EIT Digital |
Advanced Recommender Systems (Coursera) https://www.coursera.org/learn/advanced-recommender-systems In this course, you will see how to use advanced machine-learning techniques to build more sophisticated recommender systems. Machine Learning is able to provide recommendations and make better predictions, by taking advantage of historical opinions from users and building up the model automatically, without the need for you to think about all the details of the model. At the end of the Advanced Recommender Systems, you will know how to manage hybrid information and how to combine different fil |
Architecting Smart IoT Devices (Coursera) https://www.coursera.org/learn/iot-architecture The Architecting Smart IoT Devices course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You'll discover all the available hardware and software components, such as processor families, operating systems, boards, and networks. You'll also learn how to use and integrate these components. At the end of the course, you will be ready to start architecting and implementing your own em |
Automated Reasoning: satisfiability (Coursera) https://www.coursera.org/learn/automated-reasoning-sat In this course, you will learn how to apply satisfiability (SAT/SMT) tools to solve a wide range of problems. Several basic examples are given to get the flavour of the applications: fitting rectangles to be applied for printing posters, scheduling problems, solving puzzles, and program correctness. Also, the underlying theory is presented: resolution as a basic approach for propositional satisfiability, the CDCL framework to scale up for big formulas, and the simplex method to deal with linear |
Automated Reasoning: Symbolic Model Checking (Coursera) https://www.coursera.org/learn/automated-reasoning-symbolic-model-checking The Automated Reasoning: Symbolic Model Checking course presents how the properties of acting systems and programs can be verified automatically. The basic notion is a transition system: any system that can be described by states and steps. We present how in CTL (computation tree logic) properties like reach-ability can be described. Typically, a state space may be very large. One way to deal with this is symbolic model checking: a way in which sets of states are represented symbolically. A fru |
Basic Recommender Systems (Coursera) https://www.coursera.org/learn/basic-recommender-systems The Basic Recommender Systems course introduces you to the leading approaches in recommender systems. The techniques described touch both collaborative and content-based approaches and include the most important algorithms used to provide recommendations. You'll learn how they work, how to use and how to evaluate them, pointing out benefits and limits of different recommender system alternatives. After completing this course, you'll be able to describe the requirements and objectives of recomm |
Blockchain 360: A State of the Art for Professionals (Coursera) https://www.coursera.org/learn/blockchain-professionals Businesses are currently dealing intensively with digital transformation. Blockchain has a major impact on the design and implementation of digital business processes in many application areas such as the Internet of Things, the Smart Grid, supply chain, and many more. In this MOOC you will learn the basics of blockchain technology, as well as many examples of best practice business applications. Course chapters: * Blockchain characteristics * Blockchain automation * Identification of opportu |
Blockchain for the decision maker (Coursera) https://www.coursera.org/learn/blockchain-decision-maker This nanoMOOC is an introduction to the live course 'Blockchain for the Decision Maker', offered by EIT Digital and the Budapest University of Technology and Economics. You will learn: - the concept of Distributed Ledgers and how 'blockchain' can provide them - the difference between public networks (as Bitcoin) and consortial ones bespoke for specific business consortia and needs - the key value propositions of blockchain for business and a birds-eye view of use case patterns - the fact that c |
Business Implications of AI: A Nano-course (Coursera) https://www.coursera.org/learn/business-implications-ai-nano-course A must for all business leaders! In the Business Implications of AI: A Nano-course, you will learn what Artificial Intelligence is, from a business leader's point of view. All the below questions will be answered during the course: * How shall we, as leaders, understand AI from a corporate strategy point of view? * What is it and how can it be used? * What are the crucial strategic decisions we have to make, and how to make them? * What consequences can we expect if we decide on doing AI pro |
Business Implications of AI: Full course (Coursera) https://www.coursera.org/learn/business-implications-ai The Business Implications of AI Throughout the course you will receive an answer to these key questions * How shall we, as leaders, understand AI from a corporate strategy point of view? * What is it and how can it be deployed? * What are the crucial strategic decisions we have to make, and how to make them? * What consequences can we expect if we decide on doing AI projects and what kind of competencies do we need? * Where shall we start, and what could be a good second as well as a t |
Capstone: Autonomous Runway Detection for IoT (Coursera) https://www.coursera.org/learn/autonomous-runway-detection Finally! You will learn how to motivate engineering decisions and how to choose implementations to make a system actually running! This capstone project course ties together the knowledge from three previous courses in IoT though embedded systems: Development of Real-Time Systems, Web Connectivity & Security and Embedded Hardware and Operating Systems. You will develop a larger system using the learning outcomes from these courses, and the students will evaluate the developed system in a real |
