Newsletter Subject

Want to break into the cybersecurity industry?

From

edx.org

Email Address

edX@news.edx.org

Sent On

Sun, Sep 3, 2023 08:01 AM

Email Preheader Text

Discover the right edX course for you. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ �

Discover the right edX course for you. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ {preheader_text} [edX Logo](~/AAQRxQA~/RgRm1sJwP0SBaHR0cHM6Ly93d3cuZWR4Lm9yZy8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Courses](~/AAQRxQA~/RgRm1sJwP0SSaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dGFiPWNvdXJzZSZ1dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) / [Programs](~/AAQRxQA~/RgRm1sJwP0STaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dGFiPXByb2dyYW0mdXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) / [My Account](~/AAQRxQA~/RgRm1sJwP0SIaHR0cHM6Ly9hdXRobi5lZHgub3JnL2xvZ2luP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Protect data-driven organizations across industries.](~/AAQRxQA~/RgRm1sJwP0SHaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) The rise of data-driven businesses means increased cyberattacks. Protecting sensitive information and digital assets has become integral to the success of most organizations and industries. This means cybersecurity professionals are in demand. The U.S. Bureau of Labor Statistics projects a 35% growth in security analyst positions from 2021 to 2031, making it the perfect time to cultivate your skills and build your professional portfolio to stand out as a strong candidate.1 [Explore courses](~/AAQRxQA~/RgRm1sJwP0SHaHR0cHM6Ly93d3cuZWR4Lm9yZy9zZWFyY2g_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) Executive Education Learn from experts with years of experience in the cybersecurity and data privacy world, and earn an official certificate from a leading university. Executive education courses are delivered by GetSmarter. [[HarvardX] Cybersecurity: Managing Risk in the Information Age Prepare your organization to defend against cyberattacks.](~/AAQRxQA~/RgRm1sJwP0TVaHR0cHM6Ly9oYXJ2YXJkeC1vbmxpbmVjb3Vyc2VzLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvaGFydmFyZC1jeWJlcnNlY3VyaXR5LW9ubGluZS1zaG9ydC1jb3Vyc2U_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[IMD] Cybersecurity Risk and Strategy Make strategic decisions that boost your organization’s cyber resilience.](~/AAQRxQA~/RgRm1sJwP0TcaHR0cHM6Ly9pbWQtb25saW5lLXByb2dyYW1zLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvaW1kLWN5YmVyc2VjdXJpdHktcmlzay1hbmQtc3RyYXRlZ3ktb25saW5lLXByb2dyYW0vP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[Northwestern University] Cybersecurity Leadership Lead a cyber-safe organizational culture.](~/AAQRxQA~/RgRm1sJwP0TwaHR0cHM6Ly9nZXRzbWFydGVyLm1jY29ybWljay5ub3J0aHdlc3Rlcm4uZWR1L3ByZXNlbnRhdGlvbnMvbHAvbm9ydGh3ZXN0ZXJuLXVuaXZlcnNpdHktY3liZXJzZWN1cml0eS1sZWFkZXJzaGlwLW9ubGluZS1zaG9ydC1jb3Vyc2U_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[Northwestern University] Privacy Law and Data Protection Solve your data privacy issues and protect your organization.](~/AAQRxQA~/RgRm1sJwP0TyaHR0cHM6Ly9nZXRzbWFydGVyLmxhdy5ub3J0aHdlc3Rlcm4uZWR1L3ByZXNlbnRhdGlvbnMvbHAvbm9ydGh3ZXN0ZXJuLXVuaXZlcnNpdHktcHJpdmFjeS1sYXctYW5kLWRhdGEtcHJvdGVjdGlvbi1vbmxpbmUtc2hvcnQtY291cnNlLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[University of Cape