Search result for Course of electrical engineering Online Courses & Certifications
Get Course Alerts by Email
Microsoft Excel Hands on Specialization For Data Analytics
by Thinkahead Academy, LLC.- 0.0
8.5 hours on-demand video
It has a battery of supplied functions to answer statistical, engineering and financial needs. Leverage Excel's powerful built-in tools to get the median, maximum, and minimum values of your data At the end of the course, you'll be provided with useful shortcuts and tips, enabling you to do efficient data analysis with Microsoft Excel....
$12.99
Julia Scientific Programming
by Juan H Klopper , Henri Laurie- 4.5
Approx. 18 hours to complete
This four-module course introduces users to Julia as a first language. By the end of the course you will be able to: - Understand the advantages and capacities of Julia as a computing language The course is delivered through video lectures, on-screen demonstrations, quizzes and practical peer-reviewed projects designed to give you an opportunity to work with the packages....
Water and Wastewater Treatment Engineering: Biochemical Technology | 水处理工程:生物化学方法
by Zuo Jiane- 0.0
10 Weeks
Learn the basic principles and characteristics of biochemical technology in water and wastewater treatment engineering. Biochemical technology in water and wastewater treatment engineering is essential in the field of water treatment. In this environmental studies course you will learn the basic principles and characteristics of biochemical technology. Basic principles and characteristics of biochemical technology in water and wastewater treatment...
$49
2021 Beginner's guide to Cyber Security
by George Proorocu- 4.3
1.5 hours on-demand video
Since we've been working in this field for over 15 years, we wanted to share part of what we've learned in all these years with people that are completely new to Cyber Security, or people that would like to understand the 2021 basics in this field. Prerequisites This course is designed for a general audience....
$14.99
Natural Attenuation of Groundwater Contaminants: New Paradigms, Technologies, and Applications
by Pedro Alvarez , Charles Newell , David Adamson- 4.8
Approx. 28 hours to complete
Cleaning up the large number of groundwater contamination sites is a significant and complex environmental challenge. Course Overview and MNA as an Evolving Technology Course Trailer Course Overview Course Navigation History of MNA: Fuels, Solvents, Three Lines of Evidence General Course Information Thermodynamic Feasibility of Biodegradation Types of Isotope Analysis and Sampling Techniques/Lab Analysis...
Ansys Tutorial
by Armin Yousefi Kanani- 4.5
7.5 hours on-demand video
In order to have the best of this course is better to start from basic and learn all the tools from section 1 to 5 then you would be able to create any model in ANSYS ACP. Please send me message if you think anything can improve the quality of this course as I am updating course regularly....
$19.99
计算机辅助翻译原理与实践 Principles and Practice of Computer-Aided Translation
by Jingsong Shawn Yu 俞敬松 , Mr. Alex Han 韩林涛- 4.7
Approx. 35 hours to complete
The course is one of the PKU-DeTao MOOCs, which is a joint effort by Peking University and DeTao Masters Academy. 本周课程导读 Introduction of Lecture 4 (01:30) [il] 第十一周 机器翻译与本地化工程概论(上) Lecture 11: Overview of Machine Translation and Localization Engineering Part A [OM] 第十二周 机器翻译与本地化工程概论(下) Lecture 12: Overview of Machine Translation and Localization Engineering Part B [OT]...
Related searches
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Identify events of interest Risk Management Process: Type of Audits Risk Management Process: Type of Audits Monitoring Results: Potential Uses of Server Log Data...
Unlocking Information Security I: From Cryptography to Buffer Overflows
by Avishai Wool , Dan Gittik- 0.0
5 Weeks
You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering. This course was produced at Tel Aviv University by TAU Online - learning innovation center. An overview of cryptography with an emphasis on symmetric ciphers. A high-level examination of hash functions and an overview of common hash algorithms....
$149
Introduction to numerical analysis
by Evgeni Burovski- 4.7
Approx. 18 hours to complete
These days however, it’s not only traditional «hard sciences»: whether you do digital humanities or biotechnology, whether you design novel materials or build artificial intelligence systems, virtually any quantitative work involves some amount of numerical computing . You will also work on implementing abstract mathematical constructions into working prototypes of numerical code....