Bridgeway International

Certified Data Science Practitioner (CDSP)

For a business to thrive in our data-driven world, it must treat data as one of its most important assets. Data is crucial for understanding where the business is and where it’s headed. Not only can data reveal insights, it can also inform—by guiding decisions and influencing day-to-day operations. This calls for a robust workforce of professionals who can analyze, understand, manipulate, and present data within an effective and repeatable process framework. In other words, the business world needs data science practitioners. This course will enable you to bring value to the business by putting data science concepts into practice. This course includes hands on activities for each topic area.

Incident Response for Business Professionals (IRBIZ ™)

This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.

Data Ethics for Business Professionals (DEBIZ ™)

The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we apply ethical principles to data driven technology? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology.

CyberSAFE: End User Security

Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Certified Cyber Secure Coder

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.

Certified Ethical Emerging Technologist TM (CEET)

Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm. Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course’s practical, problems- based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations.

CyberSec First Responder (CFR)

Cyber threats are constant—and escalating. To defend networks and critical assets, today’s IT professionals need more than just awareness—they need structured, tested methods to detect, respond, and recover. The average breach costs $4.45 million—making fast, skilled response more critical than ever. The CyberSec First Responder (CFR) course from CertNexus equips practitioners with the skills to assess risk, monitor for intrusions, analyze threats, and respond to incidents in real time. Built around leading frameworks like NIST 800-61r2 and PPD-41, this 5-day course prepares learners to protect information systems and carry out Defensive Cyber Operations (DCO) effectively. This course also prepares candidates for the CFR-410 certification exam, validating their ability to detect, contain, analyze, and recover from cybersecurity incidents across modern network environments.

Cyber Secure Coder (CSC)

Over 80% of security breaches exploit software vulnerabilities, yet most teams address security after the code is written, leaving organizations at risk. The Cyber Secure Coder (CSC) course empowers software developers, testers, and architects to build secure, resilient applications by integrating security into every phase of the software development lifecycle. The CertNexus Cyber Secure Coder (CSC) program guides you through the entire software development lifecycle, emphasizing a security-by-design approach to reduce the risk of security defects, misconfiguration, and vulnerabilities that can undermine your code. Through hands-on labs and real-world scenarios, you’ll learn to eliminate vulnerabilities, find and correct security defects, and design a secure architecture for both new and deployed software. CSC-210 covers secure coding practices, vulnerability assessment, threat modeling, and strategies for maintaining software security long after deployment.