Town] Fundamentals of Cybersecurity Protect your organization’s confidential information and data.](~/AAQRxQA~/RgRm1sJwP0TRaHR0cHM6Ly91Y3Qtb25saW5lLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvZnVuZGFtZW50YWxzLW9mLWN5YmVyc2VjdXJpdHktb25saW5lLXNob3J0LWNvdXJzZT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[University of Cape Town] Data Protection and Privacy Understand the laws and regulations surrounding data protection.](~/AAQRxQA~/RgRm1sJwP0TTaHR0cHM6Ly91Y3Qtb25saW5lLmdldHNtYXJ0ZXIuY29tL3ByZXNlbnRhdGlvbnMvbHAvdWN0LWRhdGEtcHJvdGVjdGlvbi1hbmQtcHJpdmFjeS1vbmxpbmUtc2hvcnQtY291cnNlP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) Boot Camps Enroll in a boot camp and hone your cybersecurity and data privacy knowledge as you build your professional portfolio. Upon completion, you’ll have a strong body of cybersecurity and data privacy projects for current and potential employers to assess. [[Arizona State University] Cybersecurity Boot Camp Protect your organization's information.](~/AAQRxQA~/RgRm1sJwP0SfaHR0cHM6Ly9ib290Y2FtcC5jcGUuYXN1LmVkdS9jeWJlcnNlY3VyaXR5L2xhbmRpbmc_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[UC Berkeley Extension] Cybersecurity Boot Camp Become a digital defender.](~/AAQRxQA~/RgRm1sJwP0SkaHR0cHM6Ly9ib290Y2FtcC5iZXJrZWxleS5lZHUvY3liZXJzZWN1cml0eS9sYW5kaW5nLWI1YT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[The Ohio State University] Cybersecurity Boot Camp Join the front lines of information security.](~/AAQRxQA~/RgRm1sJwP0SlaHR0cHM6Ly9lbmctYm9vdGNhbXBzLm9zdS5lZHUvY3liZXJzZWN1cml0eS9sYW5kaW5nLWI1YS8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[Columbia Engineering] Data Analytics Boot Camp Learn data analytics online.](~/AAQRxQA~/RgRm1sJwP0SgaHR0cHM6Ly9ib290Y2FtcC5jdm4uY29sdW1iaWEuZWR1L2RhdGEvbGFuZGluZy1iNWEvP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[The University of Texas at Austin] The Data Analysis and Visualization Boot Camp Use big data to solve big problems.](~/AAQRxQA~/RgRm1sJwP0SbaHR0cHM6Ly90ZWNoYm9vdGNhbXBzLnV0ZXhhcy5lZHUvZGF0YS9sYW5kaW5nLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [[Vanderbilt University] Data Analytics Boot Camp Transform data into decisions.](~/AAQRxQA~/RgRm1sJwP0SgaHR0cHM6Ly9ib290Y2FtcHMudmFuZGVyYmlsdC5lZHUvZGF0YS9sYW5kaW5nLWZ1bGwvP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) Weekly course features [Cybersecurity Compliance and System Administration](~/AAQRxQA~/RgRm1sJwP0TaaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1jb21wbGlhbmNlLWFuZC1zeXN0ZW0tYWRtaW5pc3RyYXRpb24tY291cnNlLXYxLWlibS1jeWJmdW4tMy0wLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cybersecurity Compliance and System Administration IBM Enroll now](~/AAQRxQA~/RgRm1sJwP0TaaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1jb21wbGlhbmNlLWFuZC1zeXN0ZW0tYWRtaW5pc3RyYXRpb24tY291cnNlLXYxLWlibS1jeWJmdW4tMy0wLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Network Security](~/AAQRxQA~/RgRm1sJwP0S4aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbmV0d29yay1zZWN1cml0eS1jb3Vyc2UtdjEtcml0eC1jeWJlcjUwNHgtMXQyMDI0P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Network Security RITx Enroll now](~/AAQRxQA~/RgRm1sJwP0S4aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbmV0d29yay1zZWN1cml0eS1jb3Vyc2UtdjEtcml0eC1jeWJlcjUwNHgtMXQyMDI0P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Cybersecurity