Baltimore County\",\"University System of Maryland\"],\"partnerKeys\":[\"UMBC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/097ca727-d3f4-43d0-8baf-9baf23c1314b-29d4b0840da2.png\",\"fullDescription\":\"Build design models of databases.,Create Relational databases.,Create NoSQL databases.,Gain experience with multiple database technologies.\",\"shortDescription\":\"In this program, you will learn all of the skills needed for Database Administrators that work with both Relational Databases and NoSQL Databases. Topics cover creating databases and interacting with data within the databases.\",\"productOverview\":\"\u003cp\u003eDatabases are pervasive in corporations, government agencies and almost any organization across the globe. A number of jobs work solely with databases, like Database Administrator, Database Developer and Database Architect. Numerous other in-demand occupations also need to have database skills, including Software Engineers, Data Scientists and Cybersecurity Engineers. For many decades, organizations have been using Relational Databases. But recently, a new type of database has begun to emerge, NoSQL Databases, adding complexity for professionals seeking to learn how to use database management systems.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eIn this program, you will learn all aspects needed to work as a Database Administrator and Architect and will learn key database skills beneficial in other occupations. The program covers both Relational Databases and NoSQL Databases. It also covers how to create your own databases and how to interact with the data within them.\u003c/p\u003e\",\"objectId\":\"program-9a18f293-0cb9-447a-a0ec-532c527bb72e\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e163116f-1355-4179-9859-cae7e77684c0\",\"productName\":\"Software Defined Networking (SDN)\",\"productSlug\":\"certificates/professional-certificate/curtinx-software-defined-networking\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/e163116f-1355-4179-9859-cae7e77684c0-8a8da5de490c.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Curtin University\"],\"partnerKeys\":[\"CurtinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/afb92a21-674a-4636-b83b-17e3fef7243d-82515dc77939.png\",\"fullDescription\":\"Understand innovations in Network Automation using Software Defined Networking, Intent Based Networking, and Network Function Virtualisation.,Explore security as a service using SDN and NFV.,Gain a deeper understanding of zero-trust security.,Engage in the deployment of Virtual Network Function (VNF) on a practical testbed.,Apply SDN/NFV knowledge for local and global orchestration.\",\"shortDescription\":\"\",\"productOverview\":\"$364\",\"objectId\":\"program-e163116f-1355-4179-9859-cae7e77684c0\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d2fb4b76-e398-42d8-9835-970a49678fa3\",\"productName\":\"Computer Forensics\",\"productSlug\":\"learn/computer-forensics/rochester-institute-of-technology-computer-forensics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d2fb4b76-e398-42d8-9835-970a49678fa3-61141c84d306.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eDigital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.\u003c/p\u003e\\n\u003cp\u003eIn this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.\u003c/p\u003e\\n\u003cp\u003eThis offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCourt admissibility investigative procedures\u003c/li\u003e\\n\u003cli\u003eAttributes of various Windows and Unix/Linux file systems and file recovery processes\u003c/li\u003e\\n\u003cli\u003eTo identify and apply appropriate forensics tools to acquire, preserve and analyze system image\u003c/li\u003e\\n\u003cli\u003eReview and critique a forensics report\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d2fb4b76-e398-42d8-9835-970a49678fa3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER502x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9ff9b63d-f504-424c-978a-be0b6fab8e96\",\"productName\":\"Network Security\",\"productSlug\":\"learn/network-security/rochester-institute-of-technology-network-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9ff9b63d-f504-424c-978a-be0b6fab8e96-8f0e4620200d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eIn this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.\u003c/p\u003e\\n\u003cp\u003eThe issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.\u003c/p\u003e\\n\u003cp\u003eYou will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.\u003c/p\u003e\\n\u003cp\u003eYou will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.\u003c/p\u003e\\n\u003cp\u003eThis course is a part of the RITx Cybersecurity MicroMasters Program.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to identify when attacks are happening inside networks\u003c/li\u003e\\n\u003cli\u003eHow to collect evidence of network intrusions\u003c/li\u003e\\n\u003cli\u003eHow to test networks and systems for vulnerabilities\u003c/li\u003e\\n\u003cli\u003eHow to prepare for and defend against network attacks\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9ff9b63d-f504-424c-978a-be0b6fab8e96\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER504x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7a1a677e-be4c-4e1d-9630-2d60323db911\",\"productName\":\"Introduction to Cloud Computing\",\"productSlug\":\"learn/cloud-computing/ibm-introduction-to-cloud-computing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7a1a677e-be4c-4e1d-9630-2d60323db911-82b7d78fcc53.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$365\",\"shortDescription\":\"\u003cp\u003eJumpstart your cloud expertise and explore offerings of AWS, Google, and IBM; delve into IaaS, PaaS, SaaS models, and cloud security. Experience IBM Cloud app deployment. Perfect for executives, students, and budding professionals.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eAfter completing this course, a learner will be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eDefine cloud computing and explain essential characteristics, history, the business case for Cloud, and the emerging technologies enabled by Cloud.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eDescribe Cloud service models, including IaaS, PaaS, SaaS\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eDescribe Public, Private, and Hybrid Cloud deployment models.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eExplain Cloud infrastructure components.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eExplain emerging cloud-related trends, including Hybrid, Multicloud, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eList and describe services of popular cloud platforms, including AWS, Microsoft Azure, Google Cloud, IBM Cloud, Alibaba Cloud, and others.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7a1a677e-be4c-4e1d-9630-2d60323db911\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CC0101EN+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7f08e72a-2a5c-4d51-aad1-28e8048167eb\",\"productName\":\"Operating Systems and Security\",\"productSlug\":\"learn/cybersecurity/ibm-cybersecurity-roles-and-operating-system-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7f08e72a-2a5c-4d51-aad1-28e8048167eb-38d00266f6cc.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$366\",\"shortDescription\":\"\u003cp\u003eThis course focuses on the foundational concepts common to all operating systems and the unique aspects of Windows, Linux, and macOS.