Coursera Courses |
|
Securing Investment Returns in the Long Run (Coursera) https://www.coursera.org/learn/investment-returns-long-run In this course, you will learn about the famous dichotomy between active and passive investing, how to appropriately measure and analyze investment performance and what the future trends in the investment management industry are. You will first learn about absolute and relative performance, risk-adjusted returns and how to decompose investment performance. The focus will then shift to the two main categories of investment vehicles, active and passive funds, and what they entail in terms of expe |
|
Securing Linux Systems (Coursera) https://www.coursera.org/learn/securing-linux-systems In this course, we look at security and the Linux operating system. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate (LFCA) exam or just interested in learning more about Linux. This course is the third course in a series that aims to prepare you for working as an information technology professional. In this course, you will be introduced to ownership, authentication, and authorization. We will drill into creating security through backups and re |
|
Securing Software, Data and End Points (Coursera) https://www.coursera.org/learn/sscp-4th-ed-course-4 Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's |
|
Sécurité des TI : Défense contre les pratiques sombres du numérique (Coursera) https://www.coursera.org/learn/securite-des-ti-defense-contre-les-pratiques-sombres-du-numerique Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sécurité informatique. Il présente les menaces et les attaques et les nombreuses façons dont elles peuvent se manifester. Nous allons vous présenter les algorithmes de cryptage et la manière dont ils sont utilisés pour protéger les données. Ensuite, nous nous plongerons dans les trois A de la sécurité de l’information : authentification, autorisation et comptabilité. Nous aborderons également les so |
|
Sécurité informatique et dangers du numérique (Coursera) Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sécurité informatique. Il présente les menaces et les attaques et les nombreuses façons dont elles peuvent se manifester. Nous allons vous présenter les algorithmes de cryptage et la manière dont ils sont utilisés pour protéger les données. Ensuite, nous nous plongerons dans les trois A de la sécurité de l’information : authentification, autorisation et comptabilité. Nous aborderons également les so |
|
Security & Safety Challenges in a Globalized World (Coursera) https://www.coursera.org/learn/security-safety-globalized-world Security and safety challenges rank among the most pressing issues of modern times. Challenges such as, cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. These issues also rank high on the agenda of politicians, international organizations and businesses. They also feature prominently in the public conscience and in governmental policies. In the current, interconnected world, security challenges are becoming increasingly complex. Facilitated by |
|
Security and Auditing in Ethereum (Coursera) https://www.coursera.org/learn/security-and-auditing-in-ethereum The course aims to provide participants with a solid understanding of the security risks and vulnerabilities associated with Ethereum DApps. Participants will learn about common attack vectors, smart contract vulnerabilities, and best practices for securing DApps against potential threats. ● Participants will acquire the skills and knowledge necessary to conduct smart contract audits. They will learn auditing methodologies, tools, and techniques to assess the security and reliability of smart c |
|
Security and Privacy for Big Data - Part 1 (Coursera) https://www.coursera.org/learn/security-privacy-big-data Welcome to our comprehensive course focused on security within Big Data environments. This course aims to provide you with a deep understanding of cryptographic principles and equip you with the tools necessary to manage access controls effectively within any Big Data system. By the course's conclusion, you'll possess the skills required to navigate and plan Big Data projects with a full awareness of related security issues. You'll learn to approach significant Big Data projects with an experti |
|
Security and Privacy for Big Data - Part 2 (Coursera) https://www.coursera.org/learn/security-privacy-big-data-protection Welcome to our focused course on Privacy and Data Protection in Big Data Environments. Here, you will delve into not only privacy-preserving methodologies but also explore crucial data protection regulations and concepts. By the end of this course, you'll be empowered to navigate your next Big Data project with confidence, assuring all aspects of privacy and data protection are well-managed. This course will sharpen your ability to identify potential vulnerabilities in Big Data projects, provid |
|
Security and Privacy in TOR Network (Coursera) https://www.coursera.org/learn/security-and-privacy-in-tor-network In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS inst |
