Search result for What Online Courses & Certifications
Get Course Alerts by Email
Basic Skills in Constructive Communication
by Olaf Hauer- 4.5
Approx. 8 hours to complete
What is Constructive Communication?...
Writing Winning Resumes and Cover Letters
by Charles Duquette- 4.7
Approx. 13 hours to complete
What You Should Never Put on a Resume...
Engagement & Nurture Marketing Strategies
by Randy Hlavac- 4.8
Approx. 9 hours to complete
You'll see real-world best practice examples and learn what metrics they use to gauge success. What Comes Next?...
Business English: Making Presentations
by Richard Moore- 4.8
Approx. 15 hours to complete
This course teaches you language and techniques that will help you make effective presentations in English. The final task is to develop a well-organized, persuasive presentation using charts and graphs that sells your city as a venue. The course focuses on students who have an intermediate level of English, with a minimum of two years of formal language study....
Sampling People, Networks and Records
by James M Lepkowski- 4.4
Approx. 20 hours to complete
Samples can be haphazard or convenient selections of persons, or records, or networks, or other units, but one questions the quality of such samples, especially what these selection methods mean for drawing good conclusions about a population after data collection and analysis is done. 5 - What Happens When We Randomize?...
Capstone Value Creation through Innovation
by Martin Vendel- 0.0
Approx. 68 hours to complete
You should be able to show knowledge and judgment regarding when and how to utilize what method and approach....
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e....
Related searches
Applied AI with DeepLearning
by Romeo Kienzler , Niketan Pansare , Tom Hanlon , Max Pumperla , Ilja Rasin- 4.4
Approx. 24 hours to complete
Using these approaches, no matter what your skill levels in topics you would like to master, you can change your thinking and change your life. If you’re struggling, you’ll see a structured treasure trove of practical techniques that walk you through what you need to do to get on track. What is SystemML (1/2)...
Big Data - Capstone Project
by Ilkay Altintas , Amarnath Gupta- 4.4
Approx. 21 hours to complete
Welcome to the Capstone Project for Big Data! In this culminating project, you will build a big data ecosystem using tools and methods form the earlier courses in this specialization. You will analyze a data set simulating big data generated from a large number of users who are playing our imaginary game "Catch the Pink Flamingo"....
AWS Fundamentals: Migrating to the Cloud
by Seph Robinson , Sean Rinn- 4.6
Approx. 9 hours to complete
Defining what we mean by Migration What are we hoping to get out of this class?...