Home
About
Why Data Chord?
Certification
Accreditation
Career
Home
About
Why Data Chord?
Certification
Accreditation
Career
More
  • Home
  • About
  • Why Data Chord?
  • Certification
  • Accreditation
  • Career
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out


Signed in as:

filler@godaddy.com

  • Home
  • About
  • Why Data Chord?
  • Certification
  • Accreditation
  • Career

Account


  • My Account
  • Sign out


  • Sign In
  • My Account
Professional Certificate in Data Science
Online Format

Professional Certificate in Data Science (Cybersecurity)

Join a global community of alumni, earn the PCiDS™ title, and expand your professional network through this internationally accredited professional certificate in data science program.

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Join the 18 May - 7 June 2025 online class for just US$63.50/month after discount!

Register
Professional Certificate in Data Science

The world-class professional training program in data science from Singapore

Online


Our comprehensive, fully accredited certification program is designed for professionals seeking to excel at the intersection of cybersecurity and data analytics. Through a series of eight interactive modules, 60 hours of self-directed learning, and a final project module supported by Canvas LMS, you'll gain deep, hands-on knowledge from foundational principles in artificial intelligence and data science to advanced techniques in threat detection, graph theory, and data visualization—all tailored to today's rapidly evolving digital security landscape.


Based on early estimates, 87% of trainees who complete the Professional Certificate in Data Science program secure employment or achieve career advancement within six months, leveraging the data science and cybersecurity skills acquired through this upskilling program. 


The PCiDS™ certification is recognized and accepted around the world with the support of our international accreditation bodies, expert assessment panel and luminary advisors around the world.

Certification Bodies

Data Chord

Accreditation

Internationally recognized; globally accepted

​The Association of Data Scientists (ADaSci) is a premier global professional body dedicated to advancing the fields of data science, machine learning, and artificial intelligence. ADaSci offers institutional accreditation that serves as a mark of excellence, validating the quality, relevance, and industry alignment of programs, products, and services in AI, data science, and analytics. This accreditation provides organizations like Data Chord with global recognition, enhances credibility, ensures adherence to industry standards, and offers access to a vast network of professionals and resources. By aligning with ADaSci's rigorous accreditation standards, programs like PCiDS™ can demonstrate their commitment to excellence and industry relevance.

Professional Certificate in Data Science

Professional Certificate in Data Science

We use a tiered pricing system based on international purchasing power parity (PPP) and income classifications to ensure fair and equitable access to training globally. Pricing is reviewed annually and may be adjusted based on updated economic data.


  • Program fee: US$1,344 for full program (3 weeks online + 3 months to complete final assessment) - or US$75 per month for 18 months installment.
  • Promotion: 15% discount off the program fee. Promotion ends 11 May 2025
  • Price quoted includes relevant tax in Singapore. 12 or 18 months installment is available upon request.


An e-certificate will be issued to trainees who have completed the training program and have fully settled the program fee. Trainees may choose to request a hard copy via registered mail at a fee.


Program Overview

Trainees who have successfully completed the program are eligible to use the post-nominal title PCiDS, subject to verification and upon issuance of the official certificate. Current and potential employers or educational institutions may contact Data Chord to verify the authenticity of the PCiDS certificate and the Accreditation certificate.


Schedule for full certification:

  • Date: 18 May - 7 June 2025
  • Type: Online
  • Commitment:  5 evenings of 3-hours session across 7 Days in a Week. Full program runs across 3 weeks. Remaining hours for self-directed learning.


Download Program


This foundational course introduces the core concepts of Artificial Intelligence (AI), Data Science, Personal Data Protection (PDP) & Ethical Analytics, basic data integration (ETL), and fundamental Machine Learning (ML) techniques. It is designed not only to build critical technical skills but also to ensure compliance with industry regulations and quality standards required for ISO certification. The course emphasizes clear learning outcomes, practical exercises, continuous assessment, and quality documentation.


This module introduces trainees to the fundamentals of Artificial Intelligence and Data Science, covering key concepts such as types of AI, real-world applications, and the full Data Science lifecycle—from problem definition to model deployment. It also builds interdisciplinary foundations by introducing essential statistical methods like Bayesian Inference and Markov Chains, which are critical for data-driven decision making. By understanding how AI and Data Science intersect and operate in practical settings, trainees gain the conceptual and analytical grounding needed to navigate modern technology environments. This foundational knowledge not only enhances their technical literacy but also strengthens their ability to engage in data-centric roles across industries, opening pathways to careers in cybersecurity, analytics, and digital transformation. 


