![A General Approach to Risk Management](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/dc/e125ba0e8f47f4be87319df3b92e12/Course-Logo.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
A General Approach to Risk Management
Available now
![AI for Education (Advanced)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/25/1a6796d0e34e40ae490af740bfc849/AI-for-Education-Advanced1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Education (Advanced)
Available now
![AI for Education (Basic)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/cc/ea310b90f84392b3c302b2c8d8fe51/AIforEducation-Basic1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Education (Basic)
Available now
![AI for Education (Intermediate)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3d/4c90eec2ea4da98ea48a20468b362e/AI-for-Education-Intermediate1200-1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Education (Intermediate)
Available now
![AI for Everyday Life](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/86/ace14d46ba4df68f4eca6189cb36dc/1200x1200b.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Everyday Life
Available now
![AI for Grant Writing](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c7/42f05c6b6d46a0a7bfba5f74e9bd16/Grant-Writing-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Grant Writing
Available now
![AI for Marketing: SWOT Analysis](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a5/9deddc87314efe8a6f915a4f288553/SWOT-Analysis-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Marketing: SWOT Analysis
Available now
![AI for Professional Communication](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0a/616bd5199347acaedb166ae1fbee33/AI-Professional-Communication1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
AI for Professional Communication
Available now
![Branding for Differential Advantage with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/f5/eb05fc8c44446fa3541968b96a4050/CompAdv-01.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Branding for Differential Advantage with Jagdish Sheth
Available now
![Business Model Canvas: A Tool for Entrepreneurs and Innovators (Project-Centered Course)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/5f/3a08d0b57811e5ac993db8020e54a5/Image-for-Dan_s-Coursera-Program.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Business Model Canvas: A Tool for Entrepreneurs and Innovators (Project-Centered Course)
Available now
![Career Options: Exploring a New Career](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/50/7994a0177011e69f1fad7f219033ce/iStock_000037192404_Full.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Career Options: Exploring a New Career
Available now
![Career Planning: A Pathway to Employment](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b4/204ad0177011e69dafb9743dbcedef/iStock_000086592193_Small.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Career Planning: A Pathway to Employment
Available now
![Creating Global Brands with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ae/f8d47c88e4409697ea9113b07336e7/CompAdv-03png.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Creating Global Brands with Jagdish Sheth
Available now
![Customer Centricity as Competitive Advantage - Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/26/4dcb2f57834c4aa54b27567a5e4b64/CustCentrAsCompetitiveAdv-Thumbnail.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Customer Centricity as Competitive Advantage - Jagdish Sheth
Available now
![Cybersecurity and Its Ten Domains](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e9/957fe0702411e4a0b53d9470331d4e/ComputerLock-Logo_2.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity and Its Ten Domains
Available now
![Cybersecurity and Mobility](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0d/59fde0e47b11e5adba1dd0436e277d/mobility.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity and Mobility
Available now
![Cybersecurity and the Internet of Things](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/42/c427d0e47b11e58924673e58025fe8/internet.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity and the Internet of Things
Available now
![Cybersecurity and the X-Factor](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e9/84c110e47b11e5ad7fc7f529dd2b43/xfactor.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity and the X-Factor
Available now
![Cybersecurity Awareness For Everyone: Final Assessment](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/95/716aeaceec44008f56673a8a9c739f/1200x1200-Course-5.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity Awareness For Everyone: Final Assessment
Available now
![Cybersecurity Foundations for Risk Management](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d2/90817e70e44613969cc5663929652b/LockGlobe-Square.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity Foundations for Risk Management
Available now
![Cybersecurity Job Search and Interviews: Getting Started](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d3/80f706e8bc407bb07d1101e038a636/Jobs-Logo.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity Job Search and Interviews: Getting Started
Available now
![Cybersecurity: Protecting your Information at Home](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a1/1275bdf2344b37a1e3b383925d5ae5/1200x1200-Course-2.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity: Protecting your Information at Home
Available now
![Cybersecurity: Protecting your Information on the Go](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/81/fbff4997de41f69171dd27dd78c5f8/1200x1200-Course-3.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity: Protecting your Information on the Go
