University of Colorado System |
Abstraction, Problem Decomposition, and Functions (Coursera) https://www.coursera.org/learn/abstraction-problem-decomposition-functions This course is the third course in the specialization exploring both computational thinking and beginning C programming. Rather than trying to define computational thinking, we’ll just say it’s a problem-solving process that includes lots of different components. Most people have a better understanding of what beginning C programming means! This course assumes you have the prerequisite knowledge from the previous two courses in the specialization. You should make sure you have that knowledge, e |
Advanced Clinical Data Science (Coursera) https://www.coursera.org/learn/advanced-clinical-data-science This course prepares you to deal with advanced clinical data science topics and techniques including temporal and research quality analysis. |
Advanced System Security Design (CourseraSpecs) https://www.coursera.org/specializations/advanced-system-security-design Offered by University of Colorado System. Advanced Secure System Design and Analysis Skills. Apply state of art techniques and tools to ... |
Advanced System Security Topics (Coursera) https://www.coursera.org/learn/advanced-system-security-topics In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts whi |
Agile Leader Training (Coursera) https://www.coursera.org/learn/agile-leader-training In this course, you will learn the neuroscience of change, why we are so change-averse, how to train for change resilience, and most importantly, you will begin developing a practice to help you be prepared for changes in personal life and in your career. You will learn specific strategies and tools for overcoming fear, anxiety and managing stress related to these changes. By the end of this course, you will know what you need to do to become truly unshakable. You will build a practice for get |
Agile Leadership (CourseraSpecs) https://www.coursera.org/specializations/agile-leadership-change-management Offered by University of Colorado System. Develop Agile Leadership Skills. Develop agile leadership skills by implementing change ... |
Agile Leadership Capstone (Coursera) https://www.coursera.org/learn/agile-capstone This capstone project course takes you through a guided journey of putting together a comprehensive agile transformation packet. To create this packet, you will be creatively applying the concepts and tools we have covered in the first four courses of this Specialization. In the capstone course scenario, you were hired as a Senior Scrum Master at Nike. You will understand what a Fortune 100 company would be looking for in a candidate by analyzing a real Nike job posting. If you aspire to work i |
Agile Leadership: Introduction to Change (Coursera) https://www.coursera.org/learn/agile-leadership-introduction-to-change This is a foundational course in the Agile Leadership Specialization. By the end of this course, you will build an understanding of key agile leadership concepts. You will begin building a toolbox that will give you an ability to evaluate and create a baseline for yourself as an agile leader. You will access your team’s readiness for change. You will also analyze to what degree an organization is agile, and evaluate its ability to respond to change triggers. |
https://www.coursera.org/learn/agile-leadership-organization The theory of Agile is simple. However, it takes experience, knowledge, and expertise to scale it successfully. In this course, you will focus on leading change at an organizational level and scaling Agile appropriately. When studying Agile application success stories and theory, it's easy to think in terms of adopting "best practices." However, what's best for one industry, company, and most importantly, culture is not always the best for another. Not every aspect of the business is suitabl |
Algorithms for Battery Management Systems (CourseraSpecs) https://www.coursera.org/specializations/algorithms-for-battery-management-systems Get Started in Algorithms for Battery Management. Learn how to model lithium-ion battery cells, and how to use those models to manage ... |
Algorithms, Data Collection, and Starting to Code (Coursera) https://www.coursera.org/learn/algorithms-data-collection-code This course starts you on your journey learning about computational thinking and beginning C programming. If you’d like to explore how we can interact with the world in a rigorous, computational way, and would also like to start learning to program, this is the course for you! You may have heard lots of talk about computational thinking recently, but if you ask 10 different people what it is you’ll probably get 10 different answers. Rather than trying to define computational thinking, we’ll jus |