Topics Covered:

  • Fundamentals of AI:
    • What is Artificial Intelligence?
    • Types of AI (e.g., Narrow AI, General AI, Superintelligent AI)
    • Examples and real-world applications (e.g., recommendation systems, autonomous vehicles)
  • Data Science Essentials:
    • Definition and scope of Data Science
    • The Data Science lifecycle—from problem statement to model deployment
    • Key distinctions between Data Science and AI
  • Interdisciplinary Foundations:
    • Basic statistics and mathematical methods (e.g., Bayesian Inference, Markov Chains)
    • How these techniques underpin AI and data-driven decision making

Learning Outcomes:

  • Articulate basic definitions and applications of AI and Data Science.
  • Understand the steps of the Data Science lifecycle.
  • Apply fundamental statistical concepts to real-world examples.


This module equips trainees with essential knowledge in Personal Data Protection (PDP), data privacy regulations, and ethics in data analytics. It explores the role of PDP in safeguarding individual rights within today’s data ecosystem and introduces major global regulations such as GDPR, CCPA, and Vietnam’s PDPD. Trainees also learn key ethical frameworks—including utilitarianism, deontology, and virtue ethics—to guide responsible data usage and mitigate biases in analytics. By understanding both legal and moral obligations surrounding data, trainees are better prepared to design and implement analytics solutions that are not only effective but also compliant and ethically sound. These competencies are increasingly critical across industries where data protection and ethical decision-making are integral to building trust and ensuring long-term sustainability. 


Topics Covered:

  • Personal Data Protection (PDP):
    • Overview and significance of personal data protection
    • Role of PDP in today’s data ecosystem
    • Key trends such as the emphasis on individual rights and advanced protective technologies
  • Data Privacy Laws & Regulations:
    • Examination of prominent laws (e.g., GDPR, CCPA, LGPD, Vietnam PDPD)
    • How these regulations impact data collection, processing, and storage
  • Ethics in Data Analytics:
    • Moral principles (utilitarianism, deontology, virtue ethics) governing data use
    • Best practices for ethical decision making in analytics
    • Strategies to identify and mitigate algorithmic biases in data-driven projects

Learning Outcomes:

  • Recognize the importance of PDP in protecting individual rights and data integrity.
  • Evaluate the impact of key data privacy regulations on organizational practices.
  • Integrate ethical considerations into data analytics workflows.


This module provides trainees with foundational skills in data integration and ETL (Extract, Transform, Load) processes, essential for managing diverse data sources in cybersecurity and analytics workflows. Trainees learn to handle different data types—structured, semi-structured, and unstructured—and practice converting and cleaning data through Python-based labs. Emphasis is placed on building automated, error-resistant data pipelines and applying anomaly detection techniques to ensure data quality and reliability. These hands-on skills are directly transferable to roles requiring data preparation and validation, enabling trainees to support accurate analytics and make informed, secure decisions in data-driven environments. 


Topics Covered:

  • Data Integration Fundamentals:
    • Overview of data types (structured, semi-structured, unstructured)
    • Importance and benefits of consolidating data into a centralized repository
  • ETL Process Breakdown:
    • Extraction: Accessing data from disparate sources
    • Transformation: Converting semi-structured data into structured formats and cleaning data for consistency
    • Loading: Importing transformed data into target databases/data lakes
  • Practical Exercises:
    • Hands-on labs using tools (e.g., Python-based scripts) to convert data files, standardize timestamps, and extract date/time components
    • Developing simple data pipelines that emphasize automation and error checking
  • Data Quality and Anomaly Detection:
    • Techniques for identifying data anomalies that could affect downstream analytics

Learning Outcomes:

  • Build and execute basic ETL pipelines.
  • Develop strategies for data cleaning and transformation to maintain data quality.
  • Implement fundamental anomaly detection techniques to secure and validate data.


