Search result for Cmu operating systems course Online Courses & Certifications
Get Course Alerts by Email
Rapid Prototyping of Embedded Interface Designs
by Bruce Montgomery, PhD, PMP- 0.0
Approx. 10 hours to complete
This course is focused on rapid prototyping of devices and systems and the related methods, practices, and principles that will help ensure your embedded interface designs are what your users both need and want. Introduction to Course Projects Alternative Prototype Operating Systems Course Wrap-Up...
Modeling and Control of Single-Phase Rectifiers and Inverters
by Dr. Dragan Maksimovic- 0.0
Approx. 14 hours to complete
This course can also be taken for academic credit as ECEA 5709, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is Course #5 in the Modeling and Control of Power Electronics Specialization. ● Understand the operating principles of low-harmonic, high power factor rectifier and inverters Power and Harmonics in Non-sinusoidal Systems...
Securing Windows Server 2016
by Kevin Brown- 4.6
5.5 hours on-demand video
This course is designed to teach students that are knowledgeable about Windows Server how to secure Windows Server 2016 by providing practical exercises that demonstrate configurations that you can follow along with. In this course you will learn: Deploy Server Core operating systems Manage Windows Defender on the Server operating system...
$17.99
Learn Social Engineering & Open-source Intelligence (OSINT)
by Gabriel Avramescu- 4.4
4.5 hours on-demand video
Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. That's it what about this course is all about. This course covers both theoretical and practical aspects and contains hands-on labs. Disclaimer: this course is intended for ethical hackers and those who want to protect against this kind of attacks....
$12.99
Ethical Hacking - The Most Advanced Level NMAP Course
by Vishal Patel- 0.0
2.5 hours on-demand video
Complete network security course, Learn network penetration testing using nmap, Advanced level NMAP course In this course you will learn about network penetration testing using NMAP. In this course i am using kali linux as platform to demonstrate all the lectures. One of the most important feature that Nmap has ability to detect remote operating systems and software....
$12.99
Embedded Systems Essentials with Arm: Get Practical with Hardware
by Tim Wilmshurst , Mark Allen- 0.0
10 Weeks
Connected home appliances, biomedical devices, autonomous vehicles and IoT applications all rely on real-time operating systems (RTOS) to manage multiple digital and analog inputs, and efficient communication protocols to handle the transfer of data between peripherals and a microcontroller. This is the 2nd course in our Embedded Systems Essentials Program....
$99
Robot Framework Test Automation - Saucelabs Integration
by Bryan Lamb- 4.2
1 hour on-demand video
Instead of building & maintaining your own computers to host your Robot Framework test automation, a few simple changes to your scripts will allow you to easily run your Robot Framework Selenium tests in parallel on several dozen configurations including many versions of Windows, MacOS, and Linux operating systems and their most popular web browsers....
$12.99
Related searches
Fundamentals of Red Hat Enterprise Linux
by Chris Caillouet- 0.0
8 Weeks
This course will provide you with a basic introduction to Linux® skills using Red Hat® Enterprise Linux. Linux systems are used everywhere—the internet, point-of-sale systems, and the world's stock markets. If you're working with mobile applications or the Internet of Things, it is also likely that the operating system of your device is based on Linux....
$99
Fundamentals of Red Hat Enterprise Linux
by Chris CaillouetTop Instructor- 4.8
Approx. 21 hours to complete
This course will provide you with a basic introduction to Linux® skills using Red Hat® Enterprise Linux 8. Linux systems are used everywhere—the internet, point-of-sale systems, and the world's stock markets. Course Introduction Course Basics Managing File Systems Permissions from the Command Line Managing File Systems Permissions from the Command Line...
Information Security - Authentication and Access Control
by Aspen Olmsted- 0.0
6 Weeks
This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. This is a self-paced course that provides a continuation of information security and cybersecurity topics. We then drill into the implementation details of access control in several other operating systems. Describe the Purpose of an Operating System (OS)...
$166