Applied Cryptography (CourseraSpecs) https://www.coursera.org/specializations/applied-crypto Offered by University of Colorado System. Improve Your Career in Computer Security. Master the cryptographic tools and their design ... |
Asymmetric Cryptography and Key Management (Coursera) https://www.coursera.org/learn/asymmetric-crypto Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA ciph |
Basic Cryptography and Programming with Crypto API (Coursera) https://www.coursera.org/learn/basic-cryptography-and-crypto-api In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating |
Become a Sustainable Business Change Agent (CourseraSpecs) https://www.coursera.org/specializations/sustainable-business-change-agent Offered by University of Colorado System. Make your company and the world a better place. Learn tools and strategies to make sustainability ... |
https://www.coursera.org/specializations/become-an-emt Offered by University of Colorado System. EMT Medical and Trauma Emergency Care. Gain the skills needed to provide first responder emergency ... |
Burgos: Deciphering Secrets of Medieval Spain (Coursera) https://www.coursera.org/learn/burgos-deciphering-secrets-medieval-spain This advanced course focuses on two primary goals: (1) appraising how Jews, Christians, and Muslims shaped the history of medieval Spain and (2) mastering the craft of Spanish paleography, the skill of identifying Spanish handwriting in the 11th- through 15th-century manuscripts. Through the lens of the medieval history of Burgos, we dedicate 75% percent of our efforts to developing pragmatic expertise in the interpretation of Carolingian/French/Gothic handwriting. Specifically, the course exp |
Business Intelligence Concepts, Tools, and Applications (Coursera) https://www.coursera.org/learn/business-intelligence-tools This is the fourth course in the Data Warehouse for Business Intelligence specialization. Ideally, the courses should be taken in sequence. Effectively and efficiently mining data is the very center of any modern business’s competitive strategy, and a data warehouse is a core component of this data mining. The ability to quickly look back at early trends and have the accurate data – properly formatted – is essential to good decision making. By enabling this historical overview, a data warehouse |
C# Class Development (Coursera) https://www.coursera.org/learn/csharp-class-development This course is the third course in the specialization about learning how to develop video games using the C# programming language and the Unity game engine on Windows or Mac. Why use C# and Unity instead of some other language and game engine? Well, C# is a really good language for learning how to program and then programming professionally. Also, the Unity game engine is very popular with indie game developers; Unity games were downloaded 16,000,000,000 times in 2016! Finally, C# is one of the |
C# Programming for Unity Game Development (CourseraSpecs) https://www.coursera.org/specializations/programming-unity-game-development Offered by University of Colorado System. Learn to Program Unity Games with C#. Learn C# programming and how to use C# in Unity games |
C++ Class Development (Coursera) https://www.coursera.org/learn/cpp-class-development This course is the third course in the specialization about learning how to develop video games using the C++ programming language and the Unreal game engine on Windows or Mac. This course assumes you have the prerequisite knowledge from the previous two courses in the specialization. You should make sure you have that knowledge, either by taking those previous courses or from personal experience, before tackling this course. Throughout this course you'll continue building your foundational C+ |
C++ Programming for Unreal Game Development (CourseraSpecs) https://www.coursera.org/specializations/cplusplusunrealgamedevelopment Offered by University of Colorado System. Learn C++ and how to use C++ in Unreal games |
Capstone: Creating A Sustainability Proposal (Coursera) https://www.coursera.org/learn/sustainability-proposal Congratulations on reaching the Capstone Class of the Become a Sustainable Business Change Agent specialization. The class will help you apply material from the previous three classes. We have developed a case about a hypothetical ski resort that offers lots of opportunities to develop sustainability recommendations. A second option is do develop a proposal for a change in your company or organization. Or you can do both the case and your own proposal. The goal of the class is to have you |
Classical Cryptosystems and Core Concepts (Coursera) https://www.coursera.org/learn/classical-cryptosystems Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to For |