This module introduces trainees to the core principles and practical applications of Machine Learning (ML) within the broader context of AI. It covers the complete ML lifecycle—from data ingestion and preprocessing to model training, tuning, and deployment—alongside automation techniques that streamline repetitive tasks. Trainees explore different types of ML, including supervised, unsupervised, and reinforcement learning, and learn how these approaches can be applied to detect anomalies and vulnerabilities in cybersecurity settings. By mastering these skills, trainees are equipped to develop intelligent systems that enhance threat detection and decision-making, positioning them for roles in AI-driven cybersecurity and data analytics environments.


Topics Covered:

  • Overview of Machine Learning:
    • Role of ML in the broader AI landscape
    • Comparative analysis of AI, ML, and Deep Learning
  • ML Workflow Essentials:
    • Data ingestion and preprocessing
    • Model training, experimentation, and deployment
    • Automating repetitive tasks in the ML lifecycle, such as hyperparameter tuning and model serving
  • Types of Machine Learning Techniques:
    • Supervised Learning: Classification and regression methods using labeled data
    • Unsupervised Learning: Clustering and association rule learning with unlabeled data
    • Reinforcement Learning: Trial-and-error approaches for optimal decision making
  • Application in Cybersecurity:
    • Basic approaches to vulnerability and anomaly detection using ML
    • Examples of how ML algorithms can identify suspicious patterns and reduce risks

Learning Outcomes:

  • Understand the complete lifecycle of an ML project and implement a basic ML pipeline.
  • Differentiate between supervised, unsupervised, and reinforcement learning techniques.
  • Apply ML algorithms to fundamental cybersecurity and data quality challenges.


Learners will take the assessment for Certificate of Completion (Anchor Level).


This Intermediate course introduces essential concepts of graph theory—including classification, representation methods, traversal algorithms, and key graph properties—and applies these principles to real-world cybersecurity challenges. The curriculum combines theoretical instruction with hands-on lab exercises (using tools such as Python’s NetworkX library) and detailed documentation to ensure quality and traceability for ISO audit compliance.


This module provides a comprehensive introduction to graph theory, a critical area in understanding complex relationships in cybersecurity and data science. Trainees learn essential terminology—such as nodes, edges, and weights—and explore various graph classifications, including directed vs. undirected and cyclic vs. acyclic structures. The module also covers practical representation methods (like adjacency matrices and lists), traversal algorithms (BFS and DFS), and pathfinding techniques using Dijkstra’s Algorithm. By mastering these concepts and applying them through hands-on exercises, trainees gain the analytical skills needed to model and analyze interconnected systems, laying the groundwork for advanced applications such as attack graph construction, network analysis, and vulnerability mapping in cybersecurity. 


Topics Covered:

  • What is Graph Theory?
    • Definitions: Nodes (vertices), Edges, Weights, and Graph Terminology
    • Basic examples (e.g., the “love triangle” scenario)
  • Classification of Graphs:
    • Directed vs. Undirected: Understanding one-way and mutual connections
    • Weighted vs. Unweighted: Importance of edge weights in practical scenarios
    • Cyclic vs. Acyclic: Identifying cycles, Directed Acyclic Graphs (DAGs) for scheduling and blockchain
    • Special Graphs: Trees (rooted trees, binary trees), bipartite graphs, and planar graphs
  • Graph Representation Methods:
    • Adjacency Matrix and List: Pros and cons, use cases in computer science
    • Practical comparison using example datasets
  • Graph Properties and Metrics
    • Connectedness, path lengths (shortest path), cycles, and centrality measures
    • Introduction to fundamental algorithms: Dijkstra’s Algorithm for pathfinding
  • Graph Traversal Algorithms:
    • Breadth-First Search (BFS): Level-order exploration
    • Depth-First Search (DFS): Deep recursive exploration
    • Algorithmic pseudocode and step-by-step examples

Learning Outcomes:

  • Define key graph theory concepts and apply standard terminology.
  • Classify and represent different types of graphs accurately.
  • Implement basic traversal algorithms (BFS and DFS) and compute the shortest path using Dijkstra’s Algorithm.
  • Analyze and evaluate graph properties to support various computing problems.