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAdvance your front-end development career with interactive web applications using JavaScript technologies such as React, JSX, and ES6. \u003c/li\u003e\\n\u003cli\u003eBuild dynamic client-side applications quickly and easily with reusable React components. \u003c/li\u003e\\n\u003cli\u003eMake your components flexible and scalable with features including props, states, hooks, forms, and Redux. \u003c/li\u003e\\n\u003cli\u003eDemonstrate your React aptitude by building several front-end applications such as a shopping cart.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7f08e72a-2a5c-4d51-aad1-28e8048167eb\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+Cybfun.2.0+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"efc25613-f0ea-4423-bfcd-4d94c317f085\",\"productName\":\"Tech for Good: The Role of ICT in Achieving the SDGs\",\"productSlug\":\"learn/technology/sdg-academy-tech-for-good-the-role-of-ict-in-achieving-the-sdgs\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/efc25613-f0ea-4423-bfcd-4d94c317f085-5dd84e82e22b.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Data Analysis \u0026 Statistics\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"SDG Academy\"],\"partnerKeys\":[\"SDGAcademyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0152661c-94b4-44ff-ad5d-54528339c1b0-516950c54c28.png\",\"fullDescription\":\"$367\",\"shortDescription\":\"\u003cp\u003eWhat opportunities and challenges do digital technologies present for the development of our society?\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eICT can improve access to knowledge and services, promote transparency, and encourage collaboration\u003c/li\u003e\\n\u003cli\u003eResponsible collection and use of data requires governance, security, and trust\u003c/li\u003e\\n\u003cli\u003eICT projects should be contextualized and inclusive\u003c/li\u003e\\n\u003cli\u003eTechnology is \u003cem\u003enot\u003c/em\u003e neutral! Be aware of bias in design and implementation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-efc25613-f0ea-4423-bfcd-4d94c317f085\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:SDGAcademyX+ICT001+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d04bae51-9058-45bc-9b1b-92ecc929bfcf\",\"productName\":\"Networking Basics and Security\",\"productSlug\":\"learn/computer-science/ibm-networking-basics-and-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d04bae51-9058-45bc-9b1b-92ecc929bfcf-240e23de81d7.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$368\",\"shortDescription\":\"\u003cp\u003eLearn the essentials of computer networking and network security. This course provides hands-on experience in securing networks, configuring devices, and applying network security techniques.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eApply sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions \u003c/li\u003e\\n\u003cli\u003eApply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets \u003c/li\u003e\\n\u003cli\u003eInstall, configure, apply patches, and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems \u003c/li\u003e\\n\u003cli\u003ePerform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d04bae51-9058-45bc-9b1b-92ecc929bfcf\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+SE0202EN+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1d806edf-67a7-47c1-aa89-012702eba0d8\",\"productName\":\"Information Technology (IT) Fundamentals for Everyone\",\"productSlug\":\"learn/computer-science/ibm-information-technology-it-fundamentals-for-everyone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1d806edf-67a7-47c1-aa89-012702eba0d8-a5fc18765bdd.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$369\",\"shortDescription\":\"\u003cp\u003eBuild the job-ready IT and non-technical IT skills in just six weeks. Plus, gain practical experience you can discuss in the interviews. No prior IT experience is required.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eJob-ready IT skills non-technical project professionals need in just 6 weeks, supported by practical experience employers look for on a resume and an industry-recognized credential. \u003c/li\u003e\\n\u003cli\u003eThe essentials of operating systems, computer components, programming concepts, databases, and the difference between commercial and open software. \u003c/li\u003e\\n\u003cli\u003eThe importance of computer networks, including wired and wireless connections; explore network resources and storage types in MS Windows. \u003c/li\u003e\\n\u003cli\u003eHow to protect against security threats, address public browsing security concerns, and list password management best practices. \u003c/li\u003e\\n\u003cli\u003eThe benefits of cloud computing and an understanding of the cloud infrastructure layer, virtual machines, and the features of ticketing systems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1d806edf-67a7-47c1-aa89-012702eba0d8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0110EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"759db122-3782-4f72-8215-67be70e4b2f8\",\"productName\":\"Fundamentos de Ciberseguridad: un enfoque práctico\",\"productSlug\":\"learn/cybersecurity/inter-american-development-bank-fundamentos-de-ciberseguridad-un-enfoque-practico\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/759db122-3782-4f72-8215-67be70e4b2f8-b7948b4d5a19.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Inter-American Development Bank\",\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"IDBx\",\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f87a494a-5b61-4c1c-b9ff-0fefec519326-6ea0a51177d0.png\",\"fullDescription\":\"$36a\",\"shortDescription\":\"\u003cp\u003e\u003cstrong\u003eAprende a pensar como un hacker, pero actúa como un experto en ciberseguridad.\u003c/strong\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLos principales conceptos sobre amenazas, como son el cibercrimen o la ciberguerra.\u003c/li\u003e\\n\u003cli\u003eTécnicas y herramientas aplicadas en informática forense.\u003c/li\u003e\\n\u003cli\u003eProcesos y herramientas de ingeniería inversa.\u003c/li\u003e\\n\u003cli\u003eConceptos y herramientas sobre la gestión de redes para ciberdefensa.\u003c/li\u003e\\n\u003cli\u003eTipos y características de malware y amenazas persistentes avanzadas (APTs).\u003c/li\u003e\\n\u003cli\u003eGestión de vulnerabilidades, junto con pruebas de penetración.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-759db122-3782-4f72-8215-67be70e4b2f8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IDB_UC3Mx+IDB_UC3M.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ff83dde2-2442-4712-b380-0ec00a9fe4f7\",\"productName\":\"Digitalization of Intelligent and Integrated Energy Systems\",\"productSlug\":\"learn/energy/delft-university-of-technology-digitalization-of-intelligent-and-integrated-energy-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ff83dde2-2442-4712-b380-0ec00a9fe4f7-8b396efdfbac.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$36b\",\"shortDescription\":\"\u003cp\u003eLearn where and how to apply intelligence to the energy grid to create a digitalized, automated, integrated and optimized energy system. The course discusses state-of-the-art digital technologies, so you are at the forefront of the power grid revolution.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eTo recognize the digital transformation in the energy sector, identify challenges and solutions, and evaluate its impact on both the power system and society itself.\u003c/li\u003e\\n\u003cli\u003eTo analyse the IT-OT infrastructure and protocols of the digitalized power system, identify vulnerabilities and learn how to mitigate and recover from these cyber threats.\u003c/li\u003e\\n\u003cli\u003eTo compare the different model types used for numerical simulations of energy systems and evaluate the influence of individual parameters and system models on the simulation performance.