Search result for Computer engineering Online Courses & Certifications
Get Course Alerts by Email
Fundamentals of Machine Learning in Finance
by Igor Halperin- 3.8
Approx. 18 hours to complete
Current full-time students pursuing a degree in Finance, Statistics, Computer Science, Mathematics, Physics, Engineering or other related disciplines who want to learn about practical applications of ML in Finance...
Data Processing Using Python
by ZHANG Li- 4.2
Approx. 29 hours to complete
Also, it discusses the fast, convenient and efficient data processing capacity of Python in humanities and social sciences fields like literature, sociology and journalism and science and engineering fields like mathematics and biology, in addition to business fields. 4 Aplications of Python into Science and Engineering Fields...
Input Filter Design
by Dr. Dragan Maksimovic- 0.0
Approx. 11 hours to complete
This course can also be taken for academic credit as ECEA 5707, part of CU Boulder’s Master of Science in Electrical Engineering degree....
Modeling and Control of Single-Phase Rectifiers and Inverters
by Dr. Dragan Maksimovic- 0.0
Approx. 14 hours to complete
This course can also be taken for academic credit as ECEA 5709, part of CU Boulder’s Master of Science in Electrical Engineering degree....
IBM Data Analyst Professional Certificate
- 0.0
All you need to get started is basic computer literacy, high school math, comfort working with numbers, willingness to learn, and a desire to enrich your profile with valuable skills....
Ethical Hacking & Bug Hunting: Buffer Overflow For Beginners
by Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing)- 0.0
1.5 hours on-demand video
Get a shell! (Reverse engineering and Exploit development). This course cuts down the technical subjects of computer memory management, controlling code, and data inside of a working program, and exploiting poor quality software into terms that IT people with no software development knowledge can understand....
$16.99
Ethical Hacking with Metasploit: Exploit & Post Exploit
by Muharrem AYDIN- 4.5
5 hours on-demand video
Then you will learn how to scan vulnerabilities with Nessus and gain full access to computer systems via discovering the weaknesses and vulnerabilities. Gain control over computer systems using server side attacks Social Engineering Toolkit (SET) for Phishing...
$20.99
Related searches
Python Programming For Network Engineers
by Andrew Schlegel- 4.1
11 hours on-demand video
I show you here, nothing is better than this anywhere period! I have 20 years engineering experience, I teach network engineering and programming at University level now for a living, I can teach you to be a star. Don't waste your time with some computer software guru babbling about weird stuff....
$14.99
Artificial Intelligence Projects with Python-HandsOn: 2-in-1
by Packt Publishing- 3.6
4 hours on-demand video
Artificial Intelligence is one of the hottest fields in computer science right now and has taken the world by storm as a major field of research and development. ● Joshua Eckroth is an Assistant Professor of Computer Science at Stetson University, where he teaches Big Data Mining and Analytics, artificial intelligence (AI), and Software Engineering....
$9.99
Cyber Threats and Attack Vectors
by Greg Williams- 4.7
Approx. 12 hours to complete
This course is the second course in the Practical Computer Security. THREATS AND ATTACK VECTORS IN COMPUTER SECURITY Social Engineering...