Search result for How to use figma Online Courses & Certifications
Get Course Alerts by Email
Ecosystem Services: a Method for Sustainable Development
by Martin Schlaepfer , Anthony Lehmann , Juliet Jane Fall- 4.7
Approx. 18 hours to complete
Ecosystem services are a way of thinking about – and evaluating – the goods and services provided by nature that contribute to the well-being of humans. • Optional: learn how to map ecosystem services with GIS tools 1 Introduction to module 3 1 Introduction to module 4 1 Introduction to module 5...
Leadership Communication for Maximum Impact: Storytelling
by Tom Collinger , Ernest Duplessis , Hud Englehart , Candy Lee- 4.5
Approx. 4 hours to complete
Effective leaders communicate to inspire talent to excel; to partner with investors and communities; to engage with customers and clients and to grow their impact in the world as part of a global community. Introduction to Module 2 Introduction to Module 3 Critical Audiences: Know who they are and how to reach them ....
Excel Fundamentals for Data Analysis
by Nicky Bull , Dr Prashan S. M. Karunaratne- 4.8
Approx. 15 hours to complete
Welcome to Excel Fundamentals for Data Analysis Use Excel tools and functions to clean and prepare data for analysis. Use Named Ranges and Tables to automate your analysis. Understand the different types of data in Excel and use appropriate functions to work with them. Use logical and lookup functions to transform, link and categorise data....
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. How organizations are governed How organizations structure the security function How organizations make strategic plans for security Methods used to implement risk management...
Start the UX Design Process: Empathize, Define, and Ideate
by Google Career CertificatesTop Instructor- 4.8
Approx. 31 hours to complete
You will learn how to empathize with users and understand their pain points, define user needs using problem statements, and come up with lots of ideas for solutions to those user problems. Use insights from competitive audits to ideate Use How Might We to ideate Use Crazy Eights to ideate How to present a competitive audit...
Application of AI, InsurTech, and Real Estate Technology
by Christopher Geczy- 4.6
Approx. 4 hours to complete
Professor Chris Geczy of the Wharton School has designed this course to help you navigate the complex world of insurance and real estate tech, and understand how FinTech plays a role in the future of the industry. Through study and analysis of Artificial Intelligence and Machine Learning, you’ll learn how InsurTech is redefining the insurance industry....
RPA Lifecycle: Deployment and Maintenance
by Automation Anywhere, Inc.- 4.6
Approx. 6 hours to complete
Next, you need to deploy the bots and set them up for routine monitoring. As you begin this course, you will be introduced to the user interface of the Web Control Room. Introduction to the Course...
Related searches
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
The impact of technology and networks on our lives, culture, and society continues to increase. To function in an information-centric world, we need to understand the workings of network technology. Welcome to Class Bonus: Nii Quaynor - Bringing the Web to Africa History: The Web Makes it Easy to Use History: The Web Makes it Easy to Use...
FPGA computing systems: Background knowledge and introductory materials
by Marco Domenico Santambrogio- 4.6
Approx. 46 hours to complete
We cover the basics of how to decide whether or not to use an FPGA and, if this technology will be proven to be the right choice, how to program it. On how to improve the Reconfigurable computing performance via CAD improvements How to use FPGA Reconfiguration to face area issues...
Computational Thinking for K-12 Educators: Conditional Loops and If Statements
by Beth Simon- 0.0
Approx. 12 hours to complete
Want to make a game that ends when you "catch" an object by clicking on it? Or maybe you get points based on how close you came? Finally, you'll learn how to support interactive learning experiences among your students with Peer Instruction. (Optional) Demo: How to do Non-Interactive Puzzles Why Use Peer Instruction?...