Cybersecurity Awareness and Innovation (Coursera) https://www.coursera.org/learn/cybersecurity It’s not you, it’s me! What’s going on? This course empowers students, professionals and the wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It provides a practical overview of challenging issues like identity credentials management and security, e-mail threats and web impersonation, or web hacking. In addition to this, you will have a practical appreciation of i |
Data Science for Business Innovation (Coursera) https://www.coursera.org/learn/data-science-for-business-innovation This is your chance to learn all about Data Science for Business innovation and future-proof your career. Match your business experience tech and analytics! The Data Science for Business Innovation nano-course is a compendium of the must-have expertise in data science for executives and managers to foster data-driven innovation. The course explains what Data Science is and why it is so hyped. You will learn: * the value that Data Science can create * the main classes of problems that Data Sci |
Development of Real-Time Systems (Coursera) https://www.coursera.org/learn/real-time-systems This course is all about practical programming and problem-solving! After completing this course, you will have the knowledge to plan and set up a real-time system both on paper and in practice. The course centers around the problem of achieving timing correctness in embedded systems, which means to guarantee that the system reacts within the real-time requirements. Examples of such systems include airbags, emergency breaks, avionics, and also multi-media systems like video playback and QoS in |
Development of Secure Embedded Systems (CourseraSpecs) https://www.coursera.org/specializations/embedded-systems-security Offered by EIT Digital . Secure Embedded Systems save lives and your career. Learn how to develop secure embedded systems with tools used in ... |
Embedded Hardware and Operating Systems (Coursera) https://www.coursera.org/learn/embedded-operating-system All about practical programming and creating IoTs applications! In this course, we will talk about two components of a cyber-physical system, namely hardware and operating systems. After completing this course, you will have knowledge of both hardware components and operating systems. You are able to plan and use embedded operating systems in resource-constraint devices for Internet-of-Things (cyber-physical system) applications. In addition, you can use Cooja simulation for designing and sim |
Foundations of mining non-structured medical data (Coursera) https://www.coursera.org/learn/mining-medical-data Rare course alert! This course is very specific and very will give you the edge you need in your career! Learn all about the foundations of Big Data and the data that is being generated in the health domain and how the use of technology would help to integrate and exploit all those data to extract meaningful information that can be later used in different sectors of the health domain from physicians to management, from patients to caregivers, etc. The course offers a high-level perspective of |
Geometric Algorithms (Coursera) https://www.coursera.org/learn/geometric-algorithms Geometric algorithms are a category of computational methods used to solve problems related to geometric shapes and their properties. These algorithms deal with objects like points, lines, polygons, and other geometric figures. In many areas of computer science such as robotics, computer graphics, virtual reality, and geographic information systems, it is necessary to store, analyze, and create or manipulate spatial data. This course deals with the algorithmic aspects of these tasks: we study |
I/O-efficient algorithms (Coursera) https://www.coursera.org/learn/io-efficient-algorithms I/O-efficient algorithms, also known as external memory algorithms or cache-oblivious algorithms, are a class of algorithms designed to efficiently process data that is too large to fit entirely in the main memory (RAM) of a computer. These algorithms are particularly useful when dealing with massive datasets, such as those found in large-scale data processing, database management, and file systems. Operations on data become more expensive when the data item is located higher in the memory hier |
Impact from digital transformation: A Nano course (Coursera) https://www.coursera.org/learn/digital-transformation-impact-nano-course Do you believe that a lot of industries will fundamentally change due to digital power in the upcoming 5 to 10 years? Do you believe that what often today has been called 'disruption' might happen to an industry of your specific interest? Do you believe in the value of becoming able to predict how that kind of change will evolve in order to do digital transformation and thereby avoid ending up with big problems in the future? Then this course is for you! In this nano-course, you will get an |
Impact from Digital Transformation: Full course (Coursera) https://www.coursera.org/learn/digital-transformation-impact This course is about what you can do when everything around you seems to be moving due to digital change. It is about how to handle the disruptive process that tends to unfold in the industry nowadays due to digitalisation. The way to handle this is what is here referred to as 'Digital Transformation' and at the core of it, it is about understanding how the new business landscape is evolving and heading for a new position in that landscape. It is about corporate strategy! |