\u003c/li\u003e\\n\u003cli\u003eTo explain the different objectives of decision-making in energy systems, and the influence of different units and their properties on the decision making.\u003c/li\u003e\\n\u003cli\u003eTo apply and evaluate machine learning methods for prediction and control in energy systems\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-ff83dde2-2442-4712-b380-0ec00a9fe4f7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+IIES02x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e8bd5363-27d4-4743-a3f2-2b65646e6c71\",\"productName\":\"New Space Economy\",\"productSlug\":\"learn/economics/ecole-polytechnique-federale-de-lausanne-new-space-economy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e8bd5363-27d4-4743-a3f2-2b65646e6c71-ee6b321542d2.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Science\",\"Engineering\"],\"partnerName\":[\"École polytechnique fédérale de Lausanne\"],\"partnerKeys\":[\"EPFLx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f244695-7416-4c6c-a2a9-97769b6acb56-a2dc5dd735ab.png\",\"fullDescription\":\"$36c\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-SG\\\"\u003eThe New Space Economy is a fast-growing market, driven by the commercialization of the historical institutional space sector. This course contains more than 30 videos-lectures from space experts from various fields.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHistory and trends in space\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eManagement of space and impact\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRemote sensing for Earth applications\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRemote communication for Earth applications\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eSpace a unique environment\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRemote geopositioning and navigation\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e8bd5363-27d4-4743-a3f2-2b65646e6c71\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EPFLx+new-space-economyX+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b72fc2e6-963f-4ec6-be14-0dab8807fc66\",\"productName\":\"FinTech Ethics and Risks\",\"productSlug\":\"learn/fintech/university-of-hong-kong-fintech-ethics-and-risks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b72fc2e6-963f-4ec6-be14-0dab8807fc66-566c4faf668d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"The University of Hong Kong\"],\"partnerKeys\":[\"HKUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5024b547-2d68-4bfd-9e9e-1e5f96c13375-c9b5e39fb8af.png\",\"fullDescription\":\"$36d\",\"shortDescription\":\"\u003cp\u003eLearn how individuals and organizations can utilize and regulate blockchain, AI, and other FinTech solutions to ensure their adoption does not come at the expense of societal growth.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the ethical elements of finance, emerging technologies, and FinTech.\u003c/li\u003e\\n\u003cli\u003eIdentify trends and opportunities that will shape the future of FinTech.\u003c/li\u003e\\n\u003cli\u003eCritically examine implications of Artificial Intelligence (AI), blockchain and cryptocurrencies (including ICOs).\u003c/li\u003e\\n\u003cli\u003eUnderstand how Regulatory Technology (RegTech) enhances supervision and reduces compliance-related costs.\u003c/li\u003e\\n\u003cli\u003eUnderstand how payment solutions are evolving and the potential ethical implications.\u003c/li\u003e\\n\u003cli\u003eUnderstand how alternative financing, including crowdfunding and P2P lending, are impacting markets.\u003c/li\u003e\\n\u003cli\u003eAnalyze positive and negative aspects of the introduction and expansion of FinTech.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b72fc2e6-963f-4ec6-be14-0dab8807fc66\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUx+HKU_09x+2T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"eb409cc4-546e-432f-af78-ab81ccbae685\",\"productName\":\"Introduction to Global Governance\",\"productSlug\":\"learn/global-studies/ku-leuven-introduction-to-global-governance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/eb409cc4-546e-432f-af78-ab81ccbae685-9e43cbe68703.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Law\"],\"partnerName\":[\"KU Leuven\"],\"partnerKeys\":[\"KULeuvenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/7205f972-57a3-4313-a7ea-7dfa0645d965-399b53df1455.png\",\"fullDescription\":\"$36e\",\"shortDescription\":\"\u003cp\u003eCritical introduction to the concept, importance and analysis of global governance. In particular, this course provides an overview of the main actors involved in global governance and how these actors manage current key global challenges.\u003c/p\u003e\",\"productOverview\":\"$36f\",\"objectId\":\"course-eb409cc4-546e-432f-af78-ab81ccbae685\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:KULeuvenX+GLOBEx+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"adc58b5a-b7b4-4bc6-84a2-cecc81b94f0c\",\"productName\":\"Check Point Jump Start: CloudGuard Workload Protection and Application Security\",\"productSlug\":\"learn/computer-programming/check-point-software-technologies-ltd-check-point-jump-start-cloudguard-workload-protection-and-application-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/adc58b5a-b7b4-4bc6-84a2-cecc81b94f0c-e551ec971414.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$370\",\"shortDescription\":\"\u003cp\u003eThe purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThe purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.\u003c/p\u003e\",\"objectId\":\"course-adc58b5a-b7b4-4bc6-84a2-cecc81b94f0c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs08+3T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/adc58b5a-b7b4-4bc6-84a2-cecc81b94f0c-b1373a1475b8.png\"},{\"productUuid\":\"f0b2062c-e432-4652-8fd2-0d867506e5e5\",\"productName\":\"The Citizen Developer Mindset: Creating Business Solutions with Design Thinking\",\"productSlug\":\"learn/design-thinking/the-university-of-maryland-college-park-the-citizen-developer-mindset-creating-business-solutions-with-design-thinking\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f0b2062c-e432-4652-8fd2-0d867506e5e5-bfd99f01737f.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"\u003cp\u003eThis course describes the concept of design thinking and how it is used to create empathy for the customer's challenges and needs. Training professionals will use design thinking to create effective training programs designed specifically to help citizen developers succeed. \u003c/p\u003e\\n\u003cp\u003eCitizen developers must work as partners with the IT department. The training department can be the conduit between citizen developers and the IT department. To be good partners, citizen developers need to be trained in these skills:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eCybersecurity essentials.\u003c/li\u003e\\n\u003cli\u003eCollaboration skills and being a good partner.\u003c/li\u003e\\n\u003cli\u003eThe software development lifecycle and when to call in extra help and guidance from the IT Department\u003c/li\u003e\\n\u003c/ul\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to use design thinking to create training programs to teach citizen developers in design thinking.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eTrainers will teach citizen developers Observation techniques to scope out the customer's problem fully.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eTrainers will expose citizen developers to Empathy techniques to help citizen developers better understand the causes of the customer's problem.