Search result for How to use gimp Online Courses & Certifications
Get Course Alerts by Email
FPGA Softcore Processors and IP Acquisition
by Timothy Scherr- 4.1
Approx. 10 hours to complete
You will learn the extent of Soft Processor types and capabilities, how to make your own Soft Processor in and FPGA, including how to design the hardware and the software for a Soft Processor. Once complete you will know how to create and use Soft Processors and IP, a very useful skill....
Business Metrics for Data-Driven Companies
by Daniel Egger , Jana Schaich Borg- 4.6
Approx. 8 hours to complete
In this course, you will learn best practices for how to use data analytics to make any company more competitive and more profitable. Finally, you will be able to use a checklist provided in the course to score any company on how effectively it is embracing big data culture. Roles and Companies as They Relate to Big Data...
Learn to Teach Java: Sequences, Primitive Types and Using Objects
by Beth Simon- 4.9
Approx. 13 hours to complete
Get started with the basics of Java, and prepare to teach others using the free, online interactive CS Awesome textbook. In this course for teachers we'll guide you both in learning Java concepts and skills but also in how to effectively teach those to your students. Classroom Discussions: What are they & How do I use them in my classroom?...
Google Cloud Fundamentals for Azure Professionals: Core Infrastructure
by Google Cloud Training- 4.6
Approx. 14 hours to complete
This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). How Google Cloud differs from Azure: Regions and Zones Welcome to Google Cloud Fundamentals for Azure Professionals: Core Infrastructure How to download course resources How typical approaches to load-balancing in Google Cloud differ from those in Azure...
Julia Scientific Programming
by Juan H Klopper , Henri Laurie- 4.5
Approx. 18 hours to complete
This four-module course introduces users to Julia as a first language. You will be able to access all the available processors and memory, scrape data from anywhere on the web, and have it always accessible through any device you care to use as long as it has a browser. How to do a Peer Graded Assignment...
Create Professional Book Covers That Sell - For Free
by Ian Stables- 3.2
4.5 hours on-demand video
- I will explain how to use the design tools to get professional results. - I am going to teach you how to create special design effects that make your book stand out. It will also help you understand how to use the tools in practice. This teaches how to create book covers that sell....
$9.99
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. In this course, students will gain an understanding of what data privacy is along with how to identify and understand typical data protection and privatization objectives that an enterprise may have, and how to choose a data protection approach....
Related searches
Battery State-of-Health (SOH) Estimation
by Gregory Plett- 4.8
Approx. 23 hours to complete
In this course, you will learn how to implement different state-of-health estimation methods and to evaluate their relative merits. How to use discussion forums 2: How to find the ordinary-least-squares solution as a benchmark How to write code for the different total-capacity estimators 3: How to estimate states and parameters at the same time...
Japanese for beginners 2
by Maria Malashevskaya , Inga Ibrakhim , Nadia Hassan Issa , Yoshiko Arakawa- 4.5
Approx. 20 hours to complete
Japanese language has become extremely popular among learners in recent years, since it is the best way to explore one of the richest and most mysterious cultures of the modern East. To understand basic vocabulary in speech and use it in everyday communicative situations (shopping, traveling, visiting friends, phone conversations etc)....
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
Welcome to Security Best Practices in Google Cloud How to Send Feedback Connecting to Virtual Machines Using shielded VMs to maintain the integrity of virtual machines How Cloud Security Scanner Works Lab Intro Using Cloud Security Scanner to Find Vulnerabilities in an App Engine Application Introduction to Kubernetes/GKE Apply techniques and best practices to secure Compute Engine...