University of Colorado System |
Preventative Healthcare for the Newborn Baby (Coursera) https://www.coursera.org/learn/preventive-healthcare-newborn-baby In this course, you will learn some medical interventions and skills to keep newborns healthy in the days and weeks after they have been born. We’ll tell you about medicines like Vitamin K and erythromycin and how they can prevent serious illnesses. We’ll also introduce screening tests like hearing screening and newborn blood screening that help to make sure that babies are set up for success right from the start. But we will start off by talking about jaundice, looking at the simple ways to |
Proactive Computer Security (Coursera) https://www.coursera.org/learn/proactive-computer-security I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, |
Providing Social, Emotional, Behavioral, and Special Education Services in School (Coursera) Welcome to our the third course in the School Health specialization: Providing Social, Emotional, Behavioral, and Special Education Services in School. In this course, you will learn about how social-emotional skills, mental health, and learning are related. We will focus on how schools can support social-emotional learning and promote mental health for all students. We will walk through the reasons that schools should promote student mental health. Next, we’ll review school wide activities to |
Psychosocial and Spiritual Aspects of Palliative Care (Coursera) https://www.coursera.org/learn/psychosocial-spiritual-aspects-palliative-care In this course, you’ll learn how serious and life-threatening illnesses often affect emotional and spiritual well-being. Illnesses can increase stress as patients and families learn to live with a “new normal” that may often focus on illness. You’ll learn how to tell when normal sadness (or grief) becomes something more serious and needs to be addressed. People with serious illnesses also have social concerns as their family, friends and community support system becomes stretched, and sometimes |
Queering Identities: LGBTQ+ Sexuality and Gender Identity (Coursera) https://www.coursera.org/learn/queeringidentities In this course, you will explore the history of LGBTQ identities, experiences, and activism. We’ll study major events in global LGBTQ history, investigate local histories of queer and transgender people and communities, and consider how LGBTQ histories have helped shape broader conversations about civil rights, equality, and justice. |
Queering the Schoolhouse: LGBTQ+ Inclusion for Educators (Coursera) https://www.coursera.org/learn/queeringtheschoolhouse In this course, you will learn about the history of LGBTQ+ issues in education and develop strategies for building more inclusive learning environments for students, teachers, and community members. This course will provide you with insights and equip you with strategies for exploring inclusion for lesbian, gay, bisexual, transgender, and queer or questioning learners in your specific professional context. Throughout the videos, reading assignments, and additional resources we’ve provided, you’l |
Relational Database Support for Data Warehouses (Coursera) https://www.coursera.org/learn/dwrelational Relational Database Support for Data Warehouses is the third course in the Data Warehousing for Business Intelligence specialization. In this course, you'll use analytical elements of SQL for answering business intelligence questions. You'll learn features of relational database management systems for managing summary data commonly used in business intelligence reporting. Because of the importance and difficulty of managing implementations of data warehouses, we'll also delve into storage archit |
Requirements Elicitation: Artifact and Stakeholder Analysis (Coursera) https://www.coursera.org/learn/requirements-elicitation In Elicitation: Artifact and Stakeholder Driven Analysis, you will learn to use both recorded and presently unrecorded knowledge in your elicitation techniques. As you get started in finding out about the new product, you must first learn about the product that was (if there was one) and then learn about the system to be. Oftentimes, you'll find yourself in an environment you know nothing about! This course will help you find ways to learn about the domain, the system that was, and the system |
Requirements Engineering: Secure Software Specifications (CourseraSpecs) https://www.coursera.org/specializations/requirements-engineering-secure-software Offered by University of Colorado System. From Customers to Secure Software Products. This specialization helps learners to create secure ... |
Requirements Gathering for Secure Software Development (Coursera) https://www.coursera.org/learn/requirements-gathering-secure In Software Requirements Elicitation for Secure Software Development, we're going to discuss the overall software requirements process as it applies in waterfall, spiral, and agile models. You'll learn about each of these processes and your goals as a software requirements analyst. This is not an easy task! Who do you talk to, when, and what kind of knowledge are you trying to obtain, in any software life cycle? How do you handle obstacles as you go? These are the questions we will focus on a |
Requirements Specifications: Goals and Conflict Analysis (Coursera) https://www.coursera.org/learn/requirements-specification-goals In Requirements Goal Development and Language Analysis, we move from the spoken word to precise writing. A first step in this is writing goals. We will talk about goals used in requirements engineering and, from this, writing use cases from what we learn. Use cases can be in diagram and written form. Then- the villains enter- misuse cases and abuse cases are discussed in how we can deal with them in a Requirements environment. In gathering requirements, you'll have many questions remaining. |
