熟女人妻

2024 FAFSA Information Guide

Diversify Your Knowledge

熟女人妻 Tech

Empower Yourself with 熟女人妻 Tech

Certificates available in Software Development (Full Stack), Cybersecurity, and Data Science.

熟女人妻 Tech certificates are a great way to enhance your knowledge with skills and training that are immediately applicable to the workplace.

For Current 熟女人妻 Students
熟女人妻 Tech certificates can be taken as part of the Divine Design requirements of your educational journey or can be earned alongside any degree.听

For Non-Degree Seeking Students
Considering a career change or looking for ways to learn more in your current field? 熟女人妻 Tech certificates can give you exactly what you鈥檙e looking for 鈥 all on your schedule and within your budget.听

Request Information

Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
SMS OPT IN
By selecting yes and clicking 鈥淪ubmit,鈥 I give 熟女人妻 permission to contact me with important university-related updates via text messaging. (Standard messaging rates may apply.) I also understand that I may opt-out from this communication at any time by replying with the word STOP.
This field is for validation purposes and should be left unchanged.

Software Development

Craft seamless online experiences

Full Stack Web Development
Full-stack developers work with both the front- and back-end to develop interactive web applications.

Front-End Web Development
Front-end developers create the visible part of a website or application, such as the user interface and design.

Back-End Web Development
Back-end developers design the interactions between the web application and its databases. Databases store and manage data sent to and from the user-facing side of a website or application.

Cybersecurity

Create innovations to protect data and information

Cybersecurity protects networks, systems, and programs from digital attacks. These attacks usually aim to access, change, or destroy sensitive information, extort money from users, or interrupt normal business processes.

Cybersecurity focuses on preventing and detecting this type of unauthorized access. It applies to networks, computers, programs, and data, as well as the management of the impact of such attacks. This includes implementing security measures such as firewalls, encryption, intrusion detection, and prevention systems, as well as responding to incidents when they occur.

Data Science

Develop solutions and optimize operations

Data science is an interdisciplinary field that uses scientific tools, processes, algorithms, and systems to extract knowledge and insights from data in various forms (both structured and unstructured).

It combines mathematics, statistics, data analysis, machine learning, and computer science 鈥 all focused on discovering patterns in large data sets and using that knowledge to make predictions and decisions.

About the Certificates

Software Development

FULL STACK

Full-stack developers work with both the front- and back-end to develop interactive web applications.

Front-End Web Development
Front-end developers create the visible part of a website or application, such as the user interface and design.

Back-End Web Development
Back-end developers design the interactions between the web application and its databases. Databases store and manage data sent to and from the user-facing side of a website or application.

Data Science

Data science is an interdisciplinary field that uses scientific tools, processes, algorithms, and systems to extract knowledge and insights from data in various forms (both structured and unstructured).

It combines mathematics, statistics, data analysis, machine learning, and computer science 鈥 all focused on discovering patterns in large data sets and using that knowledge to make predictions and decisions.

Cybersecurity

Cybersecurity protects networks, systems, and programs from digital attacks. These attacks usually aim to access, change, or destroy sensitive information, extort money from users, or interrupt normal business processes.

Cybersecurity focuses on preventing and detecting this type of unauthorized access. It applies to networks, computers, programs, and data, as well as the management of the impact of such attacks. This includes implementing security measures such as firewalls, encryption, intrusion detection, and prevention systems, as well as responding to incidents when they occur.

Upcoming Courses

Additional courses will be offered in future semesters. Visit the for course details.听

Fall A听

SDEV 1003 Front-End Development I

CSEC 1003 Introduction to Cybersecurity

Fall B听

SDEV 1013 Back-End Development I

DATA 1003 Introduction to Data Science

Spring A听

SDEV 2003 Front-End Development II

Spring B听

SDEV 2013 Back-End Development II

Program Details

Course Format

Fully online

Course Length

8 weeks each

熟女人妻 Prerequisites

None

Time Commitment

Minimum 10 hours per week

All Levels Welcome

No prior tech experience? No problem! We鈥檒l teach you everything you need to know.

Course Content

  • Video and text-based lessons
  • Hands-on activities
  • One-on-one meetings with the professor or course mentors
  • Mock interviews
  • Open-book quizzes
  • Drop-in workshops for live help
  • Online community via 熟女人妻 Tech Slack
  • Projects to develop a portfolio
  • Opportunity to partner with an organization to build a solution to a real-world problem (Capstone courses)

Get Started

Current 熟女人妻 Students

All 熟女人妻 students can choose to add 熟女人妻 Tech courses to their degree journey. To register, log in to .

students meeting around a table

Non-Degree Students

Anyone can benefit from 熟女人妻 Tech courses! Contact us at seutech@seu.edu to get started.