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eTrainers will teach citizen developers a variety of Solution techniques to develop no-code/low-code apps that will meet the customer’s needs.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eThen, the citizen developer is taught Prototyping techniques to build possible solutions to test how well their no-code/low-code apps solve the customer's problems.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f0b2062c-e432-4652-8fd2-0d867506e5e5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+CITIZEN01+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9b7fdb41-5a79-4010-b547-95f26dd4d810\",\"productName\":\"Introduction to Software Side Channels and Mitigations\",\"productSlug\":\"learn/computer-security/graz-university-of-technology-introduction-to-software-side-channels-and-mitigations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9b7fdb41-5a79-4010-b547-95f26dd4d810-a69d9da5cfa8.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"$371\",\"shortDescription\":\"\u003cp\u003eSide channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Spot and exploit side-channel leakage in simple software programs\u003cbr /\u003e\\n- Use different software-based side channels to extract secret information\u003cbr /\u003e\\n- Connect these security risks with methods to mitigate and close side channels\u003c/p\u003e\",\"objectId\":\"course-9b7fdb41-5a79-4010-b547-95f26dd4d810\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TUGrazX+SCS2+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"463d6f42-eb6c-459b-b957-6fd98963d07d\",\"productName\":\"Zero Trust Architecture – Cyber Security Model\",\"productSlug\":\"learn/computer-science/state-bank-of-india-zero-trust-architecture-cyber-security-model\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/463d6f42-eb6c-459b-b957-6fd98963d07d-e6f716f404b5.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"State Bank of India\"],\"partnerKeys\":[\"State-Bank-of-India\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6fc80e42-95b2-47c6-a5e8-8d76f104cebd-dd0954c7476b.png\",\"fullDescription\":\"$372\",\"shortDescription\":\"\u003cp\u003eThis e-lesson on \u003cstrong\u003eZero Trust Architecture (ZTA) - Cyber Security Model\u003c/strong\u003e provides an essential overview of the Zero Trust security model, which emphasizes the principle of \\\"never trust, always verify.\\\" Participants will learn about key concepts such as identity verification, least privilege access, and continuous monitoring, as well as the critical components of a Zero Trust framework, including micro-segmentation and secure access controls.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUnderstand the principles of Zero Trust Architecture.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eLearn the strategies for implementing Zero Trust Architecture in the organization.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eOvercoming challenges and best practices in zero trust architecture.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eSecuring cloud Infrastructure and applications.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUnderstanding emerging technologies, and standards in zero trust architecture.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDevelop in-demand cyber security skills and become an asset to any organization.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eGain insights into emerging zero trust trends and technologies.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-463d6f42-eb6c-459b-b957-6fd98963d07d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:State-Bank-of-India+SBIIT010x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4d67e5fe-1f51-4f7c-a523-d545cc87fc78\",\"productName\":\"Remote Work Revolution for Everyone\",\"productSlug\":\"learn/remote-work/harvard-university-remote-work-revolution-for-everyone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4d67e5fe-1f51-4f7c-a523-d545cc87fc78-4e11a9fc0776.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$373\",\"shortDescription\":\"\u003cp\u003eIn Remote Work Revolution for Everyone, you will learn to excel in the virtual-work landscape. You will learn how to build trust, increase productivity, use digital tools intelligently, and remain fully aligned with your remote team.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the key elements of remote work and use your knowledge to successfully navigate the remote work environment \u003c/li\u003e\\n\u003cli\u003eDevelop strategies for yourself and your team, improving productivity, communication, and collaboration\u003c/li\u003e\\n\u003cli\u003eUnderstand the types of trust required to be successful in remote working environments—and how to build it\u003c/li\u003e\\n\u003cli\u003eLearn how to select the right digital tools to increase productivity and access to team members\u003c/li\u003e\\n\u003cli\u003eImplement practices that will allow you to be an effective leader and successfully manage a remote team\u003c/li\u003e\\n\u003cli\u003eCreate a plan to relaunch your team into successful remotely working contributors\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4d67e5fe-1f51-4f7c-a523-d545cc87fc78\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+WFH_01+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c9472e61-557d-462b-baa9-5777a0f7bd60\",\"productName\":\"Introduction to Quantum Circuits\",\"productSlug\":\"learn/quantum-computing/the-linux-foundation-introduction-to-quantum-circuits\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c9472e61-557d-462b-baa9-5777a0f7bd60-5a33d1a95a19.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"$374\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of quantum computing and build your capacity for performing quantum experiments using quantum computers on the cloud.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDiscuss the basics of quantum computing\u003c/li\u003e\\n\u003cli\u003eGain an understanding of the technology landscape, specifically the present and future of quantum computing\u003c/li\u003e\\n\u003cli\u003eCreate quantum circuits for various quantum algorithms\u003c/li\u003e\\n\u003cli\u003eInterface with quantum hardware using IBM Q Visual Composer\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c9472e61-557d-462b-baa9-5777a0f7bd60\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:LinuxFoundationX+LFQ103x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"218bd043-93d9-4485-995b-0e6a866c108b\",\"productName\":\"Arctic Security Fundamentals\",\"productSlug\":\"learn/international-relations/university-of-alaska-fairbanks-arctic-security-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/218bd043-93d9-4485-995b-0e6a866c108b-7b99542060fd.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"History\",\"Environmental Studies\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$375\",\"shortDescription\":\"\u003cp\u003eThis course explores the present-day security situation of the Arctic through a focus on the key stakeholders responsible for diplomacy and defense.