The Global Scholarly Directory.

Discover world-class academic programs curated for the modern intellectual. Search through 19877+ degrees and professional certificates.

search
Deploy & Optimize ML Services Confidently Coursera

Deploy & Optimize ML Services Confidently

Take your machine learning skills beyond the notebook and into production. In this short, practical course, you’ll learn how to turn trained models into reliable RESTful inference services, automate deployment pipelines, and monitor real-time performance like a professional MLOps engineer. You’ll build a /predict API using FastAPI, integrate it with GitHub Actions for CI/CD, and then simulate traffic with Locust to evaluate latency and optimize for a 100 ms SLA target. Whether you’re an aspiring MLOps engineer or a data scientist ready to bridge into deployment, this course gives you the hands-on confidence to deliver production-grade ML services that scale. You’ll strengthen the technical and analytical skills that modern AI teams need — automation, performance optimization, and service reliability — to stay competitive in the evolving ML operations landscape. By the end, you’ll not only deploy your own model confidently but also gain the credibility to manage real-world ML systems end-to-end.

schedule 6 Months
$222 / TOTAL
View on Coursera
Reinforcement Learning from Human Feedback DeepLearning.AI

Reinforcement Learning from Human Feedback

Large language models (LLMs) are trained on human-generated text, but additional methods are needed to align an LLM with human values and preferences. Reinforcement Learning from Human Feedback (RLHF) is currently the main method for aligning LLMs with human values and preferences. RLHF is also used for further tuning a base LLM to align with values and preferences that are specific to your use case. In this course, you will gain a conceptual understanding of the RLHF training process, and then practice applying RLHF to tune an LLM. You will: 1. Explore the two datasets that are used in RLHF training: the “preference” and “prompt” datasets. 2. Use the open source Google Cloud Pipeline Components Library, to fine-tune the Llama 2 model with RLHF. 3. Assess the tuned LLM against the original base model by comparing loss curves and using the “Side-by-Side (SxS)” method.

schedule 7 Months
$355 / TOTAL
View on Coursera
Certified Kubernetes Administrator (CKA): Unit 1 Pearson

Certified Kubernetes Administrator (CKA): Unit 1

This course teaches you the core skills for building, managing, and securing Kubernetes clusters. You’ll start by learning how Kubernetes works and how its components fit together. Using kubeadm, you’ll set up clusters, handle everyday management tasks, and maintain nodes for reliable performance. Through hands-on labs, you’ll practice real-world tasks like managing containers with CricTL and backing up or restoring etcd. You’ll also learn how to secure clusters by configuring API access, setting security contexts, and using RBAC for users and service accounts. By the end, you’ll have the practical knowledge to deploy and maintain secure, highly available Kubernetes clusters.

schedule 8 Months
$51 / TOTAL
View on Coursera
Cloud Native, Microservices, Containers, DevOps and Agile IBM

Cloud Native, Microservices, Containers, DevOps and Agile

Over 80% of enterprises now rely on cloud-native technologies to drive innovation and scale efficiently (CNCF). Professionals with cloud-native, microservices, and DevOps skills are highly sought after! This course equips both aspiring and experienced professionals with the practical, job-ready expertise employers are looking for. During the course, you’ll explore cloud-native fundamentals, including hybrid cloud infrastructures and modernization strategies. Plus, you'll gain hands-on experience mastering RESTful APIs, CI/CD pipelines, and Agile and Scrum practices that enhance collaboration and delivery. The course also covers essential containerization concepts for using Docker and Kubernetes, ensuring you can build scalable and resilient applications. Plus, through interactive labs and real-world projects, you'll develop the technical skills and confidence to apply these practices effectively in professional environments. By the end, you'll have the expertise to build scalable cloud-native applications, automate development workflows, and align technical solutions with business objectives. If you’re keen to open up exciting career opportunities in cloud, enroll today!

schedule 8 Months
$147 / TOTAL
View on Coursera
Networking in Google Cloud: Hybrid and Multicloud - Português Brasileiro Google Cloud