Researcher Management and Leadership Training (Coursera) https://www.coursera.org/learn/researcher-management-leadership-training This course is for early career researchers and mentors who believe that modern scientific careers require management skills and want to be research leaders. This curriculum gives you skills to effectively implement funded projects, thereby enhancing your career success. Research leaders take on a number of new roles, rights, and responsibilities--as scientific leaders, financial administrators, managers, and mentors. In this course, we explain how to optimize the people, teams, projects, and fi |
School Health for Children and Adolescents (CourseraSpecs) https://www.coursera.org/specializations/school-health-for-children-and-adolescents Offered by University of Colorado System. Promoting Healthy Practices in School. Learn to manage medical conditions & mental health ... |
Secure Networked System with Firewall and IDS (Coursera) https://www.coursera.org/learn/secure-networked-system-with-firewall-ids In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort. |
Secure Software Design (CourseraSpecs) https://www.coursera.org/specializations/secure-software-design Offered by University of Colorado System. Design and maintain secure software.. Acquire the attitudes and skills needed to produce designs ... |
Security and Privacy in TOR Network (Coursera) https://www.coursera.org/learn/security-and-privacy-in-tor-network In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS inst |
Simulation, Algorithm Analysis, and Pointers (Coursera) https://www.coursera.org/learn/simulation-algorithm-analysis-pointers This course is the fourth and final course in the specialization exploring both computational thinking and beginning C programming. Rather than trying to define computational thinking, we’ll just say it’s a problem-solving process that includes lots of different components. Most people have a better understanding of what beginning C programming means! This course assumes you have the prerequisite knowledge from the previous three courses in the specialization. You should make sure you have that |
Software Design as an Abstraction (Coursera) https://www.coursera.org/learn/software-design-abstraction The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design. |
Software Design as an Element of the Software Development Lifecycle (Coursera) https://www.coursera.org/learn/software-design-development-life-cycle This course talks about software development lifecycles a description/prescription for how we write software. Design is a step in this life cycle, and the course explores the implications of this. Design has a role in the life cycle; it is always there, regardless of the kind of life cycle we’re talking about. Why is that? Why was design considered as a step in this life cycle? |
Software Design Methods and Tools (Coursera) https://www.coursera.org/learn/software-design-methods-tools Since many software developers are compulsive coders, they have created software over the years to help them do their job. There are tools which make design and its associated tasks easier. The course introduces some basic tools and techniques to help you with design. Tools aren’t always tangible, however. The last two lessons of this course discuss questions of Ethics in software development. The purpose here is, as with tools, to equip you to better carry our your responsibilities as a des |
Software Design Threats and Mitigations (Coursera) https://www.coursera.org/learn/software-design-threats-mitigations The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design. |
Software Requirements Prioritization: Risk Analysis (Coursera) https://www.coursera.org/learn/software-requirements-prioritization Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? In analyzing alternatives, you must consider risks. In this course, we'll look into how to analyze risk, evaluate risk, document risks, and use this information for prioritization of requirements. Qualitative and Quantitative approaches will be covered. |
SRS Documents: Requirements and Diagrammatic Notations (Coursera) https://www.coursera.org/learn/srs-documents-requirements As requirements are being gathered and prioritized, they also need to be documented. In Diagrammatic Notations and Software Requirements Specification Writing, we discuss and practice the process of turning requirements into something readable to the customers at a high level, and the developers. When a designer or developer reads your document, they should be able to understand the overall idea, the scope, the domain, the resources, the expectations, and why alternative choices are not selecte |
Supporting Parents of a Newborn Baby (Coursera) https://www.coursera.org/learn/supporting-parents-newborn-baby In this course, you will learn some core components in supporting parents of newborn babies. The Supporting Parents of Newborn Babies Course will teach you best practices for what to expect in the newborn exam and how to best support parents, partners, and other caregivers. This course examines post-partum depression, early bonding, and touch. This course introduces the important role of supportive partners and parents, in varied households, and what that support looks like. With every househo |