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eDevelop an introductory understanding of how the environment and people interact throughout the Arctic region\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDefine basic regional and international diplomacy organizations such as the Arctic Council, and how priority non-emergency issues are managed\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDevelop an understanding of identifying and managing regional security through cooperation and competition\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDefine the current regional defense disposition and potential future developments in the Arctic\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-218bd043-93d9-4485-995b-0e6a866c108b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+ARCSEC-1+3T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"51821230-63f3-49bb-86af-0d3073a28648\",\"productName\":\"Introduction to the Internet of Things (IoT)\",\"productSlug\":\"learn/iot-internet-of-things/curtin-university-introduction-to-the-internet-of-things-iot\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/51821230-63f3-49bb-86af-0d3073a28648-2687094599c0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Design\",\"Electronics\"],\"partnerName\":[\"Curtin University\"],\"partnerKeys\":[\"CurtinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/afb92a21-674a-4636-b83b-17e3fef7243d-82515dc77939.png\",\"fullDescription\":\"\u003cp\u003e\u003cstrong\u003eThis course will soon be retired. The last day to enroll is 02/18/2025 at 15:59 UTC.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eThe Internet of Things (IoT) is expanding at a rapid rate, and it is becoming increasingly important for professionals to understand what it is, how it works, and how to harness its power to improve business. This introductory course will enable learners to leverage their business and/or technical knowledge across IoT-related functions in the workplace.\u003c/p\u003e\\n\u003cp\u003eIn the course, we will examine the concept of IoT. We will look at the ‘things’ that make up the Internet of Things, including how those components are connected together, how they communicate, and how they value add to the data generated. We will also examine cybersecurity and privacy issues, and highlight how IoT can optimize processes and improve efficiencies in your business.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eGain an understanding of what the IoT is and the requirements to design your own IoT solutions. Start developing IoT ideas in your industry.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eGain a deep appreciation of the IoT\u003c/li\u003e\\n\u003cli\u003eUnderstand what constitutes an IoT design solution\u003c/li\u003e\\n\u003cli\u003eStart to grow the seeds of IoT ideas within your field and area of expertise\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-51821230-63f3-49bb-86af-0d3073a28648\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CurtinX+IOT1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a8d986de-61b4-4a20-98bb-144f782f04ca\",\"productName\":\"Smart and Sustainable Cities: New Ways of Digitalization \u0026 Governance\",\"productSlug\":\"learn/sustainable-development/delft-university-of-technology-smart-and-sustainable-cities-new-ways-of-digitalization-governance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a8d986de-61b4-4a20-98bb-144f782f04ca-178c6fba9e4b.png\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$376\",\"shortDescription\":\"\u003cp\u003eExplore the key governance challenges for smart sustainable city (SSC) initiatives and the approach required. Learn to organize co-creation and to use a roadmap that support planning, implementation, close monitoring and risks mitigation.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eReview governance challenges for SSC\u003c/li\u003e\\n\u003cli\u003eReflect and debate on how to set priorities for smart sustainable city initiatives planning and management\u003c/li\u003e\\n\u003cli\u003eUnderstand how to engage stakeholders and involve citizens in SSC development and apply co-creation pathways with stakeholders \u003c/li\u003e\\n\u003cli\u003eObserve the conditions and risks related to IT and data governance in SSC \u003c/li\u003e\\n\u003cli\u003eDefine a draft of a governance and regulatory framework for implementing and monitoring SSC initiatives\u003c/li\u003e\\n\u003cli\u003eApply a roadmap for governing SSC initiatives in a real case\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a8d986de-61b4-4a20-98bb-144f782f04ca\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+SaSC01x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"64daa010-7003-48a7-b6be-46756c95d788\",\"productName\":\"Software Defined Networking (SDN) Access Security\",\"productSlug\":\"learn/cybersecurity/curtin-university-software-defined-networking-sdn-access-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/64daa010-7003-48a7-b6be-46756c95d788-d9f92b30b72d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Curtin University\"],\"partnerKeys\":[\"CurtinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/afb92a21-674a-4636-b83b-17e3fef7243d-82515dc77939.png\",\"fullDescription\":\"\u003cp\u003eThis course will soon be retired. The last day to enroll is 02/18/2025 at 22:00 UTC.\u003c/p\u003e\\n\u003cp\u003eThe aim of this course is to equip learners with advanced skills in the fields of security and cybersecurity and make you industry ready.\u003c/p\u003e\\n\u003cp\u003eYou will learn about SDN Access Security. We will begin with the core security and privacy issues relevant to conventional IP networking, and explain how SDN can handle security and privacy issues for modern enterprise and data centre networks.\u003c/p\u003e\\n\u003cp\u003eThe course has been designed with a practical, hands-on approach to help learners obtain a better understanding of new threat vectors for SDN Architecture. We will also explore recent developments in industry-specific Zero-Trust networking.\u003c/p\u003e\\n\u003cp\u003eThe course has been designed by an academic team with extensive teaching experience and a successful track record of delivering high quality MOOC courses, including the MicroMasters in The Internet of Things, in which over a quarter of a million edX learners have enrolled.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscover how Software Defined Networking (SDN) can handle security and privacy issues for modern enterprise and data centre networks.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eArticulate the security challenges in traditional networking and explore various use cases of security in modern enterprise and data centre networks\u003c/li\u003e\\n\u003cli\u003eExplore Software Defined Networking security challenges\u003c/li\u003e\\n\u003cli\u003eUnderstand security as a service using SDN and NFV\u003c/li\u003e\\n\u003cli\u003eGain an understanding of concepts such as zero-trust security and encrypted traffic analytics\u003c/li\u003e\\n\u003cli\u003eExplore a case study on Industry 4.0 or Smart Factory security\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-64daa010-7003-48a7-b6be-46756c95d788\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CurtinX+SDN2x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8c6642f0-0949-4bd5-9084-b2d63814a75c\",\"productName\":\"Check Point Jump Start: Harmony Endpoint Security\",\"productSlug\":\"learn/computer-security/check-point-software-technologies-ltd-check-point-jump-start-harmony-endpoint-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8c6642f0-0949-4bd5-9084-b2d63814a75c-d0a9079674a6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$377\",\"shortDescription\":\"$378\",\"productOverview\":\"\u003cp\u003eLearn how to use Check Point Harmony Endpoint security solution to prevent, protect, and quickly respond to advanced attacks on Endpoint devices.\u003c/p\u003e\",\"objectId\":\"course-8c6642f0-0949-4bd5-9084-b2d63814a75c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs07+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a3d65c5b-4de8-4533-b771-85ccf8c91fd7\",\"productName\":\"Network Security - Protocols\",\"productSlug\":\"learn/network-security/new-york-university-network-security-protocols\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a3d65c5b-4de8-4533-b771-85ccf8c91fd7-4480487bc1f7.