Coursera Courses


Script Writing: Write a Pilot Episode for a TV or Web Series (Project-Centered Course) (Coursera)

https://www.coursera.org/learn/script-writing

What you’ll achieve: In this project-centered course*, you will design a series bible and write a complete pilot episode for your own unique television or web series, be it drama or comedy or something in between. You’ll learn to break down the creative process into components, and you’ll discover a structured process that allows you to produce a polished and pitch-ready script in just a few weeks. Completing this project will increase your confidence in your ideas and abilities, and you’ll fe

Scripting with Python and SQL for Data Engineering (Coursera)

https://www.coursera.org/learn/scripting-with-python-sql-for-data-engineering-duke

In this third course of the Python, Bash and SQL Essentials for Data Engineering Specialization, you will explore techniques to work effectively with Python and SQL. We will go through useful data structures in Python scripting and connect to databases like MySQL. Additionally, you will learn how to use a modern text editor to connect and run SQL queries against a real database, performing operations to load and extract data. Finally, you will use extracted data from websites using scraping tech

Scrum Master Capstone (Coursera)

https://www.coursera.org/learn/scrum-master-capstone

This course enables learners to apply the knowledge and skills of a Scrum Master that they have acquired throughout their participation in the IBM IT Scrum Master Professional Certificate (PC) or the SkillUp Scrum Master Specialization. In this Capstone course, you will gain practical knowledge, including understanding the initiation of project launches and the formation of effective Scrum teams. Additionally, you will acquire skills in developing working agreements, User Stories, curating the

Scrum Master Certification Exam Preparation (Coursera)

https://www.coursera.org/learn/certified-scrum-master-exam-preparation

This course is designed to help Scrum beginners review knowledge in order to prepare to take the Scrum Master Certification Exam. We will review several of the Scrum Methodologies and the Sprint process as well as complete several exercises and discussions. This is a standalone course, however we recommend completing the Scrum Master Certification specialization courses prior to beginning this one, as the methodologies and exercises within those courses are the foundations for this exam prepara

Scrum Master Certification Practice (Coursera)

https://www.coursera.org/learn/certified-scrum-master-in-practice

This course is designed to help Scrum beginners apply gained knowledge to practice. We will review several of the Scrum Methodologies and the Sprint process as well as complete several exercises. This is a standalone course, however we recommend completing the Scrum Master Certification specialization courses prior to beginning this one, as the methodologies and exercises within those courses are the foundations for this practice course.

Scrum Master Certification: Scaling Agile and the Team-of-Teams (Coursera)

https://www.coursera.org/learn/scaling-agile-and-the-team-of-teams

Prior to starting this course, we recommend that you complete the first two courses in this specialization: Introduction to Scrum Master Training and Scrum Methodology. This is the third course in the Certified Scrum Master specialization: Scaling Agile and the Team-of-Teams.

Scrum Master Certification: Scrum Methodologies (Coursera)

https://www.coursera.org/learn/csm-practice-process-management

This course is designed to help Scrum beginners learn the foundational knowledge to become proficient with Agile Scrum. Throughout the course, learners will explore User Stories and how they are prioritized in Agile, Velocity, Backlog Refinement, and Market Actions. Learners will also learn about different Scrum Reports and methods of managing risks.

Search and Display Advertising (Coursera)

https://www.coursera.org/learn/search-and-display-advertising

Consumers search for virtually everything. This includes the things that small businesses do, from restaurants to bespoke products. When consumers search they get organic results along with paid results. Paid search ads are systematically designed to be relevant. As a result, they’re often useful at getting consumers where they want to go. Consumers don’t tune out paid search like other types of digital ads. Search ads can be a small business opportunity. While larger advertisers pay massive a

Searching for the Grand Paris (Coursera)

https://www.coursera.org/learn/grand-paris-metropolis

What is the reasoning for the Grand Paris? What does the transformation of the relationship between Paris and its suburbs imply? “Searching for the Grand Paris” is an original MOOC featuring accounts from residents, association representatives, experts, and researchers. It also contains archival footage and documents, as well as a comparative analysis of Brussels, London, and other French cities. The MOOC combines historical and comparative approaches with a discussion of controversial topics. I

Secure Access with Azure Active Directory (Coursera)

https://www.coursera.org/learn/secure-access-with-azure-active-directory

Microsoft Azure provides a comprehensive suite of security tools and services to help you safeguard your organization's data and applications. Secure access with Azure Active Directory is the right course if you are interested in an IT security career and becoming an Azure security engineer. In this course, you will learn about Azure Active Directory (Azure AD) and the various roles in Azure AD. You will learn to create and manage users and groups in Azure AD and manage administrative units.