Basics](~/AAQRxQA~/RgRm1sJwP0S8aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1iYXNpY3MtY291cnNlLXYxLWlibS1jeWJmdW4tMS0wLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cybersecurity Basics IBM Enroll now](~/AAQRxQA~/RgRm1sJwP0S8aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1iYXNpY3MtY291cnNlLXYxLWlibS1jeWJmdW4tMS0wLTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cybersecurity: The CISO's View](~/AAQRxQA~/RgRm1sJwP0TLaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS10aGUtY2lzby1zLXZpZXctY291cnNlLXYxLXV3YXNoaW5ndG9ueC1jeWIwMDJ4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cybersecurity: The CISO's View UWashingtonX Enroll now](~/AAQRxQA~/RgRm1sJwP0TLaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS10aGUtY2lzby1zLXZpZXctY291cnNlLXYxLXV3YXNoaW5ndG9ueC1jeWIwMDJ4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Finding Your Cybersecurity Career Path](~/AAQRxQA~/RgRm1sJwP0TUaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZmluZGluZy15b3VyLWN5YmVyc2VjdXJpdHktY2FyZWVyLXBhdGgtY291cnNlLXYxLXV3YXNoaW5ndG9ueC1jeWIwMDR4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Finding Your Cybersecurity Career Path UWashingtonX Enroll now](~/AAQRxQA~/RgRm1sJwP0TUaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvZmluZGluZy15b3VyLWN5YmVyc2VjdXJpdHktY2FyZWVyLXBhdGgtY291cnNlLXYxLXV3YXNoaW5ndG9ueC1jeWIwMDR4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Network and Security Foundations](~/AAQRxQA~/RgRm1sJwP0TEaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbmV0d29yay1hbmQtc2VjdXJpdHktZm91bmRhdGlvbnMtY291cnNlLXYxd2d1eGl0ZWMyMTAyM3QyMDIxP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [Network and Security Foundations WGUx Enroll now](~/AAQRxQA~/RgRm1sJwP0TEaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvbmV0d29yay1hbmQtc2VjdXJpdHktZm91bmRhdGlvbnMtY291cnNlLXYxd2d1eGl0ZWMyMTAyM3QyMDIxP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [CS50's Introduction to Cybersecurity](~/AAQRxQA~/RgRm1sJwP0TUaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3M1MC1zLWludHJvZHVjdGlvbi10by1jeWJlcnNlY3VyaXR5LWNvdXJzZS12MS1oYXJ2YXJkeC1jczUwY3MtY3liZXJzZWN1cml0eT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [CS50's Introduction to Cybersecurity HarvardX Enroll now](~/AAQRxQA~/RgRm1sJwP0TUaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3M1MC1zLWludHJvZHVjdGlvbi10by1jeWJlcnNlY3VyaXR5LWNvdXJzZS12MS1oYXJ2YXJkeC1jczUwY3MtY3liZXJzZWN1cml0eT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cyber Security Basics: A Hands-on Approach](~/AAQRxQA~/RgRm1sJwP0TPaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXItc2VjdXJpdHktYmFzaWNzLWEtaGFuZHMtb24tYXBwcm9hY2gtY291cnNlLXYxLXVjM214LWluZi0yeC0zdDIwMjM_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Cyber Security Basics: A Hands-on Approach UC3Mx Enroll now](~/AAQRxQA~/RgRm1sJwP0TPaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXItc2VjdXJpdHktYmFzaWNzLWEtaGFuZHMtb24tYXBwcm9hY2gtY291cnNlLXYxLXVjM214LWluZi0yeC0zdDIwMjM_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [Cybersecurity and Privacy in the IoT](~/AAQRxQA~/RgRm1sJwP0TLaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1hbmQtcHJpdmFjeS1pbi10aGUtaW90LWNvdXJzZS12MS1jdXJ0aW54LWlvdDV4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cybersecurity and Privacy in the IoT CurtinX Enroll