Coursera Courses |
Current Gen 3D Game Prop Production (Coursera) https://www.coursera.org/learn/3d-game-prop-production In this course you will learn to create a photo-real game prop using modern game art production techniques. You will gather reference, generate a base model, create a high polygon model, bake details onto a low poly model, and then texture and present a final portfolio piece. This course is aimed at students who have some knowledge in 3d and game art and would like to learn more advanced techniques employed in the creation of modern game assets. We will be using Maya, Zbrush, Marmoset, and Subst |
Current-Mode Control (Coursera) https://www.coursera.org/learn/current-modecontrol This course can also be taken for academic credit as ECEA 5708, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is Course #4 in the Modeling and Control of Power Electronics course sequence. The course is focused on current-mode control techniques, which are very frequently applied in practical realizations of switched-mode. Practical advantages of peak current mode control are discussed, including built-in overcurrent protection, simpler and more robust dynamic re |
Curso final de análisis computacional de datos de Google: completa un caso práctico (Coursera) https://www.coursera.org/learn/completa-un-caso-practico Este es el octavo curso del Certificado de análisis computacional de datos de Google. Tendrás la oportunidad de realizar un caso práctico opcional que te ayudará a prepararte para la búsqueda de empleos de análisis computacional de datos. Los empleadores suelen usar casos prácticos para evaluar las destrezas analíticas. En tu caso práctico, elegirás un escenario creado en función del análisis de datos. Luego, harás preguntas sobre los datos de este escenario y los prepararás, procesarás, analiza |
Cursos en línea: modelo para armar (Coursera) https://www.coursera.org/learn/enlinea ¿Quieres crear un curso en línea? Estás en el lugar correcto. En alrededor de 20 horas podrás estructurar un curso de acompañamiento completo. Sabrás cómo diseñar sesiones que te permitan interactuar dinámicamente con tus estudiantes y a ellos trabajar en subgrupos en actividades que los mantengan motivados y que promuevan aprendizajes sólidos. ¡Únete a este grupo creciente de maestros y otros interesados en la educación para crear tu curso de acompañamiento en línea! Nuestro agradecimiento al |
Custom and Distributed Training with TensorFlow (Coursera) https://www.coursera.org/learn/custom-distributed-training-with-tensorflow In this course, you will: • Learn about Tensor objects, the fundamental building blocks of TensorFlow, understand the difference between the eager and graph modes in TensorFlow, and learn how to use a TensorFlow tool to calculate gradients. • Build your own custom training loops using GradientTape and TensorFlow Datasets to gain more flexibility and visibility with your model training. • Learn about the benefits of generating code that runs in graph mode, take a peek at what graph code looks li |
Custom Models, Layers, and Loss Functions with TensorFlow (Coursera) https://www.coursera.org/learn/custom-models-layers-loss-functions-with-tensorflow In this course, you will: • Compare Functional and Sequential APIs, discover new models you can build with the Functional API, and build a model that produces multiple outputs including a Siamese network. • Build custom loss functions (including the contrastive loss function used in a Siamese network) in order to measure how well a model is doing and help your neural network learn from training data. • Build off of existing standard layers to create custom layers for your models, customize a n |
https://www.coursera.org/learn/wharton-customer-analytics Data about our browsing and buying patterns are everywhere. From credit card transactions and online shopping carts, to customer loyalty programs and user-generated ratings/reviews, there is a staggering amount of data that can be used to describe our past buying behaviors, predict future ones, and prescribe new ways to influence future purchasing decisions. In this course, four of Wharton’s top marketing professors will provide an overview of key areas of customer analytics: descriptive analyt |
Customer Centric Innovation (Coursera) https://www.coursera.org/learn/customer-centric-innovation Successful innovation starts with understanding customer needs and ends with a delighted customer. This course is created to develop a holistic understanding of customers’ role in developing successful innovations and how to capture and utilize customer information to create successful innovations. |
Customer Insights: New Product Development Orientation (Coursera) https://www.coursera.org/learn/customer-insights-orientation This course is the first in the Customer Insights and New Product Development (CIPD) specialization. It will introduce learners to the tools and process of gathering customer insights for identifying and developing new product opportunities. Through an integrated set of five modules and hands-on project experiences, learners will acquire the knowledge and skills to turn their ideas gained from understanding customer needs into innovative new products. |
