Search result for Master of science in cyber-physical systems Online Courses & Certifications
Get Course Alerts by Email
Modeling and Debugging Embedded Systems
by David Sluiter- 4.6
Approx. 8 hours to complete
This course can also be taken for academic credit as ECEA 5387, part of CU Boulder’s Master of Science in Electrical Engineering degree. * About SystemC and how it can be used to create models of cyber-physical systems in order to perform "what-if" scenarios * A deeper understanding of embedded systems in the Automotive and Transportation market segment...
Introduction to the Digital Supply Chain (11h)
by Alexandre Oliveira- 4.1
11 hours on-demand video
The 1st online course on DSC in the WORLD! An introductory course with triggers that lead to insights! By the end of this course, you will master the principles of: · The Cyber Physical Systems · Intelligent Transport Systems & Drones NOT for Data Science / IT people; For Logistics & SChain professionals The Cyber Physical Systems...
$39.99
Quantitative Formal Modeling and Worst-Case Performance Analysis
by Dr.ir. Pieter Cuijpers , Anne Remke- 0.0
Approx. 17 hours to complete
This course is part of the university course on Quantitative Evaluation of Embedded Systems (QEES) as given in the Embedded Systems master curriculum of the EIT-Digital university, and of the Dutch 3TU consortium consisting of TU/e (Eindhoven), TUD (Delft) and UT (Twente). Refinement of consumption/production systems Proof that the number of tokens in a single-rate dataflow cycle is constant...
Digitalisation in Space Research
by Klaus Drechsler , Guenter W. Hein- 4.7
Approx. 13 hours to complete
This course provides an overview of the most important digital applications in the field of aerospace research. One unit is specifically devoted to exploring the use of artificial intelligence in the evaluation of satellite data. Global Navigation Satellite Systems (GNSS) for efficient and flexible air navigation You will learn about a range of digital applications used in space research....
Real-World Ethical Hacking: Hands-on Cybersecurity
by Bryson Payne- 4.7
11 hours on-demand video
Quickly master new hands-on skills in Linux, Windows and Android hacking and cybersecurity. Packed with real-world, practical examples, real hacking techniques, and easy-to-follow plain English instruction, Real-World Ethical Hacking is the course for the new generation of cyber heroes, as they build one of the top job skills of the 21st century! With over 1,000,000 cybersecurity jobs posted in the U....
$21.99
Nanotechnology and Nanosensors, Part1
by Prof. Hossam Haick- 4.6
Approx. 12 hours to complete
student at the Faculty of Education in Science and Technology at the Technion, under the supervision of Asst. She received a second master degree in Educatu in Science and Technology from the Technion in 2013. candidate at the Faculty of Education in Science and Technology at the Technion, under the supervision of Asst....
Nanotechnology and Nanosensors, Part 2
by Prof. Hossam Haick- 4.8
Approx. 17 hours to complete
student at the Faculty of Education in Science and Technology at the Technion, under the supervision of Asst. She received a second master degree in Educatu in Science and Technology from the Technion in 2013. candidate at the Faculty of Education in Science and Technology at the Technion, under the supervision of Asst....
Related searches
Neuroplasticity: The Ultimate Brain Rewiring Formula 3.0 ®
by Noah Merriby- 4.6
18.5 hours on-demand video
In This Course, You Will Learn How To Master Your Brain's Plasticity, Take Control Of The Wiring Process Instead Of Falling Victim To The Subliminal Thoughts, Experiences, Emotions and Memories On A Daily Basis. 10) Finally, Learn How To Control, Change Or Eliminate Your Habits, Conscious And Subconscious Behaviors, And Effectively Implement New Habit Systems In Your Daily Life...
$15.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Section 8: Cryptography is the science of writing in secret code and is considered an ancient art. In this section review the vulnerabilities in an IS, types of IDS, types of evasion, techniques used to evade IDS, IDS tools, and how to carry out penetration testing so you can put a prevention plan in place....
$199.99