 This module bridges graph theory with practical cybersecurity applications, equipping trainees to analyze complex digital threats through visual and structural models. It covers how to represent computer networks as graphs, where devices and data flows become nodes and edges, and how to distinguish between directed and undirected connections. Trainees learn to construct attack trees and graphs to map cyberattack scenarios such as phishing or insider threats, and apply graph-based machine learning for anomaly detection. With hands-on use of Python’s NetworkX library, they gain experience in building and analyzing network structures, calculating centrality, and identifying potential vulnerabilities. These skills enable trainees to visualize cyber risks, strengthen threat modeling capabilities, and contribute to proactive cybersecurity defense strategies. 


Topics Covered:

  • Relevance of Graph Theory in Cybersecurity:
    • Modeling complex cyber relationships—attack paths, threat structures, and network vulnerabilities.
    • Applications include threat detection, intrusion detection, fraud identification, and blockchain security.
  • Representing Computer Networks as Graphs:
    • Modeling network devices (e.g., computers, routers, IoT devices) as nodes and communication links as edges.
    • Differentiating directed graphs (to show data flow) versus undirected graphs (for mutual connectivity).
  • Threat Modeling and Attack Graphs:
    • Attack Trees vs. Attack Graphs:
      • Hierarchical representation of attacker goals and detailed steps in a cyberattack.
      • Case studies covering advanced persistent threat (APT) scenarios and social network fraud detection.
  • Graph-Based Machine Learning in Cybersecurity:
    • Applying graph neural networks (GNNs) and centrality analysis for threat prediction and anomaly detection.
  • Hands-On: Building Cybersecurity Graphs:
    • Exercise 1: Draw simple network graphs representing real-world communication networks with undirected/directed edges.
    • Exercise 2: Construct attack graphs to model phishing attacks, insider threats, or ransomware scenarios.
    • Exercise 3: Utilize Python’s NetworkX library to develop, analyze, and visualize cybersecurity graphs (including computation of centrality measures and shortest path analysis).
    • Code Walkthrough: Detailed step-by-step demonstration of scripts that build a network graph, detect vulnerable nodes, and highlight suspicious data flows.

Learning Outcomes:

  • Explain the role of graph theory in analyzing complex cybersecurity scenarios.
  • Construct both directed and undirected graphs to accurately model computer networks.
  • Develop attack trees and graphs to represent potential cyberattacks and threat scenarios.

Utilize graph analytics (centrality measures, shortest path algorithms) using Python to identify vulnerable nodes and potential attack paths. 


Learners will take the assessment for Certificate of Completion (Intermediate Level).


This course equips learners with the skills to transform complex datasets into insightful visual representations while also developing expertise in merging and analyzing cybersecurity data. The first module introduces key principles and techniques for effective data visualization, and the second module focuses on advanced data analytics tailored to cybersecurity challenges. The curriculum integrates theoretical instruction with practical hands‐on exercises (using tools such as Power BI and Python) and detailed documentation to meet ISO audit compliance through traceable, well-documented processes.


This module introduces trainees to the fundamentals of data visualization, emphasizing its role in simplifying complex datasets for clearer interpretation and decision-making. It covers a variety of visual formats—such as scatter plots, bar charts, line charts, heat maps, and histograms—and explains how to choose the right visual based on the data and analytical goals. Trainees gain hands-on experience with tools like Power BI, learning how to load data, build dashboards, and apply best practices for clarity, accessibility, and impact. By mastering these techniques, trainees enhance their ability to communicate data-driven insights effectively—an essential skill in cybersecurity, business analytics, and beyond. 


Topics Covered:

  • What is Data Visualization?
    • The practice of representing complex data with visual elements to enable easy interpretation and insight discovery.
    • Overview of transforming datasets into visual representations such as charts, graphs, maps, and dashboards.
  • Advantages of Data Visualization:
    • Enhances understanding, enables rapid insight discovery, and supports effective communication of data-driven findings.
  • Common Data Visualization Types:
    • Scatter Plots: Display relationships between variables and indicate dominance ratios.
    • Bar Charts: Compare incident types and severity levels (e.g., SIRT case records).
    • Line Charts: Illustrate trends over time (e.g., threat intelligence tracking).
    • Heat Maps and Histograms: Visualize user behavior patterns and distribution of events.
  • Data Visualization Tools:
    • Overview of popular tools (such as Power BI Desktop) with guidance on installation and initial configuration.
  • Best Practices:
    • Guidelines for clarity, labeling, consistency, and accessibility.
    • Practical steps for data loading, chart selection, and interpretation of visual cues.

