Coursera Courses


Customer-Centric IT Strategy (Coursera)

https://www.coursera.org/learn/uva-darden-customer-centric-it-strategy

Now more than ever, corporations are investing heavily in IT. The quality of these investments affect the daily work of millions, yet it’s not uncommon to see industry surveys where the failure rates for IT projects is over 50%. It’s possible to do better and it’s possible to do so consistently. In this two-week course, we’ll step through major challenges within corporate IT and how to address them with the disciplined use of design thinking, Lean Startup, and agile as a team framework. By the

Customising your models with TensorFlow 2 (Coursera)

https://www.coursera.org/learn/customising-models-tensorflow2

Welcome to this course on Customising your models with TensorFlow 2! In this course you will deepen your knowledge and skills with TensorFlow, in order to develop fully customised deep learning models and workflows for any application. You will use lower level APIs in TensorFlow to develop complex model architectures, fully customised layers, and a flexible data workflow. You will also expand your knowledge of the TensorFlow APIs to include sequence models. You will put concepts that you learn

Cyber Attack Countermeasures (Coursera)

https://www.coursera.org/learn/cyber-attack-countermeasures

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attent

Cyber Security Fundamentals (Coursera)

https://www.coursera.org/learn/cyber-security-fundamentals

This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed. The role of cryptography i

Cyber Security in Manufacturing (Coursera)

https://www.coursera.org/learn/cyber-security-manufacturing

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security need

Cyber Threat Hunting (Coursera)

https://www.coursera.org/learn/cyber-threat-hunting

Learn repeatable, documentable cyber threat hunting methodologies and types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization that will ultimately deliver proactive defenses against possible de

Cyber Threat Intelligence (Coursera)

https://www.coursera.org/learn/ibm-cyber-threat-intelligence

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also give

Cyber Threats and Attack Vectors (Coursera)

https://www.coursera.org/learn/cyber-threats-attack-vectors

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bea

Cyber-Physical Systems: Modeling and Simulation (Coursera)

https://www.coursera.org/learn/cyber-physical-systems-1

Cyber-physical systems (CPS for short) combine digital and analog devices, interfaces, networks, computer systems, and the like, with the natural and man-made physical world. The inherent interconnected and heterogeneous combination of behaviors in these systems makes their analysis and design an exciting and challenging task. CPS: Modeling and Simulation provides you with an introduction to modeling and simulation of cyber-physical systems. The main focus is on models of physical process, fin

Cybercrime (Coursera)

https://www.coursera.org/learn/cybercrime

This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how cybercrime can be defined, and how it can be studied. You will learn about the difficulties in measuring the occurrence, the frequency and the impact of cybercrime, and build a scepticism on the reliability and the interpretation of cybercrime reports. You will be introduced to discussion about human aspects of cybercrime, in particular, the actors related

Cybersecurity and Its Ten Domains (Coursera)

https://www.coursera.org/learn/cyber-security-domain

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to mate

Cybersecurity and Mobility (Coursera)

https://www.coursera.org/learn/cybersecurity-mobility

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evol

Cybersecurity and the Internet of Things (Coursera)

https://www.coursera.org/learn/iot-cyber-security

Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught u

Cybersecurity and the X-Factor (Coursera)

https://www.coursera.org/learn/cybersecurity-and-x-factor

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate it

Cybersecurity Architecture (Coursera)

https://www.coursera.org/learn/cybersecurity-architecture

In a digital world, data drives the world’s economy, and almost all cyberattacks aim at stealing sensitive information or holding data hostage. Did you know that according to a recent IBM study, "the global average cost of a data breach was USD 4.45 million, a 15% increase over 3 years"? If you are getting started with a career in cybersecurity or just curious about how cybersecurity works, join us on this five-module course on Cybersecurity Architecture. You will learn from a distinguished IBM

Cybersecurity Assessment: CompTIA Security+ & CYSA+ (Coursera)

https://www.coursera.org/learn/cybersecurity-assessment-comptia-security-cysa

Forbes specifically recommends the CompTIA Security+ certification for career starters seeking to validate their cybersecurity skills. Many job roles require CompTIA Security + and CySA+ certifications, and certified applicants catch the eye of employers (CompTIA)! During this two-week intensive short course, you’ll prepare for both the foundational CompTIA Security+ and advanced CySA+ exams. First, explore the vital CompTIA Security+ exam details, including exam eligibility, the five exa

Cybersecurity Awareness and Innovation (Coursera)

https://www.coursera.org/learn/cybersecurity

It’s not you, it’s me! What’s going on? This course empowers students, professionals and the wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It provides a practical overview of challenging issues like identity credentials management and security, e-mail threats and web impersonation, or web hacking. In addition to this, you will have a practical appreciation of i