Clinical Data Models and Data Quality Assessments (Coursera) https://www.coursera.org/learn/clinical-data-models-and-data-quality-assessments This course aims to teach the concepts of clinical data models and common data models. Upon completion of this course, learners will be able to interpret and evaluate data model designs using Entity-Relationship Diagrams (ERDs), differentiate between data models and articulate how each are used to support clinical care and data science, and create SQL statements in Google BigQuery to query the MIMIC3 clinical data model and the OMOP common data model. |
Clinical Data Science (CourseraSpecs) https://www.coursera.org/specializations/clinical-data-science Offered by University of Colorado System. Launch your career in Clinical Data Science. A six-course introduction to using clinical data to ... |
Clinical Natural Language Processing (Coursera) https://www.coursera.org/learn/clinical-natural-language-processing This course teaches you the fundamentals of clinical natural language processing (NLP). In this course you will learn the basic linguistic principals underlying NLP, as well as how to write regular expressions and handle text data in R. You will also learn practical techniques for text processing to be able to extract information from clinical notes. Finally, you will have a chance to put your skills to the test with a real-world practical application where you develop text processing algorithm |
Coexistence in Medieval Spain: Jews, Christians, and Muslims (Coursera) https://www.coursera.org/learn/coexistence-in-medieval-spain This course explores Jewish, Christian, and Muslim intercultural relations in Iberia from the Visigothic era (6th century CE) until the creation of Queen Isabel I and King Ferdinand II Catholic Spain (late 15th century). We evaluate the many identities of the peninsula known as Christian Hispania, Jewish Sefarad, and Islamic al-Andalus. We trace the origins and trajectory of conflict between these communities (the Muslim conquest of Spain, Christian Reconquista, prohibitions blocking intermixing |
Computational Thinking with Beginning C Programming (CourseraSpecs) https://www.coursera.org/specializations/computational-thinking-c-programming Offered by University of Colorado System. |
Computer Communications (CourseraSpecs) https://www.coursera.org/specializations/computer-communications Offered by University of Colorado System. Launch your career in computer network & security. Provide an introduction to fundamental network ... |
Computer Security and Systems Management (CourseraSpecs) https://www.coursera.org/specializations/computer-security-systems-management Offered by University of Colorado System. Practical Application to System Management. Learn how to securely design and manage enterprise ... |
Cross-Functional Collaboration (CourseraSpecs) https://www.coursera.org/specializations/cross-functional-collaboration Offered by University of Colorado System. Lead and Facilitate Cross-functional Collaboration. Learn in-demand skills of leading, navigating, ... |
Cryptographic Hash and Integrity Protection (Coursera) https://www.coursera.org/learn/cryptographic-hash-integrity-protection Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptograp |
Cryptography and Information Theory (Coursera) https://www.coursera.org/learn/crypto-info-theory Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational s |
Cyber Threats and Attack Vectors (Coursera) https://www.coursera.org/learn/cyber-threats-attack-vectors Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bea |
Cybersecurity for Business (CourseraSpecs) https://www.coursera.org/specializations/cyber-security-business Offered by University of Colorado System. Discover the practical side of computer security. Identify what threatens your business and master ... |
Cybersecurity Policy for Aviation and Internet Infrastructures (Coursera) https://www.coursera.org/learn/cybersecurity-policy-aviation-internet In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Prog |
Cybersecurity Policy for Water and Electricity Infrastructures (Coursera) https://www.coursera.org/learn/cybersecurity-policy-water-electricity This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are |
Data Analysis and Representation, Selection and Iteration (Coursera) https://www.coursera.org/learn/data-analysis-representation-selection-iteration This course is the second course in the specialization exploring both computational thinking and beginning C programming. Rather than trying to define computational thinking, we’ll just say it’s a problem-solving process that includes lots of different components. Most people have a better understanding of what beginning C programming means! This course assumes you have the prerequisite knowledge from the previous course in the specialization. You should make sure you have that knowledge, eithe |