Innovation & Entrepreneurship - From Basics to Open Innovation (Coursera) https://www.coursera.org/learn/open-innovation-entrepreneurship This Innovation and Entrepreneurship course focuses on the interconnection between entrepreneurial thinking and innovation. Specifically, we look at models used in Silicon Valley to grow both start-up companies as well as innovation inside large organizations. Bringing together top Haas School of Business, UC Berkeley faculty, this course addresses critical areas for successful growth, including design thinking, open innovation, business models, product-market fit, and financing. This course w |
Innovation & Entrepreneurship - From Design Thinking to Funding (Coursera) https://www.coursera.org/learn/design-thinking-entrepreneurship This Innovation and Entrepreneurship course focuses on the interconnection between entrepreneurial thinking and innovation. Specifically, we look at models used in Silicon Valley to grow both start-up companies as well as innovation inside large organizations. Bringing together top Haas School of Business, UC Berkeley faculty, this course addresses critical areas for successful growth, including design thinking, open innovation, business models, product-market fit, and financing. This course w |
Introduction to Architecting Smart IoT Devices (Coursera) https://www.coursera.org/learn/iot-devices Architecting smart IoT (Internet of Things) devices involves designing and developing interconnected devices that can collect and exchange data over the internet to perform various functions and tasks. These devices are equipped with sensors, microcontrollers, communication modules, and software, allowing them to interact with the physical world and communicate with other devices or central systems. What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: |
Marketing Strategy for Entrepreneurs (Coursera) https://www.coursera.org/learn/marketing-strategy-entrepreneurs You live a hands-on life, and you intend to continue doing so! That is why I guess you already have checked where the QR-code (the logo) for this course leads to, right? And it is in this kind of setting that you prefer hands-on learning. Things you can do, already today are something you value. You actually did not start this course when enrolling in it. You started it long ago, either as a customer somewhere, or just maybe thinking about marketing for some time. Or maybe you are already work |
Mastering Digital Twins (Coursera) https://www.coursera.org/learn/mastering-digital-twins In this course, you will learn about Digital Twins fundamentals, how they represent a concept of integration for product-related data. The concept of digital twins is a response to the increasing digitalisation of product development, production, and products themselves. Today's products are complex systems which are not only fulfilling their intended functions and quality but are also communicating via communication networks with other components, products, clouds, and services. We are talking |
Privacy and Standardisation (CourseraSpecs) https://www.coursera.org/specializations/privacy Offered by EIT Digital . Interpret Legal Texts for Technological Solutions. Analyse and interpret the legal rules of standardisation and ... |
https://www.coursera.org/learn/privacy-eu Explore the intricacies of European privacy law in this focused course, designed as a follow-up to "Privacy in the Western World." This course places a strong focus on the European legal framework, which bases its privacy protection on seminal human rights treaties such as the UN Declaration on Human Rights. You'll gain insights into the historical context that shaped Europe's approach to privacy, beginning with economic cooperation initiatives set up to prevent another conflict after the devas |
Privacy in the Western World (Coursera) https://www.coursera.org/learn/history-privacy-laws Welcome to this course about privacy, We are thrilled to see that you are interested and will provide you with a comprehensive study of this intriguiging subject. We hope this course will enthuse you to look further into privacy and personal data regulation. Especially in the light of recent events it becomes more important to know about your (alleged!?) rights and freedoms. After showing you a number of interesting examples of privacy in recent events, this course continues to provide you w |
Quantitative Formal Modeling and Worst-Case Performance Analysis (Coursera) https://www.coursera.org/learn/quantitative-formal-modeling-1 Welcome to "Quantitative Formal Modeling and Worst-Case Performance Analysis," an intellectually stimulating course designed to hone your abstract thinking skills in the realm of theoretical computer science. This course invites you to dive deep into the world of token production and consumption, a foundational approach to system behaviour. Master the art of mathematically formalizing these concepts through prefix orders and counting functions. Get hands-on with Petri-nets, explore the nuances |
Quantitative Model Checking (Coursera) https://www.coursera.org/learn/quantitative-model-checking Welcome to the cutting-edge course on Quantitative Model Checking for Markov Chains! As technology permeates every aspect of modern life—Embedded Systems, Cyber-Physical Systems, Communication Protocols, and Transportation Systems—the need for dependable software is at an all-time high. One tiny flaw can lead to catastrophic failures and enormous costs. That's where you come in. The course kicks off with creating a State Transition System, the basic model that captures the intricate dynamics of |
Security and Privacy for Big Data - Part 1 (Coursera) https://www.coursera.org/learn/security-privacy-big-data Welcome to our comprehensive course focused on security within Big Data environments. This course aims to provide you with a deep understanding of cryptographic principles and equip you with the tools necessary to manage access controls effectively within any Big Data system. By the course's conclusion, you'll possess the skills required to navigate and plan Big Data projects with a full awareness of related security issues. You'll learn to approach significant Big Data projects with an experti |
