Certificate in Data Visualization

Start anytime. Work at your own pace.

Need an excerpt

Data Science

Online Self-Paced

6 CEUs

60 hours

$1500

$1200

Instructor: Jesus Caban

Curriculum designed and delivered by Hopkins APL’s Dr. Lanier Watkins

LIVE monthly seminars and office hours

Engaging learning including video walkthroughs and hands-on activities

Satisfaction guaranteed. Explore the course with no risk.

Save $300 with the Certificate vs. buying courses separately

Attack surfaces are expanding. Malware is evolving. Alert fatigue is real.

The answers to the modern cybersecurity threat landscape aren’t in firewalls and known signatures—they’re in spotting patterns no human can see, moving faster than attackers, and adapting in real time.

In this 3-course certificate program, Dr. Lanier Watkins gives Tier 1 and Tier 2 analysts the knowledge to use AI as a force multiplier and take your career to the next level.

His daily work at the Applied Physics Laboratory Infrastructure Protection Group AND his role as Hopkins Engineering’s cybersecurity master’s program chair makes him an ideal guide for a self-paced program combining academic rigor with real-world implementation.

Dr. Watkins will start you off with a solid foundation: Realistic expectations for AI in cybersecurity; core types of machine learning; Weak vs. strong vs. super AI. Then he’ll show you how to apply AI and machine learning to some of cybersecurity’s toughest challenges

  • Spam and phishing at scale
  • Polymorphic and metamorphic malware
  • Botnet activity and command-and-control detection
  • Alert overload and noisy data
  • AI-attacks poisoning AI models

and develop working tools to defeat them.

It’s a grounded, lab-based experience based in a secure, Linux-based virtual environment preloaded with Jupyter notebooks, working Python code, and real-world datasets. Dr. Watkins explains the concepts in video lectures and shares his favorite papers and articles. The preloaded notebooks get you going in a hurry while still letting you solve, experiment, and explore.

You’ll explore techniques like supervised and unsupervised learning, anomaly detection, neural networks, and reinforcement learning—not just to understand the algorithms, but to wield them.

Along the way, you’ll build intuition around when to use each approach, how to evaluate their performance, and what their outputs really mean for decision-making. You’ll also dive into biometric authentication, fraud prevention, malware analysis, and intrusion detection.

You don’t need a background in math or data science. You’ll do what you do best as a cybersecurity analyst: developing and deploying tools—not designing the math behind them.

The Certificate combines sequential cybersecurity courses:

into one bundle, saving you $300 off the cost of buying separately

After completing the course content, you can successfully complete and submit a capstone project to earn your Certificate of Achievement—proving to colleagues and employers that you’re ready to take the lead in building, evaluating and deploying cutting-edge AI cybersecurity solutions to protect critical assets.

The capstone requires applying all skills from the 3-course certificate into a single deliverable that demonstrates knowledge of state-of-the-art ML and includes sufficient performance metrics. The project will be reviewed by Dr. Watkins, who will provide feedback, which can be discussed further during live office hours.

The image is for illustrative purposes only. Actual certificate design subject to change,

No Risk: Satisfaction Guaranteed

Feel confident in your learning journey! If the certificate content is too advanced, not advanced enough, or simply doesn’t meet your expectations, we’ve got you covered with our money-back guarantee. Just contact our team within 7 days from purchase to receive a full refund—no questions asked.

Meet Your Instructors

Amy Bechner

Texas Instruments, Johns Hopkins University

Amy has spent 25+ years working at Texas Instruments and is currently Director of Program Management and Product Engineering for the MSP Business in Embedded Processors. She is one of the few PMs elected as Senior Members of the Technical Staff. She is an instructor in Hopkins Engineering’s #1 ranked online master’s program in engineering management. She earned her MBA in Project Management from the University of Texas at Dallas.

Buck Buchanan

Johns Hopkins University

Buck retired as a Colonel after 29+ years in the Air Force. After a stint at the Johns Hopkins Applied Physics Laboratory as a Project Area Manager, he joined Raytheon Solipsys as the Director of Business Development. Buck is currently a lecturer and advisor in Hopkins Engineering’s #1 ranked online master’s program in engineering management. He earned master’s degrees from Southern Illinois University, the University of Oklahoma, and Air University.

Faculty are Here to Help!

Questions about course content? Looking compare model results or get feedback? Stop by monthly Zoom office hours to talk with Amy, Buck, and fellow students.

Prerequisites

The Certificate is designed for cybersecurity professionals experienced students ready to level up. You don’t need to be a data scientist, but you should be comfortable navigating technical tools—like running Python code in Jupyter notebooks or working in a Linux-based virtual machine. If you’ve worked in cybersecurity, IT, or a related field and want to understand how AI is actually applied to real-world threats, this course is for you.