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"New York University\"],\"partnerKeys\":[\"NYUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/dc6d25de-0dac-43e6-a915-e362bf8b4403-917c4e000b69.png\",\"fullDescription\":\"$379\",\"shortDescription\":\"\u003cp\u003eLearn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security.\u003c/p\u003e\",\"productOverview\":\"$37a\",\"objectId\":\"course-a3d65c5b-4de8-4533-b771-85ccf8c91fd7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:NYUx+CYB.NET.2+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d11f12b5-6373-4a27-8057-139e85a08bdd\",\"productName\":\"Human-Computer Interaction\",\"productSlug\":\"certificates/professional-certificate/gtx-human-computer-interaction\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d11f12b5-6373-4a27-8057-139e85a08bdd-e57a2f67508e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$37b\",\"shortDescription\":\"Learn the principles and methods behind good user interface and experience design through human-computer interaction.\",\"productOverview\":\"$37c\",\"objectId\":\"program-d11f12b5-6373-4a27-8057-139e85a08bdd\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"95c27f23-9062-4959-9673-de788e07873d\",\"productName\":\"Introduction to Hyperledger Blockchain Technologies\",\"productSlug\":\"learn/hyperledger/the-linux-foundation-introduction-to-hyperledger-blockchain-technologies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/95c27f23-9062-4959-9673-de788e07873d-f2fafd03e084.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\",\"Computer Science\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"$37d\",\"shortDescription\":\"\u003cp\u003eA primer to blockchain, distributed ledgers and Hyperledger technologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDescribe business blockchain and distributed ledger technologies\u003c/li\u003e\\n\u003cli\u003eGain familiarity with current Hyperledger projects and cross-industryuse cases\u003c/li\u003e\\n\u003cli\u003eBecome involved in and contribute to the open source Hyperledger projects\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-95c27f23-9062-4959-9673-de788e07873d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:LinuxFoundationX+LFS171x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ca6c61d5-1196-426c-ab68-c3eda9834aae\",\"productName\":\"Blockchain for Business\",\"productSlug\":\"certificates/professional-certificate/linuxfoundationx-blockchain-for-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ca6c61d5-1196-426c-ab68-c3eda9834aae-9a8d9b4a11b6.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Economics \u0026 Finance\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"Describe Business Blockchain and Distributed Ledger Technologies to audiences with varying experience,Blockchain impact and potential for change around the world,Demonstrate some of the immediate blockchain use cases in technology, business, and enterprise products and institutions,Gain familiarity with current Hyperledger projects and cross-industry use cases\",\"shortDescription\":\"Discover how distributed-ledger blockchain technologies are changing industries and what this emerging space means for you and your company.\",\"productOverview\":\"\u003cp\u003eBlockchain is a powerful distributed-ledger technology that is poised to revolutionize the way entire industries do business from supply chain tracking to real-estate transaction processing and everything in between. With that potential there is a lot of hype to contend with. This program will teach business professionals what blockchain is, possible use cases and applications to help them better understand blockchain landscape and how they might leverage this technology in their own industry.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eSkills in blockchain are being reported as the top job-skill in demand. This program would provide a great first step in verifying candidates have fundamental understanding of blockchain technologies. \u003c/p\u003e\",\"objectId\":\"program-ca6c61d5-1196-426c-ab68-c3eda9834aae\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0a1179d1-08cb-4065-a750-df080ef89188\",\"productName\":\"La cybersécurité en milieu universitaire\",\"productSlug\":\"learn/computer-science/universite-de-montreal-la-cybersecurite-en-milieu-universitaire\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0a1179d1-08cb-4065-a750-df080ef89188-33fe4e7137eb.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Université de Montréal\"],\"partnerKeys\":[\"UMontrealX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/1181fcba-6687-4114-8c3c-f34815663fd7-a287d6820336.png\",\"fullDescription\":\"$37e\",\"shortDescription\":\"\u003cp\u003eDécouvrez les bases de la sécurité numérique.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCerner les enjeux de cybersécurité liés aux activités universitaires ;\u003c/li\u003e\\n\u003cli\u003eIdentifier les risques et les principales menaces associés aux technologies numériques ;\u003c/li\u003e\\n\u003cli\u003eAdopter les bonnes pratiques en matière de cybersécurité et d’hygiène numérique.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0a1179d1-08cb-4065-a750-df080ef89188\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UMontrealX+FAS-CYBERSECFR+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null}]},{\"productType\":\"Executive Education\",\"categoryLabel\":\"Executive Education\",\"products\":[{\"productUuid\":\"83d8b90b-40d5-443c-99fd-6ea813c19538\",\"productName\":\"Cybersecurity: Managing Risk in the Information Age\",\"productSlug\":\"executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/83d8b90b-40d5-443c-99fd-6ea813c19538-62a831cbd0d5.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$37f\",\"shortDescription\":\"\u003cp\u003eDevelop an action plan to reduce system vulnerabilities and minimize damage\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll gain:The ability to recommend a cybersecurity leadership plan. The skills needed to develop a cyber risk mitigation strategy. A practical, holistic understanding of cybersecurity and its value. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-83d8b90b-40d5-443c-99fd-6ea813c19538\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:HarvardX+CYB+1T2025c\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/83d8b90b-40d5-443c-99fd-6ea813c19538-73362dc0e981.png\"},{\"productUuid\":\"5fb664b2-1b3f-4d58-8131-f4f6126fcc00\",\"productName\":\"Fundamentals of Cybersecurity\",\"productSlug\":\"executive-education/university-of-cape-town-fundamentals-of-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5fb664b2-1b3f-4d58-8131-f4f6126fcc00-60d1ab0a8b37.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$380\",\"shortDescription\":\"\u003cp\u003eLearn how to defend your organization’s systems and data against the growing threat of cyberattacks.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:An understanding of the fundamental principles of cybersecurity management and the relevant legislative environment. The ability to evaluate cybersecurity risks, and analyse corporate information security policies. The skills to design a secure network model and a suitable incident response plan for an organisation. Insight into cybersecurity software and hardware products, and knowledge of the measures that can be implemented to protect a business from cyberthreats. Unlimited access to edX's Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-5fb664b2-1b3f-4d58-8131-f4f6126fcc00\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+CBS+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/5fb664b2-1b3f-4d58-8131-f4f6126fcc00-853b3c799e9d.png\"},{\"productUuid\":\"b538f688-0d2f-433c-8cea-3797730dc67a\",\"productName\":\"Cybersecurity Risk and Strategy\",\"productSlug\":\"executive-education/institute-for-management-development-imd-cybersecurity-risk-and-strategy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b538f688-0d2f-433c-8cea-3797730dc67a-9b88f5b251d7.