Available now
![Cybersecurity: What to Do When You Are a Victim](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/40/415d8d0e104fa3a3231358f806fd43/1200x1200-Course-4.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity: What to Do When You Are a Victim
Available now
![Developing a Leadership Framework](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/75/44b2c5ed754f51a0029ced57be58c7/Logo-1200x1200.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Developing a Leadership Framework
Available now
![DFSS for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/97/dab2bc23cc491d9007ae20b353c0cf/Square-Course8.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
DFSS for the 6 σ Black Belt
Available now
![Dominant Risk Management Standards and Frameworks](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/77/f8412e44f14a4b9a08be864887d62d/RiskMgtStandardsFrameworks.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Dominant Risk Management Standards and Frameworks
Available now
![Emerging Markets - Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/77/661655187f4d52bd6fb6c3b0c0a74a/4As-Thumbnail-03.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Emerging Markets - Jagdish Sheth
Available now
![Ethical AI Use](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ca/ac724297d745c9852896583bcb04de/Ethical-AI-Use-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Ethical AI Use
Available now
![How Technology Will Shape Marketing with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c0/7f228994844dc484a94e5409a25861/CompAdv-04.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
How Technology Will Shape Marketing with Jagdish Sheth
Available now
![How to Become a Trusted Advisor with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/4f/0107b63ee34d96a434df7a75deed57/How-to-Become-Trusted-Advisor-Thumbnail.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
How to Become a Trusted Advisor with Jagdish Sheth
Available now
![Implementing a Risk Management Framework](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3d/8825c99d9242c4bab98141c77ae34f/CreatingRiskMgtFramework600x600.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Implementing a Risk Management Framework
Available now
![Leading and Developing Top Talent](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e5/19654797824fd1be16db41bcabc01b/Developing-Top-Talent-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Leading and Developing Top Talent
Available now
![Leading Organizational Change](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/50/2fb34f9c5b4ef793b51459c6ed98fb/Leading-Org-Change-1200x1200.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Leading Organizational Change
Available now
![Managing Customer Expectations with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/11/dcc7b1fe1b4daaa24262be70a4dc48/ManagingCustomerExpect-Thumbnail.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Managing Customer Expectations with Jagdish Sheth
Available now
![Managing Cybersecurity Incidents and Disasters](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/6d/307c2122864df1b486be38862e724a/Course4.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Managing Cybersecurity Incidents and Disasters
Available now
![Managing Network Security](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b4/6196b7225a433ba78b9ba1f3fe697b/CyberManagement1.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Managing Network Security
Available now
![Organization Planning and Development for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/7c/15196854a0494c81f9a11d5cf8d901/Square-Course1.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Organization Planning and Development for the 6 σ Black Belt
Available now
![Professional Selling: Step 1 - Think Like a High-Performer](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e7/2090f382d940fbbddfc2d119ba5b68/1-square.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Professional Selling: Step 1 - Think Like a High-Performer
Available now
![Professional Selling: Step 2 - Prepare Like a High-Performer](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/78/ff7a2334c44c35b2d553ba0aa75864/2-square.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Professional Selling: Step 2 - Prepare Like a High-Performer
Available now
![Professional Selling: Step 3 - Become a High-Performer](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/33/90ea72d6314d80a5de66bc839e39fc/3-square.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Professional Selling: Step 3 - Become a High-Performer
Available now
![Road to the CISO – Culminating Project Course](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/46/066ade8fca47d6b0e12d45dc3b1f49/Course5.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Road to the CISO – Culminating Project Course
Available now
![Segmenting the Market with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/77/51f01b85b047f4ad75c2c4c2535ff4/CompAdv-02.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Segmenting the Market with Jagdish Sheth
Available now
![Six Sigma Advanced Analyze Phase](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/9d/a97e60414111e7ab0b653d0ac1cf5d/A.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Advanced Analyze Phase
Available now
![Six Sigma Advanced Define and Measure Phases](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/64/3c42c0414111e792c5678d305d9d08/DM.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Advanced Define and Measure Phases