|
Security and Risk Management (Coursera) https://www.coursera.org/learn/packt-security-and-risk-management-f4vdz In this course, you’ll dive deep into the essential components of Security and Risk Management, aligned with the latest CISSP curriculum. The journey begins with a strong foundation in security concepts, governance principles, and legal frameworks, including ISO and NIST. As you progress, you'll explore the complexities of risk management, threat modeling, and supply chain risk, ensuring you're prepared to manage modern security challenges effectively. You'll gain critical insights into regulat |
|
Security Awareness Training (Coursera) https://www.coursera.org/learn/security-awareness-training The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be ab |
|
Security Best Practices in Google Cloud (Coursera) https://www.coursera.org/learn/security-best-practices-in-google-cloud This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. |
|
Security Concepts and Practices (Coursera) https://www.coursera.org/learn/security-concepts-and-practices Course 1 - Security Concepts and Practices This is the first course under the specialization SSCP. In this course, we will focus on the core aspects of security concepts and practice, starting with the importance of codes of ethics. We will then cover the basic principles of information security and move on to describe security controls, their implementation, maintenance, and assessment. We will also address the identification of corporate assets and the change management life cycle. We will |
|
Security for Artificial Intelligence Software and Services (Coursera) https://www.coursera.org/learn/security-for-artificial-intelligence-software-and-services The "Security Basics for Artificial Intelligence Software and Services" course provides an in-depth exploration of security measures and best practices in the context of AI. Spanning two comprehensive modules, the course begins with an introduction to the fundamentals of AI security, including ethical considerations and common threats. It then progresses to practical strategies for implementing robust security in AI development, such as secure coding, vulnerability assessment, and adherence to c |
|
Security Governance & Compliance (Coursera) https://www.coursera.org/learn/security-governance-compliance Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance. |
|
Security Management and Governance (Coursera) https://www.coursera.org/learn/security-management-and-governance In this course you will look at some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes. Together, you will examine how incident management, cyber resilience, and developing an effective appreciation of people, not simply as users but as active participants, can enable better cy |
|
Security Operations (Coursera) https://www.coursera.org/learn/security-operations Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to: E |
|
Security Operations and Administration (Coursera) https://www.coursera.org/learn/security-operations-administration-sscp Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. |
|
Security Operations Center (SOC) (Coursera) https://www.coursera.org/learn/security-operations-center-soc If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you acquire the fundamental skills required in a security operations center. You will learn the primary functions of a security operations center (SOC) and the critical role it plays in protecting organizational assets from cyber-attacks. By the end of the course, you will be able to: • Gain an understanding of SOC team member’s daily activities and responsibilities. • Identif |
|
Security Principles (Coursera) https://www.coursera.org/learn/-security-principles Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to: Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulati |
|
Security, Compliance, and Governance for AI Solutions (Coursera) https://www.coursera.org/learn/security-compliance-and-governance-for-ai-solutions This course helps you understand some common issues of around security, compliance, and governance associated with artificial intelligence (AI) solutions. You will learn how to recognize governance and compliance requirements for AI systems. You will also learn about various Amazon Web Services (AWS) services and features that will help you apply governance controls and achieve your compliance objectives. Finally, you will be introduced to AWS services that can help you secure your AI systems. |
|
Seeing Through Photographs (Coursera) https://www.coursera.org/learn/photography Taking, sharing, and viewing photographs has become second nature for many of us. Given our near-constant engagement with images this course will help you dig into the meaning of pictures and reconsider photography’s role in our visual culture. This course aims to address the gap between seeing and truly understanding photographs by introducing a diversity of ideas, approaches, and technologies that inform their making. In this course you will look closely at 100 photographs from the collectio |