Learning Outcomes:

  • Define data visualization and explain its role in translating complex data into understandable insights.
  • Identify various visualization types and select the appropriate method for different analytical scenarios.
  • Utilize data visualization tools to create clear and interactive visual representations.
  • Apply best practices to ensure visualizations are effective and communicate the intended messages. 


This module equips trainees with advanced data analytics skills tailored to cybersecurity contexts. It begins by clarifying the distinction between master and secondary data and emphasizes their roles in centralized security analysis. Trainees gain practical experience in ingesting and integrating diverse data sources using ETL techniques and join operations, enabling the transformation of raw logs into structured, actionable insights. The module also introduces key statistical methods—Markov Chain analysis, Bayesian inference, and chi-square testing—for detecting anomalies and modeling cyber threats. Through hands-on use of tools like Power BI, trainees learn to build dynamic dashboards that support real-time monitoring and strategic decision-making. These capabilities are essential for professionals aiming to manage cybersecurity data at scale and contribute to intelligent, evidence-based threat prevention. 


Topics Covered:

  • Master Data vs. Secondary Data in Cybersecurity:
    • Definitions, differences, and their roles within a cybersecurity analytics framework.
    • Overview of the security_config file as master data and its importance for centralized security management.
  • Data Ingestion and Integration:
    • Ingesting master data (e.g., security_config.csv) into Power BI.
    • Performing ETL processes on unstructured data to generate structured analytic tables.
    • Joining secondary data with the master dataset through various join operations (left, right, inner, full outer, and anti joins).
  • Benefits of Data Integration:
    • Simplified management, enhanced automation, improved auditing, consistent enforcement, and better root-cause analysis.
  • Advanced Analytical Methods in Cybersecurity:
    • Markov Chain Analysis: Modeling state transitions and behavioral patterns for intrusion detection.
    • Bayesian Inference: Dynamically updating threat probabilities and supporting spam/phishing detection.
    • Chi-Square Testing: Evaluating statistical discrepancies between expected and observed cybersecurity event frequencies.
  • ETL for Unstructured Data:
    • Techniques for converting raw log files and unstructured data into a structured format.
    • Practical challenges such as delimiter detection, renaming fields, and data cleansing.
  • Visualization and Reporting in Security Analytics:
    • Integrating joined data to generate comprehensive dashboards for monitoring security posture.
    • Using advanced analytics to derive actionable insights and predictive trends.

Learning Outcomes:

  • Distinguish between master and secondary data in cybersecurity, and understand their significance in a unified analytic framework.
  • Execute ETL processes and join operations to integrate diverse cybersecurity data sources.
  • Apply statistical methods such as Markov Chains, Bayesian Inference, and Chi-Square tests to analyze cybersecurity events.
  • Develop and present comprehensive reports and dashboards that drive proactive threat management and enhance policy enforcement.


Learners will take the assessment for Certificate of Completion (Advanced Level).


This is the final assessment for the qualification round of the Professional Certificate in Data Science (Cybersecurity). All final projects are reviewed by an Expert Assessment Panel comprising seasoned professionals with over 20 years of experience in data science.


While there are no strict entry requirements, 

  • a background in IT or data science would be beneficial, and
  • a display of certain level of English proficiency, and
  • at least 18 years old


We welcome learners from all backgrounds to join us in this training program.


At this moment, we are preparing for the next level of training: the Professional Advanced Certificate in Data Science.


  •  Data Analyst - threathunting 
  •  Data Analyst – Cybersecurity (SIEM) 


Register

Executive Committee and Advisors

Dr. Daniel Koh ("Dan")

Tran Hoai Phuong Chi (“Chi”)

Dr. Daniel Koh ("Dan")

Dr. Daniel Koh brings a distinguished educator’s perspective to our training program, grounded in over two decades of experience in data science, artificial intelligence, and cybersecurity. He has taught at leading institutions including Singapore Management University as an analytics instructor, Singapore University of Social Sciences as

Dr. Daniel Koh brings a distinguished educator’s perspective to our training program, grounded in over two decades of experience in data science, artificial intelligence, and cybersecurity. He has taught at leading institutions including Singapore Management University as an analytics instructor, Singapore University of Social Sciences as an adjunct lecturer, and currently serves as an adjunct lecturer at the Management Development Institute of Singapore. As the lead instructor for our Data Science modules, Dr. Koh is committed to translating complex concepts into accessible, real-world learning. His curriculum blends practical applications with critical thinking—preparing learners to tackle modern cybersecurity challenges through AI-driven solutions. In recognition of his data science contributions during the COVID-19 pandemic, he was awarded the Singapore’s prestigious COVID-19 Resilience Medal. His approach equips learners not only with technical expertise, but also with the mindset to apply data ethically and effectively in today’s fast-changing world.