Available now
![Six Sigma Advanced Improve and Control Phases](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/9c/c45910414211e7b9d2c5418ef9c1a1/IC.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Advanced Improve and Control Phases
Available now
![Six Sigma and the Organization (Advanced)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3c/11179040b911e795ad21e7f82353cf/800x800-DMAIC.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma and the Organization (Advanced)
Available now
![Six Sigma Principles](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b8/295de0bb2d11e6ae5ebd9d9b53d2f6/iStock-518599088.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Principles
Available now
![Six Sigma Principles](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b8/295de0bb2d11e6ae5ebd9d9b53d2f6/iStock-518599088.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Principles
Available now
![Six Sigma Tools for Analyze](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/cf/370900f07111e6a8c82b8af416066a/iStock-464900523.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Tools for Analyze
Available now
![Six Sigma Tools for Define and Measure](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/72/dcea30f07111e69135afc9506c24aa/iStock-498719620.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Tools for Define and Measure
Available now
![Six Sigma Tools for Improve and Control](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d6/b65e40f07311e68d17dd08ab469187/iStock-496348715.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Six Sigma Tools for Improve and Control
Available now
![Social Media & Marketing - Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e9/3360abcbe148e8beac62e1eea4f269/4As-Thumbnail-02.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Social Media & Marketing - Jagdish Sheth
Available now
![Strategies for Planned Social Change with Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0c/1b94d04c4e417c93c2fae8fbd8b6c0/Planned-Scial-Change-Thumbnail.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Strategies for Planned Social Change with Jagdish Sheth
Available now
![Successful Career Development](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/02/d1b560177111e6b19b053f741d7b84/iStock_000062286568_Small.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Successful Career Development
Available now
![Team Management for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/67/85ff2e762445138ec5be76d35e5be9/Square-Course2.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Team Management for the 6 σ Black Belt
Available now
![The Analyze Phase for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/86/3e311cfb1f4c189b965266788231f3/Square-Course5.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Analyze Phase for the 6 σ Black Belt
Available now
![The Business of Cybersecurity Capstone](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/37/614f70e47c11e593b1b127fa4a32f6/cap.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Business of Cybersecurity Capstone
Available now
![The Control Phase for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/99/dd3e3475b74547b80788bc02b2d1d4/Square-Course7.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Control Phase for the 6 σ Black Belt
Available now
![The Define Phase for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/bc/4c08c7e6f1477fa1294050a685de46/Square-Course3.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Define Phase for the 6 σ Black Belt
Available now
![The Foundations of Cybersecurity](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d2/90817e70e44613969cc5663929652b/LockGlobe-Square.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Foundations of Cybersecurity
Available now
![The Good, Bad, and Ugly of Marketing - Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e8/8549b3c5714378bf6a31fff315c38d/4As-Thumbnail-04.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Good, Bad, and Ugly of Marketing - Jagdish Sheth
Available now
![The GRC Approach to Managing Cybersecurity](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/14/01f9a7c5fd4cc38e3f609706811c99/Course2-GRC.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The GRC Approach to Managing Cybersecurity
Available now
![The Improve Phase for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/c1/2b3c7ab64b43bd9f49f2efd633b2ef/Square-Course6.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Improve Phase for the 6 σ Black Belt
Available now
![The Measure Phase for the 6 σ Black Belt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/49/cf6afad2db4407822ab5e82ed8427c/Square-Course4.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Measure Phase for the 6 σ Black Belt
Available now
![What Are the 4 A’s of Marketing - Jagdish Sheth](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/36/f12bc154d542be850ddf083b0ebc64/4As-Thumbnail-01.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
What Are the 4 A’s of Marketing - Jagdish Sheth
Available now
![What Is Cybersecurity?](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/72/5b180173e747b7b08c4530ab3a3e6a/1200x1200-Course-1.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
What Is Cybersecurity?
Available now
![Writing Professional Email and Memos (Project-Centered Course)](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0f/6b0450bb8e11e5b8440118b60c1239/IMG_1281.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Writing Professional Email and Memos (Project-Centered Course)
Available now