Cybersecurity Best Practices (Coursera)

https://www.coursera.org/learn/cybersecurity-best-practices

"Cybersecurity Best Practices" is a transformative course designed for any learners whether they are just getting started with cybersecurity or are seasoned professionals looking for a refresher. This course uses real world examples and explains cybersecurity concepts in relatable ways to make it accessible for anyone while still challenging seasoned professionals to think of these concepts with a different lens. We dive into the fundamental structure of cybersecurity and demystify its complexit

Cybersecurity Capstone Project (Coursera)

https://www.coursera.org/learn/cyber-security-capstone

This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on course team availability and learner interest. Please keep this in mind as you enroll into the Capstone program. While you will still be able to access

Cybersecurity Capstone: Breach Response Case Studies (Coursera)

https://www.coursera.org/learn/ibm-cybersecurity-breach-case-studies

This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk

Cybersecurity Compliance Framework & System Administration (Coursera)

https://www.coursera.org/learn/cybersecurity-compliance-framework-system-administration

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems. You will learn the concepts of e

Cybersecurity Compliance Framework, Standards & Regulations (Coursera)

https://www.coursera.org/learn/cybersecurity-compliance-framework-standards-regulations

Cyber threats present a constant challenge today, costing billions and affecting everyone, from governments to small businesses. Are you ready to contribute to the solution? This course will provide you with a deep understanding of cybersecurity principles, industry standards, regulations, and audit processes. You will explore the fundamental concepts of information security and compliance, covering topics such as governance, risk, compliance, cybersecurity frameworks, and process management.

Cybersecurity for Data Science (Coursera)

https://www.coursera.org/learn/cybersecurity-for-data-science

This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, and policies that will be essential to data science. We will explore key tools and techniques for authentication and access control so p

Cybersecurity for Everyone (Coursera)

https://www.coursera.org/learn/cybersecurity-for-everyone

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues. Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk.

Cybersecurity for Managers (Coursera)

https://www.coursera.org/learn/cybersecurity-for-managers

En el mundo empresarial, los managers suelen ser el principal objetivo de un ciberataque, ya que tienen acceso a información confidencial, a cuentas o a transacciones económicas. Además, sus relaciones con múltiples contactos de interés como clientes, proveedores o personas de la misma organización los convierten en objetivos especialmente atractivos para los ciberdelincuentes. Por ello, en este curso trataremos las temáticas más relevantes en el ámbito de la ciberseguridad que debes conocer.

Cybersecurity for Tech Professionals (Coursera)

https://www.coursera.org/learn/cybersecurity-for-tech-professionals

Como integrantes del mundo empresarial, los profesionales de la tecnología suelen ser el principal objetivo de un ciberataque, ya que tienen acceso a información confidencial, a cuentas o a los sistemas de una empresa. Aunque sean conocedores de los riesgos a los que están sometidos las organizaciones en las que trabajan, es importante tener un amplio y consolidado conocimiento en materia de ciberseguridad para poder prevenir los ataques. Por ello, en este curso trataremos las temáticas más rel

Cybersecurity Foundations for Risk Management (Coursera)

https://www.coursera.org/learn/cybersecurity-foundations-for-risk-management

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ● Define key concepts and terminology in Cybersecurity ● Identify threats to cybersecurity ● Identify strategies to identify and remediate vulnerabilities in inform

Cybersecurity Identity and Access Solutions using Azure AD (Coursera)

https://www.coursera.org/learn/cybersecurity-identity-and-access-solutions-with-azure-ad

Upon completing the first three courses of the Professional Certificate, you should have some foundational knowledge about computers, operating systems, networking, and cyberthreats, all of which put you in a good position to explore cybersecurity in greater detail. In this course, you’ll explore the world of authorization and authentication, and understand the concepts of two-step authentication and single sign-on policies. You’ll also become familiar with the features and capabilities of Azu

Cybersecurity in Healthcare (Hospitals & Care Centres) (Coursera)

https://www.coursera.org/learn/cybersecurity-in-healthcare

The Cybersecurity in Healthcare MOOC was developed as part the SecureHospitals.eu project. This project has received funding from the European Union’s Horizon 2020 Coordination Research and Innovation Action under Grant Agreement No. 826497. The course "Cybersecurity in Healthcare" has been developed to raise awareness and understanding the role of cybersecurity in healthcare (e.g., hospitals, care centres, clinics, other medical or social care institutions and service organisations) and the ch

Cybersecurity Job Search and Interviews: Getting Started (Coursera)

https://www.coursera.org/learn/cybersecurity-jobs

Are you planning to have a career in cybersecurity? This course can help you plan your preparation for such a career as well as give some advice on finding positions and landing a position. After completing this course, a learner will be able to: • Define the cybersecurity field and describe its variations. • Describe the need for qualified cybersecurity professionals in U.S. and global organizations. • Discuss the cybersecurity professional’s role in an organization’s cybersecurity effort. •