Profile

Mark Phooi ("Mark")

Tran Hoai Phuong Chi (“Chi”)

Dr. Daniel Koh ("Dan")

We are proud to welcome Mark Phooi as an advisor to our company. A visionary in the creative industry, design education and entrepreneurship, Mark began his journey with just S$2,000, founding Lancer Design in 1989. He went on to build First Media, a group of design agencies and educational institutions across Asia. In 2004, he won the To

We are proud to welcome Mark Phooi as an advisor to our company. A visionary in the creative industry, design education and entrepreneurship, Mark began his journey with just S$2,000, founding Lancer Design in 1989. He went on to build First Media, a group of design agencies and educational institutions across Asia. In 2004, he won the Top Entrepreneurs of the Year Award by Rotary Club/ASME. In 2006, he established First Media Design School (FMDS), offering an innovative "whole-brain" training model rooted in the Herrmann Brain Dominance framework. Under his leadership, FMDS was the 13th recipients in the much sought after four-year EduTrust certification. 


Mark’s philosophy—captured in his book Think Like a Sage, Work Like a Fool, Act Like a Criminal—emphasises passion, hunger, and discipline (PHD) as core traits for success. His Four-Stage Designpreneurship Pedagogy blends multi-dimensional and design thinking to nurture future-ready creative leaders. With his advisory role, we are confident in strengthening our professional certificate in data science programs and expanding our impact through innovation and educational excellence.

Profile

Tran Hoai Phuong Chi (“Chi”)

Tran Hoai Phuong Chi (“Chi”)

Tran Hoai Phuong Chi (“Chi”)

A passionate leader with strong interpersonal skills and the ability to motivate a workforce to achieve great heights. Her professional career started on a high note in 1997 as a Business Leader for Hardware & Software Distribution. The company carried multiple IT solution vendors such as HP, Lenovo, Oracle, Microsoft, and Adobe, among ot

A passionate leader with strong interpersonal skills and the ability to motivate a workforce to achieve great heights. Her professional career started on a high note in 1997 as a Business Leader for Hardware & Software Distribution. The company carried multiple IT solution vendors such as HP, Lenovo, Oracle, Microsoft, and Adobe, among others. She strategically delivered value to channel partners ranging from SMBs to enterprises and learned the tremendous value of continuous learning and workforce skills development.

Profile

Zulkifli Jalil ("Zul")

Tran Hoai Phuong Chi (“Chi”)

Tran Hoai Phuong Chi (“Chi”)

Zulkifli Jalil is a renowned cybersecurity expert, entrepreneur, and educator with extensive experience in cybersecurity, AI-driven security solutions, cloud security, and business strategy. As the Founder & CEO of Cyb3r, Qicyber and 5Cyber, Zulkifli leads multiple initiatives that bridge cybersecurity education, enterprise security consu

Zulkifli Jalil is a renowned cybersecurity expert, entrepreneur, and educator with extensive experience in cybersecurity, AI-driven security solutions, cloud security, and business strategy. As the Founder & CEO of Cyb3r, Qicyber and 5Cyber, Zulkifli leads multiple initiatives that bridge cybersecurity education, enterprise security consulting, and AI-powered security solutions, equipping individuals and businesses with cutting-edge digital defense capabilities.