Data Structures and Design Patterns for Game Developers (Coursera) https://www.coursera.org/learn/data-structures-design-patterns This course is a stand-alone course that builds on the knowledge included in the C# Programming for Unity Game Development Specialization, so the course assumes you have the prerequisite knowledge from that Specialization. You should make sure you have that knowledge, either by taking those courses or from personal experience, before tackling this course. Throughout this course you'll build on your foundational C# and Unity knowledge by developing more robust games with better object-oriented de |
Data Warehouse Concepts, Design, and Data Integration (Coursera) https://www.coursera.org/learn/dwdesign This is the second course in the Data Warehousing for Business Intelligence specialization. Ideally, the courses should be taken in sequence. In this course, you will learn exciting concepts and skills for designing data warehouses and creating data integration workflows. These are fundamental skills for data warehouse developers and administrators. You will have hands-on experience for data warehouse design and use open source products for manipulating pivot tables and creating data integratio |
Data Warehousing for Business Intelligence (CourseraSpecs) https://www.coursera.org/specializations/data-warehousing Offered by University of Colorado System. Harness Business Data . Build a fully-optimized business data warehouse in five courses. |
Database Management Essentials (Coursera) https://www.coursera.org/learn/database-management Database Management Essentials provides the foundation you need for a career in database development, data warehousing, or business intelligence, as well as for the entire Data Warehousing for Business Intelligence specialization. In this course, you will create relational databases, write SQL statements to extract information to satisfy business reporting requests, create entity relationship diagrams (ERDs) to design databases, and analyze table designs for excessive redundancy. As you develop |
DDoS Attacks and Defenses (Coursera) https://www.coursera.org/learn/ddos-attacks-and-defense In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with |
Deciphering Secrets: The Illuminated Manuscripts of Medieval Europe (Coursera) https://www.coursera.org/learn/medieval-europe Perhaps no other relic of the European Middle Ages captures our imagination more than illuminated medieval manuscripts, or those documents decorated with images and colored pigments. Serving as windows unto a lost world of kings, ladies, faith, war, and culture, they communicate complex visual and textual narratives of Europe’s collective cultural heritage and patrimony. In this fashion, illuminated manuscripts are dynamic messages from our communal past that are still relevant today in fields l |
Design and Analyze Secure Networked Systems (Coursera) https://www.coursera.org/learn/design-secure-networked-systems In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our sy |
Design and Build a Data Warehouse for Business Intelligence Implementation (Coursera) https://www.coursera.org/learn/data-warehouse-bi-building The capstone course, Design and Build a Data Warehouse for Business Intelligence Implementation, features a real-world case study that integrates your learning across all courses in the specialization. In response to business requirements presented in a case study, you’ll design and build a small data warehouse, create data integration workflows to refresh the warehouse, write SQL statements to support analytical and summary query requirements, and use the MicroStrategy business intelligence pla |
Detecting and Mitigating Cyber Threats and Attacks (Coursera) https://www.coursera.org/learn/detecting-cyber-attacks Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at |
Developing an Agile Team (Coursera) https://www.coursera.org/learn/developing-agile-team Now that you have undergone personal information, you will be better prepared to empathize, understand, and mentor individual members of your team on a similar journey. Leading teams towards change-resilience is not as simple as knowing and understanding the psychology of individuals multiplied by a number of team members. It requires a different approach. In this course, you will learn what influences human behavior in teams by looking at social psychology. You will evaluate your team’s level |
Easing Physical Symptoms: It's Not Just Hospice Anymore (Coursera) https://www.coursera.org/learn/easing-physical-symptoms Palliative care provides important support for people living with serious or life-limiting illnesses and their family caregivers. In this course, you will learn to use symptom assessment tools to better understand which symptoms are present and which are most distressing. In subsequent weeks you will learn about some of the most common and distressing symptoms such as anorexia (loss of appetite), dyspnea (shortness of breath), fatigue (weakness), delirium(confusion) and constipation and nausea/v |