Cybersecurity Job Search, Resume, and Interview Prep (Coursera)

https://www.coursera.org/learn/cybersecurity-job-search-resume-and-interview-prep

With the digital and AI disruption, cybersecurity professionals are in even higher demand around the world, and the trend shows no sign of slowing. There are also several great candidates. How can you get the edge in such a competitive field? This course will prepare you to enter the job market as a great candidate for an entry-level cybersecurity position. You will be equipped with practical techniques to create job-related documents, such as a resume, a portfolio, a cover letter, and an eleva

Cybersecurity Management and Compliance (Coursera)

https://www.coursera.org/learn/cybersecurity-management-and-compliance

In this course, you’ll learn about data and record management, Information security, standards and policy formation, and implementation. You’ll also explore cloud adoption frameworks and regulatory compliance frameworks. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you'll be able to: • Explain the principles of cloud security planning • Identify securit

Cybersecurity Policy for Aviation and Internet Infrastructures (Coursera)

https://www.coursera.org/learn/cybersecurity-policy-aviation-internet

In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Prog

Cybersecurity Policy for Water and Electricity Infrastructures (Coursera)

https://www.coursera.org/learn/cybersecurity-policy-water-electricity

This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are

Cybersecurity Policy Foundations (Coursera)

https://www.coursera.org/learn/cybersecurity-policy-foundations

In this course, the learner will get a good look at what policies and frameworks do to keep the cybersecurity industry on-mission and formal. Without this area of cybersecurity, cybersecurity would mean too many people doing too many different things that might not even improve security. Learn how you can have a successful career in cybersecurity without ever touching a command line!

Cybersecurity Roles, Processes & Operating System Security (Coursera)

https://www.coursera.org/learn/cybersecurity-roles-processes-operating-system-security

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you

Cybersecurity Solutions and Microsoft Defender (Coursera)

https://www.coursera.org/learn/cybersecurity-solutions-and-microsoft-defender

In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR). You’ll gain an understanding of security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance. You’ll also learn how to

Cybersecurity Threat Vectors and Mitigation (Coursera)

https://www.coursera.org/learn/cybersecurity-threat-vectors-and-mitigation

This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experie

Cybersecurity Tools and Technologies (Coursera)

https://www.coursera.org/learn/cybersecurity-tools-and-technologies

This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment. You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management. This course will take you one step closer to the Microsoft Cybe

Cybersecurity: Protecting your Information at Home (Coursera)

https://www.coursera.org/learn/csafe-protecting-your-information-at-home

Cybersecurity is essential for everyone who uses information or communications technologies. Whether it is a computer, tablet, or smartphone, if it is connected to a network, learn about the technical infrastructure that connects it to the Internet. The objectives of this course are: -Understand the elements of home computing. -Recognize the steps needed to secure the home computing environment. -Explain how to secure the use of email. -Recognize and protect against Web browsing threats.

C程序设计进阶 (Coursera)

https://www.coursera.org/learn/c-chengxu-sheji

如果说学习过《计算导论与C语言基础》,你已经迈入了C语言的殿堂,那么《C程序设计进阶》将帮助你更上一层楼,理解“结构化程序设计的基本思想”,掌握“C程序设计的基本技巧”,养成“良好的编程习惯和编程风格”,编写出“真正具有生命力的计算机程序”。完成这门课的学习,你将能解释C程序设计语言的基本概念与知识,并且使用C语言编写计算机程序解决生活工作中的实际问题。

D'un infini à l'autre - Voyages de l'infiniment grand à l'infiniment petit (Coursera)

https://www.coursera.org/learn/physique-2-infinis-liens

Partez à la découverte de l'infiniment petit et de l'infiniment grand, en compagnie de physiciens et de physiciennes qui vont vous faire découvrir les liens entre la structure de la matière aux distances les plus petites et l'organisation de l'Univers aux distances les plus grandes ce jour, et entre les outils scientifiques utilisés pour les étudier. Vous découvrirez que de nombreux messagers venus de notre Univers (le photon, les neutrinos, ou encore les rayons cosmiques) sont aussi des objets

Dairy Production and Management (Coursera)

https://www.coursera.org/learn/dairy-production

With the world's first MOOOOO-C, you will gain a broad and comprehensive understanding of all aspects of dairy management such as genetics, nutrition, reproduction, animal health, farm economics, and sustainability of dairy production systems. There's something here for everyone whether you are just looking for the basics or have years of experience in the dairy industry. This is an eight-week course. Each week consists of four to nine video lectures, additional reading materials, and a multipl