now](~/AAQRxQA~/RgRm1sJwP0TLaHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXJzZWN1cml0eS1hbmQtcHJpdmFjeS1pbi10aGUtaW90LWNvdXJzZS12MS1jdXJ0aW54LWlvdDV4LTF0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cyber Risk Supervision](~/AAQRxQA~/RgRm1sJwP0S5aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXItcmlzay1zdXBlcnZpc2lvbi1jb3Vyc2UtdjEtaW1meC1jcnN4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) [Cyber Risk Supervision IMFx Enroll now](~/AAQRxQA~/RgRm1sJwP0S5aHR0cHM6Ly93d3cuZWR4Lm9yZy9jb3Vyc2UvY3liZXItcmlzay1zdXBlcnZpc2lvbi1jb3Vyc2UtdjEtaW1meC1jcnN4LTJ0MjAyMz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) MicroBachelors® and MicroMasters® Programs Enroll in graduate-level cybersecurity courses, apply new data privacy skills to your current role, and earn credits toward full degrees from top universities. [[UCSanDiegoX] Algorithms and Data Structures Master algorithmic programming techniques necessary for top software engineering professions.](~/AAQRxQA~/RgRm1sJwP0S4aHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb21hc3RlcnMvdWNzYW5kaWVnb3gtYWxnb3JpdGhtcy1hbmQtZGF0YS1zdHJ1Y3R1cmVzP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[WGU] Introduction to Information Technology Build a career pathway in information technology or advance your career with a foundation in hardware, software, networks, security, and programming.](~/AAQRxQA~/RgRm1sJwP0S7aHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb2JhY2hlbG9ycy93Z3V4LWludHJvZHVjdGlvbi10by1pbmZvcm1hdGlvbi10ZWNobm9sb2d5P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[RITx] Cybersecurity Launch your career in an industry projecting 2 million new jobs annually by earning an RIT Cybersecurity MicroMasters® program credential.](~/AAQRxQA~/RgRm1sJwP0SgaHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb21hc3RlcnMvcml0eC1jeWJlcnNlY3VyaXR5P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~) [[IUx] Information Systems Learn the role of applying information systems/technologies in digitally-enabled businesses.](~/AAQRxQA~/RgRm1sJwP0SlaHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb21hc3RlcnMvaXV4LWluZm9ybWF0aW9uLXN5c3RlbXM_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[UMBC / USM] Database Management Systems Learn skills needed for Database Administrators that work with both Relational Databases and NoSQL Databases.](~/AAQRxQA~/RgRm1sJwP0SuaHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb21hc3RlcnMvdW1iYy1kYXRhYmFzZS1tYW5hZ2VtZW50LXN5c3RlbXM_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [[UCSanDiegoX] Data Science Gain the critical skills needed to become a data scientist, a top job in America and in demand globally.](~/AAQRxQA~/RgRm1sJwP0SoaHR0cHM6Ly93d3cuZWR4Lm9yZy9taWNyb21hc3RlcnMvdWMtc2FuLWRpZWdveC1kYXRhLXNjaWVuY2U_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) [How a boot camp helped one learner launch a new career during COVID-19](~/AAQRxQA~/RgRm1sJwP0T1aHR0cHM6Ly93d3cuZWR4Lm9yZy9yZXNvdXJjZXMvYS1mcmVzaC1zdGFydC1ob3ctdW9mdC1zY3MtY3liZXJzZWN1cml0eS1ib290LWNhbXAtaGVscGVkLXRqLWxpdmVybW9yZS1sYXVuY2gtYS1uZXctY2FyZWVyLWR1cmluZy1jb3ZpZC0xOT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) Meet TJ TJ Livermore believes there’s never a bad time to reinvent yourself, which is why he decided to career-pivot during a global pandemic. After working as an HVAC technician for 11 years, he followed