Search result for Network analysis Online Courses & Certifications
Get Course Alerts by Email
Software Defined Networking
by Umakishore Ramchandran- 0.0
Approx. 6 hours to complete
It covers the history behind SDN, description of networks in data-centers, a concrete data-center network architecture (Microsoft VL2), and traffic engineering. Introduction to Network Virtualization Network Fabric (Nisheeth Srivastava) Data Network Design Considerations Cloud Network Traffic Engineering Data Center Network Example Network Debugger Header Space Analysis and Netplumer Network Traffic Characteristics...
The Complete Python Hacking Course: Beginner to Advanced!
by Joseph Delgadillo- 4.2
17.5 hours on-demand video
Learn ethical hacking, penetration testing and network security while working on Python coding projects! Network analysis Network Security Network Analysis...
$19.99
Intro to Algorithms
by Michael Littman- 0.0
Timeline Approx. 4 Months
This class will give you an introduction to the design and analysis of algorithms, enabling you to analyze networks and discover how individuals are connected. lesson 1 A Social Network Magic Trick Become familiar with algorithm analysis. lesson 6 Hardness of Network Problems Explore what it means for a social network problem to be "harder" than other....
Free
Online Advertising & Social Media
by Wendy Moe , Lauren Rhue , Yogesh Joshi- 0.0
4 Weeks
Learn how to develop Online Advertising Ecosystems complete with Social Media/Social Network and Media Big Data analysis for better decision making in all forms of outreach. 3 Online Reviews and Sentiment Analysis 4 Social Media /Social Network Analysis 5 Analysis of Social Media Big Data...
$499
Network Simulation using NS2
by Durgesh P. Kshirsagar- 0.0
3.5 hours on-demand video
Learn Network Simulator 2 (NS-2), TCL, Trust management, performance analysis and automation in easiest way! Network is an essential part of life. Network Simulator (NS2) is a powerful open source network simulation tool....
$12.99
Graph Search, Shortest Paths, and Data Structures
by Tim Roughgarden- 4.8
Approx. 15 hours to complete
The primary topics in this part of the specialization are: data structures (heaps, balanced search trees, hash tables, bloom filters), graph primitives (applications of breadth-first and depth-first search, connectivity, shortest paths), and their applications (ranging from deduplication to social network analysis). Universal Hashing: Analysis of Chaining [Advanced - Optional] Bloom Filters: Heuristic Analysis...
Python and Machine Learning for Asset Management
by John Mulvey - Princeton University , Lionel Martellini, PhD- 3
Approx. 17 hours to complete
Using factor models in portfolio construction and analysis Principle component analysis Graphical analysis Lab session: Graphical Network Analysis Lab session: Graphical Network Analysis Machine learning techniques for regime analysis...
200-201: Cisco Certified CyberOps Associate : Tests 2020
by Mehul Patel- 0.0
This exam test your skill about security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents and monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Host-based analysis Network intrusion analysis...
$12.99
Natural Language Processing with Sequence Models
by Younes Bensouda Mourri , Łukasz Kaiser , Eddy Shyu- 4.5
Approx. 22 hours to complete
a) Train a neural network with GLoVe word embeddings to perform sentiment analysis of tweets, Neural Networks for Sentiment Analysis Neural Networks for Sentiment Analysis Neural Networks for Sentiment Analysis Siamese Network Create word embeddings, then train a neural network on them to perform sentiment analysis of tweets...
Most Advanced Level Ethical Hacking Using Kali Linux
by ITNuggets Institute- 0.0
8 hours on-demand video
Computer Network Penetration Testing Course ,Learn Ethical Hacking Course,Kali Linux Tutorials ,Learn Kali Linux This course covers complete network offensive topics but in safe manner. Penetration tester take permission first before performing any network offensive attack over the system. Penetration tester perform network offensive attack over the systems to gather weakness of it....
$16.99