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"International Institute for Management Development\"],\"partnerKeys\":[\"IMD\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed7ebe0c-9979-40e3-a922-b5f075ae3bce-c3fa9dd41ba4.png\",\"fullDescription\":\"$381\",\"shortDescription\":\"\u003cp\u003eAcquire the frameworks and terminology required to make informed strategic decisions that enhance the overall cyber resilience of your organization from top to bottom.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this program, you’ll walk away with:Insight into the new cybersecurity landscape, and threats that pose the most risk to your industry or organization. A cybersecurity strategy designed for your organization’s assets and risks that boost business value. An understanding of existing data protection regulations, and the ability to assess your organization’s cybersecurity governance strategy and preparedness for potential breaches. A practical approach to effective cybersecurity incident response planning and best practices for managing an incident. The knowledge to assess how well prepared your organization is for the short-term future by understanding the evolving trends in cybersecurity.\u003c/p\u003e\",\"objectId\":\"course-b538f688-0d2f-433c-8cea-3797730dc67a\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:IMD+CYM+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/b538f688-0d2f-433c-8cea-3797730dc67a-fd06ed437e8a.jpg\"},{\"productUuid\":\"d7e8d061-37e6-4183-a5c0-fa156cb8a7d8\",\"productName\":\"IT Management\",\"productSlug\":\"executive-education/university-of-cape-town-it-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d7e8d061-37e6-4183-a5c0-fa156cb8a7d8-09b4c954ae15.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$382\",\"shortDescription\":\"\u003cp\u003eGain the knowledge and confidence to manage all facets of modern IT operations effectively.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:A strategic IT management plan suited to your business context. Knowledge of best practices for modern IT management, and insight into budgeting and resourcing, value chain optimisation, risk control, and change management. An understanding of the latest IT trends in the areas of cybersecurity, DevOps, networks, design thinking, cloud, and IoT. The ability to use information and communications technology (ICT) to solve business problems. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-d7e8d061-37e6-4183-a5c0-fa156cb8a7d8\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+ITM+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/d7e8d061-37e6-4183-a5c0-fa156cb8a7d8-e61007cb2105.png\"}]},{\"productType\":\"Masters\",\"categoryLabel\":\"Master's Programs\",\"products\":[{\"productUuid\":\"de971614-e9f1-4dc5-9081-5dec52d5ac4e\",\"productName\":\"Master of Science in Cybersecurity\",\"productSlug\":\"masters/maryville-university-master-of-science-in-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/de971614-e9f1-4dc5-9081-5dec52d5ac4e-1e304d495d26.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eExpert cybersecurity professionals are in high demand as public, private, and nonprofit organizations race to stay ahead of the latest threats. As the need for auditing, protection, and troubleshooting grows and cybersecurity budgets soar, now is the perfect time to capitalize on this critical global need.\u003c/p\u003e \\r\\n\\r\\n\u003cp\u003eOur online master’s degree in cybersecurity can help you reach areas of the industry a bachelor’s degree typically can’t, including management and the C-suite. When you earn your online master’s in cybersecurity from Maryville, you can grow your cybersecurity credentials with in-demand technical skills, knowledge of vital business concepts, and industry-relevant certifications such as CISSP, ECSA, ECES, CISA, CCSP, and Splunk Core Certified Power User.\u003c/p\u003e \\r\\n\\r\\n\u003cp\u003eTop career skills you can develop: \\r\\n\u003cul\u003e\\r\\n\u003cli\u003eAuditing\u003c/li\u003e\\r\\n\u003cli\u003eTroubleshooting\u003c/li\u003e\\r\\n\u003cli\u003eOperating systems\u003c/li\u003e\\r\\n\u003cli\u003eRisk analysis\u003c/li\u003e\\r\\n\u003cli\u003eGovernance\u003c/li\u003e\\r\\n\u003cli\u003eAdvanced pen testing\u003c/li\u003e\\r\\n\u003c/ul\u003e\u003c/p\u003e\",\"objectId\":\"program-de971614-e9f1-4dc5-9081-5dec52d5ac4e\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d0efa09a-7b03-4c1e-b860-30baa53a8d3b\",\"productName\":\"Master of Science in Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/hawaii-pacific-master-of-science-in-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d0efa09a-7b03-4c1e-b860-30baa53a8d3b-476697001131.jpeg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Hawai‘i Pacific University\"],\"partnerKeys\":[\"HPU\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/753a8147-5768-46e7-b085-7f0d36e83614-329156d5c3d2.png\",\"fullDescription\":\"\",\"shortDescription\":\"Develop the skills to defend organizations from data breaches, strengthen your résumé, and advance your career as a responsible leader in cybersecurity.\",\"productOverview\":\"$383\",\"objectId\":\"program-d0efa09a-7b03-4c1e-b860-30baa53a8d3b\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7e610677-ff84-40c0-8f24-657173f95b48\",\"productName\":\"University of Sydney’s Master of Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/university-of-sydneys-master-of-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/7e610677-ff84-40c0-8f24-657173f95b48-11c3d9a5c1f6.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The University of Sydney\"],\"partnerKeys\":[\"USYDx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0da70b4d-5231-43bf-bb60-e95c0cb8de98-71210b7cf35c.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eThe University of Sydney’s Master of Cybersecurity (Online) is designed for experienced tech or STEM professionals who want to discover emerging technologies in cybersecurity. Students will learn to lead cybersecurity initiatives at the organisational level and stay at the forefront of evolving privacy and security regulations.\u003c/p\u003e\",\"objectId\":\"program-7e610677-ff84-40c0-8f24-657173f95b48\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"780e11a3-0b47-424f-8a03-3f0a9072c5ec\",\"productName\":\"Master of Science in Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/syracuse-master-of-science-in-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/780e11a3-0b47-424f-8a03-3f0a9072c5ec-4ebccdb659d5.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Syracuse University\"],\"partnerKeys\":[\"SyracuseUniversity\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Syracuse University’s online M.S. in Cybersecurity prepares students to predict, prevent and respond to cyberattacks. Through live online classes, students develop advanced skills without relocating. Able to be completed in 15 months and no GRE currently required. Master's degree preferred, and programming exp. required. \",\"objectId\":\"program-780e11a3-0b47-424f-8a03-3f0a9072c5ec\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5c002189-0866-4b10-807e-bcf093346dc0\",\"productName\":\"Master of Information and Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/ucb-master-of-information-and-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/5c002189-0866-4b10-807e-bcf093346dc0-f76c1c8d8a9b.