Search result for Master's in control systems engineering Online Courses & Certifications
Get Course Alerts by Email
Learn Hacking Windows 7 Remotely from Scratch
by Vijaykumar Uddhadi- 0.0
3.5 hours on-demand video
Discover Vulnerabilities in Remote Machine and exploit them to gain full control over those machines Hack Secure systems using Social Engineering attacks and client side attacks Capture Keystrokes on a Compromised Systems Learn Writing Scripts that Automate Exploiting Machines with in a Seconds...
$12.99
System Dynamics and Controls
by Cherish Qualls, PhD- 4.5
18.5 hours on-demand video
Mathematical Modeling of Systems and More Equations of motion of mechanical and electrical systems The book I recommend and always use for this course is Control Systems Engineering by Nise. Most definitely! The fundamental knowledge gained in this course will be useful in classes such as Mechanical Vibrations, Feedback Control Systems, and others....
$21.99
Engineering Practices for Building Quality Software
by Kevin Wendt- 4.5
Approx. 18 hours to complete
In this course, you will learn about engineering practices and processes that agile and traditional teams use to make sure the team is prepared for change. In additional, you will also learn about practices, techniques and processes that can help team build high quality software. Quality in Design ISO/IEC/IEEE Systems and software engineering — Architecture description Version Control Systems...
Maintain Android Apps with Jetpack Architecture Components
by Packt Publishing- 4
7.5 hours on-demand video
Are you willing to learn all new Android Jetpack Architecture components and features in order to deliver an extendable, maintainable, and testable codebase? She is one of the trainers in the Google Developers Group at Bhubaneswar, Odisha in India. Yusuf earned his master's degree in Computer Engineering from Ryerson University in 2011 and started his career as a ....
$12.99
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting. social engineering...
$17.99
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Describe processes for operating and maintaining monitoring systems Describe the various source systems Describe the supporting role in forensics investigation processes Incident Handling: Anti-Malware Systems Incident Handling: Anti-Malware Systems...
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor. In this class, students learn the third phase of penetration testing; exploitation....
$166
Related searches
Car Repair - Auto Repair & Tuning - Auto Technician Training
by TechBinz Academy- 3.9
7 hours on-demand video
Why Every Car Technician Should Know Electricity in Cars ? In the past it was possible for technicians to work their entire careers and be able to almost completely avoid the vehicle’s electrical systems. They would specialize in engines, steering/suspension, or brakes. Even electrical systems that were once thought of as being simple have evolved to computer controls....
$12.99
Learn to implement lean principles everywhere
by Business Excellence framework Build your success story- 4.8
1.5 hours on-demand video
This Lectures is intended for use in a course that traditionally has been titled, "Production Control," "Operations Management," "Manufacturing Systems," or "Production Management," and it is intended to provide a comprehensive view of issues related to this area, with a specific focus on lean engineering principles....
$11.99
Learn Ethical Hacking From Scratch
by Ashwin Pk- 0.0
4.5 hours on-demand video
Gaining Access - In this section you will learn two main approaches to gain full control over any computer system: Server Side Attacks: In this approach you will learn how to gain full access to computer systems without the need for user interaction. You will also learn how to exploit these weaknesses to gain full control over the target....
$12.99