Secure Full Stack MEAN Developer (Coursera)

https://www.coursera.org/learn/secure-full-stack-mean-developer

MEAN stack development is a modern approach to building dynamic web applications. It is an open-source JavaScript framework that harnesses four major technologies: MongoDB, Express, Angular, and Node.js. Given the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development. The course will begin with teaching you how to build your own application with plain JavaScript and the fundamentals of web development (HTML, CSS, a

Secure Networked System with Firewall and IDS (Coursera)

https://www.coursera.org/learn/secure-networked-system-with-firewall-ids

In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort.

Securing and Integrating Components of your Application (Coursera)

https://www.coursera.org/learn/securing-integrating-components-app

In this course, application developers learn how to design and develop cloud-native applications that seamlessly integrate managed services from Google Cloud. Through a combination of presentations, demos, and hands-on labs, participants learn how to develop more secure applications, implement federated identity management, and integrate application components by using messaging, event-driven processing, and API gateways. Completing one version of each lab is required. Each lab is available in

Securing and Integrating Components of your Application 日本語版 (Coursera)

https://www.coursera.org/learn/securing-integrating-components-app-jp

このコースでは、アプリケーション デベロッパー向けに、Google Cloud のマネージド サービスをシームレスに統合するクラウドネイティブ アプリケーションを設計、開発する方法を説明します。講義、デモ、ハンズオンラボを通して、メッセージング、イベント駆動型処理、API ゲートウェイを使ったセキュリティ性の高いアプリケーションの設計、フェデレーション ID 管理の実装、アプリケーション コンポーネントの統合方法を学習します。 各ラボのいずれかのバージョンを完了する必要があります。各ラボは Node.js で利用できるほか、ほとんどの場合、Python または Java でも提供されます。お好みの言語でラボを完了できます。 本コースは、「Developing Applications with Google Cloud」シリーズの 2 つ目のコースですこのコースを修了したら、「App Deployment, Debugging, and Performance」コースに登録してください。

Securing Digital Democracy (Coursera)

https://www.coursera.org/learn/digital-democracy

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more.

Securing Investment Returns in the Long Run (Coursera)

https://www.coursera.org/learn/investment-returns-long-run

In this course, you will learn about the famous dichotomy between active and passive investing, how to appropriately measure and analyze investment performance and what the future trends in the investment management industry are. You will first learn about absolute and relative performance, risk-adjusted returns and how to decompose investment performance. The focus will then shift to the two main categories of investment vehicles, active and passive funds, and what they entail in terms of expe

Securing Linux Systems (Coursera)

https://www.coursera.org/learn/securing-linux-systems

In this course, we look at security and the Linux operating system. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate (LFCA) exam or just interested in learning more about Linux. This course is the third course in a series that aims to prepare you for working as an information technology professional. In this course, you will be introduced to ownership, authentication, and authorization. We will drill into creating security through backups and re

Securing Software, Data and End Points (Coursera)

https://www.coursera.org/learn/sscp-4th-ed-course-4

Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's

Sécurité des TI : Défense contre les pratiques sombres du numérique (Coursera)

https://www.coursera.org/learn/securite-des-ti-defense-contre-les-pratiques-sombres-du-numerique

Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sécurité informatique. Il présente les menaces et les attaques et les nombreuses façons dont elles peuvent se manifester. Nous allons vous présenter les algorithmes de cryptage et la manière dont ils sont utilisés pour protéger les données. Ensuite, nous nous plongerons dans les trois A de la sécurité de l’information : authentification, autorisation et comptabilité. Nous aborderons également les so

Sécurité informatique et dangers du numérique (Coursera)

https://www.coursera.org/learn/securite-informatique-defense-contre-les-pratiques-sombres-du-numerique