Das liebe Geld - Finance im Alltag (Coursera)

https://www.coursera.org/learn/finanzen

Durch den MOOC „Das liebe Geld - Finance im Alltag“ erlangen Sie ein Basiswissen für bewusste und korrekte finanzielle Entscheidungen im Alltag. Sie eignen sich konkrete Werkzeuge an, die Ihnen helfen können, bessere Alltagsentscheidungen zu treffen und bekommen einen Einblick in verschiedene neueste Forschungserkenntnisse der Finance. Wir begleiten Sie in sechs Wochenmodulen zu soliden finanziellen Alltagsentscheidungen. Nach einer Einführung erlernen Sie den Zeitwert des Geldes als zentrales

Dasar-dasar Analitik Data: Data, Data di Mana-mana (Coursera)

https://www.coursera.org/learn/dasar-dasar-analitik-data-data-data-di-mana-mana

Ini adalah materi pertama dalam program Sertifikasi Data Analitik Google. Materi ini akan membekali Anda dengan keterampilan yang Anda butuhkan untuk melamar kerja sebagai analis data tingkat pemula. Semua jenis organisasi membutuhkan analis data untuk memperbaiki proses operasional mereka, mengidentifikasi peluang dan tren, meluncurkan produk baru, dan membuat keputusan yang tepat. Di materi ini, Anda akan diperkenalkan dengan dunia analitik data berdasarkan kurikulum yang langsung dikembangkan

Dasar-dasar Desain Pengalaman Pengguna (User Experience, UX) (Coursera)

https://www.coursera.org/learn/dasar-dasar-desian-pengalaman-pengguna-ux

Dasar-dasar Desain Pengalaman Pengguna (User Experience, UX) adalah bagian pertama dari tujuh rangkaian materi yang akan membekali Anda keterampilan yang berguna untuk melamar pekerjaan desain UX tingkat pemula. Desainer UX fokus pada interaksi orang-orang dengan berbagai produk seperti situs web, aplikasi mobile dan obyek fisik. Desainer UX menjadikan interaksi sehari-hari bermanfaat, menyenangkan, dan mudah diakses. Peran seorang desainer UX tingkat pemula meliputi: berempati dengan pengguna,

Dasar-Dasar Dukungan Teknis (Coursera)

https://www.coursera.org/learn/dasar-dasar-dukungan-teknis

Materi ini adalah rangkaian pertama dari keseluruhan program pelatihan yang akan membantu Anda untuk berperan sebagai IT Support Specialist tingkat pemula. Dalam kursus ini, Anda akan diperkenalkan ke dunia Teknologi Informasi, atau IT. Anda akan mempelajari berbagai aspek Teknologi Informasi, seperti perangkat keras komputer, Internet, perangkat lunak komputer, pemecahan masalah, dan layanan pelanggan. Pelatihan ini mencakup berbagai topik dalam dunia IT yang dirancang untuk memberi Anda gambar

Dasar-dasar Manajemen Proyek (Coursera)

https://www.coursera.org/learn/dasar-dasar-manajemen-proyek

Materi ini adalah yang pertama dari enam seri yang akan membekali Anda dengan keterampilan yang dibutuhkan untuk diterapkan pada posisi tingkat pemula di bidang manajemen proyek. Manajer proyek memegang peran kunci dalam memimpin, merencanakan, dan mengimplementasikan proyek penting untuk membantu keberhasilan organisasi mereka. Dalam materi ini, Anda akan menemukan terminologi dasar tentang manajemen proyek dan mendapatkan pemahaman yang lebih dalam tentang peran dan tanggung jawab seorang man

Data & Cybersecurity (Coursera)

https://www.coursera.org/learn/data-cybersecurity

Como integrantes del mundo empresarial, los especialistas en el tratamiento de datos suelen ser uno de los principales objetivos de un ciberataque, ya que tienen acceso a información confidencial de una empresa. Aunque sean conocedores de los riesgos a los que están sometidas las organizaciones en las que trabajan, es importante tener un amplio y consolidado conocimiento en materia de ciberseguridad para poder prevenir los ataques; y en el caso de que ocurran, mitigar los riesgos que afecten a l

Data Analysis and Interpretation Capstone (Coursera)

https://www.coursera.org/learn/data-analysis-capstone

The Capstone project will allow you to continue to apply and refine the data analytic techniques learned from the previous courses in the Specialization to address an important issue in society. You will use real world data to complete a project with our industry and academic partners. For example, you can work with our industry partner, DRIVENDATA, to help them solve some of the world's biggest social challenges! DRIVENDATA at www.drivendata.org, is committed to bringing cutting-edge practices