|
Seguimiento de casos y contactos COVID-19 (Coursera) https://www.coursera.org/learn/seguimiento-de-casos-y-contactos-covid-19 La pandemia COVID19 ha desafiado a los sistemas políticos y sanitarios en el mundo. Dentro de la estrategia sanitaria, un pilar fundamental para controlar la infección es generar la trazabilidad y el seguimiento de casos y contactos. Lamentablemente, hasta la fecha nuestro sistema sanitario se va visto superado en estas acciones, lo que ha contribuido al aumento de casos nuevos. Este curso, pretende contribuir a esta problemática, entregando herramientas para generar trazabilidad y el seguimient |
|
Segurança de TI: defesa contra as artes negras digitais (Coursera) https://www.coursera.org/learn/it-security-pt Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para salvaguardar dados. Em seguida, vamos analisar detalhadamente os três aspetos mais importantes da segurança das informações: autenticação, autorização e contabilidade. Também vamos aborda |
|
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital (Coursera) https://www.coursera.org/learn/seguranca-de-it Este curso aborda uma série de conceitos, ferramentas e práticas recomendadas de segurança de TI. Nele, temos uma introdução às ameaças e ataques e suas muitas formas de se manifestar. Daremos a você uma base de conhecimento sobre algoritmos de criptografia e como eles são usados para proteger dados. Depois, vamos estudar a fundo os três tipos de segurança da informação: autenticação, autorização e registro. Além disso, vamos abordar soluções de segurança de rede, de firewalls a opções de cripto |
|
Seguridad en la red (Coursera) https://www.coursera.org/learn/seguridad-en-la-red Las organizaciones cada vez tienen procesos más complejos, los cuales son soportados en su mayoría a través de las tecnologías de la información y las comunicaciones (TIC). Debido a la alta dependencia de las TIC, cada vez se presentan más ataques informáticos poniendo en riesgo a las organizaciones. Por estas razones cada vez es más necesario que las personas desarrollen habilidades y conocimientos en seguridad de la información. En este curso justamente analizaremos el diseño de una arquitectu |
|
https://www.coursera.org/learn/seguridad-hidrica Habitamos en un contexto caracterizado por múltiples y complejos desafíos. La falta de servicios de agua potable y saneamiento, la degradación de los ecosistemas, el uso intensivo de agua para la producción de bienes y servicios, y la exacerbación de los efectos del cambio ambiental global imponen grandes retos para el ejercicio de todos los derechos humanos de todas las personas, así como para la sustentabilidad de los ecosistemas. Ante este escenario, la comunidad internacional ha decidido es |
|
Seguridad informática: defensa contra las artes oscuras digitales (Coursera) https://www.coursera.org/learn/seguridad-informatica Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los tres sistemas de seguridad de la información: autenticación, autorización y contabilidad. También cubriremos soluciones de seguridad de red, que van desde Firewalls hasta opciones de enc |
|
Seismology to Earthquake Engineering (Coursera) https://www.coursera.org/learn/seismology-to-earthquakes This course ranges from the earth structure, the generation of earthquakes and seismic waves by faults to the seismic response of soils, foundations and structures as well as seismic risk. It is consequently aimed at undergraduates, graduates and professionals interested in engineering seismology, earthquake engineering or seismic risk. It investigates various technical fields: rock mechanics, soil dynamics, structural dynamics and dynamic soil-structure interaction. Various types of sessions ar |
|
https://www.coursera.org/learn/sel-capstone In this course the instructors (Randy Testa, Ben Kirshner, Emily Price, and Dan Liston) have designed two culminating projects for the Coursera Specialization entitled – “The Teacher and SEL”. The two options include: “A Teacher Implementation Plan”, and “The Cinema, SEL, and the Classroom”. This course is a part of the 5-course Specialization “The Teacher and Social Emotional Learning (SEL)”. Interested in earning 3 university credits from the University of Colorado-Boulder for this specializ |
|
SEL for Students: A Path to Social Emotional Well-Being (Coursera) https://www.coursera.org/learn/sel-for-students Social and emotional learning, or SEL, programs have flourished in schools during the last decade. In this course the instructor (Emily Price) introduces you to the history and framings of social and emotional learning preK-12 curricula, as well as various elementary, middle, and high school SEL programs and associated research. This course is a part of the 5-course Specialization “The Teacher and Social Emotional Learning (SEL)”. Interested in earning 3 university credits from the University o |
|