Customer Insights: Quantitative Techniques (Coursera) https://www.coursera.org/learn/quantitative-customer-insights This course will highlight the potential of quantitative marketing research for assessing new product opportunities. In addition to focusing on the skills and practices for a successful New Product Development (NPD), the course will illustrate the multi-faceted challenges of NPD using authentic business situations. The first module will provide business practice foundations to help learners devise creative solutions to problems using a design-thinking framework. Learners will experience the idea |
Customer Relationship Management (Coursera) https://www.coursera.org/learn/customer-relationship-management Customer Relationship Management (CRM) is a comprehensive course that explores various aspects of CRM, from data-driven strategies to customer segmentation and loyalty programs. The course is designed in three stages, each building upon the previous one, and includes self-paced learning with pre-recorded video lectures, exercises, and interactive quizzes. Real-world case studies and problem-solving exercises are introduced in the Intermediate and Advanced stages to simulate real CRM challenges. |
Customer Service Fundamentals (Coursera) https://www.coursera.org/learn/customer-service-fundamentals There are a growing number of exciting, well-paying jobs in today’s tech industry that do not require a traditional college degree, an one of the hottest areas with high demand is in IT customer service and support. Customer Service is a perfect entry point to start your career in IT, with a multitude of job openings ranging from onsite or remote help desk work to customer care or client support. We can help you get there with the Customer Service Fundamentals course. We will help you to bu |
Customer Value in Pricing Strategy (Coursera) https://www.coursera.org/learn/uva-darden-bcg-pricing-strategy-customer-value The traditional approach to pricing based on costs works to pay the bills, but it leaves revenue on the table. You can, in fact, price your products in a way that increases sales--if you know what your customers are willing to pay and can leverage psychology to create better deal and discount plans. In this course, we'll show you how to price a product based on how your customers value it and the psychology behind their purchase decisions. Developed at the Darden School of Business at the Univer |
Customer-Centric IT Strategy (Coursera) https://www.coursera.org/learn/uva-darden-customer-centric-it-strategy Now more than ever, corporations are investing heavily in IT. The quality of these investments affect the daily work of millions, yet it’s not uncommon to see industry surveys where the failure rates for IT projects is over 50%. It’s possible to do better and it’s possible to do so consistently. In this two-week course, we’ll step through major challenges within corporate IT and how to address them with the disciplined use of design thinking, Lean Startup, and agile as a team framework. By the |
Customising your models with TensorFlow 2 (Coursera) https://www.coursera.org/learn/customising-models-tensorflow2 Welcome to this course on Customising your models with TensorFlow 2! In this course you will deepen your knowledge and skills with TensorFlow, in order to develop fully customised deep learning models and workflows for any application. You will use lower level APIs in TensorFlow to develop complex model architectures, fully customised layers, and a flexible data workflow. You will also expand your knowledge of the TensorFlow APIs to include sequence models. You will put concepts that you learn |
Cyber Attack Countermeasures (Coursera) https://www.coursera.org/learn/cyber-attack-countermeasures This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. The basics of cryptography are also introduced with attent |
Cyber Security in Manufacturing (Coursera) https://www.coursera.org/learn/cyber-security-manufacturing The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security need |
Cyber Threat Hunting (Coursera) https://www.coursera.org/learn/cyber-threat-hunting Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible de |
Cyber Threat Intelligence (Coursera) https://www.coursera.org/learn/ibm-cyber-threat-intelligence This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also give |
Cyber Threats and Attack Vectors (Coursera) https://www.coursera.org/learn/cyber-threats-attack-vectors Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bea |
Cyber-Physical Systems: Modeling and Simulation (Coursera) https://www.coursera.org/learn/cyber-physical-systems-1 Cyber-physical systems (CPS for short) combine digital and analog devices, interfaces, networks, computer systems, and the like, with the natural and man-made physical world. The inherent interconnected and heterogeneous combination of behaviors in these systems makes their analysis and design an exciting and challenging task. CPS: Modeling and Simulation provides you with an introduction to modeling and simulation of cyber-physical systems. The main focus is on models of physical process, fin |
Cybersecurity and Its Ten Domains (Coursera) https://www.coursera.org/learn/cyber-security-domain This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to mate |
Cybersecurity and Mobility (Coursera) https://www.coursera.org/learn/cybersecurity-mobility This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evol |