Networking in Google Cloud: Hybrid and Multicloud - Português Brasileiro

「Networking in Google Cloud 日本語版」シリーズの 6 番目のコース「Hybrid and Multicloud」へようこそ。最初のモジュールでは、Google Cloud のさまざまな接続オプションを説明します。Cloud Interconnect について掘り下げ、その種類とそれぞれの機能を確認します。2 番目のモジュールでは Cloud VPN の実装、高可用性 VPN トポロジ、Network Connectivity Center(NCC)による管理の効率化について説明します。このコースを修了すると、オンプレミス ネットワークや他のクラウド ネットワークを Google Cloud に拡張するためのさまざまな接続オプションについて説明できるようになります。また、Google Cloud の各種のハイブリッドおよびマルチクラウド接続サービスが特定のユースケースに適しているかどうかを検討する方法についても理解できます。さっそく始めましょう。

schedule 5 Months
$252 / TOTAL
View on Coursera
Cybersecurity and Network Defense Fundamentals Edureka

Cybersecurity and Network Defense Fundamentals

This program equips aspiring cybersecurity professionals, SOC analysts, network engineers, and system administrators with the foundational knowledge and practical skills required to understand, analyze, and defend against modern cyber threats in enterprise environments. You will begin by exploring the evolving cyber threat landscape, examining attacker motivations, adversary methodologies, and structured attack lifecycles using frameworks such as the Cyber Kill Chain and MITRE ATT&CK. Through guided demonstrations and applied analysis, you will learn how attackers conduct reconnaissance, exploit vulnerabilities, and move across networks—and how defenders detect and disrupt these activities using structured security operations techniques. Building on this foundation, you will develop practical Linux skills essential for cybersecurity operations. Working within a Kali Linux environment, you will execute core command-line operations, analyze system logs, apply regular expressions for investigation, and map adversary techniques using MITRE ATT&CK Navigator. The course also introduces structured threat intelligence practices, including OSINT collection and STIX/TAXII-based intelligence sharing. Using tools such as Maltego and theHarvester, you will learn how to uncover external attack surfaces and enhance situational awareness through intelligence-driven defense. Next, the program explores attack vectors and exploitation techniques commonly used in real-world cyber incidents. You will analyze phishing campaigns, social engineering tactics, malware delivery methods, and ransomware lifecycles. Through controlled demonstrations and sandbox-based analysis, you will observe malicious behavior, identify indicators of compromise, and understand how attackers transition from initial access to system impact. The course then advances into operating system security and network monitoring. You will apply secure configuration principles, enforce privilege management controls, audit system activity, and assess endpoint security posture across Windows and Linux environments. On the network side, you will design segmented architectures, implement intrusion detection and prevention concepts, and analyze packet-level traffic using Wireshark and Snort to detect anomalies and suspicious activity. Finally, you will integrate these capabilities in a structured practice project where you map a full threat lifecycle, analyze indicators, harden systems, and validate monitoring controls—demonstrating a layered defense strategy aligned with enterprise best practices. By the end of this program, you will be able to: -Analyze cyber threats, attacker behaviors, and structured attack lifecycles. -Map adversary tactics and techniques using MITRE ATT&CK and the Cyber Kill Chain. -Apply Linux command-line tools for log analysis, investigation, and threat mapping. -Collect and evaluate threat intelligence using OSINT and structured intelligence feeds. -Identify phishing, malware, and ransomware exploitation techniques. -Implement operating system hardening and privilege management controls. -Design secure network architectures using segmentation and IDS/IPS principles. -Analyze network traffic and detect suspicious activity using monitoring tools. This course is designed for SOC analysts, cybersecurity practitioners, network and infrastructure engineers, system administrators, and early-career security professionals seeking strong foundational and operational skills in cyber threat analysis and network defense. Join us to build the analytical mindset, technical capability, and structured defense strategies required to protect enterprise systems against modern cyber threats.

schedule 6 Months
$124 / TOTAL
View on Coursera
Jenkins Pipeline: Declarative and IaC approaches for DevOps Coursera

Jenkins Pipeline: Declarative and IaC approaches for DevOps

By the end of this course you will be able to start writing your own Jenkins scripts either in the Jenkins UI or as Jenkinsfile over a multi-stage CD workflow.

schedule 7 Months
$155 / TOTAL
View on Coursera
AWS Certified SysOps Administrator - Associate Packt