Selective Laser Sintering and Metal Laser Powder Bed Fusion (Coursera) https://www.coursera.org/learn/selective-laser-sintering-and-metal-laser-powder-bed-fusion Powder bed fusion is one of the additive manufacturing processes that has found the most application in functional part production. In this course we discuss this process in the context of polymers (selective laser sintering) and metals (laser powder bed fusion), with an emphasis on machine setup and post-processing. The necessary elements for each course are lecture videos, knowledge checks, and project completion. For additional information on certain topics, I've included supplemental readin |
|
Selenium WebDriver with Python (Coursera) https://www.coursera.org/learn/selenium-webdriver-python “Selenium WebDriver with Python” is a foundational course that aims to provide a comprehensive understanding of Selenium and its components. It also helps in understanding how Selenium WebDriver Operates. This course begins by demonstrating an environment setup for Selenium WebDriver with Python. A brief description of locating Web elements and web Interactions is provided in this course. This course covers an overview of testing frameworks with Selenium WebDriver. Some advanced topics such as H |
|
Self Awareness and the Effective Leader (Coursera) https://www.coursera.org/learn/self-awareness Part of being an effective leader is learning how to play to your strengths and overcome characteristics that don't lend to good leadership practices. During the course, you will examine your own strengths and learn ways to use them in a leadership role. Learn to manage stress and solve problems creatively. Throughout the course, you will also build a tool kit of useful techniques that you can begin using right away in your engineering career. This course is designed for engineers who are inter |
|
Selling to Chinese Consumers (Coursera) https://www.coursera.org/learn/selling-to-chinese-consumers This course is designed to help learners sell their products, goods and services to Chinese consumers. To achieve this goal, the course will use evidence-based research in psychology, economics, legal studies and marketing to help learners understand the historical, economic and legal contexts of doing business in China and the behavioral characteristics of Chinese consumers. The course will cover topics in Chinese and global marketing, Chinese consumers, institutional and cultural influence on |
|
Selling with Confidence (Coursera) https://www.coursera.org/learn/develop-with-dell-it-sales-selling-with-confidence This course is designed to give the learner the confidence to complete the sale by providing business value, while teaching the ins and outs of overcoming objections and going for the close. This course is primarily aimed at people who are interested in beginning a career in IT Sales and as such, learners are not required to have prior sales or technical experience. This course is recommended for students looking to begin their career as well as those who are looking for a career change or trans |
|
Seluk Beluk Jaringan Komputer (Coursera) https://www.coursera.org/learn/seluk-beluk-jaringan-komputer Materi ini dirancang untuk memberikan gambaran lengkap tentang jaringan komputer. Kami akan membahas semua mulai dari dasar-dasar teknologi dan protokol jaringan modern kemudian gambaran umum cloud hingga aplikasi praktis dan pemecahan masalah jaringan. Pada akhir materi ini, Anda akan dapat: ● menggambarkan jaringan komputer dalam bentuk model lima lapis ● memahami semua protokol standar yang terlibat dengan komunikasi TCP/IP ● menguasai alat dan teknik pemecahan masalah yang tepat ● mempelaj |
|
Semiconductor Packaging Manufacturing (Coursera) https://www.coursera.org/learn/manufacturing This course will provide information on the various stages of semiconductor package manufacturing, including sort, assembly, and final test. In addition, we will also describe how to select, build, and test the packages with the die and other components to ensure the quality of the package and total assembly performance. We will also discuss the role of Process Control Systems in semiconductor manufacturing as they relate to quality testing. Specifically, we will explore how Process Control Syst |
|
Semiconductor Physics (Coursera) https://www.coursera.org/learn/semiconductor-physics This course can also be taken for academic credit as ECEA 5630, part of CU Boulder’s Master of Science in Electrical Engineering degree. This course introduces basic concepts of quantum theory of solids and presents the theory describing the carrier behaviors in semiconductors. The course balances fundamental physics with application to semiconductors and other electronic devices. At the end of this course learners will be able to: 1. Understand the energy band structures and their significan |
|
Sensor Manufacturing and Process Control (Coursera) https://www.coursera.org/learn/sensor-manufacturing-process-control "Sensor Manufacturing and Process Control" can also be taken for academic credit as ECEA 5343, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is our fourth course in our specialization on Embedding Sensor and Motors. To get the most out of this course, you should first take our first course entitled "Sensors and Sensor Circuits", our second course entitled "Motor and Motor Control Circuits", and our third course entitled "Pressure, Force, Motion, and Humidity Sens |