Cybersecurity and the Internet of Things (Coursera) https://www.coursera.org/learn/iot-cyber-security Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught u |
Cybersecurity and the X-Factor (Coursera) https://www.coursera.org/learn/cybersecurity-and-x-factor What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate it |
Cybersecurity Awareness and Innovation (Coursera) https://www.coursera.org/learn/cybersecurity It’s not you, it’s me! What’s going on? This course empowers students, professionals and the wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It provides a practical overview of challenging issues like identity credentials management and security, e-mail threats and web impersonation, or web hacking. In addition to this, you will have a practical appreciation of i |
Cybersecurity Capstone Project (Coursera) https://www.coursera.org/learn/cyber-security-capstone This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on course team availability and learner interest. Please keep this in mind as you enroll into the Capstone program. While you will still be able to access |
Cybersecurity Capstone: Breach Response Case Studies (Coursera) https://www.coursera.org/learn/ibm-cybersecurity-breach-case-studies This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk |
Cybersecurity Compliance Framework & System Administration (Coursera) https://www.coursera.org/learn/cybersecurity-compliance-framework-system-administration This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems. You will learn the concepts of e |
Cybersecurity for Data Science (Coursera) https://www.coursera.org/learn/cybersecurity-for-data-science This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, and policies that will be essential to data science. We will explore key tools and techniques for authentication and access control so p |
Cybersecurity for Everyone (Coursera) https://www.coursera.org/learn/cybersecurity-for-everyone Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues. Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. |
Cybersecurity for Managers (Coursera) https://www.coursera.org/learn/cybersecurity-for-managers En el mundo empresarial, los managers suelen ser el principal objetivo de un ciberataque, ya que tienen acceso a información confidencial, a cuentas o a transacciones económicas. Además, sus relaciones con múltiples contactos de interés como clientes, proveedores o personas de la misma organización los convierten en objetivos especialmente atractivos para los ciberdelincuentes. Por ello, en este curso trataremos las temáticas más relevantes en el ámbito de la ciberseguridad que debes conocer. |
Cybersecurity for Tech Professionals (Coursera) https://www.coursera.org/learn/cybersecurity-for-tech-professionals Como integrantes del mundo empresarial, los profesionales de la tecnología suelen ser el principal objetivo de un ciberataque, ya que tienen acceso a información confidencial, a cuentas o a los sistemas de una empresa. Aunque sean conocedores de los riesgos a los que están sometidos las organizaciones en las que trabajan, es importante tener un amplio y consolidado conocimiento en materia de ciberseguridad para poder prevenir los ataques. Por ello, en este curso trataremos las temáticas más rel |
Cybersecurity Foundations for Risk Management (Coursera) https://www.coursera.org/learn/cybersecurity-foundations-for-risk-management In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ● Define key concepts and terminology in Cybersecurity ● Identify threats to cybersecurity ● Identify strategies to identify and remediate vulnerabilities in inform |
Cybersecurity Identity and Access Solutions using Azure AD (Coursera) https://www.coursera.org/learn/cybersecurity-identity-and-access-solutions-with-azure-ad Upon completing the first three courses of the Professional Certificate, you should have some foundational knowledge about computers, operating systems, networking, and cyberthreats, all of which put you in a good position to explore cybersecurity in greater detail. In this course, you’ll explore the world of authorization and authentication, and understand the concepts of two-step authentication and single sign-on policies. You’ll also become familiar with the features and capabilities of Azu |
Cybersecurity in Healthcare (Hospitals & Care Centres) (Coursera) https://www.coursera.org/learn/cybersecurity-in-healthcare The Cybersecurity in Healthcare MOOC was developed as part the SecureHospitals.eu project. This project has received funding from the European Union’s Horizon 2020 Coordination Research and Innovation Action under Grant Agreement No. 826497. The course "Cybersecurity in Healthcare" has been developed to raise awareness and understanding the role of cybersecurity in healthcare (e.g., hospitals, care centres, clinics, other medical or social care institutions and service organisations) and the ch |
Cybersecurity Job Search and Interviews: Getting Started (Coursera) https://www.coursera.org/learn/cybersecurity-jobs Are you planning to have a career in cybersecurity? This course can help you plan your preparation for such a career as well as give some advice on finding positions and landing a position. After completing this course, a learner will be able to: • Define the cybersecurity field and describe its variations. • Describe the need for qualified cybersecurity professionals in U.S. and global organizations. • Discuss the cybersecurity professional’s role in an organization’s cybersecurity effort. • |
