Newsletter Subject

Unlock a high-demand career in data privacy

From

edx.org

Email Address

edX@news.edx.org

Sent On

Sun, Jun 4, 2023 08:01 AM

Email Preheader Text

Explore courses in cybersecurity, data management, AI, and more. ‌ ‌ ‌ ‌ ‌

Explore courses in cybersecurity, data management, AI, and more. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ {preheader_text} [edX Logo](~/AAQRxQA~/RgRmXsn1P0R_aHR0cHM6Ly93d3cuZWR4Lm9yZy8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Courses](~/AAQRxQA~/RgRmXsn1P0SRaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2gvP3RhYj1jb3Vyc2UmdXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) / [Programs](~/AAQRxQA~/RgRmXsn1P0SSaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2gvP3RhYj1wcm9ncmFtJnV0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) / [My Account](~/AAQRxQA~/RgRmXsn1P0SGaHR0cHM6Ly9hdXRobi5lZHgub3JnL2xvZ2luP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Gain data privacy skills. Unlock new career heights.](~/AAQRxQA~/RgRmXsn1P0SFaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) Digital privacy threats have increased around the world. How do we combat this? Organizations must recruit experts who can secure the constant flow of sensitive information and stay current with dynamic data regulations. If this interests you, edX has courses and programs — from executive education to professional certificates — to help protect your organization’s data with enhanced expertise. [Explore courses](~/AAQRxQA~/RgRmXsn1P0SFaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) Boot Camps Enroll in a boot camp, develop your data privacy management skills, and show off your knowledge in your professional portfolio. [[Arizona State University] Cybersecurity Boot Camp Join the front lines of information security.](~/AAQRxQA~/RgRmXsn1P0SdaHR0cHM6Ly9ib290Y2FtcC5jcGUuYXN1LmVkdS9jeWJlcnNlY3VyaXR5L2xhbmRpbmc_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[University of Connecticut] Cybersecurity Boot Camp Become a digital defender.](~/AAQRxQA~/RgRmXsn1P0STaHR0cDovL2Jvb3RjYW1wLnVjb25uLmVkdS9jeWJlcnNlY3VyaXR5Lz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[Columbia Engineering] Cybersecurity Boot Camp Protect your organization's information.](~/AAQRxQA~/RgRmXsn1P0SmaHR0cHM6Ly9ib290Y2FtcC5jdm4uY29sdW1iaWEuZWR1L2N5YmVyc2VjdXJpdHkvbGFuZGluZy1iNWE_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[UC Berkeley Extension] Data Analytics Boot Camp Learn data analytics online.](~/AAQRxQA~/RgRmXsn1P0SaaHR0cHM6Ly9ib290Y2FtcC5iZXJrZWxleS5lZHUvZGF0YS9sYW5kaW5nLWI1YS8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[Vanderbilt University] Data Analytics Boot Camp Transform data into decisions.](~/AAQRxQA~/RgRmXsn1P0SeaHR0cHM6Ly9ib290Y2FtcHMudmFuZGVyYmlsdC5lZHUvZGF0YS9sYW5kaW5nLWZ1bGwvP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[The University of Texas at Austin] The Data Analysis and Visualization Boot Camp Use big data to solve big problems.](~/AAQRxQA~/RgRmXsn1P0SZaHR0cHM6Ly90ZWNoYm9vdGNhbXBzLnV0ZXhhcy5lZHUvZGF0YS9sYW5kaW5nLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) Short Courses Learn from experts with years of experience in data privacy management roles, and earn an official certificate from a leading university. Short courses are delivered by GetSmarter. [[University of Cape Town] IT Management Build strategies to drive efficient IT team processes.](~/AAQRxQA~/RgRmXsn1P0S8aHR0cHM6Ly91Y3Qtb25saW5lLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvdWN0LWl0LW1hbmFnZW1lbnQtc2hvcnQtY291cnNlP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[University of Cape Town] Data Protection and Privacy Understand the laws and regulations surrounding data protection.](~/AAQRxQA~/RgRmXsn1P0TRaHR0cHM6Ly91Y3Qtb25saW5lLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvdWN0LWRhdGEtcHJvdGVjdGlvbi1hbmQtcHJpdmFjeS1vbmxpbmUtc2hvcnQtY291cnNlP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[HarvardX] Cybersecurity: Managing Risk in the Information Age Prepare your organization to defend against cyberattacks.](~/AAQRxQA~/RgRmXsn1P0TTaHR0cHM6Ly9oYXJ2YXJkeC1vbmxpbmVjb3Vyc2VzLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvaGFydmFyZC1jeWJlcnNlY3VyaXR5LW9ubGluZS1zaG9ydC1jb3Vyc2U_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[IE University] Chief Technology Officer Program Develop the business acumen to drive transformation and shape organizational strategy.](~/AAQRxQA~/RgRmXsn1P0TWaHR0cHM6Ly9pZXVuaXZlcnNpdHktb25saW5lLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvaWUtdW5pdmVyc2l0eS1jaGllZi10ZWNobm9sb2d5LW9mZmljZXItcHJvZ3JhbS8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[Northwestern University] Privacy Law and Data Protection Solve your data privacy issues and protect your organization.](~/AAQRxQA~/RgRmXsn1P0TwaHR0cHM6Ly9nZXRzbWFydGVyLmxhdy5ub3J0aHdlc3Rlcm4uZWR1L3ByZXNlbnRhdGlvbnMvbHAvbm9ydGh3ZXN0ZXJuLXVuaXZlcnNpdHktcHJpdmFjeS1sYXctYW5kLWRhdGEtcHJvdGVjdGlvbi1vbmxpbmUtc2hvcnQtY291cnNlLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[LSE] Data: Law, Policy and Regulation Develop a practical understanding of data regulation and protection.](~/AAQRxQA~/RgRmXsn1P0TjaHR0cHM6Ly9vbmxpbmVjZXJ0aWZpY2F0ZWNvdXJzZXMubHNlLmFjLnVrL3ByZXNlbnRhdGlvbnMvbHAvbHNlLWRhdGEtbGF3LXBvbGljeS1hbmQtcmVndWxhdGlvbi1vbmxpbmUtY2VydGlmaWNhdGUtY291cnNlP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) Weekly course features [Secure Software Development: Requirements, Design, and Reuse](~/AAQRxQA~/RgRmXsn1P0TmaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uvc2VjdXJlLXNvZnR3YXJlLWRldmVsb3BtZW50LXJlcXVpcmVtZW50cy1kZXNpZ24tYW5kLXJldXNlLWNvdXJzZS12MWxpbnV4Zm91bmRhdGlvbnhsZmQxMDR4MnQyMDIyP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Secure Software Development: Requirements, Design, and Reuse LinuxFoundationX Enroll now](~/AAQRxQA~/RgRmXsn1P0TmaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uvc2VjdXJlLXNvZnR3YXJlLWRldmVsb3BtZW50LXJlcXVpcmVtZW50cy1kZXNpZ24tYW5kLXJldXNlLWNvdXJzZS12MWxpbnV4Zm91bmRhdGlvbnhsZmQxMDR4MnQyMDIyP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Introduction to Cloud Computing](~/AAQRxQA~/RgRmXsn1P0TDaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvaW50cm9kdWN0aW9uLXRvLWNsb3VkLWNvbXB1dGluZy1jb3Vyc2UtdjEtaWJtLWNjMDEwMWVuLTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Introduction to Cloud Computing IBM Enroll now](~/AAQRxQA~/RgRmXsn1P0TDaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvaW50cm9kdWN0aW9uLXRvLWNsb3VkLWNvbXB1dGluZy1jb3Vyc2UtdjEtaWJtLWNjMDEwMWVuLTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Unlocking Information Security I: From Cryptography to Buffer Overflows](~/AAQRxQA~/RgRmXsn1P0TtaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvdW5sb2NraW5nLWluZm9ybWF0aW9uLXNlY3VyaXR5LWktZnJvbS1jcnlwdG9ncmFwaHktdG8tYnVmZmVyLW92ZXJmbG93cy1jb3Vyc2UtdjEtdGF1eC1pbmZvc2VjMTAxLTF0MjAyND91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Unlocking Information Security I: From Cryptography to Buffer Overflows TAUx and IsraelX Enroll now](~/AAQRxQA~/RgRmXsn1P0TtaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvdW5sb2NraW5nLWluZm9ybWF0aW9uLXNlY3VyaXR5LWktZnJvbS1jcnlwdG9ncmFwaHktdG8tYnVmZmVyLW92ZXJmbG93cy1jb3Vyc2UtdjEtdGF1eC1pbmZvc2VjMTAxLTF0MjAyND91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Knowledge Management and Big Data in Business](~/AAQRxQA~/RgRmXsn1P0TVaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uva25vd2xlZGdlLW1hbmFnZW1lbnQtYW5kLWJpZy1kYXRhLWluLWJ1c2luZXNzLWNvdXJzZS12MS1oa3BvbHl1eC1pc2UxMDF4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Knowledge Management and Big Data in Business HKPolyUx Enroll now](~/AAQRxQA~/RgRmXsn1P0TVaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uva25vd2xlZGdlLW1hbmFnZW1lbnQtYW5kLWJpZy1kYXRhLWluLWJ1c2luZXNzLWNvdXJzZS12MS1oa3BvbHl1eC1pc2UxMDF4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Manage