AWS Certified SysOps Administrator - Associate

This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Prepare for the AWS Certified SysOps Administrator - Associate exam with hands-on experience in real-world scenarios. You'll master key AWS services such as EC2, IAM, VPC, and Route 53, focusing on configuration, performance monitoring, and cost management. This course dives into backup and recovery strategies, high availability, and database services, ensuring you're equipped to handle the full scope of AWS operations. The course structure is designed to walk you through each AWS service in depth. Starting with Identity and Access Management (IAM), you’ll learn how to manage user permissions and security policies. Then, you’ll explore VPCs and EC2 instances, gaining expertise in networking and compute resources. High availability, application load balancing, and Route 53 are covered in the next phase, enabling you to architect resilient solutions. You’ll then move on to backup, recovery, and orchestration tools to automate processes and ensure the availability of critical resources. Finally, the course will take you through managing AWS costs effectively, which is crucial for optimizing cloud resources. By the end, you will have the comprehensive knowledge needed to confidently tackle the AWS Certified SysOps Administrator - Associate exam and apply these skills in real-world AWS environments. This course is ideal for system administrators, engineers, or anyone looking to advance their career with AWS expertise. It’s targeted at those familiar with basic AWS concepts and cloud technologies. If you have experience managing systems or are aiming for a career in cloud operations, this course is for you.

schedule 7 Months
$165 / TOTAL
View on Coursera
Introduction to Social Media Marketing Meta

Introduction to Social Media Marketing

This course lays the foundation of social media marketing. You’ll learn what social media marketing entails, including the history and the different social media channels that exist. You’ll learn how to select a social media channel that fits your needs, set goals and success metrics, and determine who your target audience is. By the end of this course, you will be able to: • Understand the landscape of traditional, digital, and social media marketing • Understand how to become certified as a Digital Marketing Associate • Understand the major social media platforms, how they function, and what role they play in marketing • Create SMART goals and identify KPIs • Define your target audience and their customer journey • Choose the right social media platforms and learn how to create social media policies Whatever level of knowledge you start with, this course will help you build a solid foundation for social media marketing and gain applicable skills that will allow you to make your social media marketing efforts more successful and noticeable. Learners don't need marketing experience, but should have basic internet navigation skills and be eager to participate and connect in social media. Learners must have a Facebook account and an Instagram account helps.

schedule 7 Months
$316 / TOTAL
View on Coursera
Digital business - Grow on digital world École Polytechnique

Digital business - Grow on digital world

Digital-driven changes are both generic and specific. Most transformations apply to all industries, equally and without exception. But in some industries or places, digital transformations are singular and atypical. To be a player in the digital world, you will need to master both the transformations common to all industries and the transformations at work on certain verticals. Retail and the sharing economy are emblematic of markets where specific transformations are unfolding. This module will tell you how. Week 1 : New business models, new perimeters Week 2 : Regulating the digital innovation Week 3 : The value of digital innovation

schedule 3 Months
$81 / TOTAL
View on Coursera
Concurrency in Go University of California, Irvine

Concurrency in Go

Learn how to implement concurrent programming in Go. Explore the roles of channels and goroutines in implementing concurrency. Topics include writing goroutines and implementing channels for communications between goroutines. Course activities will allow you to exercise Go’s capabilities for concurrent programming by developing several example programs.

schedule 7 Months
$346 / TOTAL
View on Coursera
Splunk Search Expert 103 Splunk Inc.

Splunk Search Expert 103

In this course, you will learn how to calculate co-occurrence between fields and analyze data from multiple datasets, increase your knowledge of searching and learn how to work with multivalue data. In addition, you will learn tips and tricks to improve search performance using accelerations.

schedule 3 Months
$105 / TOTAL
View on Coursera
Dynamic volume provisioning on GKE with Google Cloud NetApp Volumes Google Cloud

Dynamic volume provisioning on GKE with Google Cloud NetApp Volumes

This is a self-paced lab that takes place in the Google Cloud console.

schedule 5 Months
$297 / TOTAL
View on Coursera
Введение в анализ данных с помощью Excel Rice University