Cybersecurity Management and Compliance (Coursera) https://www.coursera.org/learn/cybersecurity-management-and-compliance In this course, you’ll learn about data and record management, Information security, standards and policy formation, and implementation. You’ll also explore cloud adoption frameworks and regulatory compliance frameworks. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you'll be able to: • Explain the principles of cloud security planning • Identify securit |
Cybersecurity Policy for Aviation and Internet Infrastructures (Coursera) https://www.coursera.org/learn/cybersecurity-policy-aviation-internet In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Prog |
Cybersecurity Policy for Water and Electricity Infrastructures (Coursera) https://www.coursera.org/learn/cybersecurity-policy-water-electricity This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are |
Cybersecurity Policy Foundations (Coursera) https://www.coursera.org/learn/cybersecurity-policy-foundations In this course, the learner will get a good look at what policies and frameworks do to keep the cybersecurity industry on-mission and formal. Without this area of cybersecurity, cybersecurity would mean too many people doing too many different things that might not even improve security. Learn how you can have a successful career in cybersecurity without ever touching a command line! |
Cybersecurity Roles, Processes & Operating System Security (Coursera) https://www.coursera.org/learn/cybersecurity-roles-processes-operating-system-security This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you |
Cybersecurity Solutions and Microsoft Defender (Coursera) https://www.coursera.org/learn/cybersecurity-solutions-and-microsoft-defender In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR). You’ll gain an understanding of security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance. You’ll also learn how to |
Cybersecurity Threat Vectors and Mitigation (Coursera) https://www.coursera.org/learn/cybersecurity-threat-vectors-and-mitigation This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experie |
Cybersecurity Tools and Technologies (Coursera) https://www.coursera.org/learn/cybersecurity-tools-and-technologies This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment. You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management. This course will take you one step closer to the Microsoft Cybe |
https://www.coursera.org/learn/c-chengxu-sheji 如果说学习过《计算导论与C语言基础》,你已经迈入了C语言的殿堂,那么《C程序设计进阶》将帮助你更上一层楼,理解“结构化程序设计的基本思想”,掌握“C程序设计的基本技巧”,养成“良好的编程习惯和编程风格”,编写出“真正具有生命力的计算机程序”。完成这门课的学习,你将能解释C程序设计语言的基本概念与知识,并且使用C语言编写计算机程序解决生活工作中的实际问题。 |
D'un infini à l'autre - Voyages de l'infiniment grand à l'infiniment petit (Coursera) https://www.coursera.org/learn/physique-2-infinis-liens Partez à la découverte de l'infiniment petit et de l'infiniment grand, en compagnie de physiciens et de physiciennes qui vont vous faire découvrir les liens entre la structure de la matière aux distances les plus petites et l'organisation de l'Univers aux distances les plus grandes ce jour, et entre les outils scientifiques utilisés pour les étudier. Vous découvrirez que de nombreux messagers venus de notre Univers (le photon, les neutrinos, ou encore les rayons cosmiques) sont aussi des objets |
Dairy Production and Management (Coursera) https://www.coursera.org/learn/dairy-production With the world's first MOOOOO-C, you will gain a broad and comprehensive understanding of all aspects of dairy management such as genetics, nutrition, reproduction, animal health, farm economics, and sustainability of dairy production systems. There's something here for everyone whether you are just looking for the basics or have years of experience in the dairy industry. This is an eight-week course. Each week consists of four to nine video lectures, additional reading materials, and a multipl |
Das liebe Geld - Finance im Alltag (Coursera) https://www.coursera.org/learn/finanzen Durch den MOOC „Das liebe Geld - Finance im Alltag“ erlangen Sie ein Basiswissen für bewusste und korrekte finanzielle Entscheidungen im Alltag. Sie eignen sich konkrete Werkzeuge an, die Ihnen helfen können, bessere Alltagsentscheidungen zu treffen und bekommen einen Einblick in verschiedene neueste Forschungserkenntnisse der Finance. Wir begleiten Sie in sechs Wochenmodulen zu soliden finanziellen Alltagsentscheidungen. Nach einer Einführung erlernen Sie den Zeitwert des Geldes als zentrales |
Dasar-dasar Analitik Data: Data, Data di Mana-mana (Coursera) https://www.coursera.org/learn/dasar-dasar-analitik-data-data-data-di-mana-mana Ini adalah materi pertama dalam program Sertifikasi Data Analitik Google. Materi ini akan membekali Anda dengan keterampilan yang Anda butuhkan untuk melamar kerja sebagai analis data tingkat pemula. Semua jenis organisasi membutuhkan analis data untuk memperbaiki proses operasional mereka, mengidentifikasi peluang dan tren, meluncurkan produk baru, dan membuat keputusan yang tepat. Di materi ini, Anda akan diperkenalkan dengan dunia analitik data berdasarkan kurikulum yang langsung dikembangkan |