Ce cours couvre une grande variété de concepts, d’outils et de meilleures pratiques en matière de sécurité informatique. Il présente les menaces et les attaques et les nombreuses façons dont elles peuvent se manifester. Nous allons vous présenter les algorithmes de cryptage et la manière dont ils sont utilisés pour protéger les données. Ensuite, nous nous plongerons dans les trois A de la sécurité de l’information : authentification, autorisation et comptabilité. Nous aborderons également les so

Security & Safety Challenges in a Globalized World (Coursera)

https://www.coursera.org/learn/security-safety-globalized-world

Security and safety challenges rank among the most pressing issues of modern times. Challenges such as, cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. These issues also rank high on the agenda of politicians, international organizations and businesses. They also feature prominently in the public conscience and in governmental policies. In the current, interconnected world, security challenges are becoming increasingly complex. Facilitated by

Security and Privacy for Big Data - Part 1 (Coursera)

https://www.coursera.org/learn/security-privacy-big-data

Welcome to our comprehensive course focused on security within Big Data environments. This course aims to provide you with a deep understanding of cryptographic principles and equip you with the tools necessary to manage access controls effectively within any Big Data system. By the course's conclusion, you'll possess the skills required to navigate and plan Big Data projects with a full awareness of related security issues. You'll learn to approach significant Big Data projects with an experti

Security and Privacy for Big Data - Part 2 (Coursera)

https://www.coursera.org/learn/security-privacy-big-data-protection

Welcome to our focused course on Privacy and Data Protection in Big Data Environments. Here, you will delve into not only privacy-preserving methodologies but also explore crucial data protection regulations and concepts. By the end of this course, you'll be empowered to navigate your next Big Data project with confidence, assuring all aspects of privacy and data protection are well-managed. This course will sharpen your ability to identify potential vulnerabilities in Big Data projects, provid

Security and Privacy in TOR Network (Coursera)

https://www.coursera.org/learn/security-and-privacy-in-tor-network

In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS inst

Security Awareness Training (Coursera)

https://www.coursera.org/learn/security-awareness-training

The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organizations to be ab

Security Best Practices in Google Cloud (Coursera)

https://www.coursera.org/learn/security-best-practices-in-google-cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Security Governance & Compliance (Coursera)

https://www.coursera.org/learn/security-governance-compliance

Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance.

Security Operations (Coursera)

https://www.coursera.org/learn/security-operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to:  E

Security Operations and Administration (Coursera)

https://www.coursera.org/learn/security-operations-administration-sscp

Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.

Security Operations Center (SOC) (Coursera)

https://www.coursera.org/learn/security-operations-center-soc

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you acquire the fundamental skills required in a security operations center. You will learn the primary functions of a security operations center (SOC) and the critical role it plays in protecting organizational assets from cyber-attacks. By the end of the course, you will be able to: • Gain an understanding of SOC team member’s daily activities and responsibilities. • Identif

Security Principles (Coursera)

https://www.coursera.org/learn/-security-principles

Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to:  Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulati

Seeing Through Photographs (Coursera)

https://www.coursera.org/learn/photography

Taking, sharing, and viewing photographs has become second nature for many of us. Given our near-constant engagement with images this course will help you dig into the meaning of pictures and reconsider photography’s role in our visual culture. This course aims to address the gap between seeing and truly understanding photographs by introducing a diversity of ideas, approaches, and technologies that inform their making. In this course you will look closely at 100 photographs from the collectio

Seguimiento de casos y contactos COVID-19 (Coursera)

https://www.coursera.org/learn/seguimiento-de-casos-y-contactos-covid-19

La pandemia COVID19 ha desafiado a los sistemas políticos y sanitarios en el mundo. Dentro de la estrategia sanitaria, un pilar fundamental para controlar la infección es generar la trazabilidad y el seguimiento de casos y contactos. Lamentablemente, hasta la fecha nuestro sistema sanitario se va visto superado en estas acciones, lo que ha contribuido al aumento de casos nuevos. Este curso, pretende contribuir a esta problemática, entregando herramientas para generar trazabilidad y el seguimient