Course Summaries

Build practical skills in implementing basic AI tools for spam filtering, anti-phishing, and biometric authentication—along with a solid understanding of how supervised and unsupervised learning approaches can serve as force multipliers in cybersecurity operations.

You’ll build:

  • Perceptron-Based Spam Filter for SMS Data: Your first end-to-end ML tool
  • Support Vector Machine for Spam Detection: Level up with “suspect” and “neutral” words, finding threats simpler models would miss
  • Phishing Website Classifier with “One-Hot” Encoding: What’s best for the task? Linear regression, logic regression, or decision trees
  • Biometric Keystroke Authentication System: Compare multiple models on a dataset of 51 user keystroke dynamics
  • Biometric Facial Recognition for Secure ID: Using Principal Component Analysis and eigenfaces, you’ll implement dimensionality reduction techniques with the “Labeled Faces in the Wild” dataset for secure identity verification.

Create advanced detection systems that identify threats signature-based methods consistently miss. You’ll develop sophisticated security solutions for malware analysis for PE file examination, botnet detection, and industrial control system protection.

Then explore Hidden Markov Models for identifying self-modifying malware, K-means clustering for malware classification, and autonomic cybersecurity systems that provide self-healing capabilities

By course completion, you’ll possess a toolkit of AI-powered security implementations—including models for self-modifying malware detection, pattern recognition for unknown threats, and transparent AI for network anomaly detection. These skills enable you to implement adaptive security solutions that don’t rely solely on known signatures, significantly strengthening your defense capabilities.

You’ll build:

  • Static Malware Feature Extractor
    Use PEview to extract features from Windows executables for ML analysis.
  • Decision Tree Malware Classifier
    Train a decision tree to classify executables using labeled malware data.
  • Malware Clustering with K-Means
    Build a K-means model to group files as malware or benign based on PE headers.
  • Statistical Anomaly Detector
    Code a simple Python system to flag unusual network behavior using thresholds.
  • Botnet Detector with Supervised Learning
    Use KNN, decision tree, and Naive Bayes to detect botnet traffic
  • Autonomic Cybersecurity System Prototype
    Build a simulated IDS using multiple ML models to detect and explain attacks

As cybersecurity methods advance, cybercriminals are turning the tables on practitioners by using AI-based tools to outwit our defenses.

After breaking down a real-world use case of using IBM Watson to detect credit card fraud through advanced sampling techniques and ensemble models, Dr. Watkins takes you into the AI vs. AI domain.

You’ll learn how adversarial examples can compromise neural networks with “patch attacks,” how GANs evade detection systems, and how reinforcement learning agents methodically bypass security controls while preserving malicious functionality.

Then neutralize them with statistical anomaly detection, gradient masking, and adversarial training. You’ll know how to craft robust AI security systems capable of withstanding even the most advanced machine learning-based threats.

The course concludes with a critical analysis of H.S. Anderson’s Black Hat-presented RL malware-evasion framework.

You’ll build:

  • Credit Card Fraud Prevention System with IBM Watson: Compare Random Forest and Extreme Gradient Boosting algorithms.
  • GAN Handwriting Implementation: See for yourself the competition between the generator and discriminator networks.
  • Adversarial Attacks: Try Fast Gradient Sign Method, Projected Gradient Descent and Adversarial Patch attacks against deep neural networks.
  • Maze Reinforcement Learning Agent: Use Q-learning algorithms to allow the agent to learn optimal pathways and maximize rewards.

Tab 4 content.

Powered by Engineering for Professionals

The #1 Ranked Online Grad Program for Computer Information Technology by U.S. News & World Report

Johns Hopkins Engineering’s Lifelong Learning delivers executive education courses from the same faculty and support team behind Johns Hopkins Engineering for Professionals, the nation’s #1 online, part-time graduate program in computer information technology. This ranking includes our master’s programs in computer science, artificial intelligence, cybersecurity, information systems engineering, and data science.

Course Delivery and Support

The courses are delivered entirely online through the industry-leading Canvas Learning Management System. This system is supported by the same instructional design team behind Johns Hopkins’ renowned Engineering for Professionals program, which serves thousands of online graduate students each year. Upon registration, you will receive an email with instructions to create your Hopkins Canvas account and access the videos, readings, files and quizzes.

Certificate in Data Visualization

Data Science

Online Self-Paced

6 CEUs

60 hours

$1500

$1200

No Risk: Explore the Certificate for 7 Days