his passion for technology and decided to delve deeper into secure coding. Studying online meant he could keep his day job. [Discover how TJ took advantage of flexible learning to become a vulnerability management coordinator.](~/AAQRxQA~/RgRm1sJwP0T1aHR0cHM6Ly93d3cuZWR4Lm9yZy9yZXNvdXJjZXMvYS1mcmVzaC1zdGFydC1ob3ctdW9mdC1zY3MtY3liZXJzZWN1cml0eS1ib290LWNhbXAtaGVscGVkLXRqLWxpdmVybW9yZS1sYXVuY2gtYS1uZXctY2FyZWVyLWR1cmluZy1jb3ZpZC0xOT91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) 1Occupational Outlook Handbook. (2022).[U.S. Bureau of Labor Statistics](~/AAQRxQA~/RgRm1sJwP0TQaHR0cHM6Ly93d3cuYmxzLmdvdi9vb2gvY29tcHV0ZXItYW5kLWluZm9ybWF0aW9uLXRlY2hub2xvZ3kvaW5mb3JtYXRpb24tc2VjdXJpdHktYW5hbHlzdHMuaHRtP3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdCN0YWItNlcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~). Retrieved August 9, 2023. ~/AAQRxQA~/RgRm1sJwP0SBaHR0cHM6Ly93d3cuZWR4Lm9yZy8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRm1sJwP0SJaHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL2VkWD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA ~/AAQRxQA~/RgRm1sJwP0SKaHR0cHM6Ly90d2l0dGVyLmNvbS9lZFhPbmxpbmU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRm1sJwP0SRaHR0cHM6Ly93d3cubGlua2VkaW4uY29tL2NvbXBhbnkvZWR4P3V0bV9zb3VyY2U9YnJhemUmdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249U3VuZGF5X0NvdXJzZV9Sb3VuZHVwX1VTXzIwMjMwOTAzJnV0bV9jb250ZW50PUV4ZWMuIEVkLiBGaXJzdFcDc3BjQgpk8HA99GT3qSRiUht0cmlzdHJhbWJhbGR3aW45MUBnbWFpbC5jb21YBAAAAEA~ ~/AAQRxQA~/RgRm1sJwP0SQaHR0cHM6Ly93d3cuaW5zdGFncmFtLmNvbS9lZHhvbmxpbmU_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRm1sJwP0SKaHR0cHM6Ly93d3cucmVkZGl0LmNvbS9yL2VkWC8_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRm1sJwP0STaHR0cHM6Ly9lZHguYXBwLmxpbmsvZW1haWwtYXBwLWluc3RhbGw_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~ ~/AAQRxQA~/RgRm1sJwP0SSaHR0cHM6Ly9lZHguYXBwLmxpbmsvZW1haWwtYXBwLWluc3RhbD91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA edX is the trusted platform for education and learning. [edX For Business](~/AAQRxQA~/RgRm1sJwP0SGaHR0cHM6Ly9idXNpbmVzcy5lZHgub3JnLz91dG1fc291cmNlPWJyYXplJnV0bV9tZWRpdW09ZW1haWwmdXRtX2NhbXBhaWduPVN1bmRheV9Db3Vyc2VfUm91bmR1cF9VU18yMDIzMDkwMyZ1dG1fY29udGVudD1FeGVjLiBFZC4gRmlyc3RXA3NwY0IKZPBwPfRk96kkYlIbdHJpc3RyYW1iYWxkd2luOTFAZ21haWwuY29tWAQAAABA) — eLearning Solutions for Your Company © 2023 edX LLC All rights reserved. [Update Your Preferences](~/AAQRxQA~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_dXRtX3NvdXJjZT1icmF6ZSZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1TdW5kYXlfQ291cnNlX1JvdW5kdXBfVVNfMjAyMzA5MDMmdXRtX2NvbnRlbnQ9RXhlYy4gRWQuIEZpcnN0VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) / [Unsubscribe](~/AAQRxQA~/RgRm1sJwP0TVaHR0cHM6Ly9jb25zZW50LXNldHRpbmdzLXN0Zy5lZHgub3JnL2VtYWlsX3Vuc3Vic2NyaWJlL25ldz92PWRISnBjM1J5WVcxaVlXeGtkMmx1T1RGQVoyMWhhV3d1WTI5dElGSllhR3haZVRSblVsZFJkVWxGV25CamJrNHdPbUUyTnpBeVptTXdOVFJoTURjeU5tUXhOREZrTWpNME1UQmxNamswWW1JeE5tVmpNVE0xWlRJMVkySXdNamM1TnpFNVlXUTNNelV4T0RObU16azNNR1E9VwNzcGNCCmTwcD30ZPepJGJSG3RyaXN0cmFtYmFsZHdpbjkxQGdtYWlsLmNvbVgEAAAAQA~~) 7900 Harkins Road, Lanham, MD 20706

Marketing emails from edx.org

View More
Sent On

07/09/2023

Sent On

06/09/2023

Sent On

31/08/2023

Sent On

30/08/2023

Sent On

29/08/2023

Sent On

27/08/2023

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.