Введение в анализ данных с помощью Excel

Использование Excel широко распространено в отрасли. Это очень мощный инструмент анализа данных, и почти все крупные и малые предприятия используют Excel в своей повседневной работе. Это вводный курс по использованию Excel, который предоставляет знания о работе в Excel с целью ее использования для более продвинутых тем деловой статистики позже. Курс разработан с учетом двух типов учащихся — тех, у кого очень мало функциональных знаний о Excel, и тех, кто регулярно использует Excel, но на периферийном уровне и хочет развить свои навыки. Курс включает в себя базовые операции, такие как импорт данных в Excel с использованием различных форматов данных, организацию и управление данными, а также некоторые более продвинутые функции Excel. В целом, знакомство с функциями Excel проходит на базе простых для понимания примеров, которые демонстрируются таким образом, чтобы учащимся не составило труда понять и применить их. Для успешного прохождения курсов учащиеся должны иметь доступ к Microsoft Excel 2010 или более поздней версии для Windows. ________________________________________ НЕДЕЛЯ 1 Модуль 1: Введение в электронные таблицы В этом модуле вы познакомитесь с использованием электронных таблиц Excel и различными базовыми функциями данных Excel. Рассматриваемые темы включают: • Импорт данных в Excel с использованием различных форматов • Основные функции в Excel, арифметические и различные логические функции • Форматирование строк и столбцов • Использование формул в Excel и их копирование с использованием абсолютных и относительных ссылок ________________________________________ НЕДЕЛЯ 2 Модуль 2: Функции электронной таблицы для организации данных В этом модуле представлены различные функции Excel для организации и запроса данных. Участники знакомятся с функциями ЕСЛИ, ВПР и ГПР и вложенной функцией ЕСЛИ в Excel. Рассматриваемые темы включают: • Функция ЕСЛИ и вложенная функция ЕСЛИ • ВПР и ГПР • Функция СЛУЧМЕЖДУ ________________________________________ НЕДЕЛЯ 3 Модуль 3: Введение в фильтры, сводные таблицы и диаграммы В этом модуле представлены различные возможности фильтрации данных в Excel. Вы узнаете, как настраивать фильтры для избирательного доступа к данным. Также объясняется очень мощный инструмент обобщения данных, сводная таблица, и мы начинаем вводить функцию построения диаграмм в Excel. Рассматриваемые темы включают: • ВПР и рабочие листы • Фильтрация данных в Excel • Использование сводных таблиц с категориальными и числовыми данными • Введение в возможности построения диаграмм в Excel ________________________________________ НЕДЕЛЯ 4 Модуль 4: Расширенные возможности построения графиков и диаграмм В этом модуле рассматриваются различные продвинутые методы построения графиков и диаграмм, доступные в Excel. Начиная с различных линейных, столбчатых и круговых диаграмм, мы представляем сводные диаграммы, точечные графики и гистограммы. Вы научитесь понимать эти различные диаграммы и начнете строить их самостоятельно. Рассматриваемые темы включают: • Линейные, столбчатые и круговые диаграммы • Сводные диаграммы • Точечные графики • Гистограммы

schedule 4 Months
$370 / TOTAL
View on Coursera
Introduction to CNN Training Simplilearn

Introduction to CNN Training

This beginner-friendly course on Convolutional Neural Networks (CNNs) equips you with essential skills to understand deep learning fundamentals and apply them to real-world image recognition tasks. Learn how CNNs power modern AI applications and gain practical experience through guided lab demos. Build confidence in designing, training, and implementing CNN models effectively. By the end of this course, you will be able to: Understand CNN Basics: Explain what CNNs are and their role in deep learning and computer vision Explore Core Components: Learn about convolution, ReLU, and pooling layers in CNNs Recognize Image Processing: Understand how CNNs detect and classify image features Apply CNN Models: Build and implement CNN models through hands-on guided labs Gain Practical Skills: Develop expertise to handle real-world image classification projects Ideal for beginners, and professionals interested in AI, computer vision, and deep learning.

schedule 7 Months
$185 / TOTAL
View on Coursera
Origins - Formation of the Universe, Solar System, Earth and Life University of Copenhagen

Origins - Formation of the Universe, Solar System, Earth and Life

The Origins course tracks the origin of all things – from the Big Bang to the origin of the Solar System and the Earth. The course follows the evolution of life on our planet through deep geological time to present life forms.

schedule 6 Months
$71 / TOTAL
View on Coursera
headset_mic
Get In Touch