Segurança de TI: defesa contra as artes negras digitais (Coursera)

https://www.coursera.org/learn/it-security-pt

Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para salvaguardar dados. Em seguida, vamos analisar detalhadamente os três aspetos mais importantes da segurança das informações: autenticação, autorização e contabilidade. Também vamos aborda

Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital (Coursera)

https://www.coursera.org/learn/seguranca-de-it

Este curso aborda uma série de conceitos, ferramentas e práticas recomendadas de segurança de TI. Nele, temos uma introdução às ameaças e ataques e suas muitas formas de se manifestar. Daremos a você uma base de conhecimento sobre algoritmos de criptografia e como eles são usados para proteger dados. Depois, vamos estudar a fundo os três tipos de segurança da informação: autenticação, autorização e registro. Além disso, vamos abordar soluções de segurança de rede, de firewalls a opções de cripto

Seguridad en la red (Coursera)

https://www.coursera.org/learn/seguridad-en-la-red

Las organizaciones cada vez tienen procesos más complejos, los cuales son soportados en su mayoría a través de las tecnologías de la información y las comunicaciones (TIC). Debido a la alta dependencia de las TIC, cada vez se presentan más ataques informáticos poniendo en riesgo a las organizaciones. Por estas razones cada vez es más necesario que las personas desarrollen habilidades y conocimientos en seguridad de la información. En este curso justamente analizaremos el diseño de una arquitectu

Seguridad hídrica (Coursera)

https://www.coursera.org/learn/seguridad-hidrica

Habitamos en un contexto caracterizado por múltiples y complejos desafíos. La falta de servicios de agua potable y saneamiento, la degradación de los ecosistemas, el uso intensivo de agua para la producción de bienes y servicios, y la exacerbación de los efectos del cambio ambiental global imponen grandes retos para el ejercicio de todos los derechos humanos de todas las personas, así como para la sustentabilidad de los ecosistemas. Ante este escenario, la comunidad internacional ha decidido es

Seguridad informática: defensa contra las artes oscuras digitales (Coursera)

https://www.coursera.org/learn/seguridad-informatica

Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los tres sistemas de seguridad de la información: autenticación, autorización y contabilidad. También cubriremos soluciones de seguridad de red, que van desde Firewalls hasta opciones de enc

Seismology to Earthquake Engineering (Coursera)

https://www.coursera.org/learn/seismology-to-earthquakes

This course ranges from the earth structure, the generation of earthquakes and seismic waves by faults to the seismic response of soils, foundations and structures as well as seismic risk. It is consequently aimed at undergraduates, graduates and professionals interested in engineering seismology, earthquake engineering or seismic risk. It investigates various technical fields: rock mechanics, soil dynamics, structural dynamics and dynamic soil-structure interaction. Various types of sessions ar

SEL Capstone (Coursera)

https://www.coursera.org/learn/sel-capstone

In this course the instructors (Randy Testa, Ben Kirshner, Emily Price, and Dan Liston) have designed two culminating projects for the Coursera Specialization entitled – “The Teacher and SEL”. The two options include: “A Teacher Implementation Plan”, and “The Cinema, SEL, and the Classroom”. This course is a part of the 5-course Specialization “The Teacher and Social Emotional Learning (SEL)”. Interested in earning 3 university credits from the University of Colorado-Boulder for this specializ

SEL for Students: A Path to Social Emotional Well-Being (Coursera)

https://www.coursera.org/learn/sel-for-students

Social and emotional learning, or SEL, programs have flourished in schools during the last decade. In this course the instructor (Emily Price) introduces you to the history and framings of social and emotional learning preK-12 curricula, as well as various elementary, middle, and high school SEL programs and associated research. This course is a part of the 5-course Specialization “The Teacher and Social Emotional Learning (SEL)”. Interested in earning 3 university credits from the University o

Selenium WebDriver with Python (Coursera)

https://www.coursera.org/learn/selenium-webdriver-python

“Selenium WebDriver with Python” is a foundational course that aims to provide a comprehensive understanding of Selenium and its components. It also helps in understanding how Selenium WebDriver Operates. This course begins by demonstrating an environment setup for Selenium WebDriver with Python. A brief description of locating Web elements and web Interactions is provided in this course. This course covers an overview of testing frameworks with Selenium WebDriver. Some advanced topics such as H

