Search result for Master of science in cybersecurity Online Courses & Certifications
Get Course Alerts by Email
Data Science Math Skills
by Daniel Egger , Paul Bendich- 4.5
Approx. 13 hours to complete
~The concept of instantaneous rate of change and tangent lines to a curve While this course is intended as a general introduction to the math skills needed for data science, it can be considered a prerequisite for learners interested in the course, "Mastering Data Analysis in Excel," which is part of the Excel to MySQL Data Science Specialization....
Machine Learning and Data Science Essentials with Python & R
by AkaSkills! 35,000+ Students- 4.4
5.5 hours on-demand video
Master Machine Learning with Python, Tensorflow & R. Data Science is the most in-demand and Highest Paying Job of 2018 Meet Machine Learning, the in-demand and Highest Paying job skill of 2018 and beyond. Machine learning is increasingly shaping future of work and jobs. Master Machine Learning using Python and R Matrix Operations in R and Python...
$11.99
Penetration Testing - Post Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor....
$166
Data Visualization and Communication with Tableau
by Daniel Egger , Jana Schaich Borg- 4.7
Approx. 25 hours to complete
One of the skills that characterizes great business data analysts is the ability to communicate practical implications of quantitative analyses to any kind of audience member. In this course you will learn how to become a master at communicating business-relevant implications of data analyses. Salaries of Data-Related Jobs: Your First Graph...
Electric Vehicles and Mobility
by Émeric FORTIN , Virginie BOUTUEIL- 4.5
Approx. 20 hours to complete
Electric Vehicles and Mobility is the result of this shared history and was developed from a course delivered within the Master Mobility and Electric Vehicles, led by Arts et Métiers ParisTech in partnership with Ensta ParisTech, Mines ParisTech and École des Ponts ParisTech. Issues and Present Situation of Charging Infrastructures in France...
Introduction to Predictive Modeling
by De Liu- 5
Approx. 12 hours to complete
Welcome to Introduction to Predictive Modeling, the first course in the University of Minnesota’s Analytics for Decision Making specialization. , exponential smoothing and Holt-Winter’s method) in Excel, evaluate the goodness of fit, and use fitted models to make forecasts. Carlson School of Management: Master of Science Program in Business Analytics (MSBA)...
Teaching Impacts of Technology: Data Collection, Use, and Privacy
by Beth Simon- 4.6
Approx. 13 hours to complete
Impacts (What could my data do for me in the future? In terms of CSTA K-12 computer science standards, we’ll primarily cover learning objectives within the “impacts of computing” concept, while also including some within the “networks and the Internet” concepts and the “data and analysis” concept. This is part of a specialization...
Related searches
Bioinformatics: Introduction and Methods 生物信息学: 导论与方法
by Ge Gao 高歌, Ph.D. , Liping Wei 魏丽萍, Ph.D.- 4.4
Approx. 25 hours to complete
A big welcome to “Bioinformatics: Introduction and Methods” from Peking University! In this MOOC you will become familiar with the concepts and computational methods in the exciting interdisciplinary field of bioinformatics and their applications in biology, the knowledge and skills in bioinformatics you acquired will help you in your future study and research....
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor....
$166
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. This is a self-paced course that provides a continuation of network security topics....
$166