Sustainable Business: Big Issues, Big Changes (Coursera) https://www.coursera.org/learn/sustainable-business-changes This is class 3 in the MOOC specialization, Become a Sustainable Business Change Agent. This class looks at the big issues companies are fixing - climate change, water, worker satisfaction and supply chain issues. You will learn tools to help your company address these issues intelligently. The class ends with an assignment to set a science-based carbon reduction target for a small company. Tis is absolutely cutting edge material. Only about 300 companies in the whole world are doing this as |
Symmetric Cryptography (Coursera) https://www.coursera.org/learn/symmetric-crypto Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review th |
TCP/IP and Advanced Topics (Coursera) https://www.coursera.org/learn/tcp-ip-advanced In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. The role of address prefixes and the uses of masks are explained in details. We review in details about TCP three-way handshake, flow control, and congestion control. Furthermore, we provide an introduction |
The Newborn Assessment (Coursera) https://www.coursera.org/learn/newborn-assessment In your previous course, you learned some medical interventions and skills to keep newborns healthy in the days and weeks after they have been born. In this course, you will learn what some additional skills that medical providers do to keep babies healthy. The Newborn Assessment Course will walk you through the physical examination from head to toe. You are going to learn that this is so much we can discover just by looking at a baby. And yes, we will be listening too, and discussing how me |
Toledo: Deciphering Secrets of Medieval Spain (Coursera) https://www.coursera.org/learn/toledo-deciphering-secrets-medieval-spain This course evaluates the medieval history of Toledo from the era of the Visigoth Kingdom (6th-8th centuries) through its Islamic period (8th to 11th centuries) and into its reintegration into Christian Spain (after 1085 c.e.) In particular, we take note of the cultural and religious transformations that characterized the city with a special effort to understand how many peoples and religions came to settle and live amongst one another. We will virtually-tour the Islamic and Christian structures |
Trauma Emergencies and Care (Coursera) https://www.coursera.org/learn/trauma-emergencies-and-care Welcome to Trauma Emergencies and Care. In this course, you will learn about some of the mechanics and physics of trauma on the human body, and how this can cause injury. You will continue to expand your new vocabulary with medical terminology, and learn how to describe the different injuries you may see. You will also learn about the trauma system itself- and when it is important to transport patients to a trauma center. Then we will dive into specific injuries based on what part of the body |
What is Palliative Care? (Coursera) https://www.coursera.org/learn/what-is-palliative-care Palliative care provides invaluable help for patients living with serious or life-limiting illness and their family caregivers. Palliative care should be part of healthcare services to improve quality of life, the ability to tolerate and benefit from treatment and improve survival. In this course, you will learn about the nature of suffering and how this concept can help you understand the experience of people living with serious illness. Next, you will learn skills to more effectively communic |
Wilderness First Aid (CourseraSpecs) https://www.coursera.org/specializations/wilderness-first-aid Offered by University of Colorado System. First aid for wilderness medical emergencies. By the end of this course, you should be able to ... |
Wilderness First Aid - Environmental Emergencies (Coursera) https://www.coursera.org/learn/wilderness-first-aid-environmental-emergencies In this course, students will learn about environmental injuries, how to treat them, and what conditions require evacuation. This will include animal bites/stings, and temperature-related emergencies, such as those that are heat or cold-related, lightning, altitude, and drowning. Students will also learn about important aspects of camp hygiene, and what to do in the event that evacuation is needed. |
Wilderness First Aid - Introduction (Coursera) https://www.coursera.org/learn/wilderness-first-aid-introduction In this course, students will learn the basics of wilderness medicine, including how it is a unique clinical environment, and concepts of scene safety. They will learn how to perform a basic assessment of a patient, including a physical exam, gather history data using the SAMPLE approach, and how to evaluate a patient for a potential spinal cord injury. |
Wilderness First Aid - Medical Emergencies (Coursera) https://www.coursera.org/learn/wilderness-first-aid-medical-emergencies In this course, students will learn to identify and treat common traumatic injuries in the wilderness, and how to identify the difference between blunt and penetrating trauma. They will also be taught about common injuries of the chest, abdomen, pelvis, and signs and symptoms of different types of head trauma along with how to identify when a condition would warrant immediate evacuation. |
Wilderness First Aid - Traumatic Emergencies (Coursera) https://www.coursera.org/learn/wilderness-first-aid-traumatic-emergencies In this course, students will learn about common medical conditions that involve the heart, lungs, brain, abdominal and genital organs, how to treat these conditions, and when a condition would require evacuation. Students will also learn prevention measures to reduce the chance of developing diseases in the wilderness setting. |
Windows Server Management and Security (Coursera) https://www.coursera.org/learn/windows-server-management-security Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself. This course is the second course in the System Management and Security Spec |