Self Awareness and the Effective Leader (Coursera)

https://www.coursera.org/learn/self-awareness

Part of being an effective leader is learning how to play to your strengths and overcome characteristics that don't lend to good leadership practices. During the course, you will examine your own strengths and learn ways to use them in a leadership role. Learn to manage stress and solve problems creatively. Throughout the course, you will also build a tool kit of useful techniques that you can begin using right away in your engineering career. This course is designed for engineers who are inter

Selling to Chinese Consumers (Coursera)

https://www.coursera.org/learn/selling-to-chinese-consumers

This course is designed to help learners sell their products, goods and services to Chinese consumers. To achieve this goal, the course will use evidence-based research in psychology, economics, legal studies and marketing to help learners understand the historical, economic and legal contexts of doing business in China and the behavioral characteristics of Chinese consumers. The course will cover topics in Chinese and global marketing, Chinese consumers, institutional and cultural influence on

Seluk Beluk Jaringan Komputer (Coursera)

https://www.coursera.org/learn/seluk-beluk-jaringan-komputer

Materi ini dirancang untuk memberikan gambaran lengkap tentang jaringan komputer. Kami akan membahas semua mulai dari dasar-dasar teknologi dan protokol jaringan modern kemudian gambaran umum cloud hingga aplikasi praktis dan pemecahan masalah jaringan. Pada akhir materi ini, Anda akan dapat: ● menggambarkan jaringan komputer dalam bentuk model lima lapis ● memahami semua protokol standar yang terlibat dengan komunikasi TCP/IP ● menguasai alat dan teknik pemecahan masalah yang tepat ● mempelaj

Semiconductor Packaging Manufacturing (Coursera)

https://www.coursera.org/learn/manufacturing

This course will provide information on the various stages of semiconductor package manufacturing, including sort, assembly, and final test. In addition, we will also describe how to select, build, and test the packages with the die and other components to ensure the quality of the package and total assembly performance. We will also discuss the role of Process Control Systems in semiconductor manufacturing as they relate to quality testing. Specifically, we will explore how Process Control Syst

Semiconductor Physics (Coursera)

https://www.coursera.org/learn/semiconductor-physics

This course can also be taken for academic credit as ECEA 5630, part of CU Boulder’s Master of Science in Electrical Engineering degree. This course introduces basic concepts of quantum theory of solids and presents the theory describing the carrier behaviors in semiconductors. The course balances fundamental physics with application to semiconductors and other electronic devices. At the end of this course learners will be able to: 1. Understand the energy band structures and their significan

Sensor Manufacturing and Process Control (Coursera)

https://www.coursera.org/learn/sensor-manufacturing-process-control

"Sensor Manufacturing and Process Control" can also be taken for academic credit as ECEA 5343, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is our fourth course in our specialization on Embedding Sensor and Motors. To get the most out of this course, you should first take our first course entitled "Sensors and Sensor Circuits", our second course entitled "Motor and Motor Control Circuits", and our third course entitled "Pressure, Force, Motion, and Humidity Sens

Sensors and Sensor Circuit Design (Coursera)

https://www.coursera.org/learn/sensors-circuit-interface

This course can also be taken for academic credit as ECEA 5340, part of CU Boulder’s Master of Science in Electrical Engineering degree. After taking this course, you will be able to: ● Understand how to specify the proper thermal, flow, or rotary sensor for taking real-time process data. ● Implement thermal sensors into an embedded system in both hardware and software. ● Add the sensor and sensor interface into a microprocessor based development kit. ● Create hardware and firmware to process

Sequence Models (Coursera)

https://www.coursera.org/learn/nlp-sequence-models

In the fifth course of the Deep Learning Specialization, you will become familiar with sequence models and their exciting applications such as speech recognition, music synthesis, chatbots, machine translation, natural language processing (NLP), and more. By the end, you will be able to build and train Recurrent Neural Networks (RNNs) and commonly-used variants such as GRUs and LSTMs; apply RNNs to Character-level Language Modeling; gain experience with natural language processing and Word Emb