Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Data Manipulation Course Catalog
Birla Institute of Technology & Science, Pilani
Skills you'll gain: Microarchitecture, Computer Architecture, Computational Logic, Computer Systems, Computer Science, Programming Principles, Embedded Systems, Computer Hardware, Digital Design, Data Storage
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Vulnerability Assessments, Docker (Software)
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Keras (Neural Network Library), Artificial Neural Networks, Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Algorithms, Data Processing
Google Cloud
Skills you'll gain: Cloud Applications, Google Sheets, Google Workspace, Cloud-Based Integration, Issue Tracking, Data Integration, Microsoft Excel
- Status: Free Trial
Skills you'll gain: Text Mining, Natural Language Processing, Microsoft Azure, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Unstructured Data, Analytics, Application Development, Application Programming Interface (API)
Skills you'll gain: Amazon Redshift, Extract, Transform, Load, Amazon Web Services, Data Warehousing, Amazon S3, AWS Identity and Access Management (IAM), Data Storage, Performance Tuning, Amazon Elastic Compute Cloud, Cloud Security, Database Management, Cloud Computing, SQL
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Maven Analytics
Skills you'll gain: Unsupervised Learning, Regression Analysis, Exploratory Data Analysis, Time Series Analysis and Forecasting, Data Analysis, Statistical Analysis, Data Science, Data Mining, Workflow Management, Machine Learning, Predictive Modeling, Classification And Regression Tree (CART), Supervised Learning, Histogram, Data Quality, Anomaly Detection, Feature Engineering, Dimensionality Reduction, Business Intelligence, Quality Assurance
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Program Evaluation, Health Equity, Quantitative Research, Data Analysis, Statistical Analysis, Analysis, Statistical Reporting, Data Collection, Sampling (Statistics), Public Health and Disease Prevention, Maternal Health, Data Quality, Research Design
- Status: Free Trial
Skills you'll gain: Selenium (Software), Object Oriented Programming (OOP), Web Development Tools, Test Automation, Scripting, Python Programming, Web Scraping, Development Environment, Debugging, File Management
- Status: Free Trial
University of Michigan
Skills you'll gain: Object Oriented Programming (OOP), Software Design, Data Structures, Visualization (Computer Graphics), Computer Programming, Computer Graphics, Python Programming, Algorithms, Linear Algebra, Simulations
Data Manipulation learners also search
In summary, here are 10 of our most popular data manipulation courses
- Introduction to Computing Systems: Birla Institute of Technology & Science, Pilani
- Certified Kubernetes Security Specialist (CKS) Course: Packt
- Cybersecurity Foundations: Threats Networks, and IoT Protection: Johns Hopkins University
- 컨볼루션 신경망: DeepLearning.AI
- Build a Project Tracking App with AppSheet: Google Cloud
- Intro to Natural Language Processing in Microsoft Azure: Microsoft
- Build a Data Warehouse in AWS: Edureka
- Cybersecurity and Secure Software Design: Ball State University
- Complete Visual Guide to Machine Learning: Maven Analytics
- Analysis and Interpretation of Large-Scale Programs: Johns Hopkins University