the cyber threat for finance professionals](~/AAQRxQA~/RgRmXsn1P0TQaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbWFuYWdlLXRoZS1jeWJlci10aHJlYXQtZm9yLWZpbmFuY2UtcHJvZmVzc2lvbmFscy1jb3Vyc2UtdjFhY2NhY3MwMDEydDIwMjI_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Manage the cyber threat for finance professionals ACCA Enroll now](~/AAQRxQA~/RgRmXsn1P0TQaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbWFuYWdlLXRoZS1jeWJlci10aHJlYXQtZm9yLWZpbmFuY2UtcHJvZmVzc2lvbmFscy1jb3Vyc2UtdjFhY2NhY3MwMDEydDIwMjI_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Application Security for Developers](~/AAQRxQA~/RgRmXsn1P0THaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uvc2VjdXJpdHktZm9yLWFwcGxpY2F0aW9uLWRldmVsb3BlcnMtY291cnNlLXYxLWlibS1jZDAyNjdlbi0zdDIwMjI_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Application Security for Developers IBM Enroll now](~/AAQRxQA~/RgRmXsn1P0THaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2Uvc2VjdXJpdHktZm9yLWFwcGxpY2F0aW9uLWRldmVsb3BlcnMtY291cnNlLXYxLWlibS1jZDAyNjdlbi0zdDIwMjI_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Cybersecurity and Privacy in the IoT](~/AAQRxQA~/RgRmXsn1P0TJaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1hbmQtcHJpdmFjeS1pbi10aGUtaW90LWNvdXJzZS12MS1jdXJ0aW54LWlvdDV4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Cybersecurity and Privacy in the IoT CurtinX Enroll now](~/AAQRxQA~/RgRmXsn1P0TJaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1hbmQtcHJpdmFjeS1pbi10aGUtaW90LWNvdXJzZS12MS1jdXJ0aW54LWlvdDV4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Data Science and Agile Systems for Product Management](~/AAQRxQA~/RgRmXsn1P0S7aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZGF0YS1zY2llbmNlLWFuZC1hZ2lsZS1zeXN0ZW1zLWZvci1wcm9kdWN0LW1hbmFnZW1lbnQ_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Data Science and Agile Systems for Product Management UMD and USMx Enroll now](~/AAQRxQA~/RgRmXsn1P0S7aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZGF0YS1zY2llbmNlLWFuZC1hZ2lsZS1zeXN0ZW1zLWZvci1wcm9kdWN0LW1hbmFnZW1lbnQ_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Jump Start: Network Security](~/AAQRxQA~/RgRmXsn1P0ShaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvanVtcC1zdGFydC1uZXR3b3JrLXNlY3VyaXR5P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Jump Start: Network Security CheckPoint Enroll now](~/AAQRxQA~/RgRmXsn1P0ShaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvanVtcC1zdGFydC1uZXR3b3JrLXNlY3VyaXR5P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Digital Technology and Innovation](~/AAQRxQA~/RgRmXsn1P0TGaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZGlnaXRhbC10ZWNobm9sb2d5LWFuZC1pbm5vdmF0aW9uLWNvdXJzZS12MS1pdXgtYnVrZC14NTkxLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Digital Technology and Innovation IUx Enroll now](~/AAQRxQA~/RgRmXsn1P0TGaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZGlnaXRhbC10ZWNobm9sb2d5LWFuZC1pbm5vdmF0aW9uLWNvdXJzZS12MS1pdXgtYnVrZC14NTkxLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) Professional Certificate Programs Find a program related to data privacy management and earn a shareable certificate — all while studying at your own pace. [[IBM] IBM Cybersecurity Fundamentals Learn about cybersecurity tools and the basics of security compliance.](~/AAQRxQA~/RgRmXsn1P0S2aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvaWJtLWN5YmVyc2VjdXJpdHktZnVuZGFtZW50YWxzP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[IBM] Information Technology (IT) Support PC Launch your technology career with IT support.](~/AAQRxQA~/RgRmXsn1P0S6aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvaWJtLWluZm9ybWF0aW9uLXRlY2hub2xvZ3ktc3VwcG9ydD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[UWashingtonX] Essentials of Cybersecurity Find your niche in