Security and Privacy for Big Data - Part 2 (Coursera) https://www.coursera.org/learn/security-privacy-big-data-protection Welcome to our focused course on Privacy and Data Protection in Big Data Environments. Here, you will delve into not only privacy-preserving methodologies but also explore crucial data protection regulations and concepts. By the end of this course, you'll be empowered to navigate your next Big Data project with confidence, assuring all aspects of privacy and data protection are well-managed. This course will sharpen your ability to identify potential vulnerabilities in Big Data projects, provid |
Software Architecture for the Internet of Things (Coursera) https://www.coursera.org/learn/iot-software-architecture Dive into the world of IoT system architecture with a course that doesn't just teach you the "how," but also the "why." Learn the art and science of building robust, scalable, and interoperable IoT systems. This five-week course takes you on a comprehensive journey from understanding the imperative of well-planned architecture to mastering the nuances of quality attributes and scenarios. Why should you care? Because the business impact of your technical decisions can make or break your IoT proj |
Standardisation & Technology (Coursera) https://www.coursera.org/learn/standardisation Welcome to the course standardisation and technology! Do you already know what standards are? Could you image a world without standards? It is certainly not easy to visualize a world without standards and the huge importance of standards is often underestimated in our society. That is because such a vast amount are common to us and have been for ages. We don’t even realise they are standards anymore. We are excited to see you join and explore the world of standards that goes unnoticed by so |
Sustainable Digital Innovation (Coursera) https://www.coursera.org/learn/sustainable-digital-innovation Two of our most profound business challenges are digitalization and sustainability. They are rapidly changing the way we are doing business both today and in the future. Therefore, in the Sustainable Digital Innovation course, we explore the business opportunities that can open up when we align our strategy with sustainability goals. You will gather knowledge on: * understanding the sustainable contextual framework * the methods and tools for your business to address various sustainability chal |
System Validation (2): Model process behaviour (Coursera) https://www.coursera.org/learn/system-validation-behavior System Validation is the field that studies the fundamentals of system communication and information processing. It is the next logical step in computer science and improving software development in general. It allows automated analysis based on behavioural models of a system to see if a system works correctly. We want to guarantee that the systems does exactly what it is supposed to do. The techniques put forward in system validation allow to prove the absence of errors. It allows to design emb |
System Validation (3): Requirements by modal formulas (Coursera) https://www.coursera.org/learn/system-validation-modal-formulas System Validation is the field that studies the fundamentals of system communication and information processing. It allows automated analysis based on behavioural models of a system to see if a system works correctly. We want to guarantee that the systems does exactly what it is supposed to do. The techniques put forward in system validation allow to prove the absence of errors. It allows to design embedded system behaviour that is structurally sound and as a side effect forces you to make the b |
System Validation (4): Modelling Software, Protocols, and other behaviour (Coursera) https://www.coursera.org/learn/system-validation-software-protocols System Validation is the field that studies the fundamentals of system communication and information processing. It allows automated analysis based on behavioural models of a system to see if a system works correctly. We want to guarantee that the systems does exactly what it is supposed to do. The techniques put forward in system validation allow to prove the absence of errors. It allows to design embedded system behaviour that is structurally sound and as a side effect forces you to make the |
System Validation: Automata and behavioural equivalences (Coursera) https://www.coursera.org/learn/automata-system-validation Have you ever experienced software systems failing? Websites crash, calendar not synchronising, or even a power blackout. Of course you have! But did you know that many of these errors are the result of communication errors either within a system or between systems? Depending on the system, the impact of software failures can be huge, even resulting in massive economic damage or loss of lives. Software, and in particular the communication between software-intensive systems, is very complex and v |
Value Creation Through Innovation (CourseraSpecs) https://www.coursera.org/specializations/value-creation-innovation Offered by EIT Digital . Capture the Value of Technology. Understand, predict and leverage on technology driven transformations. |
Web Connectivity and Security in Embedded Systems (Coursera) https://www.coursera.org/learn/iot-connectivity-security Welcome to Web Connectivity and Security in Cyber-Physical Systems! In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet-enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network. We will also go through security and privacy issues and challenges in cyber-physical systems (CPS). We will explore measures and techniques for secur |