|
Sensors and Sensor Circuit Design (Coursera) https://www.coursera.org/learn/sensors-circuit-interface This course can also be taken for academic credit as ECEA 5340, part of CU Boulder’s Master of Science in Electrical Engineering degree. After taking this course, you will be able to: ● Understand how to specify the proper thermal, flow, or rotary sensor for taking real-time process data. ● Implement thermal sensors into an embedded system in both hardware and software. ● Add the sensor and sensor interface into a microprocessor based development kit. ● Create hardware and firmware to process |
|
Sensory Science: Conducting Tests (Coursera) https://www.coursera.org/learn/sensory-science-conducting-tests This course will introduce the sensory evaluation laboratory and will teach you best practices for testing and documentation. We'll explore how various factors, especially the testing environment, can influence sensory experiments. Our main focus will be on two specific sensory tests: duo-trio discrimination and 3-product consumer testing. Through case studies, we’ll examine how these tests can address product challenges. For both test types, we’ll dive into how to develop an appropriate hypothe |
|
Sensory Science: The Senses (Coursera) https://www.coursera.org/learn/sensory-science-the-senses Humans are amazing sensors! This course will help you understand our sensing capabilities including taste, olfaction, tactile senses, vision, and audition. The course will explain at a high-level the anatomy, physiology, and chemistry of the senses and give you an appreciation of how senses are transmitted to, and experienced by, the brain. You’ll learn by experience to assess cases such as dysfunctions in olfaction or tactile temperature adaptation. Optional podcast conversations with experts i |
|
https://www.coursera.org/learn/nlp-sequence-models In the fifth course of the Deep Learning Specialization, you will become familiar with sequence models and their exciting applications such as speech recognition, music synthesis, chatbots, machine translation, natural language processing (NLP), and more. By the end, you will be able to build and train Recurrent Neural Networks (RNNs) and commonly-used variants such as GRUs and LSTMs; apply RNNs to Character-level Language Modeling; gain experience with natural language processing and Word Emb |
|
Sequences, Time Series and Prediction (Coursera) https://www.coursera.org/learn/tensorflow-sequences-time-series-and-prediction If you are a software developer who wants to build scalable AI-powered algorithms, you need to understand how to use the tools to build them. This Specialization will teach you best practices for using TensorFlow, a popular open-source framework for machine learning. In this fourth course, you will learn how to build time series models in TensorFlow. You’ll first implement best practices to prepare time series data. You’ll also explore how RNNs and 1D ConvNets can be used for prediction. Finall |
|
https://www.coursera.org/learn/creatividad ¡Claro que todos podemos potenciar nuestra creatividad a través de procedimientos, rutinas y protocolos sencillos! En este curso UNAM, el participante desarrollará su talento creativo para aportar soluciones originales y generar ideas y productos en el ámbito en que se desenvuelve y en la vida cotidiana. |
|
Series Orientation: Transforming Education (Coursera) https://www.coursera.org/learn/transforming-education-series-orientation Series Orientation welcomes learners to the Transforming Education series, introduces Self-Directed/Community-Supported Learning as our core instructional design, and positions learners for success as aspiring change agents. |
|
https://www.coursera.org/learn/serious-gaming Have you ever wondered how playing games can help us to train people, deal with societal challenges or raise awareness of contemporary social issues? In this MOOC you will learn the ins and outs of games that are designed with exactly those purposes in mind: serious games. We will define serious games and discuss the different types that have been developed. We will explain why people like to play them and what impact they may have. State of the art theories from game studies, philosophy an |
|
Server side JavaScript with Node.js (Coursera) https://www.coursera.org/learn/server-side-javascript-with-nodejs Have you ever wondered how you are able to do net banking or book a ticket online? Which technology is adopted for applications used in different businesses? Backend technology acts as a backbone to every web application. It typically includes all services, data interfaces and their core business logic. This course will introduce you to the Node.js environment and help you design and develop backend or server-side of the application. It also provides you with hands on coding exercises and will |