cybersecurity.](~/AAQRxQA~/RgRmXsn1P0S9aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvdXdhc2hpbmd0b254LWVzc2VudGlhbHMtY3liZXJzZWN1cml0eT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[UWashingtonX] IT Project Management Learn and apply the latest PM techniques and strategies.](~/AAQRxQA~/RgRmXsn1P0S6aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvdXdhc2hpbmd0b254LWl0LXByb2plY3QtbWFuYWdlbWVudD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[ColumbiaX] Data Science for Executives Gain insight into the latest data science tools and their application with real-world examples.](~/AAQRxQA~/RgRmXsn1P0S9aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvY29sdW1iaWF4LWRhdGEtc2NpZW5jZS1mb3ItZXhlY3V0aXZlcz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[MichiganX] PostgreSQL for Everybody Learn how to use the PostgreSQL database in hands-on environments.](~/AAQRxQA~/RgRmXsn1P0S6aHR0cHM6Ly93d3cuZWR4Lm9yZy9wcm9mZXNzaW9uYWwtY2VydGlmaWNhdGUvbWljaGlnYW54LXBvc3RncmVzcWwtZm9yLWV2ZXJ5Ym9keT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [The ultimate guide to cybersecurity careers](~/AAQRxQA~/RgRmXsn1P0SaaHR0cHM6Ly9ibG9nLmVkeC5vcmcvY3liZXJzZWN1cml0eS1jYXJlZXItZ3VpZGU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) Cyber attacks continue to threaten the safety of data, networks, and computer systems. Discover the many cybersecurity career paths and develop the skills you need to prevent security breaches. [Learn more](~/AAQRxQA~/RgRmXsn1P0SaaHR0cHM6Ly9ibG9nLmVkeC5vcmcvY3liZXJzZWN1cml0eS1jYXJlZXItZ3VpZGU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) ~/AAQRxQA~/RgRmXsn1P0R_aHR0cHM6Ly93d3cuZWR4Lm9yZy8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRmXsn1P0SHaHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL2VkWD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRmXsn1P0SIaHR0cHM6Ly90d2l0dGVyLmNvbS9lZFhPbmxpbmU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRmXsn1P0SPaHR0cHM6Ly93d3cubGlua2VkaW4uY29tL2NvbXBhbnkvZWR4P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwNjA0JnV0bV9jb250ZW50PVNob3J0IENvdXJzZXNXA3NwY0IKZHT2RHxk_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA ~/AAQRxQA~/RgRmXsn1P0SOaHR0cHM6Ly93d3cuaW5zdGFncmFtLmNvbS9lZHhvbmxpbmU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRmXsn1P0SIaHR0cHM6Ly93d3cucmVkZGl0LmNvbS9yL2VkWC8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRmXsn1P0SRaHR0cHM6Ly9lZHguYXBwLmxpbmsvZW1haWwtYXBwLWluc3RhbGw_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA2MDQmdXRtX2NvbnRlbnQ9U2hvcnQgQ291cnNlc1cDc3BjQgpkdPZEfGT9VU7yUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRmXsn1P0SQaHR0cHM6Ly9lZHguYXBwLmxpbmsvZW1haWwtYXBwLWluc3RhbD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ edX is the trusted platform for education and learning. [edX For Business](~/AAQRxQA~/RgRmXsn1P0SEaHR0cHM6Ly9idXNpbmVzcy5lZHgub3JnLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDYwNCZ1dG1fY29udGVudD1TaG9ydCBDb3Vyc2VzVwNzcGNCCmR09kR8ZP1VTvJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) — eLearning Solutions for Your Company © 2023 edX LLC All rights reserved. [Update Your Preferences](~/AAQRxQA~/RgRmXsn1P4SSAmh0dHBzOi8vMDYuZW1haWxpbmJvdW5kcHJvY2Vzc2luZy5jb20vZW1haWwvbWFuYWdlX3N1YnNjcmlwdGlvbnMvJTI0MSUyNG94dnUxczVjdGRHc0Y0QzAxYkJYJTJCZyUzRCUzRCUyNHd2SFNocnF0SEVNOWhTeVlmd1hYOVZYemhnRUcwaEh1QVlybHBGS2dJcWMlM0Q_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_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) / [Unsubscribe](~/AAQRxQA~/RgRmXsn1P4Q1Amh0dHBzOi8vMDYuZW1haWxpbmJvdW5kcHJvY2Vzc2luZy5jb20vZW5jX3VzZXIvdW5zdWJzY3JpYmU_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_VVO8lIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) 7900 Harkins Road, Lanham, MD 20706

Marketing emails from edx.org

View More
Sent On

07/09/2023

Sent On

06/09/2023

Sent On

03/09/2023

Sent On

31/08/2023

Sent On

30/08/2023

Sent On

29/08/2023

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.