Search result for Course of study for pharmacist Online Courses & Certifications
Get Course Alerts by Email
Introduction to Cyber Attacks
by Dr. Edward G. Amoroso- 4.7
Approx. 19 hours to complete
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:...
Value Chain Management Capstone
by Joe A. Bradley- 4.6
Approx. 9 hours to complete
The capstone for the Value Chain Management specialization will provide a learning experience that examines how the various segments of a business integrate to create a value chain. For more information, please see the Resource page in this course and onlinemba. Quiz for Case Study Course Overall Summary - Importance of Value Chain Management...
Understanding 9/11: Why 9/11 Happened & How Terrorism Affects Our World Today
by David Schanzer- 4.6
Approx. 13 hours to complete
This course will explore the forces that led to the 9/11 attacks and the policies the United States adopted in response. We will examine the phenomenon of modern terrorism, the development of the al Qai'da ideology, and the process by which individuals radicalize towards violence. Week 1: Course Overview and the 9/11 Attacks...
Sustainable Fashion
by Kirsti Reitan Andersen , Ana Lucia Diaz Schiavon , Esben Rahbek Gjerdrum Pedersen- 4.8
Approx. 5 hours to complete
Hopefully, you can also enlighten us with some local examples in your own countries for us to discover together new ways of dealing with sustainability. By the end of the course, you have an understanding of the overall challenges and potential solutions for businesses to become more sustainable. dx Experience: A Global Expert Study on Sustainable Fashion...
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Cryptography is the practice and study of techniques for securing communications in the presence of third parties. Define the basic requirements for cryptography Describe the process for implementing cryptographic systems Identify processes for key administration and validation Describe the implementation of secure protocols Understand and Apply Fundamental Concepts of Cryptography Cryptography Case Study...
Introduction to Applied Machine Learning
by Anna Koop- 4.7
Approx. 7 hours to complete
This course is for professionals who have heard the buzz around machine learning and want to apply machine learning to data analysis and automation. This is the first course of the Applied Machine Learning Specialization brought to you by Coursera and the Alberta Machine Intelligence Institute. Introduction to Course 1 The Three Kinds of Machine Learning...
Industrial Organization: Strategy and Competition in Business
by Kosmas Marinakis- 4.8
Approx. 26 hours to complete
The basic objective of the course is to enable the student to understand the structure of markets and the nature of strategic competition. Knowledge in this course will be valuable for the students in acquiring managing and governance skills, enriching their understanding of the institutional framework of business, and improve their analytical ability in negotiations. Tour of the course...
Related searches
Innovative Finance: Hacking finance to change the world
by Aunnie Patton Power , Tsakane Ngoepe- 4.7
Approx. 19 hours to complete
Next you must map all of the resources available for your outcome and then discover opportunities to augment these through business model innovation, multi-stakeholder partnerships and innovative financial structures. By the end of the course, you’ll have the ability to hack finance for social change. Watch the course trailer https://www. Course Introduction...
New Technologies for Business Leaders
by Mark Mueller-Eberstein, Dipl. Kfm.- 4.4
Approx. 19 hours to complete
This introductory course is developed for high level business people (and those on their way) who want a broad understanding of new Information Technologies and understand their potential for business functions (e. This is not a course for people looking for guidance on how to become a deep technical expert or implement these technologies....
Communication theory: bridging academia and practice
by Olga Solovyeva , Maria Mordvinova- 4.7
Approx. 20 hours to complete
We also have a final text in the end of the course and a little bit of writing. Although a substantial part of this course is theory-based, communication theory has a very practical application. Applying Theory to Practice: 'Motivations for multi-screening: an exploratory study on motivations and gratifications' Motivations for multi-screening an exploratory study on motivations and gratifications...