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of California, Berkeley\"],\"partnerKeys\":[\"BerkeleyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Through the UC Berkeley School of Information’s online Master of Information and Cybersecurity (MICS) program’s holistic approach, experienced professionals become well-rounded, sought-after cybersecurity leaders. Located in the Bay Area’s renowned technology hub, the MICS program exposes its students to extensive networking opportunities with alumni and cybersecurity professionals. The program includes in-person immersion experiences, and the degree can be completed in 20 months. No GRE/GMAT required to apply.\",\"objectId\":\"program-5c002189-0866-4b10-807e-bcf093346dc0\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[\"IN\"],\"organizationLogoOverride\":null},{\"productUuid\":\"0ecf2868-e7b5-4ede-8077-334d0bc4ffe8\",\"productName\":\"Master of Arts in Management and Leadership\",\"productSlug\":\"masters/maryville-university-master-of-arts-in-management-and-leadership\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/0ecf2868-e7b5-4ede-8077-334d0bc4ffe8-0e498baeac4e.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$384\",\"objectId\":\"program-0ecf2868-e7b5-4ede-8077-334d0bc4ffe8\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c6d974eb-34b9-4293-97ac-a16bff173637\",\"productName\":\"Master of Legal Studies\",\"productSlug\":\"masters/online-master-of-legal-studies/american-master-of-legal-studies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c6d974eb-34b9-4293-97ac-a16bff173637-98e1f1a9b375.png\",\"productType\":\"Masters\",\"attributes\":[\"Law\"],\"partnerName\":[\"American University\"],\"partnerKeys\":[\"American\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f9c5559-f219-400d-b186-13f575b33b08-4a28e48d5256.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"A thorough understanding of the law is not limited to practicing attorneys. The online Master of Legal Studies (MLS) from American University Washington College of Law (AUWCL) is designed for professionals who have law-related responsibilities and understand the law’s important influence on both your daily job functions and your community at large.\",\"objectId\":\"program-c6d974eb-34b9-4293-97ac-a16bff173637\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"productName\":\"Master of Science in Accounting\",\"productSlug\":\"masters/maryville-university-master-of-science-in-accounting\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/518b3b7e-f773-4b11-8427-4343b53cd1ae-1e8df2a9d7ed.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eAccounting isn’t just about balancing books. Top managers in every organization consult with accountants and rely on their insights and expertise to help make critical financial decisions.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eYou can join the next generation of accountants who will help lead the future of business. Whether you have your bachelor’s degree in accounting or you’re looking to start a new career in this exciting field, Maryville University’s online Master of Science in Accounting program can prepare you with advanced accounting skills, business acumen, and financial expertise to maximize your career opportunities and your organization’s success.\u003c/p\u003e\",\"objectId\":\"program-518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"333b8b06-ca26-4d73-853b-ef9ceee271ac\",\"productName\":\"Master of Business Administration\",\"productSlug\":\"masters/maryville-university-master-of-business-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/333b8b06-ca26-4d73-853b-ef9ceee271ac-2619d905aded.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$385\",\"objectId\":\"program-333b8b06-ca26-4d73-853b-ef9ceee271ac\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null}]},{\"productType\":\"Bachelors\",\"categoryLabel\":\"Bachelor's Programs\",\"products\":[{\"productUuid\":\"e86df75d-27f4-4a80-a2d0-8c14c4edf63f\",\"productName\":\"Bachelor of Science in Cybersecurity\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/e86df75d-27f4-4a80-a2d0-8c14c4edf63f-33c06f0e352b.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"You have a future in cybersecurity.Let us decrypt it.Cybersecurity \\r\\nprofessionals are in demand as public, private, and nonprofit organizations \\r\\nbecome ever more reliant on digital and cloud-based computing technologies. \\r\\nIf you’re looking to get your start in this fast-paced and exciting field, \\r\\nthen there’s no place like Maryville University to earn your bachelor’s in \\r\\ncybersecurity degree online. From our state-of-the-art cyber training \\r\\ncenter to our cutting-edge curriculum created by practicing cybersecurity \\r\\nexperts, you’ll find the top-notch teaching, tools, and hands-on training \\r\\nyou need to launch a successful career.\\r\\n\\r\\nGet Curriculum Details\",\"objectId\":\"program-e86df75d-27f4-4a80-a2d0-8c14c4edf63f\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6d2bfd17-1e92-40e4-89eb-7cc1b24a6f44\",\"productName\":\"Bachelor of Arts in Liberal Studies\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-arts-in-liberal-studies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6d2bfd17-1e92-40e4-89eb-7cc1b24a6f44-af38aeb30d9a.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Every industry needs critical thinkers who can communicate effectively, \\r\\ndrive culture, design strategies, and solve workplace challenges. Helping \\r\\nyou grow as a thought leader is the foundation of Maryville University’s \\r\\nbachelor of liberal studies online program. It’s designed to help you \\r\\nthrive in a range of professional settings and differentiate yourself as an \\r\\nastute contributor to your field of interest.Our liberal studies program provides you with a comprehensive foundation in \\r\\nthe humanities and social sciences while also allowing you to explore \\r\\nspecialized courses in accounting, business administration, marketing, \\r\\nhealthcare management, cybersecurity, and other disciplines.\",\"objectId\":\"program-6d2bfd17-1e92-40e4-89eb-7cc1b24a6f44\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c3abf25d-a907-4e3c-b940-802d5e1744bd\",\"productName\":\"Bachelor of Science in Computer Science\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-computer-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c3abf25d-a907-4e3c-b940-802d5e1744bd-382892081328.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$386\",\"objectId\":\"program-c3abf25d-a907-4e3c-b940-802d5e1744bd\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d2d8568d-4264-48ce-9b0d-76fd1412604b\",\"productName\":\"Bachelor of Science in Business Administration\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-business-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d2d8568d-4264-48ce-9b0d-76fd1412604b-aa66a9d317cc.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"To succeed in this rapidly changing world, business leaders must have \\r\\nwide-ranging knowledge of economics, finance, management, marketing, and \\r\\noperations. That’s why Maryville University has developed an online \\r\\nbachelor’s in business administration program with input from top employers \\r\\nto provide you with the latest skills and best practices. As a Maryville \\r\\ngraduate, you’ll emerge ready and able to maximize ROI for any organization \\r\\nas you take your career to new heights.\",\"objectId\":\"program-d2d8568d-4264-48ce-9b0d-76fd1412604b\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null}]}],\"location\":\"product-catalog\",\"cardFormatSubtype\":\"$undefined\"}]\n"])</script></body></html>