Search result for Certificate in optical design and engineering Online Courses & Certifications
Get Course Alerts by Email
Data Science : Complete Alteryx Bootcamp (Hands-on Alteryx)
by Ankit Mistry- 4.6
6 hours on-demand video
Alteryx is process automation and data science workflow design tool without need to worry about any coding part. Just drag and drop and get your job done. Rather than focusing upon software engineering part of data science, concentrate on how to analyze data, trying to find some intelligent information from your data, and build some predictive analytics tool....
$12.99
CRISPR/Cas9 Crash Course for Beginners
by Muhammad Naeem- 4.3
2.5 hours on-demand video
Certificate of Completion( To add in CV or Linkedin profile). If you are an absolute beginner in the genome-editing field. If you know a little about CRISPR/Cas9 and want to get the best results in your CRISPR/Cas9 lab experiment. Thanks again for checking out my course and I look forward to seeing you in the classroom :)...
$15.99
Electronic Interfaces: Bridging the Physical and Digital Worlds
by Michel M. Maharbiz , Tom Zajdel- 0.0
8 Weeks
Learn by doing: analyze, design, and build electronic interfaces between sensors and a microcontroller to build a robot or your own creation in this hands-on lab course. EE40LX teaches the fundamentals of engineering electronic interfaces between the physical world and digital devices. There will also be individual circuit analysis and design exercises to reinforce the theories presented in the course....
$50
Learning Path: Python:Data Visualization with Matplotlib 2.x
by Packt Publishing- 3.8
10.5 hours on-demand video
Perform data visualization and represent data in the right way with Matplotlib 2. Customize and represent data in 3D Create data visualizations on 2D and 3D charts in the form of bar charts, bubble charts, heat maps, histograms, scatter plots, stacked area charts, swarm plots, and much more You'll also explore images and contours in depth....
$9.99
数据结构与算法第一部分 | Data Structures and Algorithms Part 1
by 张铭 Ming Zhang- 0.0
4 Weeks
These are the questions that will be answered in “Data Structures and Algorithms,” an important core course in Computer Science. After studying this course, students will be well prepared for further study and research in engineering and other computer-related areas. Programming assignments are automatically assessed by POJ which accepts code written in C/C++ and JAVA....
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
Learn how hackers hack Windows, Linux & Android by using Social Engineering and protect yourself from phishing attacks With the CEH credential, you can design and govern the minimum standards necessary for credentialing information that security professionals need to engage in ethical hacking. In this course, I will cover all aspects of social engineering with different techniques and tools....
$17.99
数据结构与算法第二部分 | Data Structures and Algorithms Part 2
by 张铭 Ming Zhang- 0.0
4 Weeks
These are the questions that will be answered in “Data Structures and Algorithms,” an important core course in Computer Science. After studying this course, students will be well prepared for further study and research in engineering and other computer-related areas. In session 1, we learnt Linear Lists, Stacks, Queues, Strings, Binary Trees, Trees and Graphs, which are fundamental data structures....
Related searches
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
Terms and Standards Intercepting HTTP & HTTPS Traffics with Burp SuiteAn Automated Tool: Zed Attack Proxy (ZAP) in DetailsInformation Gathering and Configuration FlawsInput & Output ManipulationCross Site Scripting (XSS)Reflected XSS, Stored XSS and DOM-Based XSSBeEF - The Browser Exploitation FrameworkSQL InjectionAuthentication FlawsOnline Password CrackingAuthorisation FlawsPath Traversal AttackSession ManagementSession Fixation AttackCross-Site Request Forgery (CSRF)Social Engineering & Phishing Attacks...
$21.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
In public key cryptography, the CA creates private and public keys using the same algorithm, but it functions asymmetrically Learn the steps to create and manage a public key infrastructure, and the relationship between public key infrastructures and certificate authority, as well as both traditional cryptography and public key cryptography, the implementation of certificates, and managing certificates....
$199.99
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
Having limited networking experience and absolutely no experience with hacking or ethical hacking, I've learned, practiced, and understood how to perform hacks in just a few days. With the CEH credential, you can design and govern the minimum standards necessary for credentialing information that security professionals need to engage in ethical hacking....
$23.99