Search result for How to use figma Online Courses & Certifications
Get Course Alerts by Email
Algebra & Algorithms
by Дмитрий ИльинскийTop Instructor , Alex Dainiak- 0.0
Approx. 30 hours to complete
Firstly, modern computers would be somewhat useless if they were not able to carry out arithmetic and algebraic computations efficiently, so we need to think on dedicated, sometimes rather sophisticated algorithms for these operations. Welcome to the Course Applying Parallel Prefix to improve Adder depth Lower bound on the circuit size: from circuits to trees...
The Blockchain
by Stefano M. Stefan- 4.1
Approx. 9 hours to complete
This course also introduces distributed digital systems in terms of software and network architecture, and shows how these systems underlie the functionality of the blockchain. In this and the following courses in the specialization you'll have a chance for hands-on-practice to cement your learning....
The Importance of Listening
by Randy Hlavac- 4.6
Approx. 9 hours to complete
In this MOOC, guest speakers from Social Gist, BroadReader, Lexalytics, Semantria, Radian6, and IBM's Bluemix and Social Media Analytics Tools (SMA) will join Professor Hlavac to take you through the full range of analytics tools and options available to you and how to get the most from them. Welcome to MOOC 2!...
Cracking the Creativity Code: Discovering Ideas
by Prof. (Emeritus) Shlomo Maital- 4.7
Approx. 12 hours to complete
We show how to re-ignite rusty creative powers. You will practice the method, use it to tackle challenging real-world needs and produce a 2-3 minutes video presenting your idea. How to build your creativity ‘muscles’ How to challenge basic assumptions? How to sell your ideas How to be creative In large organizations (Intrapreneurship)...
Ethical Leadership Through Giving Voice to Values
by Mary Gentile- 4.7
Approx. 11 hours to complete
This course offers an action-oriented introduction to Giving Voice to Values (or GVV), an exciting new approach to values-driven leadership development in the workplace, in business education and in life. What Is Giving Voice to Values? Why and How It Works Welcome to the Course and Week 1 What is Giving Voice to Values (GVV)?...
Business Application of Machine Learning and Artificial Intelligence in Healthcare
by Craig Johnson- 4.1
Approx. 12 hours to complete
But it is not enough to recognize the opportunities of AI; we as leaders in the healthcare industry have to first determine the best use for these applications ensuring that we focus our investment on solving problems that impact the bottom line. Critically assess the opportunities to leverage decision support in adapting to trends in the industry....
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. We will learn how to setup a hidden server to provide web service on AWS instance. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information....
Related searches
Data Processing with Azure
by Samant Bali , Kenny Mobley- 3.6
Approx. 13 hours to complete
This Azure training course is designed to equip students with the knowledge need to process, store and analyze data for making informed business decisions. 5 Use Case: ADF and Spark Exercise 1 - Use Batch Processing with Databricks and Data Factory on Azure How Stream Analytics Relate to Data Solutions Use ETL and ELT to load and transform data...
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
This course gives you the background needed to understand basic Cybersecurity around people. Welcome to People, Process and Operating System Fundamentals for Cybersecurity Introduction to Process Welcome to People, Process and Operating System Fundamentals for Cybersecurity Introduction to the CIA Triad module Introduction to Authentication and Access Control Welcome to operating system fundamentals...
Weight Management: Beyond Balancing Calories
by Sharon Horesh Bergquist, MD- 4.7
Approx. 18 hours to complete
We will see how our food environment has evolved over the last half-century, and how it is altering our biology to over-consume calories and resist sustained weight loss. We will also see how stress, a sedentary lifestyle, and inadequate sleep disrupt our appetite control system to promote gaining weight. How to Consistently Make Healthy Choices...