Profile

Expert Assessment Panel

Dr. Daniel Koh

Dr. Kathrin Kind-Trueller

Dr. Kathrin Kind-Trueller

With over 20 years of experience in data science across multiple markets and more than 7 years as a university lecturer, Dr. Daniel Koh brings deep expertise at the intersection of data, education, and innovation. He has worked extensively with both government agencies and private enterprises to develop data-driven strategies for decision

With over 20 years of experience in data science across multiple markets and more than 7 years as a university lecturer, Dr. Daniel Koh brings deep expertise at the intersection of data, education, and innovation. He has worked extensively with both government agencies and private enterprises to develop data-driven strategies for decision-making and digital transformation. Dr. Koh is the founder of Koh & Associates in Osaka and the Managing Director of the Singapore-based affiliated company, Data Chord Pte Ltd. His programs blend rigorous analytical training with practical, real-world application, preparing trainees not just to understand data—but to lead with it. He is also actively involved in building bridges between regional talent and international opportunities, particularly in high-impact areas such as data science and AI. In recognition of his contributions to Singapore’s national efforts during the COVID-19 pandemic, Dr. Koh was awarded the COVID-19 Resilience Medal, honoring his role in using data science to support public initiatives during a time of crisis. Trainees who successfully complete his programs emerge with the technical competence, critical thinking, and global mindset necessary to thrive in fast-changing, data-intensive environments.

Profile

Dr. Kathrin Kind-Trueller

Dr. Kathrin Kind-Trueller

Dr. Kathrin Kind-Trueller

One of only 20 globally curated members of the World Economic Forum’s Global Future Council on Data Frontiers, Dr. Kathrin Kind-Trueller is a distinguished, multi-award-winning expert in the application of artificial intelligence to business. She began her career in 1999 in quality engineering for international mobile communication networ

One of only 20 globally curated members of the World Economic Forum’s Global Future Council on Data Frontiers, Dr. Kathrin Kind-Trueller is a distinguished, multi-award-winning expert in the application of artificial intelligence to business. She began her career in 1999 in quality engineering for international mobile communication networks at Siemens. Over the years, she has contributed to the development of complete vehicle functions—including ADAS, engine management, steering, braking, cockpit infotainment, and autonomous driving—at top-tier automotive suppliers such as Bosch, ZF-TRW, and Magneti Marelli, as well as OEMs like BMW (Munich), Mercedes-Benz Cars (Sindelfingen), and Audi (Ingolstadt). She later served as a senior research scientist in AI for the Volkswagen Group in Wolfsburg.

Dr. Kind-Trueller currently holds the position of Chief Data Scientist and AI Director for Cognizant in Global Growth Markets. She is also a Technical Editor for CRC Press and Springer Nature, a volunteer mentor with the KALAI initiative under ICT, and a guest lecturer at the University of Agder (Norway) and the University of New Delhi. A prolific academic, she is the author and co-author of several technical books on autonomous systems and data.

Her academic background includes a Doctorate in AI applied to business from SSBM Geneva in collaboration with the University of Zagreb, an MBA in AI from the University of Cumbria, an MSc in Computer Science and Software Engineering from the University of Hertfordshire, and a Master of Arts in Leading Innovation and Change from York St. John University. She also holds Postgraduate Diplomas in Digitalisation Leadership from Columbia University and Systems Engineering from MIT (USA). With her expertise in data science and AI, we are confident that she brings great value to our professional certificate in data science program.

Profile

Enquiry

Find out more

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Register

Frequently Asked Questions

Each level (i.e., Anchor, Intermediate, Advanced) is independent yet designed to build progressively toward the final certification. Each level runs over one week, allowing trainees to attend one level at a time online.


Yes, trainees who have successfully completed the Professional Certificate in Data Science (Cybersecurity) (PCiDS™) program are eligible to use the post-nominal title PCiDS. This designation signifies that you have met the standards set by the program and the accrediting body, ADaSci. It can be added after your name (e.g., Jane Doe, PCiDS) to reflect your certified expertise in data science.


The assessment panel is responsible for marking and grading the final assessments submitted by trainees. It consists of a team of experts, each with over 20 years of experience in data science across multiple markets.


This is an internationally accredited professional development certificate, designed for industry upskilling. It is recognized as a professional certificate that can be used to support continuing employment purpose. Trainees who have successfully completed the program are eligible to use the post-nominal title PCiDS, subject to verification and upon issuance of the official certificate. 


Here are some write-ups about the PCiDS Training Program:

  • Bridging Cybersecurity and Data Science
  • Why does the PCiDS training program matter?
  • Why the PCiDS™ Training Program Is Superior in Today’s Cyber-Driven World


  • Home
  • About
  • Why Data Chord?
  • Certification
  • Accreditation
  • Career

Data Chord (UEN: 202435637C)

Copyright © 2024 Data Chord - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept