Unnamed: 0
int64 0
6.64k
| title
stringlengths 4
125
| enrolled
stringlengths 5
27
| rating
stringclasses 22
values | num_reviews
float64 1
229k
⌀ | Instructor
stringlengths 2
66
⌀ | Organization
stringclasses 298
values | Skills
stringlengths 2
462
| Description
stringlengths 123
32.8k
⌀ | Modules/Courses
stringclasses 43
values | Level
stringclasses 3
values | Schedule
stringclasses 130
values | URL
stringlengths 33
128
| Satisfaction Rate
stringclasses 29
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
300 | Introduction to Ableton Live | 84,372 | 4.8 | 1,104 | Erin Barra | Berklee | ['MIDI programming', 'File Management', 'Audio Recording', 'Ableton', 'Music Making'] | In the past, Digital Audio Workstations (DAWs) were programs used only by audio engineers with a highly specific knowledge base, on machines inaccessible to most people. But over the past 10-15 years, DAWs and the act of recording music have evolved from being a luxury of the few to being available to the masses. Ableton Live is one such application. Used by an extremely broad range of music creators, Ableton Live not only facilitates the work of engineers, producers, and writers in professional, home, and mobile studio settings, but it is also a powerful platform for musicians on stage, in the DJ booth, and elsewhere. In this Ableton Certified Training Center course developed by Berklee Online, you will explore some of Live’s most powerful and useful functionality: MIDI programming, audio recording, warping and processing, looping editing, mixing, performing, file management, and troubleshooting. Meant to be a springboard for those who are new to Ableton Live and/or DAWs in general, this three-week course will provide you with a strong knowledge base for using Live to take your musical ideas from conception to final recording. The course breaks down the many barriers of entry into music technology and encourages all those who wish, to create fearlessly.
Note: If you do not own Ableton Live 10, you can download the free, fully featured Ableton Live Trial. The trial version will allow you to save and export your work for 30 days. If you use the trial version, do not download it until the course is scheduled to begin. Welcome to the course! Here we will cover all the details about the course and what you'll need to know to get the most out of your experience. 1 video4 readings1 assignment In this lesson, I'm going to demonstrate how to get set up in Live, whether you have an audio interface or just your computer. We'll also look at saving and submitting your sessions, devices, MIDI drums, and MIDI synths. 11 videos2 readings1 assignment1 peer review In this lesson, we'll be moving from MIDI to audio and implementing effects, which will give your sessions even more personality and depth. We'll also be diving into Audio Warping, which is one of Ableton's most powerful functionalities and is the cornerstone of remixing. 7 videos1 reading1 assignment1 peer review In this final lesson, we're going to dive into some more advanced production techniques, the very basics of mixing, and I'll get into some valuable information regarding file management and troubleshooting. Hopefully with this new information you'll be able to tie together a lot of what we've learned in the past two weeks and bring your music to the next level. 11 videos2 readings1 assignment1 peer review | 4 modules | null | 13 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/ableton-live | 97% |
301 | Narrative Economics | 33,648 | 4.8 | 577 | Robert Shiller | Yale University | ['Economics', 'Research Methods', 'History', 'Financial Markets', 'Storytelling'] | Dear Potential Learner, Please take some time to read through this note before deciding to enroll.
This course, Narrative Economics, is relatively short and proposes a simple concept: we need to incorporate the contagion of narratives into our economic theory. You can think of narratives as stories that shape public beliefs, which in turn influence our decision making. Understanding how people arrived at certain decisions in the past can aid our understanding of the economy today and improve our forecasts of the future.
Popular thinking heavily influences our answers to questions such as how much to invest, how much to spend or save, whether to go to college or take a certain job, and many more. Narrative economics is the study of the viral spread of popular narratives that affect economic behavior. I believe incorporating these ideas into our research must be done both to improve our ability to anticipate and prepare for economic events and help us structure economic institutions and policy. Until we better incorporate it into our methods of analysis and forecasting, we remain blind to a very real, very palpable, very important mechanism for economic change. Even in the dawning age of the Internet and artificial intelligence, so long as people remain ultimately in control, human narratives will matter. Maybe they will especially matter as the new technology exploits human weaknesses and creates new venues for narrative contagion. If we do not understand the epidemics of popular narratives, we cannot fully understand changes in the economy and in economic behavior.
The course is broken into 4 modules:
Part I introduces basic concepts and demonstrates how popular stories change over time to affect economic outcomes, including recessions, depressions and inequality as well as effective inspiration and growth.. These stories can be observed from diverse sources such as politics, the media, or even popular songs.
Part II seeks to answer why some stories go viral, while others are quickly forgotten, by defining our narrative theory more firmly. This module enumerates and explores a list of seven propositions to help discipline any analysis of economic narratives.
Part III examines nine perennial narratives that have proved their ability to influence important economic decisions. They include narratives regarding artificial intelligence, stock market bubbles, and job insecurity.
Part IV looks to the future and highlights the opportunities for consilience in Narrative Economics. We share some thoughts about where narratives are taking us at this point in history and what kind of future research could improve our understanding of them.
This course offers only the beginnings of a new idea and a few suggestions for how it could be used by economists and financial professionals. The tone is not prescriptive or authoritative, as perhaps my Coursera course, Financial Markets, is in places. It represents the beginning of the journey (epidemic). This course is my way of floating the “germ” of this idea out into the broader community of not only professionals but of anyone who is interested in discovering how and why things become “important” to us as a society. I hope some of you will become infected by this idea, mutate it, spread it, and advance it. The beginning of the journey is the easy part. The challenge will come in taking these concepts to the next level. We have the tools to incorporate narratives into our research and the moral obligation to act; only the work remains.
- Robert J. Shiller Module 1 introduces basic concepts and demonstrates how popular stories change over time to affect economic outcomes, including recessions, depressions, and other important economic phenomena. These stories can come from diverse sources such as politics, the media, or even popular songs. 9 videos2 readings1 assignment Module 2 seeks to answer why some stories go viral while others are quickly forgotten by defining our narrative theory more firmly. This module enumerates and explores a list of 7 propositions to help discipline any analysis of economic narratives. 8 videos1 reading1 assignment Module 3 examines nine perennial narratives that have proved their ability to influence important economic decisions. They include narratives regarding artificial intelligence, stock market bubbles, and job insecurity. 10 videos1 reading1 assignment Our last module looks to the future and highlights the opportunities for consilience in Narrative Economics. We share some thoughts about where narratives are taking us at this point in history and what kind of future research could improve our understanding of them. 5 videos1 reading1 assignment | 4 modules | Beginner level | null | https://www.coursera.org/learn/narrative-economics | 99% |
302 | Organizational Leadership in Diversity, Equity & Inclusion Specialization | 6,688 | 4.8 | 261 | Richard Anthony Baker, J.D., M.P.A, Ph.D. | Rice University | ['DEI Strategy', 'Leadership And Management', 'DEI Program Assessment', 'Workplace Inclusion', 'DEI Strategic Planning', 'DEI Strategy', 'Leadership And Management', 'DEI Program Assessment', 'Workplace Inclusion', 'DEI Strategic Planning'] | Many courses in the diversity, equity and inclusion field acquaint the learner with definitions and concepts that are commonly shared in the field but not much strategy to implement such efforts. The Organizational Leadership in Diversity, Equity and Inclusion (ODE&I) specialization introduces concepts and strategies that foster greater DE&I effectiveness across organizational planning, programming, training and assessment. The goal of this course is to offer emerging DE&I Practitioners tools, best practices, and strategies to best position and launch successful DE&I efforts regardless of where their organizations are on the DE&I continuum. Through the lens of an equal opportunity professional and the use of current events, learners can expect to explore the essential components of DE&I excellence and how to manage the shifting attitude towards social justice and the multiple dimensions of difference within their workforce. Applied Learning Project The hands-on projects for this specialization will allow learners to practice DE&I tools and best practices taught by offering them an opportunity to develop and implement DE&I strategies within their organizational programming. These projects are designed to provide emerging DE&I Practitioners with a chance to launch and/or grow their DE&I deliverables that connect to the unique cultural realities that exist in their workplaces. At the conclusion of the specialization, learners will have developed a portfolio of DE&I-related work products and assessments which is expected to include feedback from their DE&I peers, co-workers, and supervisors. Defining Diversity, Equity, and Inclusion in Organizations is the first course of a four-course series. This course introduces the core definitions of diversity, equity, and inclusion and reasons why these efforts can often fail. We will also explore the elements for making the case for diversity and the concept of DE&I maturation where learners can assess their organization’s activities to determine where it may place on the DE&I continuum. By the end of this course, you will be able to:
1. Provide a common understanding of the terms diversity, equity and inclusion and how can it be effectively implemented into an organization.
2. Understand how our changing demography will impact your organization, discover various arguments used to make the case for diversity and connect them to your organization's success.
3. Recognize the various levels of diversity in the DE&I continuum and where your organization may be.
4. Identify the common struggles with implementing DE&I initiatives and how to avoid the many ways diversity efforts fail. Key Concepts in Organizational DE&I is the second course of a four-course series and explores the foundational principles of DE&I and how they often impact decision-making within organizations. While these concepts are common, this course presents them through the unique lens of an equal opportunity professional with experience resolving complaints of discrimination and delivering DE&I programming to influence organizational culture and policy. By the end of this course, you will able to:
1. Demonstrate the ability to link the foundational principles of DEI (equal opportunity, bias, power, privilege and other key concepts) and use awareness exercises to change behavior within your organization.
2. Identify the difference between ist (such as racist or sexist), phobias (such as Xenophobia), bias, and other forms of discriminatory thinking from discriminatory behavior.
3. Describe ways that you and your employees can use cultural competence as a way to address and limit the impact of bias, prejudice and stereotypes on organizational decision making.
4. Describe the essential elements of systemic discrimination and how different forms of power and privilege must be managed to create inclusive organizations. Best practices in Planning DE&I Interventions presents a “how-to,” step-by-step approach to planning around and executing diversity initiatives. From recruitment, retention, and training, this module addresses issues such as what do you do when your organization is not ready for DE&I, to how to turn principle concepts of DE&I into practical application and desired deliverables. By the end of this course, you will be able to:
1. Understand the challenges of DE&I strategic planning and how to create and how to create a process that will help you achieve your DE&I goals.
2. Explore strategies to better recruit underrepresented talent by implementing a DE&I recruitment process that is intentional and legally compliant.
3. Examine your DE&I retention programming to learn of new efforts that will retain employees.
4. Identify the common struggles with implementing DE&I training and what you can do to support a successful training initiative. Assessment is an integral part of any strategic effort. This course provides a familiarization of assessment practices and provides learners with various traditional and nontraditional methods of measurement to assist in making informed improvements to their DE&I initiatives. You will also expand your knowledge in creating bias-free and inclusive evaluation tools with special emphasis placed on assessing organizational climate and culture. By the end of this course, you will be able to:
1. Examine the benefits of benchmarking DE&I efforts internally and against other institutions.
2. Identify variables related to DE&I assessment and how the peer review may be used in this approach.
3. Discover the elements of a successful DE&I statement and how to assess its effectiveness.
4. Describe how ethnography and strategic foresight can be used to address systemic discrimination, social justice and other DE&I concerns in your organization. | 4 course series | Intermediate level | 1 month (at 6 hours a week) | https://www.coursera.org/specializations/organizational-leadership-in-diversity-equity-and-inclusion | null |
303 | Introduction to Time Series | Enrollment number not found | Rating not found | null | Trevor Leslie | Illinois Tech | ['Statistical Analysis', 'Data Analysis in R', 'Time Series Analysis And Forecasting'] | This course introduces basic time series analysis and forecasting methods. Topics include stationary processes, ARMA models, modeling and forecasting using ARMA models, nonstationary and seasonal time series models, state-space models, and forecasting techniques. By the end of this course, students will be able to:
- Describe important time series models and their applications in various fields.
- Formulate real life problems using time series models.
- Use statistical software to estimate models from real data and draw conclusions and develop solutions from the estimated models.
- Use visual and numerical diagnostics to assess the soundness of their models.
- Communicate the statistical analyses of substantial data sets through explanatory text, tables, and graphs.
- Combine and adapt different statistical models to analyze larger and more complex data. Welcome to Introduction to Time Series! In this module we'll define time series and time series models, and we'll develop some intuition for the fundamental concept of stationarity, and why it's useful. 8 videos6 readings4 assignments1 discussion prompt In this module, we'll discuss stationarity in more detail. We'll learn the technical definitions of weak and strong stationarity, and explain why the weaker version is more practical to use. We'll discuss the autocovariance and autocorrelation functions for stationary processes---concepts that will be with us for the rest of the course. And finally, we'll see some examples of ARMA processes, which we'll treat more deeply in the coming modules. 9 videos3 readings3 assignments In this module, we'll focus on ARMA processes, and what is arguably their most important feature, namely their autocorrelation structure. We'll see how to compute these "from scratch" (with a little help from R for the computations), and look at plots of the autocorrelation function (ACF) to get some intuition for how the ACF of an ARMA process behaves and what it can tell us. 10 videos4 readings3 assignments In this module, we begin by discussing the ACF's of more complicated ARMA processes. Our main focus, though, is on one-step-ahead forecasts. We learn about the best linear predictor: both how it is defined and how to use it. Finally, we use what we have learned in order to define the Partial Autocorrelation Function (PACF), which is another fundamental tool in the study of stationary processes. 9 videos3 readings3 assignments In this module, we learn about fitting a stationary time series model to data. The fitting process involves determining what values of the parameters to use. We discuss preliminary estimation and maximum likelihood estimation of these parameters. 9 videos4 readings4 assignments In this module, we discuss model diagnostics and order selection. Given an ARMA order, we've already seen how to best fit the parameters of the associated model. Given several different fitted models, the tools we develop in this module will allow us to make an intelligent choice about which one to use. 7 videos3 readings3 assignments This module introduces students to ARIMA and SARIMA modeling techniques, essential for analyzing non-stationary and seasonal time series data. In the first lesson, students will learn to define ARIMA processes, use the Dickey-Fuller test to determine the need for differencing, and fit ARIMA models using R. The second lesson extends these skills to SARIMA models, focusing on identifying seasonality and fitting these models to capture seasonal patterns in data. 9 videos3 readings3 assignments This module equips students with more sophisticated forecasting techniques beyond one-step-ahead predictions. We treat both (S)ARIMA models and exponential smoothing models and show how to handle forecasts in R. For the simplest of these models, we look inside the "black box" a little bit and demonstrate how these forecasts are generated. 9 videos3 readings3 assignments This module contains the summative course assessment that has been designed to evaluate your understanding of the course material and assess your ability to apply the knowledge you have acquired throughout the course. 1 assignment | 9 modules | Intermediate level | 51 hours to complete (3 weeks at 17 hours a week) | https://www.coursera.org/learn/illinois-tech-introduction-to-time-series | null |
304 | Capstone and Practice Exam (AZ-500) | Enrollment number not found | Rating not found | null | Microsoft | Microsoft | ['Role-Based Access Control (RBAC)', 'Microsoft Defender for Cloud', 'azure key vault', 'Azure Monitor', 'Azure AD'] | Capstone and Practice Exam is the seventh course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. It allows you to apply the skills gained from the previous six courses and prepare for the AZ-500 exam. The course starts with a recap of courses 1 to 6, followed by a real-world capstone project. You will complete the tasks typically performed by an Azure security engineer and then submit the project for peer review. Then, you will evaluate other project submissions and discuss solutions with peers.
Finally, you will take a program-level practice exam and receive guidance on enrolling in the AZ-500 Microsoft Azure security technologies exam.
By the end of this course, you will be able to:
- Implement multifactor authentication.
- Create a resource group and a new storage account and provide access to a user.
- Create a strategy for implementing Azure security using security groups.
- Set up a virtual machine (VM) to host a website, allowing only HTTP and HTTPS traffic.
- Enable disk encryption on the VM.
- Enable database auditing for a new Azure SQL database.
- Enable Microsoft Defender for Azure SQL database.
- List the steps to enroll in the AZ-500 exam. In this module, you will recap the main concepts learned and skills acquired in courses 1 to 6 about Azure security technologies. You will also attempt knowledge checks for concepts learned and skills acquired in courses 1 to 6. 32 videos8 readings7 assignments1 discussion prompt In this module, you will be introduced to the capstone project for the Azure Security Technologies Advanced Professional Certificate program. You will be presented with the project scenario and guidelines on how to set up the project. Once the project is set up, you will attempt the peer review project and upload your submission for evaluation by your peers. Followed by your submission and peer review of submissions assigned to you, you will go through a project solution walkthrough and discuss it with your peers, if required. 2 videos1 reading1 peer review1 discussion prompt In this module, you will attempt a program-level practice exam and learn next steps for enrolling into the AZ-500 exam in Microsoft Azure security technologies. 2 videos2 readings1 assignment1 discussion prompt | 3 modules | Intermediate level | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/az-500-capstone-and-practice-exam | null |
305 | Real-World Cloud Product Management Specialization | 2,787 | 4.7 | 74 | Nancy Wang | Advancing Women in Tech | ['aws', 'Technology Strategy', 'Product Management', 'Cloud Computing', 'Cloud Storage'] | Learn cloud product management using the same curriculum asAWSPMs! Gain insights to impress on your first (or next) cloud computing role, and prepare to successfully complete the AWS Certified Cloud Practitioner Exam. Lead instructorNancy Wang, Director and General Manager of AWS Data Protection Services at Amazon Web Services,and Founder of Advancing Women in Tech (AWIT), teaches you the skills desired by hiring managers at the world’s top cloud providers. These skills will serve you throughout your career. This Specialization features insights from the following cloud leaders: Mai-Lan Tomsen Bukovec, Vice President, AWS Object and Block Storage Erin Yang, Chief Technologist, Workday Ventures Boyd Bischoff, Director, AWS Software Development Dan Scheinman, first investor in Zoom Todd Weatherby, Vice President, AWS Professional Services Ready to interview or demonstrate your cloud knowledge? This Specialization prepares you to ace the industry-recognizedAWS Certified Cloud Practitioner Exam. InstructorGordon Yu, Technical Program Manager at AWS, and General Counsel and Coursera Director at AWIT, has helped many in Amazon pass the exam. He shares his knowledge and strategies in this Specialization.
This Specialization isACE® approved—upon completion, you can earn up to 6 college credits. Applied Learning Project Learners will test their conceptual knowledge of the technical and business considerations of the cloud withover 200questions. Specifically, diligent learners will demonstrate proficiency in: Cloud velocity, its impact on organizational psychology, and how to deliver and lead at scale Cloud product management Analyzing, setting, and adjusting prices for cloud services Writing to the public or to customers Interpreting technical architecture diagrams Analyzing the financial performance of cloud services as a cloud provider and as a customer When to use the right Storage, Compute, Databases, Analytics, Blockchain, Machine Learning, and other services How to manage an enterprise-scale cloud deployment using Management, Governance, and Security tooling How to review enterprise-scale cloud deployments for compliance with the AWS Well-Architected Framework Optionally, leaners can complete10 official AWS 10-minute tutorials. Explain why cloud is the greatest "gold rush" since the invention of the client server model, and how it can accelerate your career. Explain "cloud velocity" by comparing cloud vs. non-cloud businesses, technical architecture diagrams, and financial and operational impact. Understand the purpose of the AWS Certified Cloud Practitioner Exam, determine if it is right for you, and let AWIT help you prepare. Understand the most popular technologies today, including containerization, serverless, AI/ML, and blockchain, and how to manage those business. Explain common approaches to compute, containers, serverless, distributed, and application integration. Differentiate among different databases and analytics tools. Understand the concepts of cloud management, governance, machine learning, and quantum computing. Explain how to manage cloud costs (as a customer) and set pricing (as a product manager). Understand cloud security, the Shared Responsibility Model, and the Well-Architected Framework. Explain how networking practices deliver information and content to customers around the world at scale. Finalize your preparation for the AWS Certified Cloud Practitioner exam. | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/real-world-cloud-pm | null |
306 | Using Data Analytics in Supply Chain | 3,784 | 4.3 | 33 | Unilever Team | Unilever | ['Risk Management', 'Data Analysis', 'Problem Solving', 'Presentation Layer', 'Data Visualization'] | In the Using Data Analytics in Supply Chain course, you’ll explore the importance of data governance, and learn the fundamental concepts surrounding data. You’ll also learn the tools and processes employed in supply chain analytics, enabling you to gather, analyze, synthesize, validate, and interpret data-driven insights. This ensures that products are efficiently delivered to their destination in a timely and cost-effective manner. By the end of this course, you’ll be able to:
Explain the importance of data governance and adhere to data governance policies.
Define data analysis objectives, formulate questions, pinpoint data sources, and implement effective data gathering techniques.
Conduct data analysis by applying calculations, summarizations, averages, and classification of information to answer the identified data analysis objectives and questions.
Identify how to use SQL, Python, or spreadsheets to clean, manage, consolidate, analyze, and visualize data.
Differentiate between various scenarios and construct simulations to evaluate outcomes.
Use data visualization to present insights effectively to decision-makers. In this module, you will focus on the importance of analyzing quality data and how to adhere to data governance policies. You'll be introduced to the data analysis process and the tools used to analyze data. Identify the importance of data quality. Identify the types of data. Explain the importance of data governance and adhere to data governance policies. 17 videos6 readings4 assignments In this module, you will focus on how to write the objectives of your analysis, identify the questions you should be answering with the data, determine where to obtain your data, and how to clean and prepare the data obtained. 12 videos8 readings6 assignments In this module, you will focusing on finding the answers to the identified analysis questions, identifying if errors are present in our analys and making and needed adjustments, intepreting the results and explaining what it means in your own words, and reporting your findings. 13 videos5 readings6 assignments1 discussion prompt In this module, you will learn how to use data visualization tools and storytelling to describe the data to decision makers in a clear, concise and comprehensive manner. 11 videos4 readings5 assignments This module focuses on how to create a meaningful presentation for your audience and provides you with the skills to present your findings with confidence. 6 videos5 readings2 assignments1 peer review | 5 modules | Beginner level | 34 hours to complete (3 weeks at 11 hours a week) | https://www.coursera.org/learn/using-data-analytics-in-supply-chain | null |
307 | Cryptography and Hashing Overview | 8,075 | 4.5 | 46 | Stefano M. Stefan | University of California, Irvine | [] | Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy. This course requires the purchase of two books for the completion of assignments:
Drescher, D. (2017). Blockchain Basics: A Non-Technical Introduction in 25 Steps. (ISBN-13: 978-1484226032)
Antonoupoulos, A. M. (2017). The Internet of Money, Volume Two. (ISBN-13: 978-1947910065) This week we will examine and study the ways that the blockchain keeps track of ownership transactions through the use of electronic ledgers. After an item changes hands many times, one can literally see each handoff by looking at the continuously growing string of data blocks in the blockchain. 1 video2 readings1 assignment1 discussion prompt In this second week we will explore and discuss the vast array of benefits that a blockchain technology system can bring to different industries and business markets. We will also consider together how Blockchain technology is an ideal system to manage educational achievement and merit. 1 video2 readings1 peer review1 discussion prompt The key to the blockchain’s success is the use of hash values and encryption. These are the same technologies that allow you to log into your favorite website without revealing your password and the same technologies that allow you to send a private, encrypted text message. By the end of the week you will apply a hashing algorithm to a character string and see the results. 2 videos3 readings1 assignment1 discussion prompt As you will see in this final week, it is sometimes important to step back from a purely functional discussion of what the blockchain can do to what it means when it does it. You will apply cryptography and hashing to a simple scenario in order to determine the authenticity of a simulated email message. 1 video3 readings1 peer review1 discussion prompt | 4 modules | Beginner level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/crypto-hashing | null |
308 | API Development on Google Cloud's Apigee API Platform | 15,040 | 4.6 | 1,039 | Google Cloud Training | Google Cloud | [] | In this course, you learn how to create APIs that utilize multiple services and how you can use custom code on Apigee. You will also learn about fault handling, and how to share logic between proxies. You learn about traffic management and caching. You also create a developer portal, and publish your API to the portal. You learn about logging and analytics, as well as CI/CD and the different deployment models supported by Apigee. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, build, secure, deploy, and manage API solutions using Google Cloud's Apigee API Platform.This is the third and final course of the Developing APIs with Google Cloud's Apigee API Platform course series. Welcome to API Development! This is the third course in the Developing APIs with Google Cloud's Apigee API Platform series. 2 videos This module introduces mediation concepts, including payload formats and transformation, service callouts, custom code policies, hosted targets, shared flows, and fault handling 14 videos2 readings1 assignment5 app items This module introduces spike arrests, quotas, and caching within Apigee 12 videos1 assignment2 app items This module introduces API publishing, the developer portal, and API versioning 5 videos1 assignment1 app item This module introduces message logging, Cloud Logging, and Apigee analytics 4 videos1 assignment This module introduces Apigee deployment options and CI/CD tools and strategies 5 videos2 readings1 assignment | 6 modules | Beginner level | null | https://www.coursera.org/learn/api-development-apigee-gcp | 92% |
309 | Experiments and Variations in Bipedalism | Enrollment number not found | Rating not found | null | Jeremy DeSilva | Dartmouth College | [] | This course will help you learn how fossils give us an insight into how the early members of our lineage walked bipedally. The four million years old bone of Australopithecus anamensis is the oldest undisputed evidence for bipedalism in our lineage. Similarly, Lucy’s, who was Australopithecus afarensis, fossil also helped scientists discover a lot about how bipedalism evolved over time. You will also explore bipedal variations in humans. From its earliest version to its modern form—how humans learned to walk, is an interesting story. Similarly how a human being learns to walk, from a toddler’s first footstep to an adult human being’s walk and its variations would also be discussed in this course. You will also understand that while bipedalism has its advantages, it has its adverse effects on humans too from a musculoskeletal point of view. Every module of this course has been created with the intention of a “hands-on” learner experience, where you can play around with and learn from 3D renditions of different human and animal fossils. Through these exercises, you will read the shapes found in bones in order to analyze and reconstruct how a species moved. This module explores bipedal variations in humans and why different forms of bipedal walking may have evolved. 13 videos16 readings1 assignment2 discussion prompts25 plugins This module explores the benefits of bipedal locomotion. It also discusses how the early hominin species such as Homo erectus and Homo naledi used to walk. 6 videos5 readings1 assignment2 discussion prompts12 plugins This module provides an introduction to how children learn to walk and how that varies across cultures. This also talks about the difference between running and walking and the adaptations for running. 11 videos3 readings3 assignments2 discussion prompts3 plugins This module explores the downsides of bipedalism and the anatomical trade-offs that result from our evolutionary history of upright walking. 11 videos7 readings2 assignments2 discussion prompts16 plugins | 4 modules | null | 17 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/experiments-and-variations-in-bipedalism | null |
310 | Product Management: Initial Product Strategy and Plan | 6,367 | 4.5 | 59 | Daniel C. Yeomans | SkillUp EdTech | ['Product Concept', 'Product Management', 'Product Plan', 'Swot Analysis', 'Project Charter'] | A Product Manager’s role in an organization is to drive product strategy development and implementation. They effectively engage with stakeholders to transform how an organization does business through high-impact product solutions. This course will provide an overview of the Product Management Lifecycle. You will then learn about the Product Conceive and Plan phases in detail. You will discover tools and techniques used in product concept identification. In addition, you will acquire skills to work with SWOT analysis and the Product Concept document.
The course also prepares you to establish a team and develop a project charter. Hands-on labs will help you practice working on market and solution analysis using a Market Requirement Document. You will also investigate a product business case and perform a financial analysis.
Throughout this course, several product management experts will share their insights and experiences in product management. Practice quizzes and graded quizzes will test your knowledge. You will be able to apply the concepts learned in the course in a final project.
This course is suitable for anyone who aspires to apply for product management jobs and understand various lifecycles used in product management, including agile. It does not require any prior degree. You will begin the module with a quick review of the Product Management Lifecycle. The module then introduces the Product Conceive and Plan phases. You will then get an overview of the product concept identification process. Next, you will perform product external and internal assessment and record your findings in a SWOT template in a hands-on lab. In the next lesson, you will develop product strategy activities and options and learn the contents of the Product Concept document and how to gain approval of the document. Finally, you will attempt a quiz to practice everything you have learned in the module. 11 videos2 readings3 assignments2 discussion prompts9 plugins You will begin the module with an overview of the product management team and team-building challenges a Product Manager may face. A team building checklist identifies key requirements to effectively build a team. This segment ends with a brief review of a common team-building model named the Tuckman Ladder. Next, the module describes the Project Charter concept, shares an example, and walks you through the contents of the Project Charter. You will create a Project Charter in a hands-on lab. You will identify the goals and questions that need to be addressed when conducting a marketing investigation and perform a quick review of personas. You will learn how to perform a competitive analysis. This will be followed by an introduction to the Market Requirements Document (MRD). Subject Matter Experts (SME) will share insights on the concepts learned in the module. A practice quiz at the end of each lesson will test the concepts learned in the module. A graded exam at the end of the module will further test your knowledge. 10 videos1 reading3 assignments2 discussion prompts7 plugins You will begin the module with a summary of marketing feedback goals and what the Product Manager can likely expect in terms of responses. You will then define the Product Vision, and the importance of developing a value proposition to effectively position your product. Next, you will learn how to create a preliminary launch strategy and identify product risks. The next lesson will share updates that are required to the Initial Project Charter and ideas on the importance of this document. You will identify the purpose and contents of a Product Business Case. In a hands-on lab, you will develop a Business Case. Subject Matter Experts (SME) will share insights on the concepts learned in the module. A practice quiz at the end of each lesson will test the concepts learned in the module. A graded exam at the end of the module will further test your knowledge. 9 videos1 reading3 assignments2 discussion prompts5 plugins Module 4 introduces the Plan Phase of product management. This module discusses the Product Manager’s role, and key activities, including planning, marketing, and business case updates. You will learn the components and develop a Product Roadmap in a hands-on lab. You will discover the components and how functional plans support the development plan. You will determine the required updates to the marketing and launch strategies and perform the financial components of a business case in a hands-on lab. 8 videos1 reading2 assignments1 discussion prompt7 plugins In this module, you will explore the final projects used to test a learner's comprehension of the course material. The learners’ peers evaluate these final projects in a peer review assignment. You will discover the basics of peer reviews, including how to set up the rubrics and grading. 2 readings1 assignment1 peer review1 plugin | 5 modules | Beginner level | 18 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/product-management-initial-product-strategy-and-plan | null |
311 | Game Design and Development 2: 2D Platformer | 9,261 | 4.7 | 109 | Brian Winn | Michigan State University | ['Game Making', 'Unity', 'Video Game Development', 'technology', 'Game Design'] | If you love games and want to learn how to make them, then this course is your second step down that path. In this course you will learn the fundamentals of game design, including an understanding of the game world, storytelling, gameplay, user experience, and game technology. You will continue developing videogames using industry standard game development tools, including the Unity game engine. At the end of the course you will have completed a 2D Platformer game, and will be able to leverage an array of game development techniques to create your own basic games. Are you ready to take the next step in your journey into game design and development? In this module, we will introduce the theory and practice of this course. From a theoretical perspective, we will be using the Design, Play, Experience Framework across this course as a vehicle to discuss game design. From a practical standpoint, you will be creating your second game project in the course, a 2D Platformer. In the first part of the assignment, follow along with the tutorial videos introduced in this module. In the second part of the project, you will modify the game to make it your own. 20 videos3 readings In this module, we will explore two important parts of the design, the game world and storytelling. The game world, simply put, is the world where the game takes place. At its simplest level, it is defined by space and time. But we will explore the game world across the physical, temporal, environmental, emotional, and ethical dimensions. In addition to the game world, we will also explore storytelling in games. There are two perspectives on storytelling in games, the “designer’s story” and the “player’s story”. The designer’s story is the storytelling that is designed into the game. The designer’s story can be used to set the stage, provide purpose and engagement, and convey content, among other things. The setting, character design, and narrative are the designers primary design tools. The storytelling that occurs during play combines the designer’s story with the interactions and choices the player makes. The resulting experience crafts the player’s story. 11 videos3 readings2 assignments In this module, we will explore the next two layers of the Design, Play, Experience Framework, including gameplay and user experience. The gameplay layer defines what the player does in the game. That is, what choices the player can make in the game world and what ramifications those choices will have on the rest of the game. The gameplay layer is broken down into mechanics, dynamics, and affects. The mechanics are the rules that define the operation of the game world, what the player can do, the challenges the player will face, and the player’s goals. The dynamics are the resulting behavior when the rules are instantiated over time with the influence of the player’s interactions. The resulting experiences, or emotions derived in the player, are the affects. While the user experience layer is represented as the “deepest” layer in the framework, it is actually the most visible (or surface) layer from the perspective of the player where it is manifested through the user interface. The interface encompasses everything the user sees, hears, and interacts with and how that interaction happens (i.e., the control system.) 8 videos9 readings2 assignments Everything in the Design, Play, Experience Framework is “grounded” on the technology that you are building the game upon. Overall, the capabilities and limitations of the technology and the resources required to implement the technology may greatly influence the design and should be considered throughout the design process. In this module, you will also finish up the 2D Platformer project, submit it for peer review, and peer review your fellow learners games. Finish the course strong! 8 videos2 readings1 assignment1 peer review | 4 modules | Intermediate level | 12 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/game-design-and-development-2 | null |
312 | Anthropometry, Biomechanics, and Motor Skills in User Design | Enrollment number not found | Rating not found | null | Robert Gray | Arizona State University | ['Anthropometric Measurement', 'Human Performance Measurement', 'Ergonomic Design', 'Biomechanics Optimization', 'Human centered design'] | Course 5 examines the role of anthropometrics, biomechanics and motor skills in human performance as well as key factors that influence how humans produce and sense motion, and how these can be applied to training and testing performance. This course explores anthropometry, biomechanics, and motor skills. You will learn about measuring human body dimensions and characteristics, known as anthropometrics, and how these measurements are used in design. The course covers factors influencing motion production and perception, including open- and closed-loop control and stimulus-response compatibility. You will also explore the applications of motion-tracking technologies in training and testing human performance. 1 video1 reading Module 1 explores anthropometry and ergonomics, covering the measurement of human body dimensions and the importance of anthropometric data in fields like product design and workspace layout. The module also focuses on ergonomics, the science of designing products and environments to fit human capabilities and enhance safety and efficiency. You will learn about the principles and goals of ergonomics, as well as ergonomic design considerations for creating user-centered products and workspaces. 3 videos6 readings1 assignment1 discussion prompt In Module 2, we dive into the realm of ergonomics research, exploring various applications in different settings. We begin with Lesson 1, focusing on office design and exercise, aiming to create the perfect ergonomic workspace. Moving on to Lesson 2, we shift our attention to factories and industrial settings. In Lesson 3, we turn our focus to the healthcare sector. 3 videos6 readings1 assignment1 discussion prompt In this module, we explore the field of biomechanics, which focuses on studying the mechanics and movement of the human body. We will cover various aspects of biomechanics, including its definition, applications in different domains, and methods for analyzing human movement. By the end of this module, you will have a solid understanding of biomechanics principles and how they are used to study and analyze human motion. 3 videos6 readings1 assignment1 discussion prompt Module 4 focuses on the practical applications of biomechanics in various fields. It explores how biomechanics can be utilized to optimize performance, prevent injuries, and enhance movement in sports, rehabilitation, ergonomics, and other contexts. 3 videos8 readings1 assignment | 5 modules | Intermediate level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/anthropometry-biomechanics-and-motorskills-in-user-design | null |
313 | Bayesian Statistics: Time Series Analysis | 4,620 | 4.3 | 15 | Raquel Prado | University of California, Santa Cruz | ['Forecasting', 'Bayesian Statistics', 'Time Series', 'Dynamic Linear Modeling', 'R Programming'] | This course for practicing and aspiring data scientists and statisticians. It is the fourth of a four-course sequence introducing the fundamentals of Bayesian statistics. It builds on the course Bayesian Statistics: From Concept to Data Analysis, Techniques and Models, and Mixture models. Time series analysis is concerned with modeling the dependency among elements of a sequence of temporally related variables. To succeed in this course, you should be familiar with calculus-based probability, the principles of maximum likelihood estimation, and Bayesian inference. You will learn how to build models that can describe temporal dependencies and how to perform Bayesian inference and forecasting for the models. You will apply what you've learned with the open-source, freely available software R with sample databases. Your instructor Raquel Prado will take you from basic concepts for modeling temporally dependent data to implementation of specific classes of models This module defines stationary time series processes, the autocorrelation function and the autoregressive process of order one or AR(1). Parameter estimation via maximum likelihood and Bayesian inference in the AR(1) are also discussed. 9 videos12 readings4 assignments1 peer review This module extends the concepts learned in Week 1 about the AR(1) process to the general case of the AR(p). Maximum likelihood estimation and Bayesian posterior inference in the AR(p) are discussed. 9 videos8 readings2 assignments1 peer review Normal Dynamic Linear Models (NDLMs) are defined and illustrated in this module using several examples. Model building based on the forecast function via the superposition principle is explained. Methods for Bayesian filtering, smoothing and forecasting for NDLMs in the case of known observational variances and known system covariance matrices are discussed and illustrated. 10 videos7 readings2 assignments1 peer review 7 videos4 readings2 assignments1 peer review In this final project you will use normal dynamic linear models to analyze a time series dataset downloaded from Google trend. 1 peer review | 5 modules | Intermediate level | 22 hours to complete (3 weeks at 7 hours a week) | https://www.coursera.org/learn/bayesian-statistics-time-series-analysis | null |
314 | Biostatistics in Public Health Specialization | 41,004 | 4.8 | 2,132 | John McGready, PhD, MS | Johns Hopkins University | ['Statistics', 'variability', 'regression', 'Statistical Hypothesis Testing'] | This specialization is intended for public health and healthcare professionals, researchers, data analysts, social workers, and others who need a comprehensive concepts-centric biostatistics primer. Those who complete the specialization will be able to read and respond to the scientific literature, including the Methods and Results sections, in public health, medicine, biological science, and related fields. Successful learners will also be prepared to participate as part of a research team. Applied Learning Project In each course, learners will assume the role of a biostatistical consultant helping research teams review and interpret the published scientific literature. Throughout the specializations, learners will return to two important studies, one on asthma medication and another on injectable contraception, to answer the researchers' questions about the published statistical methods and results. Calculate continuous data measures Interpret data visualizations Analyze binary data Analyze time to event data Use statistical methods to analyze sampling distribution Estimate and interpret 95% confidence intervals for single samples Estimate and interpret 95% confidence intervals for two populations Estimate and interpret p values for hypothesis testing Practice simple regression methods to determine relationships between an outcome and a predictor Recognize confounding in statistical analysis Perform estimate adjustments Practice multiple regression methods to determine relationships between an outcome and multiple predictors Use the Spline approach for non-linear relationships with continuous predictors Perform calculations with multiple predictor variables | 4 course series | Beginner level | 2 months (at 10 hours a week) | https://www.coursera.org/specializations/biostatistics-public-health | null |
315 | FinTech Foundations and Overview | 36,023 | 4.7 | 505 | Theodore Henry King CLARK | The Hong Kong University of Science and Technology | [] | Our primary goal is to help you to understand FinTech and to become more confident and persuasive in your ability to analyze and make recommendations to executives within the finance industry regarding how to react to these changes. This FIRST MOOC ON FINTECH IN ASIA-PACIFIC offered by HKUST presents the insight of several professors from the top business school in Asia as well as perspectives from industry professionals. HKUST has been ranked for many years as the No.1 EMBA program in the world, as the number one Finance program in Asia, and as the top MBA program in Asia by multiple independent rating and review journals and surveys.
This course "FinTech Foundations and Overview" offers the combined strengths of HKUST in Business, Finance, and Technology as one the world's leading academic institutions on an important area of technology and business innovations. For learners from outside Asia, this also gives an insight into changes happening in the most advanced FinTech markets of the world, since Asia leads worldwide in FinTech adoption and creative innovations. In this module (week one), students will gain a multi-dimensional perspective on what FinTech means from the perspective of large firms (and older participants in the industry - e.g. dinosaurs), entrepreneurs, investors, and consumers. Examining what FinTech is, or is not, provides a foundations upon which students can build for better understanding of opportunities and changes. 11 videos2 readings1 quiz3 discussion prompts The Business Applications of FinTech are essentially the Fin part of the FinTech world, and in this module, we will examine applications across six categories of FinTech, including lending and personal finance, crowd-finding and business financing, payments and retail transactions, equity, trading and investment applications, various types of cryptocurrencies, and banking infrastructure and tools. 15 videos1 quiz1 discussion prompt The Technology enabling and supporting FinTech is important to understand, and this module provides a brief introduction to each of the areas of technology that enable FinTech business changes, including identity and privacy technologies, blockchain and encryption, big data analytics, AI and automation, and consumer tech innovations. This introduction is designed to be at a level appropriate for business managers or students of business, and is not intended to excite or engage tech geeks. 12 videos1 quiz2 discussion prompts Building on our understanding of FinTech market applications and FinTech technologies, we move in this module to examine the implications of FinTech changes and challenges for existing financial services companies, and we look at current and future trends in FinTech world-wide. This module concludes, after the final quiz, with a final course project in which students will present their recommendations for senior managers of a large, established Asia-Pacific bank to take advantage of and respond to FinTech challenges and opportunities. 8 videos1 reading1 quiz1 peer review2 discussion prompts | 4 modules | Beginner level | null | https://www.coursera.org/learn/fintech | 93% |
316 | Innovative Finance: Hacking finance to change the world | 15,957 | 4.7 | 140 | Aunnie Patton Power | University of Cape Town | ['mapping available resources', 'identifying outcomes', 'innovating financing strategy', 'discovering opportunities', 'due diligencing your issue area'] | To address global poverty - do we really not have enough resources or do we not have the right tools to allocate our resources? The tools of finance, when applied correctly, can be an enabler of social and environmental outcomes. This course is designed to give you the ability to build innovative financing strategies that work towards outcomes such as financial inclusion, access to energy, and access to education. The innovative finance process has five key components. It starts with identifying the outcomes you are looking to achieve and next moves on to due diligencing your issue area using techniques like design thinking to make sure you are designing with the end user. Next, you must map all of the resources available for your outcome and then discover opportunities to augment these through business model innovation, multi-stakeholder partnerships, and innovative financial structures. Finally, the last step is to put all of these pieces together to design an innovating financing strategy.
Each week dives into a component of the process using examples and real case studies from social entrepreneurs, non-profits, development funders, impact investors, governments, foundations, and more. Over five weeks you’ll learn about new types of revenue creation, financing approaches, business models, and partnerships. By the end of the course, you’ll have the ability to hack finance for social change. Welcome to the first week. We start by defining what innovative finance is and why we need to innovative around financing for social impact. The seven themes of impact we consider are housing, health, education, financial inclusion, agriculture, energy, and water, sanitation, and hygiene. Our case studies are a social enterprise, impact investor, foundation, non-profit and government who are each building innovative financing strategies. You will be investigating why these organisations were created and what the specific issue areas are that they have chosen. We'll encourage you to also start thinking about which of these issue areas resonates with you and what you wish to address in the future. This is the first building block in guiding you to create an innovative financing strategy for yourself. 13 videos3 readings4 assignments2 discussion prompts This week we are going to look at how you assess the needs, challenges and roadblocks in your issue area. You’ll be introduced to Due Diligence, an essential process that needs to be undertaken to map the problem and solutions landscape of an issue area. Following this, we cover design thinking - a useful tool that can be used when conducting due diligence. It emphasizes the importance of understanding the user perspective when mapping problems and potential solutions. Once we’ve understood the concepts, our case studies explain their approaches to due diligence and impact measurement. For this week’s assignment, you’ll need to pick your issue area and outcome metrics as well as design an engagement plan. 7 videos5 readings3 assignments1 peer review1 discussion prompt Congratulations on reaching week 3! This week we are going to focus on the resources you have to achieve the outcomes in your issue area. The primary goal of this week is to get you to think creatively about your assets, revenue streams and funding sources. We are going to start with how you create revenue from assets that you have already identified and work that you (or others) are already doing. Then we are going to look at the different types of funders you should think about engaging with around resourcing. We will also look at websites to find information about these funders. We will spend a bit of time speaking about a specific type of contract called an outcomes-based contract, which can be an effective tool to create revenue streams from a third party payer. Finally, our cases are going to speak about how they identified resources to address their issue area and work towards their outcomes. You’ll hear the case participants reference the different types of funders that we discuss as well as the opportunity to use an outcomes-based contract. The assignments this week include a graded quiz and creating a resource map. Let’s get going! 8 videos2 readings3 assignments1 peer review1 discussion prompt So now that you’ve had engaged with resources, let’s consider the opportunities and risks that you may face when dealing with your issue area. First, you’ll learn how to look for specific types of opportunities outside of your issue area. We’ll draw on the best practices of other sectors or geographies to create new approaches to achieving your outcomes.
We’ll then dive into the darker side - the risks that you’ll need to understand and address with your innovative financing strategy. For your assignment, you’ll need to identify the risks and opportunities associated with your issue area. 12 videos3 readings4 assignments1 peer review2 discussion prompts Congratulations on reaching the final week of the course! It’s a short week ahead. Here we introduce you to the five stages of the innovative finance process, which you have been working through during the past four weeks. This week we have arrived at the design process. This requires us to look back over what we’ve done to create a design for our innovative financing strategy.
In this week our cases tells us how they designed for impact. Following this, I provide a summary of the cases from week 1 to week 5 and how it relates to the innovative finance process. We end off the course with an exam, covering everything we have learned, and also an optional honours assignment. In this assignment we want you to design your Innovative Finance Strategy. 8 videos1 reading2 peer reviews1 discussion prompt | 5 modules | Beginner level | null | https://www.coursera.org/learn/innovative-finance | 98% |
317 | Comparing Genes, Proteins, and Genomes (Bioinformatics III) | 21,335 | 4.7 | 131 | Pavel Pevzner | University of California San Diego | ['Bioinformatics', 'Graph Theory', 'Bioinformatics Algorithms', 'Python Programming'] | Once we have sequenced genomes in the previous course, we would like to compare them to determine how species have evolved and what makes them different. In the first half of the course, we will compare two short biological sequences, such as genes (i.e., short sequences of DNA) or proteins. We will encounter a powerful algorithmic tool called dynamic programming that will help us determine the number of mutations that have separated the two genes/proteins.
In the second half of the course, we will "zoom out" to compare entire genomes, where we see large scale mutations called genome rearrangements, seismic events that have heaved around large blocks of DNA over millions of years of evolution. Looking at the human and mouse genomes, we will ask ourselves: just as earthquakes are much more likely to occur along fault lines, are there locations in our genome that are "fragile" and more susceptible to be broken as part of genome rearrangements? We will see how combinatorial algorithms will help us answer this question.
Finally, you will learn how to apply popular bioinformatics software tools to solve problems in sequence alignment, including BLAST. <p>Welcome to class!</p><p>If you joined us in the previous course in this Specialization, then you became an expert at <em>assembling</em> genomes and sequencing antibiotics. The next natural question to ask is how to compare DNA and amino acid sequences. This question will motivate this week's discussion of <strong>sequence alignment</strong>, which is the first of two questions that we will ask in this class (the algorithmic methods used to answer them are shown in parentheses):</p><ol><li>How Do We Compare DNA Sequences? (<em>Dynamic Programming</em>)</li><li>Are There Fragile Regions in the Human Genome? (<em>Combinatorial Algorithms</em>)</li></ol><p>As in previous courses, each of these two chapters is accompanied by a Bioinformatics Cartoon created by talented artist Randall Christopher and serving as a chapter header in the Specialization's bestselling <a href="http://bioinformaticsalgorithms.com" target="_blank">print companion</a>. You can find the first chapter's cartoon at the bottom of this message. Why have taxis suddenly become free of charge in Manhattan? Where did Pavel get so much spare change? And how should you get dressed in the morning so that you aren't late to your job as a crime-stopping superhero? Answers to these questions, and many more, in this week's installment of the course.</p><p><img src="http://bioinformaticsalgorithms.com/images/cover/alignment_cropped.jpg" width="528"></p> 7 videos2 readings1 assignment2 app items <p>Welcome to Week 2 of the class!</p>
<p>Last week, we saw how touring around Manhattan and making change in a Roman shop help us find a longest common subsequence of two DNA or protein strings.</p>
<p>This week, we will study how to find a highest scoring alignment of two strings. We will see that regardless of the underlying assumptions that we make regarding how the strings should be aligned, we will be able to phrase our alignment problem as an instance of finding the longest path in a directed acyclic graph.</p> 1 video1 reading1 assignment2 app items <p>Welcome to Week 3 of the class!</p>
<p>Last week, we saw how a variety of different applications of sequence alignment can all be reduced to finding the longest path in a Manhattan-like graph.</p>
<p>This week, we will conclude the current chapter by considering a few advanced topics in sequence alignment. For example, if we need to align long strings, our current algorithm will consume a huge amount of memory. Can we find a more memory-efficient approach? And what should we do when we move from aligning just two strings at a time to aligning many strings?</p> 3 videos1 reading1 assignment2 app items <p>Welcome to Week 4 of the class!</p>
<p>You now know how to compare two DNA (or protein) strings. But what if we wanted to compare entire genomes? When we "zoom out" to the genome level, we find that substitutions, insertions, and deletions don't tell the whole story of evolution: we need to model more dramatic evolutionary events known as <strong>genome rearrangements</strong>, which wrench apart chromosomes and put them back together in a new order. A natural question to ask is whether there are "fragile regions" hidden in your genome where chromosome breakage has occurred more often over millions of years. This week, we will begin addressing this question by asking how we can compute the number of rearrangements on the evolutionary path connecting two species.</p>
<p>You can find this week's Bioinformatics Cartoon from Randall Christopher at the bottom of this E-mail. What do earthquakes and a stack of pancakes have to do with species evolution? Keep learning to find out!</p>
<p><img width="528" src="http://bioinformaticsalgorithms.com/images/cover/rearrangements_cropped.jpg"></p> 5 videos1 reading1 assignment2 app items <p>Last week, we asked whether there are fragile regions in the human genome. Then, we took a lengthy detour to see how to compute a distance between species genomes, a discussion that we will continue this week.</p>
<p>It is probably unclear how computing the <em>distance</em> between two genomes can help us understand whether <em>fragile regions</em> exist. If so, please stay tuned -- we will see that the connection between these two concepts will yield a surprising conclusion to the class.</p> 4 videos1 reading1 assignment2 app items In the sixth and final week of the course, we will apply sequence alignment algorithms to infer the non-ribosomal code. 1 peer review | 6 modules | Intermediate level | 22 hours to complete (3 weeks at 7 hours a week) | https://www.coursera.org/learn/comparing-genomes | null |
318 | Nursing Informatics Training and Education | 5,634 | 4.8 | 93 | Karen A. Monsen, PhD, RN, FAMIA, FNAP, FAAN | University of Minnesota | [] | In this fourth of our five courses, I will go deeper into the training and education leadership skills that are helpful for nursing informatics leaders. I will also guide you through the process of preparing a course document or syllabus for the nursing informatics specialty both in academic settings and in practice or industry. Following are the course objectives:
1. Describe relevant nursing informatics course development in clinical and academic settings to understand similarities and differences in informatics teaching and education across settings.
2. Describe informatics education and training needs for diverse participants with various experience levels to enable development of appropriate training and education materials.
3. Develop a prototype course syllabus and introductory recorded message to apply learning in a simulated setting.
4. Describe the benefits of formal and informal mentoring for nursing informaticians to advance career opportunities and support the nursing informatics specialty. 2 videos8 readings1 assignment1 discussion prompt 1 video3 readings1 assignment1 discussion prompt 1 video5 readings1 assignment1 discussion prompt 4 videos9 readings1 assignment1 discussion prompt 1 video8 readings1 assignment1 discussion prompt | 5 modules | Intermediate level | 21 hours to complete (3 weeks at 7 hours a week) | https://www.coursera.org/learn/training-others-nursing-informatics | null |
319 | Bridging the Gap between Strategy Design and Delivery | 30,014 | 4.8 | 776 | Ricardo Viana Vargas | Brightline Initiative | ['Strategic Management', 'Strategy Implementation', 'Leadership', 'Management', 'Business Strategy'] | Remember to get your voucher before starting the course to earn your Brightline® Initiative certificate using this link: https://www.coursera.org/promo/brightlinepromo. In today’s competitive business environment, organizations are facing unprecedented levels of change and disruption. Only 1 out of 10 executives based on a global survey admit that their organizations successfully deliver all of their strategic initiatives. This course will help you as a leader of your organization to bridge the costly and wasteful gap between strategy design and delivery.
You will learn how external and internal factors impact the organizations’ capability to implement strategies. You will understand Brightline’s 10 Guiding Principles and see how these can help bridge the strategy-implementation gap based on real-world examples from the profit-, non-profit- and government sectors. We bring you interviews from global leaders and experts to share their experiences and examples in strategy implementation. You will also analyze a fictional case and create a strategic action plan following the Brightline’s 10 Guiding Principles.
After completing this course, you will comprehend how the 10 Guiding Principles can address and resolve your organization’s challenges to successfully achieve its strategic goals. Welcome to the first week of the course! Get started by reviewing your learning objectives for this module and some helpful "housekeeping" information about the course. Then we will dive into learning about the gap between strategy design and delivery. Let's get started! 12 videos8 readings2 assignments3 discussion prompts Welcome to the second week of the course! This week we are diving into the Guiding Principles. Please review your learning objectives for this week and then let's get started! 15 videos7 readings1 assignment5 discussion prompts Well done for making it to the third week of the course! This week we are continuing our journey through the Guiding Principles. Let's keep the momentum going! 12 videos6 readings1 assignment4 discussion prompts Well done! You've made it to the fourth week of the course. This week we finish learning about the remaining Guiding Principles. Keep up the good work! 11 videos6 readings1 assignment4 discussion prompts Nice work - you've made it to the fifth and final week of the course. This week you'll take everything you've learned and apply it in a final project. Good luck, and enjoy Module 5! 1 video3 readings Choice 1: "RTech Becomes a Global Tech Player" | Choice 2: "Taxing Challenges for Pavlova" | Choice 3: "Reinventing Steifen's Life Foundation" 9 readings6 assignments3 peer reviews | 6 modules | Intermediate level | null | https://www.coursera.org/learn/bridging-strategy-design-delivery-gap | 97% |
320 | Developing Explainable AI (XAI) | Enrollment number not found | Rating not found | null | Brinnae Bent, PhD | Duke University | ['XAI', 'Machine Learning', 'Explainable AI (XAI)', 'Artificial Intelligence', 'Interpretable Machine Learning'] | As Artificial Intelligence (AI) becomes integrated into high-risk domains like healthcare, finance, and criminal justice, it is critical that those responsible for building these systems think outside the black box and develop systems that are not only accurate, but also transparent and trustworthy. This course provides a comprehensive introduction to Explainable AI (XAI), empowering you to develop AI solutions that are aligned with responsible AI principles. Through discussions, case studies, and real-world examples, you will gain the following skills:
1. Define key XAI terminology and concepts, including interpretability, explainability, and transparency.
2. Evaluate different interpretable and explainable approaches, understanding their trade-offs and applications.
3. Integrate XAI explanations into decision-making processes for enhanced transparency and trust.
4. Assess XAI systems for robustness, privacy, and ethical considerations, ensuring responsible AI development.
5. Apply XAI techniques to cutting-edge areas like Generative AI, staying ahead of emerging trends.
This course is ideal for AI professionals, data scientists, machine learning engineers, product managers, and anyone involved in developing or deploying AI systems. By mastering XAI, you'll be equipped to create AI solutions that are not only powerful but also interpretable, ethical, and trustworthy, solving critical challenges in domains like healthcare, finance, and criminal justice.
To succeed in this course, you should have experience building AI products and a basic understanding of machine learning concepts like supervised learning and neural networks. The course will cover explainable AI techniques and applications without deep technical details. In this module, you will be introduced to the concept of Explainable AI and how to develop XAI systems. You will learn how to differentiate between interpretability, explainability, and transparency in the context of AI; how to identify algorithmic bias, and how to critically examine ethical considerations in the context of responsible AI. You will apply these learnings through discussions and a quiz assessment. 5 videos8 readings1 assignment4 discussion prompts In this module, you will learn how to describe XAI techniques and approaches, examine the trade-offs and challenges in developing XAI systems, and understand emerging trends in applying XAI to Generative AI applications. You will apply these learnings through discussions and a quiz assessment. 10 videos2 readings2 assignments2 discussion prompts In this module, you will learn how to integrate XAI explanations into decision-making processes, understand considerations for the evaluation of XAI systems, and identify ways to ensure robustness and privacy in XAI systems. You will apply these learnings through case studies, discussion, and a quiz assessment. 14 videos1 reading3 assignments3 discussion prompts | 3 modules | Intermediate level | 8 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/explainable-ai-xai | null |
321 | Breastfeeding: Public Health Perspectives | 3,123 | 4.8 | 16 | Olivia S. Anderson | University of Michigan | ['Breastfeeding', 'Public Health'] | Engaging in this course will provide you with the opportunity to think about breastfeeding and its public health implications. The Socio-Ecological Model will be the framework of the course as we think about how each level of the Model (individual, interpersonal, community, organizational, and public policy) impacts breastfeeding practices in the United States, and globally. Through short video lectures you will be introduced to relevant topics related to the public health perspectives of breastfeeding such as the maternal and child short- and long-term health benefits, economic and environmental impacts, the state of health profession curricula surrounding breastfeeding education, and breastfeeding practices of the LGBTQ+ community.
You will apply this knowledge to critique breastfeeding literature, create a breastfeeding budget for a particular breastfeeding parent persona, and design an education material to promote breastfeeding. As you complete this course, you should feel confident in identifying the barriers to successful breastfeeding practices and understand how adequate breastfeeding will impact population health. This Module will address the following: What is a Public Health Problem? The Socio-ecological lens; Overview of breastfeeding environment in the US and globally. 6 videos9 readings2 assignments1 app item1 discussion prompt This Module will address the following: Maternal Self-Efficacy, Family, and Community Support for Breastfeeding. 8 videos1 assignment1 peer review This Module will address the following: Support from Health Care Providers and Employers 6 videos2 readings1 assignment1 peer review1 app item This Module will address the following: Research and Surveillance 5 videos4 readings3 assignments1 app item | 4 modules | Beginner level | null | https://www.coursera.org/learn/breastfeeding-public-health-perspectives | null |
322 | Experimental Methods in Systems Biology | 22,753 | 4.5 | 310 | Marc Birtwistle, PhD | Icahn School of Medicine at Mount Sinai | [] | Learn about the technologies underlying experimentation used in systems biology, with particular focus on RNA sequencing, mass spec-based proteomics, flow/mass cytometry and live-cell imaging. A key driver of the systems biology field is the technology allowing us to delve deeper and wider into how cells respond to experimental perturbations. This in turns allows us to build more detailed quantitative models of cellular function, which can give important insight into applications ranging from biotechnology to human disease. This course gives a broad overview of a variety of current experimental techniques used in modern systems biology, with focus on obtaining the quantitative data needed for computational modeling purposes in downstream analyses. We dive deeply into four technologies in particular, mRNA sequencing, mass spectrometry-based proteomics, flow/mass cytometry, and live-cell imaging. These techniques are often used in systems biology and range from genome-wide coverage to single molecule coverage, millions of cells to single cells, and single time points to frequently sampled time courses. We present not only the theoretical background upon which these technologies work, but also enter real wet lab environments to provide instruction on how these techniques are performed in practice, and how resultant data are analyzed for quality and content. Description goes here 5 videos6 readings1 assignment Description goes here 5 videos4 readings1 assignment Description goes here 6 videos3 readings1 assignment Description goes here 1 assignment Description goes here 7 videos4 readings1 assignment Description goes here 5 videos4 readings1 assignment Description goes here 3 videos4 readings1 assignment 1 assignment | 8 modules | null | 18 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/experimental-methods | 95% |
323 | GenAI in Social Media Marketing | Enrollment number not found | Rating not found | null | Anke Audenaert | Meta | ['Target Audience', 'Social Media Marketing', 'Generative AI', 'Social Media Content Creation', 'Digital Marketing'] | In this short course, you learn what generative AI is and discover how it can be applied in different business scenarios. You will explore how you can utilize generative AI to enhance your social media strategy, target your audience and streamline your social media content creation. You are introduced to Meta's powerful AI tools. In this short course, you learn what generative AI is and discover how it can be applied in different business scenarios. You will explore how you can utilize generative AI to enhance your social media strategy, target your audience and streamline your social media content creation. You are introduced to Meta's powerful AI tools. 9 videos6 readings5 assignments | 1 module | Beginner level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/genai-in-social-media-marketing | null |
324 | Operating Systems: Overview, Administration, and Security | 141,545 | 4.6 | 5,487 | IBM Skills Network Team | IBM | ['Operating Systems', 'Directory and File Management', 'User (Computing)', 'Virtualization', 'Linux, Windows, MacOS', 'User Accounts'] | 51% of organizations are planning to increase security investments as a result of a breach (IBM Report). Companies need skilled IT support and cybersecurity professionals now more than ever. Whether you’re just starting out or switching to tech, this course provides the critical operating systems (OS) knowledge you need to move forward. Operating systems are fundamental to all aspects of computing. In this course, you’ll learn foundational concepts common to all operating systems and the unique aspects of Windows, Linux, and MacOS.
You’ll explore OS file systems and the associated security features. You'll discover the macOS features that revolutionized OS functionality. Plus, you’ll investigate virtualization and containerization.
Additionally, through labs and a final project, you’ll get hands-on managing virus and threat protection, configuring user accounts and permissions with command-line tools, and securing systems against threats.
If you’re looking to get started IT or cybersecurity, enroll today to gain essential knowledge in operating systems that enables you to work towards a career in cybersecurity, system administration, network engineering, or IT support. In this module, you will learn about file systems and the directory structure of the Windows operating system. You will also learn how Windows separates 32-bit and 64-bit applications. The module will also enable you to explore Windows user mode and kernel mode components. Finally, you will have the opportunity to manage Windows files and folders, explore Microsoft Windows server features, and use Microsoft Windows command prompt tools for administration through hands-on labs. 12 videos4 readings3 assignments4 app items5 plugins In this module, you will learn about Microsoft Windows security settings to protect your system against various threats. You will also be able to create a firewall rule in Microsoft Windows Defender through a hands-on lab. Next, you will recognize the importance of patches and updates in protecting against cyberattacks. You will also explore Microsoft Update and some critical practices to ensure a smooth and successful update experience. The module will also explore Kerberos and its benefits in domain-based authentication systems. Finally, you’ll learn to uncover system vulnerabilities and weaknesses through security auditing techniques. 8 videos1 reading2 assignments2 app items2 plugins In this module, you will learn about Linux systems and shell commands to efficiently perform various system administration tasks. You will have access to a Linux and Bash commands cheat sheet, which will serve as a ready reckoner for commonly used commands and their syntax in the Linux terminal. This module will also cover Linux file systems, directory structures, and run levels. You will also have the opportunity to get started with the Linux terminal, explore common Linux and Unix commands, and navigate Linux user management tasks through hands-on labs. 5 videos1 reading2 assignments4 app items5 plugins In this module, you will learn about macOS, its features, preferences, and how to upgrade it. You will also learn the differences between iOS and Android. The module will cover fundamental concepts of virtualization and cloud computing. You will also have the opportunity to explore macOS features, create a virtual machine simulation, and explore containers, Docker, and IBM Cloud through hands-on labs. 9 videos2 readings3 assignments1 app item7 plugins 2 videos2 readings1 peer review2 app items1 plugin | 5 modules | Beginner level | null | https://www.coursera.org/learn/operating-systems-overview-administration-security | 92% |
325 | English for Career Development | 2,562,331 | 4.8 | 15,792 | Brian McManus | University of Pennsylvania | ['Communication', 'English Language', 'Career Development', 'Writing'] | Welcome to English for Career Development, a course created by the University of Pennsylvania, and funded by the U.S. Department of State Bureau of Educational and Cultural Affairs, Office of English Language Programs. To enroll in this course for free, click on “Enroll now” and then select "Full Course. No certificate."
This course is designed for non-native English speakers who are interested in advancing their careers in the global marketplace. In this course, you will learn about the job search, application, and interview process in the United States, while comparing and contrasting the same process in your home country. This course will also give you the opportunity to explore your global career path, while building your vocabulary and improving your language skills to achieve your professional goals. The first unit in this course will introduce the U.S. job application process and provide strategies for identifying the jobs that match your interests and skills. Unit 2 will take you through the steps necessary to produce a professional-looking resume. In unit 3, you will work to develop a clear and concise cover letter. The final unit of the course focuses on networking and interview skills.
Anyone may take this course for free. If you want to get a Coursera Verified Certificate for free, please fill out the Financial Aid form.
Unless otherwise noted, all course materials are available for re-use, repurposing and free distribution under a Creative Commons 4.0 Attribution license.
Supplemental reading materials were provided by Newsela, which publishes daily news articles at a level that's just right for each English language learner. In this unit you will learn about the steps in the job search process. 15 videos12 readings14 assignments1 peer review In this unit, you will learn how to describe yourself and your experiences in a résumé. The unit will also help you build your job-related vocabulary. 12 videos12 readings14 assignments1 peer review This unit focuses on another important document for job-seekers: the cover letter. You will learn how to write a clear cover letter that tells employers why you are the right person for the job. 11 videos9 readings11 assignments1 peer review This unit will teach job-seekers language for meeting new people, making small talk, and describing 8 videos9 readings6 assignments1 peer review This unit is about the question-and-answer process of job interviews, and will help prepare learners to present themselves well in interviews. 10 videos8 readings7 assignments | 5 modules | null | 40 hours to complete (3 weeks at 13 hours a week) | https://www.coursera.org/learn/careerdevelopment | 99% |
326 | Managing and Securing the Apigee Hybrid API Platform | Enrollment number not found | 4.5 | 16 | Google Cloud Training | Google Cloud | [] | This course discusses how environments are managed in Apigee hybrid, and how runtime plane components are secured. You will also learn how to deploy and debug API proxies in Apigee hybrid, and about capacity planning and scaling. Introduction to the management and security course on Google Cloud’s Apigee hybrid API platform. 2 videos In this module, you learn about API proxy deployment and environment management on the hybrid platform. 7 videos1 assignment This module discusses how the Apigee hybrid runtime plane infrastructure components and data are secured. 6 videos1 assignment This module discusses capacity planning for Apigee hybrid, and how the runtime components can be scaled to process increases in the volume of API traffic to your proxies. 6 videos1 assignment PDF links to all modules 1 reading | 5 modules | Beginner level | 2 hours to complete | https://www.coursera.org/learn/management-and-security-of-apigee-hybrid-api-platform | null |
327 | The Art of Storytelling | 15,247 | 4.5 | 370 | Greg Burke | IESE Business School | ['Active Listening', 'Effective Communication', 'Confidence in Presentation', 'Writing Techniques'] | Elevate your public speaking with the course on the art of storytelling: - Learn to create captivating stories that resonate, enhancing your ability to connect and leave a lasting impression.
- Perfect your narrative skills and transform every speech into an unforgettable experience. Welcome to the Art of Storytelling short course! The art of storytelling has been effective in generating memorable content that is easy to share and remember, exciting enough to capture the audience's attention and a source of inspiration to mobilize people around a common project. 6 videos4 readings3 assignments | 1 module | Beginner level | 1 hour to complete | https://www.coursera.org/learn/the-art-of-storytelling-iese | null |
328 | Performance Assessment in the Virtual Classroom | 14,140 | 4.7 | 489 | Racquel Stephens | University of California, Irvine | [] | Welcome to Performance Assessment in the Virtual Classroom! This course will help you effectively assess student performance virtually, including compliance issues, feedback models, online grade book functions, and data analysis. We will discuss why effective measures of performance and assessment are a crucial component of any virtual program, and the importance of teachers and administrators understanding both the myths and challenges of assessing performance virtually, administering standardized testing with geographical challenges, and complying with state and local requirements to make sure students are meeting requirements. Through the successful completion of this course, you will be able to:
• Examine the importance of authentic performance and assessment in the virtual classroom.
• Discuss academic integrity and remote assessments in the virtual classroom.
• Apply best practices for data analysis and grade book management.
• Consider performance and assessment for special populations: gifted, at-risk, and special needs students.
• Discuss the importance of instructional feedback and monitoring progress and performance using technology. Welcome to Module 1 of Performance Assessment in the Virtual Classroom. This module introduces the importance of testing and performance in the virtual classroom and discusses authentic assessment and the value of including multiple measures of assessment within a course. Additional topics include considerations for compliance, auditing, accreditation, and funding, and the preparation of students for high stakes testing, AP course requirements, NCAA requirements, and university admission requirements. Although the reasons why K-12 students take online courses can vary, both parents and students are increasingly seeking courses that are university-approved and are sufficiently rigorous to prepare students for high-stakes testing. 10 readings1 assignment1 discussion prompt Welcome to Module 2 of Performance Assessment in the Virtual Classroom. This module introduces performance assessment in the virtual setting and discusses the dichotomy between seat time and performance (or subject matter mastery) as the basis for passing a course. In addition, we’ll take a look at academic integrity in the virtual classroom and explore how teachers can effectively guide students in using the many resources that are available online. Finally, we’ll examine several technological advances that can help preserve academic integrity. Ultimately, teachers need to use all means at their disposal to monitor academic integrity in the virtual environment. 10 readings1 assignment1 discussion prompt Welcome to Module 3 of Performance Assessment in the Virtual Classroom. In this module, we will look at performance and assessment as related to data and data management and explore how the weights, percentages, and number of course assignments affect the total grade outcome of any course. Additionally, we will discuss why the assignments score and weight are just as important as the types of assignments given, the reasonableness of course assessments, and the overall gradebook practices. By using a learning management system (LMS), students can see the layout of their virtual courses throughout the semester in order to analyze the number of assignments given, find out how assignments are weighted, and decide where they should direct their attention and effort in order to succeed. 4 readings1 assignment1 discussion prompt Welcome to Module 4 of Performance Assessment in the Virtual Classroom. In this module, we will look at performance and assessment as related to three special student populations, e.g., gifted students, at-risk students, and special needs students, and the considerations for how to administer alternate assessments and accommodations in the virtual environment. We will also look at the choice of a learning management system (LMS), and how it plays a major role in how accommodations will be provided. 10 readings1 assignment1 discussion prompt Welcome to Module 5 of Performance Assessment in the Virtual Classroom. In this module, we will discuss the importance of instructional feedback and how it affects a student's performance in the online setting. We will also determine which instructional feedback tools are appropriate for monitoring and assessing student performance. 12 readings1 assignment1 discussion prompt | 5 modules | null | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/performance-assessment | 98% |
329 | Infrastructure Automation with Terraform | 1,734 | Rating not found | null | Whizlabs Instructor | Whizlabs | [] | Terraform is one of the most recognized infrastructure automation tools that help in addressing various real-life challenges. Infrastructure automation is a reliable instrument for improving productivity, efficiency, and reduction of operational downtime for enterprises. As a result, you can gain better career opportunities with skills in infrastructure automation with Terraform. This training course helps you develop your skills and knowledge in Terraform. You can learn the skills for developing cloud infrastructure in an effective and reliable manner. In addition, you can also develop the skills for automation of infrastructure by using Terraform for public cloud platforms such as AWS, GCP, and Azure. Therefore, you can become a valuable asset for many enterprises and access many opportunities for career growth.
This course contains 5+ hours of training videos. Learners could find a total of 33 lectures in the training course with comprehensive coverage of all topics regarding the implementation of Terraform for infrastructure automation. These lectures are divided into 5 Modules and each module is further split into lessons. The entire course includes Assessments to validate knowledge checks of learners. Also a set of Graded Questions is available at the end of every module.
By the end of this course, you will be able to:
-Describe how to automate infrastructure on Cloud using Terraform.
-Deploy resources on AWS, GCP and Azure using Terraform
-Analyze basic to Advanced features available in Terraform
-Implement setup and manage infrastructure with Terraform Welcome to Introduction to Infrastructure Automaton with Terraform. In the first week, we will learn a brief introduction of Terraform as Infrastructure as Code. We will learn comparison of Terraform with other Infrastructure as Code tools and perform installation of Terraform. 4 videos2 readings3 assignments1 discussion prompt In the second week of the course, we'll learn how to manage and deploy resources on AWS Infrastructure. we'll analyze the importance of Modules. In the end, you will know the steps to configure AWS infrastructure as backend storage 8 videos1 reading2 assignments In the third week of the course, we'll understand the importance of Modules. We'll also learn the use case of provisioners along with their types. At the end of the week, we'll illustrate working in remote state. 7 videos1 reading2 assignments In the fourth week of the course, we'll explore advanced features of Terraform such as local variables, built-in functions. Also, we'll learn to configure resource dependency with Terraform. In the end you will have clarity to Identify how to override existing configuration using files override concept. 3 videos1 reading3 assignments1 discussion prompt In the fifth week of the course, we'll learn to manage and deploy resources on Google Cloud Platform. We'll also analyze the use of data sources to identify a network created out of Terraform. we'll learn to implement the use of modules from the Terraform registry. In the end you will configure Google Cloud infrastructure as backend storage 7 videos1 reading3 assignments1 discussion prompt In the sixth week of the course, we'll learn to manage and deploy resources on Azure. We'll also analyze the use of data sources to create a Virtual Machine. In the end of the course we will learn to configure Azure infrastructure as backend storage 4 videos2 readings3 assignments1 discussion prompt | 6 modules | null | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/infrastructure-automation-with-terraform | null |
330 | Advanced Tools for Digital Marketing Analytics | 1,961 | 4.7 | 25 | Unilever Team | Unilever | ['Predictive Analytics', 'Mobile Marketing', 'Marketing Automation', 'Machine Learning', 'scaling strategies', 'Ethics'] | The Advanced Tools for Digital Marketing Analytics course explores cutting-edge tools and technologies that are transforming the landscape of digital marketing analytics such as marketing automation and scaling strategies, predictive analytics and algorithms, video and mobile marketing trends, as well as artificial intelligence (AI), natural language processing (NLP), and ethics. You’ll also walk through preparing a portfolio and supporting a career change to digital marketing analyst. After completing this course, you will be able to:
- Describe marketing automation and software applications that support it.
- Strategically assess scalability options for marketing campaigns.
- Identify the current applications of predictive analytics for digital marketing.
- Use data summarization, experimentation, and analysis as an application for targeting.
- Describe the future of video and mobile marketing and their impact on the digital marketing channel mix.
- Describe how AI and machine learning benefit digital marketing campaigns.
- Define NLP and identify its impact on digital marketing.
- Examine ethical considerations impacting digital marketing and recognize the potential impact of future advances. In this module, you will enter the exciting world of marketing automation and explore its role in streamlining marketing processes. 9 videos7 readings7 assignments In this module, you will explore predictive analytics and its applications in the realm of digital marketing. 6 videos6 readings5 assignments1 discussion prompt In this module, you will explore the exciting world of video marketing and mobile marketing and their significant impact on the digital marketing landscape. 8 videos5 readings7 assignments In this module, you will explore the powerful intersection of AI, machine learning, and digital marketing. You'll also examine the ethical considerations that arise with the implementation of AI and envisioning the potential impacts of future advancements. You will also focus on career and job search tasks to help prepare you for a marketing analyst role. 13 videos10 readings8 assignments | 4 modules | Beginner level | 20 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/advanced-tools-for-digital-marketing-analytics | null |
331 | MLOps Tools: MLflow and Hugging Face | 7,580 | 3.7 | 33 | Noah Gift | Duke University | ['Modeling', 'Information Engineering', 'Cloud Computing', 'hugging face', 'Machine Learning Software'] | This course covers two of the most popular open source platforms for MLOps (Machine Learning Operations): MLflow and Hugging Face. We’ll go through the foundations on what it takes to get started in these platforms with basic model and dataset operations. You will start with MLflow using projects and models with its powerful tracking system and you will learn how to interact with these registered models from MLflow with full lifecycle examples. Then, you will explore Hugging Face repositories so that you can store datasets, models, and create live interactive demos. By the end of the course, you will be able to apply MLOps concepts like fine-tuning and deploying containerized models to the Cloud. This course is ideal for anyone looking to break into the field of MLOps or for experienced MLOps professionals who want to improve their programming skills. In this module, you will learn what MLflow is and how to use it. You’ll install MLflow and perform basic operations like registering runs, models, and artifacts. Then, you’ll create an MLflow project for reproducible results. Finally, you’ll understand how to use a registry with MLflow models and reference artifacts from the API. 13 videos12 readings3 assignments2 discussion prompts1 ungraded lab In this module, you will learn the basics of the Hugging Face platform. You will use some of its features like its repositories so that you can store models and datasets. Finally, you will learn how to add and use models and datasets using Hugging Face APIs as well as the web interface. 14 videos9 readings1 assignment1 ungraded lab In this module, you will learn how to containerize Hugging Face models and use the FastAPI framework to serve the model with an interactive HTTP API endpoint. Once you understand how to put everything together, you’ll use automation for speed and reproducibility. Finally, you’ll use Azure and Docker Hub to store the containers so that they can be used later for deployments. 13 videos9 readings3 assignments1 ungraded lab In this module, you will learn how to fine-tune Hugging Face models by using pre-existing models and then modifying (fine-tuning) them with additional data. You’ll also use Azure to deploy the container and learn how to troubleshoot it. Finally, you’ll also see how to deploy a model to Hugging Face spaces. 17 videos10 readings3 assignments5 ungraded labs | 4 modules | Advanced level | 25 hours to complete (3 weeks at 8 hours a week) | https://www.coursera.org/learn/mlops-mlflow-huggingface-duke | null |
332 | Gender, Family, and Social Change in Contemporary South Korea | 23,650 | 4.8 | 307 | Hyun Mee Kim | Yonsei University | [] | This course examines the transformation of Korean society beginning around the turn of the 20th century to contemporary times. In particular, it explores how shifting categories of masculinity, and by contrast, femininity have impacted upon, and in turn been influenced by social, cultural, and political change. Using multiple disciplinary lenses, we will critically examine how gender intersects with political, social, and economic developments starting with the Confucianization of Korean society during the Joseon Dynasty (1392-1910) up to the contemporary moment of globalization and neoliberal reform. The class will draw on a variety of topics such as traditional views of women, religion, race, class, education, patriarchy, sexuality, imperialism, modernity, war, globalization, the diaspora, among others. Special attention will be placed on the historical, transnational and transdisciplinary connections. Broad overview of Korean history and literature beginning in the Joseon period with a particular focus on a series of social and cultural transformations that would have profound impact on the gender relations starting with Confucianism. 4 videos1 reading4 assignments1 peer review4 discussion prompts Introduction to the strategically gendered division of role in making modern Korean families and contemporary changes in the perception of marriage and family in Korea. 3 videos1 reading1 assignment1 peer review3 discussion prompts Examine a range of topics including cosmetic surgery to male circumcision and body lines to understand how female and male beauty standards and aesthetics have changed over the past two centuries. 3 videos4 readings1 peer review3 discussion prompts Discuss the issues of sexualities in contemporary Korea, ranging from the relationship between family and sexuality, commodified sexuality, to the issues of sexual minorities. 3 videos1 reading1 assignment1 peer review3 discussion prompts Provide an overview of current positive changes in Korea related to gender and discuss impending issues of contemporary feminist movement and comfort women before concluding the lecture series. 4 videos3 readings1 assignment2 peer reviews1 discussion prompt | 5 modules | Beginner level | null | https://www.coursera.org/learn/social-change-korea | 96% |
333 | Global Health Innovations Specialization | 6,673 | 4.7 | 185 | Dr Matthew Harris | Imperial College London | ['Innovation', 'Public Health', 'Entrepreneurship'] | This specialisation reflects on global health challenges and the role of innovative solutions in addressing them. It is intended for public health professionals, budding entrepreneurs and innovators, as well as those interested in understanding the role innovation plays in the health industry. The specialisation begins by providing learners with the ‘nuts and bolts’ of technology and innovation management, including key definitions and terminologies. You'll then examine ethical dimensions of innovation and explore how innovations can be supported through effective financing, protection and other incentives to support entrepreneurship. The specialisation will include in-depth examination of a variety of innovation case studies, using a variety of theoretical and practical frameworks, to understand what makes an innovation more likely to be adopted. You will also explore entrepreneurship and the skills necessary to take an idea through to invention and then innovation - and how to galvanise support for it. By the end of the specialisation, you will be able to consider, in detail, and using appropriate terminology and frameworks, a particular innovation, explaining its added value in a particular context and in a persuasive manner. Applied Learning Project Learners will create entrepreneurial style pitches to persuade their audience to adopt a healthcare innovation. In order to do this they will analyse good and poor examples, write and review pitch scripts, and study the science of persuasion. Aditionally, learners will evaluate and discuss specific healthcare innovations from around the globe by applying the knowledge they've acquired on innovation features, innovation types, intellectual property, adoption and scaleability. Describe the principles and key types of innovation in order to characterise the fundamental features of new models of care or technologies. Consider the key factors that influence the adoption and scaling up of different types of healthcare innovations Compare and contrast the systems and processes supporting the investment and protection of healthcare innovation to navigate innovation journeys. Consider key factors influencing the adoption and scaling up of different healthcare innovations so as to examine what success looks like. Analyse how organizational structure, culture and resources are key in adoption in relation to organizational contexts. Examine how cognitive, normative and affective aspects can influence perception regarding an innovation's attractiveness and scaleability. Apply persuasive techniques to connect to audiences involved in the process of innovation scaling and adoption. | 3 course series | Beginner level | 2 months (at 10 hours a week) | https://www.coursera.org/specializations/global-health-innovations | null |
334 | Student Success Specialization | Enrollment number not found | 4.9 | 8 | Kyle Smith | American Psychological Association | ['Effective Coping', 'Metacognition', 'Learning Strategies', 'Effective Written Communication', 'Building Resilience', 'Effective Coping', 'Metacognition', 'Learning Strategies', 'Effective Written Communication', 'Building Resilience'] | Students want to be successful when they embark on a learning journey. That success is dependent on a constellation of factors: 1) they need to be able to process the material that is presented in the learning experience; 2) they need the learning experience itself to be a manageable one, without overwhelming stressors that impact their mental and physical well-being; and 3) they need to be able to communicate what they are learning, especially through written channels. These courses delve into the cognitive psychological principles that successful students can use to master course material, the physiological and psychological effects of stress and techniques to overcome them, and the necessary writing skills for effective written communications. Taken together, these courses provide the foundation students need to be successful in whatever learning environments they find themselves in. Applied Learning Project Over the duration of each course, students will be presented with formative assessments to assess their knowledge on concepts that have just been covered. At the end of every module there are summative assessments which are tracked and graded to assess your overall understanding. Finally, at the end of each course you are presented with an overall course level assessment. Identify the shortcomings of your current study habits to improve the way you use notes, highlighting, flashcards, and other classic study tools. Learn to use scientifically validated learning techniques to improve your studying and increase your retention. Create effective plans to overcome procrastination Apply essential elements of the writing process to create an impactful and error-free written document that effectively communicates to the audience. Employ writing tools, organizing strategies, and source discovery and integration techniques to simplify and improve the drafting process. Utilize revising, editing, and polishing techniques to enhance a first draft, and adopt practices to stay motivated and avoid writer's block. Understand the nature of stress and identify its common causes and symptoms. Describe the psychological, social, and physiological consequences of stress. Explain how to effectively cope with stressors and prepare yourself to be able to grow after a stressor | 3 course series | Beginner level | 3 months (at 5 hours a week) | https://www.coursera.org/specializations/student-success | null |
335 | Predictive Modeling and Transforming Clinical Practice | 2,393 | Rating not found | null | Laura K. Wiley, PhD | University of Colorado System | [] | This course teaches you the fundamentals of transforming clinical practice using predictive models. This course examines specific challenges and methods of clinical implementation, that clinical data scientists must be aware of when developing their predictive models. Learn about the many types of clinical prediction models that exist and how they are put into practice. 8 videos4 readings1 assignment Understand how qualitative methods can be used to develop clinical prediction models that are more likely to transform clinical practice. 9 videos1 assignment1 peer review Learn about the different tools that are used to implement clinical prediction models in practice and the factors that affect implementations over time. 5 videos1 assignment Understand how the different types of clinical data can be used in prediction models and learn how choices made during model construction affect the utility of the model in practice. 8 videos2 readings2 assignments Put your new skills to the test - develop a clinical prediction model to asses risk of death during a stay in an Intensive Care Unit (ICU) stay. 1 video1 peer review | 5 modules | Intermediate level | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/clinical-predictive-modeling | null |
336 | Conflict Management For Everyone Specialization | Enrollment number not found | 4.8 | 9 | CareerCatalyst | Arizona State University | ['Soft skills', 'Professional Skills', 'Soft skills', 'Professional Skills'] | By the end of the specialization, you will be able to: Assess conflict types and identify the needs and responses of all conflicting parties. Identify when conflicts arise and manage them in multiple settings. Respond to conflict appropriately and brainstorm for solutions you can follow through on. Prepare for negotiations by finding alternatives and making offers to reach the best solution for all involved. Applied Learning Project Conflict is a part of life. Everyone wants different things, and sometimes those needs can clash. You have to be able to see conflict clearly, address it appropriately and find the best solution. You also need to understand the needs of everyone involved to get this process done right. Luckily, you can learn these conflict management skills from this specialization. With the expertise of ASU’s Sandra Day O’Connor College of Law, the Conflict Management specialization will put the tools, knowledge and strategies for addressing conflict directly into your hands. You’ll learn the fundamentals and get acquainted with your conflict management toolkit. Then, you’ll directly apply them in hands-on scenarios. Conflict management can seem a lot like settling an argument — but it’s much more than that. To resolve conflict, you need to know what kind it is and what solutions are available. You also need to understand what everyone is trying to accomplish during this conflict. Do you struggle to recognize conflicts early enough? Do you need to learn about the ways you and others face conflict? Learn these skills and more from the Assessing Conflict course! Do you want the best strategies for handling conflict in person, over the phone or in an email? Learn the skills to recognize and address conflicts from this Managing Conflict course! Do you want the best strategies for building options in a negotiation? Do you need to learn about best alternatives and building a counteroffer? Learn these skills and more from the Negotiation course! Do you struggle to find conflict solutions and follow through with them? Do you need to learn about responding to conflict? Learn these skills and more from the Resolving and Transforming Conflict course! | 4 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/conflictmanagementforeveryone | null |
337 | Mathematics for Machine Learning: Linear Algebra | 394,724 | 4.7 | 12,163 | David Dye | Imperial College London | ['Eigenvalues And Eigenvectors', 'Basis (Linear Algebra)', 'Transformation Matrix', 'Linear Algebra'] | In this course on Linear Algebra we look at what linear algebra is and how it relates to vectors and matrices. Then we look through what vectors and matrices are and how to work with them, including the knotty problem of eigenvalues and eigenvectors, and how to use these to solve problems. Finally we look at how to use these to do fun things with datasets - like how to rotate images of faces and how to extract eigenvectors to look at how the Pagerank algorithm works. Since we're aiming at data-driven applications, we'll be implementing some of these ideas in code, not just on pencil and paper. Towards the end of the course, you'll write code blocks and encounter Jupyter notebooks in Python, but don't worry, these will be quite short, focussed on the concepts, and will guide you through if you’ve not coded before.
At the end of this course you will have an intuitive understanding of vectors and matrices that will help you bridge the gap into linear algebra problems, and how to apply these concepts to machine learning. In this first module we look at how linear algebra is relevant to machine learning and data science. Then we'll wind up the module with an initial introduction to vectors. Throughout, we're focussing on developing your mathematical intuition, not of crunching through algebra or doing long pen-and-paper examples. For many of these operations, there are callable functions in Python that can do the adding up - the point is to appreciate what they do and how they work so that, when things go wrong or there are special cases, you can understand why and what to do. 5 videos4 readings3 assignments1 discussion prompt1 plugin In this module, we look at operations we can do with vectors - finding the modulus (size), angle between vectors (dot or inner product) and projections of one vector onto another. We can then examine how the entries describing a vector will depend on what vectors we use to define the axes - the basis. That will then let us determine whether a proposed set of basis vectors are what's called 'linearly independent.' This will complete our examination of vectors, allowing us to move on to matrices in module 3 and then start to solve linear algebra problems. 8 videos4 assignments Now that we've looked at vectors, we can turn to matrices. First we look at how to use matrices as tools to solve linear algebra problems, and as objects that transform vectors. Then we look at how to solve systems of linear equations using matrices, which will then take us on to look at inverse matrices and determinants, and to think about what the determinant really is, intuitively speaking. Finally, we'll look at cases of special matrices that mean that the determinant is zero or where the matrix isn't invertible - cases where algorithms that need to invert a matrix will fail. 8 videos2 assignments1 programming assignment1 ungraded lab In Module 4, we continue our discussion of matrices; first we think about how to code up matrix multiplication and matrix operations using the Einstein Summation Convention, which is a widely used notation in more advanced linear algebra courses. Then, we look at how matrices can transform a description of a vector from one basis (set of axes) to another. This will allow us to, for example, figure out how to apply a reflection to an image and manipulate images. We'll also look at how to construct a convenient basis vector set in order to do such transformations. Then, we'll write some code to do these transformations and apply this work computationally. 6 videos2 assignments2 programming assignments2 ungraded labs Eigenvectors are particular vectors that are unrotated by a transformation matrix, and eigenvalues are the amount by which the eigenvectors are stretched. These special 'eigen-things' are very useful in linear algebra and will let us examine Google's famous PageRank algorithm for presenting web search results. Then we'll apply this in code, which will wrap up the course. 9 videos1 reading4 assignments1 programming assignment1 ungraded lab2 plugins | 5 modules | Beginner level | null | https://www.coursera.org/learn/linear-algebra-machine-learning | 91% |
338 | Transacting on the Blockchain | 29,763 | 4.8 | 908 | Don Tapscott | INSEAD | [] | Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. The status quo, however, is rife with inefficiencies. In this course, we’ll address the many challenges of the status quo and discuss how cryptoassets, smart contracts, new identity systems, and new financial business models can help overcome them. You’ll learn how blockchain technology empowers individuals, entrepreneurs, and businesses with the tools they need to help level the playing field and to participate in the value they create. By the end of this course, you’ll learn how and why transacting on the blockchain can help us bring about a future that is faster, fairer, and more distributed than the world we inhabit today. Blockchain is the first native digital medium for value. Consequently, we are witnessing one of the largest transformations of wealth in human history—from paper-based analog assets to digital ones. In this module, students will learn about nine different kinds of cryptoassets, including cryptocurrencies, protocol tokens, non-fungible tokens (NFTs), stablecoins, securities tokens, governance tokens, exchange tokens, natural asset tokens, and central bank digital currencies (CBDCs). 14 videos12 readings4 assignments2 discussion prompts In this module, you will learn what smart contracts are and how they work. We will discuss how blockchain-based smart contracts can enable individuals and organizations to reduce transaction costs, minimize the need for third-party intermediaries, and improve productivity, security, and privacy. 11 videos4 readings5 assignments2 discussion prompts Accessing large, centralized systems such as email, health insurance, or a bank account requires the provision of various identifiers—for example, government-issued ID cards, self-selected passwords, or biometric data. However, identifier-based systems are problematic—both administratively and philosophically. In this module you will learn about five problems with identifier-based systems and explain how a distributed self-sovereign identity system, deployed on the blockchain, can resolve many of these issues. 9 videos3 readings3 assignments2 discussion prompts The current global financial system is riddled with inefficiencies, uneven developments and bizarre contradictions. Blockchain technology has the potential to bring about profound changes to financial services. In this module, you will learn how blockchain technology will disrupt the core functions of the financial services industry, offering individuals and organizations alike real choices in how they create and manage value. 8 videos4 readings4 assignments1 discussion prompt | 4 modules | Intermediate level | null | https://www.coursera.org/learn/transacting-blockchain | 97% |
339 | Computer Vision with Embedded Machine Learning | 21,804 | 4.8 | 134 | Shawn Hymel | Edge Impulse | ['Computer Programming', 'Python Programming', 'Machine Learning', 'Microcontroller', 'Embedded System Development'] | Computer vision (CV) is a fascinating field of study that attempts to automate the process of assigning meaning to digital images or videos. In other words, we are helping computers see and understand the world around us! A number of machine learning (ML) algorithms and techniques can be used to accomplish CV tasks, and as ML becomes faster and more efficient, we can deploy these techniques to embedded systems. This course, offered by a partnership among Edge Impulse, OpenMV, Seeed Studio, and the TinyML Foundation, will give you an understanding of how deep learning with neural networks can be used to classify images and detect objects in images and videos. You will have the opportunity to deploy these machine learning models to embedded systems, which is known as embedded machine learning or TinyML.
Familiarity with the Python programming language and basic ML concepts (such as neural networks, training, inference, and evaluation) is advised to understand some topics as well as complete the projects. Some math (reading plots, arithmetic, algebra) is also required for quizzes and projects. If you have not done so already, taking the "Introduction to Embedded Machine Learning" course is recommended.
This course covers the concepts and vocabulary necessary to understand how convolutional neural networks (CNNs) operate, and it covers how to use them to classify images and detect objects. The hands-on projects will give you the opportunity to train your own CNNs and deploy them to a microcontroller and/or single board computer. In this module, we introduce the concept of computer vision and how it can be used to solve problems. We cover how digital images are created and stored on a computer. Next, we review neural networks and demonstrate how they can be used to classify simple images. Finally, we walk you through a project to train an image classifier and deploy it to an embedded system. 13 videos15 readings4 assignments2 discussion prompts In this module, we go over the basics of convolutional neural networks (CNNs) and how they can be used to create a more robust image classification model. We look at the internal workings of CNNs (e.g. convolution and pooling) along with some visualization techniques used to see how CNNs make decisions. We introduce the concept of data augmentation to help provide more data to the training process. You will have the opportunity to train your own CNN and deploy it to an embedded system. 9 videos13 readings5 assignments1 discussion prompt In this module, we will cover the basics of object detection and how it differs from image classification. We will go over the math involved to measure objection detection performance. After, we will introduce several popular object detection models and demonstrate the process required to train such a model in Edge Impulse. Finally, you will be asked to deploy an object detection model to an embedded system. 10 videos11 readings3 assignments1 discussion prompt1 plugin | 3 modules | Intermediate level | 30 hours to complete (3 weeks at 10 hours a week) | https://www.coursera.org/learn/computer-vision-with-embedded-machine-learning | null |
340 | Program Management Professional PMI-PgMP® Certification Prep Specialization | Enrollment number not found | 4.1 | 12 | LearnKartS | LearnKartS | ['Risk Management', 'Benefits Management', 'Program Governance', 'Stakeholder Management', 'Performance Domains', 'Program Management', 'Project Charter', 'Benefits Realisation Management', 'Life Cycle Planning', 'Risk Management', 'Benefits Management', 'Program Governance', 'Stakeholder Management', 'Performance Domains', 'Program Management', 'Project Charter', 'Benefits Realisation Management', 'Life Cycle Planning'] | This Program Management Professional course specialization is intended for individuals seeking to develop proficiency in program management andalign their skills with the PMI Program Management Professional (PgMP)® Certification.The specialization is structured toexcel in the PMI-PgMP® examframework, ensuring thorough preparation for the certification exam. PMI-PgMP® is a4-course series. Through these four courses, you will explore program lifecycle management, benefits realization, stakeholder engagement, governance, risk management, and performance metrics, preparing you to manage complex programs effectively in diverse environments. It also consists ofcase studies,quizzes, andexam simulatorsfor practicing exam scenarios andhigh-quality instructional videosprepared by industry experts. Furthermore, the specialization course is designed from the ground up, making it ideal for individuals new to program management. Disclaimer:PMI®, PMBOK, PMP®, PgMP®, CAPM®, PMI-RMP®, and PMI-ACP®are registered trademarks of the Project Management Institute, Inc.® Applied Learning Project The PgMP Certification Prep course comprises9 case studiescovering various aspects of program management. These case studies cover essential topics such asprogram closure, financial closure, resource management, benefits management framework establishment, governance model development, stakeholder engagement and analysis, and program management life cycle.
Hence, learners will learn how to navigate program closure processes, ensure financial accountability, optimize resource utilization, establish frameworks for benefits realization, and develop robust governance models.
Additionally, they will gain insights intoadapting governance structures to meet evolving program needs, managing stakeholder engagements effectively, and identifying and analyzing stakeholders' interests and expectations throughout the program life cycle. Analyze how organizational strategy aligns with program management responsibilities. Gain insight into essential ECO tasks. Apply program management principles to formulate a program governance plan. Grasp the foundational aspects of program management. Comprehend program management and its lifecycle stages, including practical applications and challenges. Apply understanding of the program management lifecycle, including components like program strategy alignment, and risk assessment. Recognize the significance of benefits management within a program, evaluating its importance and impact. Utilize stakeholder analysis knowledge to assess and manage stakeholder involvement effectively. Understand the program governance framework, including roles, structures, and responsibilities. Outline the stages/phases of the program lifecycle, detailing associated activities. Learn the purpose and operations of a Program Management Office (PMO). Develop effective strategies for program definition, formulation, integration management, delivery management, and closeout processes. Gain a comprehensive understanding of the supporting processes essential for effective program management. Develop proficiency in applying various tools and techniques to support program execution, monitoring, and control. Enhance ability to identify and address challenges related to stakeholder engagement, communication, risk, quality, and change management. Acquire practical skills that can be applied to real-world program management scenarios. | 4 course series | Intermediate level | 2 months (at 3 hours a week) | https://www.coursera.org/specializations/pgmp-program-management-professional-exam-prep-course | null |
341 | AWS Core Services | Enrollment number not found | Rating not found | null | Edureka | Edureka | ['Storing data in block-level storage', 'Scalable Computing Capacity', 'Secure Control Access to resources', 'Develop secure networking solutions', 'AWS Global Infrastructure'] | Welcome to the AWS Core Services course! This course introduces key cloud computing concepts and core AWS services. It covers deploying and managing applications on AWS, familiarizing with the infrastructure, and applying best practices. By the end of this course, you will be able to:
- Discuss the essential components and services of AWS
- Explain the importance of IAM in ensuring secure access to AWS resources
- Implement and manage EC2 instances using AWS Management Console
- Compare the performance characteristics and use cases of different AWS storage solutions
- Develop secure, scalable, and highly available networking solutions using AWS services
This course is tailored for freshers, cloud enthusiasts, and individuals aiming for cloud roles, such as Cloud Engineers, Cloud Architects, and AWS Solutions Architects, who intend to become proficient cloud professionals.
Prior experience with cloud computing and basic knowledge of structured query language (SQL) are recommended.
Join us to explore the power of AWS cloud solutions and elevate your expertise in designing robust cloud solutions. This module covers cloud computing models and AWS Global Infrastructure. Learners will explore cloud service and deployment models, AWS regions, availability zones, and edge locations. The AWS Free Tier will also be introduced to experiment with AWS services at no cost. 10 videos7 readings4 assignments4 discussion prompts Learners will explore the essentials of AWS Identity and Access Management (IAM), including users, roles, policies, and groups, which are the core parts of this module. Additionally, IAM-related services such as Multi-Factor Authentication (MFA) and the AWS Command Line Interface (CLI) will be introduced to manage AWS resources. 14 videos3 readings4 assignments3 discussion prompts Learners will explore computing concepts related to Amazon EC2, including instance management and AMI (Amazon Machine Image) handling. They will also examine EC2 storage options, Amazon FSx for file systems, and AWS Batch for batch processing. By the end of this module, learners will be able to efficiently manage and deploy computing resources on AWS. 16 videos4 readings4 assignments3 discussion prompts Learners will be introduced to Amazon S3, which covers essential topics such as bucket creation, policy management, versioning, and advanced features. They will also explore Cross-Region Replication, S3 storage classes, and Lifecycle Policies. By the end of this module, learners will be equipped to manage data on Amazon S3 securely and efficiently. 16 videos3 readings4 assignments3 discussion prompts This module covers the essentials of Virtual Private Clouds (VPCs), including their benefits, components like subnets and route tables. It also equips the learners with advanced VPC concepts such as VPC peering and AWS Transit Gateway. Additionally, learners will explore load balancing and auto-scaling, including creating and managing network load balancers, and setting up auto-scaling groups. 34 videos5 readings5 assignments4 discussion prompts This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz on Identity, Compute, Storage, Networking, Load Balancing, and Auto Scaling services in AWS. 3 videos2 readings3 assignments1 discussion prompt | 6 modules | Intermediate level | 19 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/aws-core-services | null |
342 | IBM Data Analyst Capstone Project | 62,264 | 4.6 | 1,156 | Rav Ahuja | IBM | ['Data Analysis', 'Python Programming', 'Dashboard', 'Data Visualization', 'SQL and RDBMS'] | By completing this final capstone project you will apply various Data Analytics skills and techniques that you have learned as part of the previous courses in the IBM Data Analyst Professional Certificate. You will assume the role of an Associate Data Analyst who has recently joined the organization and be presented with a business challenge that requires data analysis to be performed on real-world datasets. You will perform the various tasks that professional data analysts do as part of their jobs, including:
- Data collection from multiple sources
- Data wrangling and data preparation
- Exploratory data analysis
- Statistical analysis and data mining
- Data visualization with different charts and plots, and
- Interactive dashboard creation.
The project will culminate with a presentation of your data analysis report for various stakeholders in the organization. The report will include an executive summary, your analysis, and a conclusion. You will be assessed on both your work for the various stages in the Data Analysis process, as well as the final deliverable.
As part of this project you will demonstrate your proficiency with using Jupyter Notebooks, SQL, Relational Databases (RDBMS), Business Intelligence (BI) tools like Cognos, and Python Libraries such as Pandas, Numpy, Scikit-learn, Scipy, Matplotlib, Seaborn and others.
This project is a great addition to your portfolio and an opportunity to showcase your Data Analytics skills to prospective employers. Data Collection is the first step in solving any analysis problem and can be collected in many formats and from many sources. In the first module of the Capstone, we will collect data by scraping the internet and using web APIs. 1 video2 readings3 assignments5 app items1 plugin In this module, you will be focusing on the cleaning of your dataset with various techniques. With these techniques you will be identifying duplicate rows, finding missing values, and normalizing the data. 6 readings5 assignments1 app item In this module, begin working with the cleaned dataset from the previous module. You will now begin to analyze the dataset to find the distribution of data, presence of outliers and the correlation between different columns. 4 readings3 assignments1 app item In module 4 of the Capstone, you will be required to create visualizations using the developer survey data. The visualizations you create should highlight the distribution of data, relationships between data, the composition of data, and comparison of data. 9 readings4 assignments2 app items In this module, you will create a dashboard using IBM Cognos Analytics or Google Looker Studio. This platform will give you the ability to create various charts while assembling a dashboard that is appealing and easy to understand. Your dashboard will contain your data analysis, which should be intuitive and allow for the drill-down of data. 2 readings1 peer review2 plugins You have analyzed the data in the previous modules, and now it is time to demonstrate your storytelling skills. In this module, you will create a compelling story that helps to clarify your analysis in an easy-to-understand presentation. 2 videos4 readings1 peer review4 plugins | 6 modules | Intermediate level | null | https://www.coursera.org/learn/ibm-data-analyst-capstone-project | 91% |
343 | Storytelling and influencing: Communicate with impact | 115,018 | 4.8 | 2,099 | Associate Professor Lawrence Ang | Macquarie University | [] | An ambitious vision for the future of your organisation isn’t enough – how do you communicate this vision to get your colleagues on board? The ability to effectively communicate and persuade others is a key leadership skill. Traditional and common-sense models of communication and persuasion often fail to capture the complex nature of ‘influencing’. Via structured learning activities (video lectures, quizzes, discussion prompts and written assessments) this course will develop your capacity to communicate appropriately in different situational and cultural contexts, making you a highly influential leader. At the heart of persuasive communications is a solid understanding of your audience and what they find appealing. This week you will learn the basic theory of persuasive communication, including models of information processing, motivational appeals, message acceptance, fast and slow decision making and rules of effective human interactions. 6 videos3 readings2 assignments1 discussion prompt Effective storytelling starts with developing persuasive content, and then structuring a dramatic narrative that will spark the imagination. In week 2, you will learn how to apply storytelling principles like shaping the beginning, building the middle, and making the ending powerful. You will learn how to find the winning idea for your story, colour it with emotions, and use metaphors to quickly connect concepts in people’s minds. 4 videos2 readings2 assignments Developing rapport and trust is a crucial aspect of persuasion, in fact, it crucial for any form of supportive human interactions. Often times, this means being able to read a situation and adapt the approach accordingly. In week 3, you will learn how to speak authentically, and how to quickly build and maintain rapport. The means by which this can be accomplished include the use of verbal and non-verbal cues and the techniques of matching and mirroring the body language and vocal qualities of the other person. 5 videos3 readings2 assignments Group meetings can create lasting impressions, which is why it important that they are well run. But, more often than not, such meetings are unproductive. Stress and tension in meetings are also common. In week 4, you will learn how to lead influential group conversation by planning an effective meeting, be aware of the do’s and don’ts in meeting, avoid groupthink, and how to make better decisions. You will also learn the power of impression management. 5 videos1 reading2 assignments Not all conversations are positive. Some are painful but necessary, like handling objections and overcoming resistance. In week 5, you will learn how to prepare for stressful conversations and deal with objections.You will understand the nature of the objections, why people make them, and then how to reduce their resistance, and defend your proposals against these objections. 4 videos1 reading2 assignments 6 videos1 reading2 assignments | 6 modules | null | 18 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/communicate-with-impact | 98% |
344 | Introduction to TCP/IP | 121,275 | 4.6 | 2,712 | Jong-Moon Chung | Yonsei University | ['Network Protocols', 'Ip Address', 'Wireshark', 'Communications Protocol'] | You use the Internet through your PC (Personal Computer), laptop, tablet, smartpad, and smartphone every day in everything you do. Through your own PC/laptop, you can easily learn everything about the Internet, and that is what this course is focused on. In this course ‘Introduction to TCP/IP,’ you will learn the operational functions of Internet technologies (which include IPv4, IPv6, TCP, UDP, addressing, routing, domain names, etc.) and your PC/laptop's security and gateway Internet setup and basic principles. In addition, through a simple Wireshark experiment, you will see the TCP/IP packets and security systems in action that are serving your PC/laptop, that serves you. For the course 'Introduction to TCP/IP,' the first module is 'My PC's Internet & Gateway,' which introduced all important functions of the Internet that you use from your PC (Personal Computer), laptop, or smartphone. The first lecture 'My PC’s Internet Setup' explains the setup used in your PC/laptop. The next lecture 'Automatic Internet Setup using DHCP,' shows how your PC/laptop’s Internet connection is automatically setup if a local DHCP Server is supporting your network. Then the focus moves to the Default Gateway configuration in the 'IP Gateway/Router Configuration' lectures. As the Default Gateway is the gateway to the Internet for your PC/laptop, the lecture 'IP Routing Table' shows how the Default Gateway sends and receives all packets for your PC/laptop. 5 videos2 assignments1 discussion prompt The second module 'TCP/IP Protocol' focuses on all protocol and functional aspects of the TCP and IP operations used in your PC/laptop/smartphone. The first lecture ‘TCP/IP 5 Layers & Operations’ provides an easy-to-understand description of how TCP/IP works in the Internet to transfer information, using a comparable example of how postal mail is delivered. The lectures ‘IPv4’ and ‘IPv6’ describe how the IPv4 and IPv6 protocols are structured and how they operate. In addition, the CIDR (Classless Inter-Domain Routing) notation as well as the IPv4 and IPv6 addresses and subnets are explained. Then the lectures on ‘UDP’ and ‘TCP’ describe how the port number works and how TCP conducts flow control and detects errors in the packets you received on your PC/laptop/smartphone. 8 videos2 assignments The third module ‘Internet Routing & Functions’ focuses on the main protocols and functions used in the Internet that you have been using every day to make network connections. The lecture ‘IGP vs. EGP’ is focused on the types and functions of IGPs (Interior Gateway Protocols) and EGPs (Exterior Gateway Protocols). The lecture ‘OSPF’ describes how OSPF (Open Shortest Path First) sets up SPT (Shortest Path Tree) routing paths, which makes your Internet connections more reliable and fast. The lectures ‘ARP’ and ‘NAT’ explains how you have used ARP (Address Resolution Protocol) and NAT (Network Address Translation) to inter-changing IP addresses for access to private networks and how your PC/laptop/smartphone had been finding IP addresses from web host names. The lectures ‘RPC’ and ‘FTP’ describes how RPC (Remote Procedure Call) had been enabling you to make connections to remote computers/servers, and how FTP (File Transfer Protocol) helped you move files from a remote computer/server to your PC/laptop so quickly. The last lecture ‘E-mail’ compares the characteristics of IMAP (Internet Message Access Protocol) and POP3 (Post Office Protocol version 3) and how they operate in serving your all your e-mails. 2 videos2 assignments The module ‘Internet Security’ focuses on the most popular Internet attack types and describes the methods used by your PC/laptop/smartphone to prevent and defend against cyber attacks. The first lecture ‘Top Ranking Internet Attacks’ describes the most commonly occurring attack types and ranks them based on the percentage of attack incidents. Your PC/laptop/smartphone has been receiving these attacks 100%, you just did not know it, but now you will. The lecture ‘Growing Security & Threat Issues’ discusses about zombie computers and botnets and other emerging attack techniques, which may be contaminating your PC/laptop/smartphone. The lectures in ‘Internet & Cyber Attacks’ include the most serious cyber attack types of Phishing, DoS (Denial of Service) & DDoS (Distributed DoS), Overflow, MITM (Man-in-the-Middle) Attack, and SQL (Structured Query Language) Injection. The lectures in ‘Internet Security & Protection’ focus on the most commonly used attack defense/security techniques used by your PC/laptop/smartphone, which include Firewalls, IDS (Intrusion Detection System), TLS (Transport Layer Security), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), WPA2, and SSH (Secure Shell). 4 videos2 assignments1 discussion prompt The module ‘Wireshark Internet Project’ contains two major parts. First ‘How to Install Wireshark’ is introduced. In the lectures of ‘Internet Packet Analysis using Wireshark,’ the descriptions of how to find your PC/laptop’s IP address and subnet mask, how to find the IP address of someone else’s website domain name, how to check the type of Internet connection and security protocols you are currently using, and how to monitor your PC/laptop’s network performance, using Wireshark is explained in very easy terms. Then it is recommended for the same Wireshark measurement experiment of downloading a test file from Google or Baidu to be conducted as a DIY (Do It Yourself) practice. 3 videos1 assignment1 discussion prompt | 5 modules | Beginner level | null | https://www.coursera.org/learn/tcpip | 97% |
345 | Jenkins - From Zero to Hero Specialization | Enrollment number not found | 3.6 | 11 | LearnKartS | LearnKartS | ['Automation Testing', 'Jenkins Pipeline', 'Jenkins Job Configuration', 'Docker Intergration', 'Jenkins Integration', 'Plugin Management', 'Distributed Builds', 'Jenkins Best Practices', 'DevOps', 'CI/CD Pipeline', 'Automation Testing', 'Jenkins Pipeline', 'Jenkins Job Configuration', 'Docker Intergration', 'Jenkins Integration', 'Plugin Management', 'Distributed Builds', 'Jenkins Best Practices', 'DevOps', 'CI/CD Pipeline'] | This specialization covers: - DevOps concepts & tools and how Jenkins fits into the CI/CD Pipeline - Jenkins pipeline concept and how to implement it - Jenkins integration with Git and GitHub - Setting up Jenkins for Maven and triggering build along with notifications - Working with Jenkins CLI and scripts - Configuring Jenkins for Tomcat - Integrating Jenkins with Docker, Ansible, and SonarQube - Remote testing - Jenkins access management and security The Jenkins - From Zero to Hero specialization is for individuals seeking to develop proficiency in Jenkins and CI/CD pipelines. The specialization will help you master Jenkins for automation in software development and deployment processes. Jenkins specialization is a4-course series. In these four courses, you will learn topics such as Jenkins fundamentals,pipeline creation and management, Jenkins setup and configuration, integrating with various development and deployment tools, managing and securing Jenkins instances, automating builds and tests, Jenkins plugins, and scaling Jenkins for enterprise-level projects. Further, the course will prepare you toimplement and manage CI/CD pipelinesefficiently in software development environments. The Jenkins tutorial specialization is designed from scratch, making it an ideal choice for anyone new to Jenkins and CI/CD. The courses includehands-on demos, quizzes, and high-qualitytheoretical content videosfrom industry experts. Applied Learning Project The Jenkins project offers21 demos, focusing onuser management, job creation, remote testing, plugin management, and running automation tests using Jenkins. Key projects include creating Jenkins jobs using theBackup Plugin, executing remote tests, managing plugins with and without restart, and running automation tests. Theinstallation demoscoverJenkins and Docker on different operating systems, along with a complete tour of the Jenkins dashboard. Additionally, the demos alsofocus on creating distributed and Maven build jobs,parameterized tasks, and executing shell and Groovy scripts.The more advanced topics includedeploying Java applications, parallel builds, Jenkins CI CD pipeline, Docker, and Ansible. The specialization includesa course-end projectthat coverssetting up a CI/CD pipeline using Git, Maven, Jenkins, Ansible, Docker, and AWS for microservices deployment and integration of code quality tools like SonarQube. Understand the concept and need of DevOps in software development. Navigate the DevOps toolchain for seamless software delivery. Learn Continuous Integration (CI) and Continuous Delivery (CD) concepts. Explore Jenkins environments on both Linux and Windows. Master the Jenkins lifecycle from source code management to continuous deployment. Learn to use Jenkins for build automation, integrating with Git, and setting up Maven. Deploy Java web apps with Tomcat and configure Jenkins for parameterized and distributed builds. Implement advanced features like pipelines, Jenkins file configuration, CLI usage, and Docker integration. Learn strategies to enhance code quality and improve development efficiency. Implement code coverage analysis and utilize code scanning tools effectively. Utilize Jenkins to automate builds with Gradle, Ant, and shell scripts. Learn fundamentals of configuration management, Infrastructure as Code (IaC), and master Ansible for configuration tasks. Essential Jenkins administration tasks, covering system information gathering and configuration management. Effective plugin utilization for reporting, code analysis, and monitoring to enhance project visibility and quality. Best practices for global security, authentication, and access management to establish a secure Jenkins environment. Jenkins backup configuration and management techniques for smooth maintenance and disaster recovery. | 4 course series | Beginner level | 2 months (at 4 hours a week) | https://www.coursera.org/specializations/jenkins-zero-to-hero | null |
346 | Incident Response, BC, and DR Concepts | 11,054 | 4.7 | 197 | ISC2 Education & Training | ISC2 | ['Computer Security Incident Management', 'Business Continuity', 'Disaster Recovery'] | Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization.
After completing this course, the participant will be able to:
Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
- Recall the terms and components of incident response.
- Summarize the components of a business continuity plan.
- Identify the components of disaster recovery.
- Practice the terminology of and review incident response, business continuity and disaster recovery concepts.
Agenda
Course Introduction
Module 1: Incident Response (IR)
Module 2: Business Continuity (BC)
Module 3: Disaster Recovery (DR)
Module 4: Incident Response, Business Continuity, and Disaster Recovery Review
This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam.
There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization.Here are the primary things to remember in this course: first, the Incident Response plan responds to unexpected changes in operating conditions to keep the business operating; second, the Business Continuity plan enables the business to continue operating throughout the crisis; and finally, if both the Incident Response and Business Continuity plans fail, the Disaster Recovery plan is activated to help the business to return to normal operations as quickly as possible. When it comes to a career in cybersecurity, the day-to-day focus is monitoring information systems and looking out for abnormal network activity, malicious software and threat actors. Security professionals spend their days ensuring the confidentiality, integrity and availability of systems and data, but in addition to safeguarding networks and securing the exchange of data and shared resources, it’s important to realize that cybersecurity goes beyond the technical aspects. Its scope encompasses the protection of people and their personal information. There is nothing more important than the health and safety of our users, coworkers and customers. 1 video1 reading Throughout this module, we will focus on the goal and the individual components of Incident Response. 1 video4 readings1 assignment Throughout this module, we will focus on the goal and the individual components of Business Continuity (BC). 2 videos2 readings1 assignment Throughout this module, we will focus on the goal and the individual components of Disaster Recovery (DR). 2 videos2 readings1 assignment This module will test your knowledge on what you have learned throughout this course. 2 videos2 readings1 assignment1 peer review | 5 modules | Beginner level | null | https://www.coursera.org/learn/incident-response-bc-and-dr-concepts | 98% |
347 | Networking Fundamentals | 12,163 | 4.7 | 64 | Shadow Farrell | Akamai Technologies, Inc. | ['Network Transmissions and Hardware', 'Network Architecture', 'Internet Protocol (IP) Suite', 'Network Theory', 'Network Management / Troubleshooting'] | Students start by learning basic network theory and terminology including network components, node functions, types of networks and network models. Students will gain an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP Model including encapsulation and common network protocols. Students learn about data transmission methods and ethernet including CSMA/CD and CSMA/CA. The course covers wired and wireless networking standards, and networking hardware including switches and routers. Students will gain a thorough understanding of TCP/IP including binary numbers, CIDR notation, ANDing, and configuring routes in a network using routers and NAT routers. Students learn to configure DHCP and DNS, and then examine regulating traffic between network zones including implementing a DMZ, and using IDS/IPS technology, and configuring VPNs. The course includes a thorough discussion of troubleshooting wired and wireless networks including using packet sniffers. Students will use software that will allow them to simulate sophisticated networks to achieve practical experience. The course ends with a capstone that students will complete to demonstrate mastery of course objectives. This module provides the student with an opportunity to understand some of the most basic vocabulary used in networking. Students will learn about the categories of networks and the standard network models. 7 videos12 readings4 assignments3 discussion prompts In this module, students will learn about the OSI model and the TCP/IP model which describe how protocols work. 4 videos7 readings3 assignments In this module, students will learn about data transmission methods. After learning about the most common media access methods, they will explore common network connectivity devices. Finally, students will learn about wireless networks. 5 videos13 readings4 assignments2 discussion prompts In this module, students will learn about how the IP protocol works. Students will learn about IPv4 and IPv6 addresses and routing. 15 videos7 readings4 assignments1 discussion prompt In this module, students will learn about the DHCP and DNS services that support TCP/IP. They will also explore some basic troubleshooting commands. 18 videos2 readings4 assignments In this module, students will learn about defense in depth. They will explore controls for securing networks and controls for detecting network intrusions. 3 videos5 readings3 assignments In this module, students will learn remote access in general and VPNs in specific. 2 videos4 readings3 assignments In this module, students will learn the concepts of network management. They will study troubleshooting methodology and review strategies for troubleshooting various types of issues. 1 video10 readings3 assignments1 discussion prompt In this module, the student will upload a capstone project that demonstrates mastery of the material. 2 videos1 peer review | 9 modules | Beginner level | null | https://www.coursera.org/learn/akamai-networking | 92% |
348 | Writing and Editing: Drafting | 28,800 | 4.8 | 346 | Patrick Barry | University of Michigan | ['Creativity', 'Time management', 'Persuasion', 'Writing', 'Editing'] | This third course in the “Good with Words: Writing and Editing” series will give you a number of strategies to help with what is often the most intimidating, even paralyzing part of the writing process: getting started. You’ll learn about the “planning fallacy” and “temptation bundling.” You’ll get a chance to experiment with “freewriting” and “writing before you are ready.” And you’ll continue to benefit, through our ongoing “Good Sentences” and “Takeaways” segments, from the models and advice of a diverse set of writers.
As with the other three courses in this series, you will also get access to a wide range of books and other resources you can use even after you finish the course. These include: (1) the readings and exercises provided to the students who have taken the in-person version of this course at the University of Michigan and the University of Chicago; (2) two digital libraries of excellent writing from a diverse collection of journalists, scientists, novelists, poets, historians, and entrepreneurs; and (3) a monthly “Good Sentences” email. In this first week, we will focus on the cost of perfectionism. 8 videos13 readings7 assignments3 app items2 discussion prompts3 plugins This week, we'll focus on "the planning fallacy" and ways to make sure you hit your deadlines. 7 videos8 readings6 assignments7 app items7 discussion prompts2 plugins This week, we will focus on how drafting and researching intertwine. 8 videos6 readings9 assignments3 app items2 discussion prompts2 plugins This week, we will focus on the benefits of naming things, especially when trying to improve skills like writing and editing. 5 videos5 readings5 assignments5 app items1 discussion prompt3 plugins | 4 modules | Beginner level | null | https://www.coursera.org/learn/writing-editing-drafting | 98% |
349 | Project Lifecycle, Information Sharing, and Risk Management | 12,270 | 4.7 | 127 | Skill-Up EdTech Team | SkillUp EdTech | ['Project Management', 'Risk Management', 'Systems Development Life Cycle', 'Information sharing'] | Every project comes with risk. If risk occurs the project team operates in a reactive mode potentially moving towards project failure. As a project manager, you will need to be vigilant and constantly evaluate and mitigate potential risks. In this course, you will learn the compelling art of risk management throughout the project lifecycle while using information sharing techniques to keep all stakeholders informed and aligned. This course introduces you to different phases in the project lifecycle, and explains the difference in the phases based on the selected project methodology. Additionally, you will have the opportunity to explore best practices for information sharing with project teams and external stakeholders while equipping yourself with effective information sharing techniques.
The course delves into the risk management lifecycle, from planning and identifying risks through to evaluation. You will also learn different strategies to respond to risks. You will learn about various tools, such as risk reports, risk registers, and the risk matrix, and the opportunity to apply your skills to create these artifacts for given project scenarios.
This course is set up to help you succeed as a project manager. It is well-suited for those looking to step up their careers or new graduates seeking to establish their project management careers.
This course is part of a series of courses that will help you prepare for certifications offered by the Project Management Institute (PMI) including Certified Associate of Project Management (PMI-CAPM) and Project Management Professional (PMI-PMP).
RECOMMENDED: It is good for everyone gearing toward a career in Project Management to have basic to intermediate skills in an Office Productivity Suite, such as Microsoft Office 365. We highly recommend enrolling in the SkillUp EdTech Office Productivity Software Specialization, which covers Word Processing, Spreadsheets, PowerPoint, Messaging, and Email. Welcome to Module 1, where we will introduce you to the major topics in the project management lifecycle. In this module, you will learn about available certification opportunities, explore the significance of the project management lifecycle, and discuss the common lifecycles used. You will also learn about the importance and components of various documents and processes project managers use and the responsibilities in each phase of the project lifecycle. 9 videos7 readings4 assignments1 plugin Welcome to Module 2 Information Sharing: Communications, where we will cover various topics to help you understand the importance of effective communication in project management. In this module, you will learn about various technology factors that can impact effective communications and the different communication methods project managers use. You will learn a three-step approach to managing communications and various communication management planning techniques and activities essential to project success. You will also learn the importance of active listening, effective conflict management, and communication monitoring responsibilities. 8 videos2 readings3 assignments1 plugin Welcome to Module 3, where we dive into the information sharing: stakeholder management process. This module provides an in-depth understanding of stakeholder management and the importance of managing stakeholders throughout the project. In this module, you will explore the purpose of creating a stakeholder register and stakeholder engagement plan. You will look at project managers' tools and steps to identify stakeholders and gain their commitment and support. You will learn the importance of managing stakeholders throughout the project and why stakeholder commitment levels may become reduced, and the benefits of setting ground rules and norms. A team charter is also an essential aspect of stakeholder management, and we will discuss its contents and significance in this module. 6 videos3 readings3 assignments1 plugin Welcome to Module 4, where we focus on project risk management, covering the need for effective risk management and the roles and responsibilities involved. In this module, you will discover how to define risk and uncertainty in projects, including how to differentiate between opportunities and threats. You will learn how to model risk metalanguage to document risks, distinguish between cause, event, and impact, the importance of SWOT analysis, and risk management plans. You will also learn about challenges in implementing a risk program, qualitative risk analysis, and risk exposure and score concepts. 8 videos3 readings3 assignments2 plugins Welcome to Module 5, which focuses on risk response planning and management. In this course, you will learn various types of responses to threats and opportunities, as well as the importance of identifying risk triggers, developing a solid risk report, and using common risk management tools. You will also learn the value of using a risk matrix to share risks with stakeholders, implementing timely risk responses, conducting risk audits, and how to ensure timely risk reassessments and critical success factors to keep in mind during the process. 6 videos2 readings3 assignments1 plugin In this module, you will complete a final exam that tests your knowledge of the course’s content. The exam will include questions on topics including but not limited to project lifecycles, communication effectiveness with internal and external stakeholders, and risk management concepts.
You will also have the opportunity to demonstrate your skills in project management, information sharing, and risk management through a peer-graded final project. 4 readings1 assignment1 peer review4 plugins | 6 modules | Beginner level | null | https://www.coursera.org/learn/project-lifecycle-information-sharing-risk-management | 97% |
350 | AutoCAD 2023 Masterclass - Produce Amazing Site Plans | Enrollment number not found | Rating not found | null | Packt - Course Instructors | Packt | ['Design', 'File Management', 'Dimensions', '2D modeling', 'AutoCAD', 'Autocad'] | Dive into the world of AutoCAD 2023 with our expertly crafted masterclass, where you'll learn to create stunning site plans with unparalleled speed and precision. Beginning with a thorough introduction to AutoCAD 2D, you'll explore the essential tools, commands, and settings that form the backbone of this powerful CAD software. Whether you're setting up your workspace or customizing commands, each step is designed to enhance your drafting experience, ensuring you can navigate the software with confidence. As you progress, the course transitions into more advanced techniques, including drafting detailed floor plans, walls, doors, windows, and even intricate staircases. You'll discover how to efficiently manage layers and blocks, ensuring your designs are well-organized and easily editable. With a strong focus on practical application, you'll gain hands-on experience by creating real-world architectural elements, from the foundational ground floor to complex interior layouts.
Finally, the masterclass delves into the art of annotation and presentation, teaching you how to insert text, dimensions, and hatching with professional flair. By the end of the course, you'll have the expertise to export your drawings in various formats, ready for presentation or further development. Whether you're a seasoned professional or a student, this course will sharpen your skills and speed up your workflow, making you a more efficient and effective designer.
This course is designed for architects, engineers, CAD technicians, and students who have a basic understanding of AutoCAD but wish to advance their skills in site planning and architectural drafting. Prior experience with AutoCAD is beneficial, but the course is structured to accommodate beginners who are willing to learn. In this module, we will introduce you to AutoCAD 2D, a powerful computer-aided design software widely used in various industries. You'll get an overview of its functionalities, learn how to set up an Autodesk account, and gain step-by-step guidance on downloading and installing the software on your computer. 4 videos1 reading In this module, we will dive into the core features of AutoCAD 2D, beginning with a comprehensive tour of the interface. You'll learn to configure key settings, master basic and advanced commands, and manage layers and dimensions to create accurate and professional drawings. 7 videos In this module, we will guide you through the initial steps of drafting a ground floor plan in AutoCAD 2D. You'll learn how to set up the drawing environment by configuring units, limits, and layers, ensuring accuracy and efficiency from the start. 2 videos1 assignment In this module, we will focus on drafting walls in AutoCAD 2D, covering both boundary and interior walls. You'll learn the techniques for setting wall properties and creating openings, ensuring your building layout is accurate and well-organized. 8 videos In this module, we will teach you how to provide openings for doors in your AutoCAD 2D drawings. You'll learn the steps to create accurately aligned door openings and configure properties to match the architectural design. 2 videos In this module, we will guide you through the process of creating stairs in AutoCAD 2D. You'll learn to construct both straight and circular stairs, with a focus on defining key parameters for accuracy and functionality. 2 videos1 assignment In this module, we will cover the drafting and fitting of doors in AutoCAD 2D. You'll learn to create various door blocks and accurately place them in the building layout, considering factors like swing direction and frame details. 4 videos In this module, we will explore the creation and adjustment of windows in AutoCAD 2D. You'll learn to construct windows of different sizes, including turned windows, and gain insights into working with glass to achieve a polished look. 6 videos In this module, we will focus on using the Line Command in AutoCAD 2D to create detailed blocks representing different materials, columns, and landscaping elements. You'll learn techniques to add depth and detail to your architectural drawings. 3 videos1 assignment In this module, we will delve into the hatching process in AutoCAD 2D. You'll learn how to apply hatching patterns to walls, lawns, and other elements, improving the clarity and visual appeal of your architectural drawings. 4 videos In this module, we will guide you on how to adjust and arrange furniture and fixtures in different rooms within your AutoCAD 2D drawings. You'll learn to create cohesive and functional layouts that enhance the living spaces of your architectural design. 6 videos In this module, we will focus on inserting text and dimensions into your AutoCAD 2D drawings. You'll learn techniques to label various elements and add dimension lines, ensuring your drawings are detailed and informative. 5 videos1 assignment In this module, we will teach you how to export your finished drawings in PNG and PDF formats. You'll learn to adjust resolution and scale to create professional-quality outputs for presentations, sharing, and printing. 1 video In this module, we will cover the creation of a section view in AutoCAD 2D. You'll learn to project from a floor plan, apply hatching and annotations, and export the final section view, providing a clear and detailed representation of the building's interior layout. 9 videos1 assignment In this concluding module, we will share valuable tips and tricks for enhancing your architectural drawings in AutoCAD 2D. You'll learn best practices for drafting, annotation, and dimensioning, ensuring your final drawings are both accurate and professional. 1 video1 assignment | 15 modules | Beginner level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/packt-autocad-2023-masterclass-produce-amazing-site-plans-quickly-qsjyw | null |
351 | Machine Learning: Theory and Hands-on Practice with Python Specialization | 10,031 | 3.7 | 51 | Geena Kim | University of Colorado Boulder | ['Unsupervised Learning', 'Python Programming', 'Deep Learning', 'hyperparameter tuning', 'Supervised Learning', 'Unsupervised Learning', 'Python Programming', 'Deep Learning', 'hyperparameter tuning', 'Supervised Learning'] | In the Machine Learning specialization, we will cover Supervised Learning, Unsupervised Learning, and the basics of Deep Learning. You will apply ML algorithms to real-world data, learn when to use which model and why, and improve the performance of your models. Starting with supervised learning, we will cover linear and logistic regression, KNN, Decision trees, ensembling methods such as Random Forest and Boosting, and kernel methods such as SVM. Then we turn our attention to unsupervised methods, including dimensionality reduction techniques (e.g., PCA), clustering, and recommender systems. We finish with an introduction to deep learning basics, including choosing model architectures, building/training neural networks with libraries like Keras, and hands-on examples of CNNs and RNNs. This specialization can be taken for academic credit as part of CU Boulder’s MS in Data Science or MS in Computer Science degrees offered on the Coursera platform. These fully accredited graduate degrees offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals. Learn more: MS in Data Science: https://www.coursera.org/degrees/master-of-science-data-science-boulder MS in Computer Science: https://coursera.org/degrees/ms-computer-science-boulder Applied Learning Project In this specialization, you will build a movie recommendation system, identify cancer types based on RNA sequences, utilize CNNs for digital pathology, practice NLP techniques on disaster tweets, and even generate your images of dogs with GANs. You will complete a final supervised, unsupervised, and deep learning project to demonstrate course mastery. Use modern machine learning tools and python libraries. Compare logistic regression’s strengths and weaknesses. Explain how to deal with linearly-inseparable data. Explain what decision tree is & how it splits nodes. Explain what unsupervised learning is, and list methods used in unsupervised learning. List and explain algorithms for various matrix factorization methods, and what each is used for. List and explain algorithms for various matrix factorization methods, and what each is used for. Apply different optimization methods while training and explain different behavior. Use cloud tools and deep learning libraries to implement CNN architecture and train for image classification tasks. Apply deep learning package to sequential data, build models, train, and tune. | 3 course series | Intermediate level | 3 months (at 10 hours a week) | https://www.coursera.org/specializations/machine-learnin-theory-and-hands-on-practice-with-pythong-cu | null |
352 | Perform data science with Azure Databricks | 7,923 | 3.3 | 63 | Microsoft | Microsoft | ['Microsoft Azure', 'Machine Learning', 'Data Processing', 'Azure Databricks'] | In this course, you will learn how to harness the power of Apache Spark and powerful clusters running on the Azure Databricks platform to run data science workloads in the cloud. This is the fourth course in a five-course program that prepares you to take the DP-100: Designing and Implementing a Data Science Solution on Azurec ertification exam.
The certification exam is an opportunity to prove knowledge and expertise operate machine learning solutions at a cloud-scale using Azure Machine Learning. This specialization teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. Each course teaches you the concepts and skills that are measured by the exam.
This Specialization is intended for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. It teaches data scientists how to create end-to-end solutions in Microsoft Azure. Students will learn how to manage Azure resources for machine learning; run experiments and train models; deploy and operationalize machine learning solutions, and implement responsible machine learning. They will also learn to use Azure Databricks to explore, prepare, and model data; and integrate Databricks machine learning processes with Azure Machine Learning. In this module, you will discover the capabilities of Azure Databricks and the Apache Spark notebook for processing huge files. You will come to understand the Azure Databricks platform and identify the types of tasks well-suited for Apache Spark. You will also be introduced to the architecture of an Azure Databricks Spark Cluster and Spark Jobs. 7 videos5 readings1 quiz3 assignments1 discussion prompt Azure Databricks supports day-to-day data-handling functions, such as reads, writes, and queries. In this module, you will work with large amounts of data from multiple sources in different raw formats. You will also learn to use the DataFrame Column Class Azure Databricks to apply column-level transformations, such as sorts, filters and aggregations. You will also use advanced DataFrame functions operations to manipulate data, apply aggregates, and perform date and time operations in Azure Databricks. 4 videos10 readings4 assignments Azure Databricks supports a range of built in SQL functions, however, sometimes you have to write custom function, known as User-Defined Function (UDF). In this module, you will learn how to register and invoke UDFs. You will also learn how to use Delta Lake to create, append, and upsert data to Apache Spark tables, taking advantage of built-in reliability and optimizations. 4 videos7 readings6 assignments In this module, you will learn how to use PySpark’s machine learning package to build key components of the machine learning workflows that include exploratory data analysis, model training, and model evaluation. You will also learn how to build pipelines for common data featurization tasks. 4 videos11 readings8 assignments In this module, you will learn how to use MLflow to track machine learning experiments and how to use modules from the Spark’s machine learning library for hyperparameter tuning and model selection. 4 videos5 readings5 assignments In this module, you will learn how to use the Uber’s Horovod framework along with the Petastorm library to run distributed, deep learning training jobs on Spark using training datasets in the Apache Parquet format. You will also learn how to use MLflow and Azure Machine Learning service register, package, and deploy a trained model to both Azure Container Instance, and Azure Kubernetes Service as a scoring web service. 5 videos6 readings4 assignments1 discussion prompt | 6 modules | Intermediate level | 25 hours to complete (3 weeks at 8 hours a week) | https://www.coursera.org/learn/perform-data-science-with-azure-databricks | null |
353 | Less Stress, Better Health | Enrollment number not found | Rating not found | null | Kyle Smith | American Psychological Association | ['Understanding Stress', 'Effective Coping', 'Building Resilience'] | Stress is a natural part of the human experience. However, stress can also be damaging to people’s physical and psychological health. This course provides an introduction to stress in general and then explores the psychological, physiological, and social consequences of stress. It ends with information on how you can combat the negative effects of stress and build resilience so you can not just survive stress, but also use it to help you grow. This module introduces you to your PsycLearn Essentials course. Find out what’s included in this course and how to navigate the modules and lessons. You’ll also learn valuable study tips for successful learning. 3 videos6 readings In the first part of this module, we will introduce you to the Less Stress, Better Health course and present the course’s learning objectives. Then, we will teach you what stress is, first from a physiological perspective, then from a psychological one. After this section, you’ll be able to explain why different people can experience the same situation, but come away with very different amounts of stress. The next lesson will shift to talking about the different types of stressors people can experience. For example, how is having to give a speech in front of a large crowd different from being bullied in school? Finally, we will discuss different common stressors, and end the module with key takeaways and a quiz. 9 videos6 readings3 assignments This module highlights the effects that stress can have on our thoughts, our feelings and our social relationships. From making us irritable to causing the onset of psychological disorders to dissolving friendships, stress can wreak havoc on many aspects of our lives. 7 videos3 readings3 assignments This module focuses on the ways that stress can impact the physiological functioning of our bodies. We will explain the physiology of the stress response in detail, then talk about the effect this response can have on the cardiovascular system. Then, we will learn about how stress impacts the immune system, and the consequences this can have on our health. Finally, we will cover the concept of allostatic load, look at examples of the negative health outcomes that are associated with chronic stress, and talk about the many ways that stress can indirectly affect our health. 2 videos10 readings5 assignments Now that you have an understanding of what stress is, how it operates, and the types of consequences it can have for your mind and body, it’s time to learn how to counteract it! In this module, we will first talk about scientifically validated ways to decrease the amount of stress that you feel. Then, we will talk about how we can help ourselves function better even when we’re experiencing stress. 5 videos7 readings5 assignments This module will help you review the important concepts of the course and prepare you for the cumulative quiz. It is broken down by learning objective with each lesson containing key takeaways, key vocabulary, and key visuals relevant to that learning objective. Each lesson also contains a check-up assessment to let you know whether you’ve mastered the material or need further review. 1 video15 readings6 assignments This module contains a quiz covering all of the material in this course. It will count for 30% of your total course grade, so make sure you’ve reviewed the material well. Good luck! 1 video1 assignment This module contains a glossary, course references, and a list of contributors to the course. 3 readings This module provides a variety of information and tools from the American Psychological Association (APA) that will help inspire you as you complete your coursework and plan your career goals. Get discounted access to Academic Writer, APA’s online tool for writing effectively, as well as valuable advice that will help you develop and strengthen your skillset for learning success and future employment. Additionally, explore resources on various psychological issues. This module also includes APA resources on scholarly research and writing; a list of sites providing valuable resources on diversity, equity, and inclusion in psychology education and in the professional community; resources on a career in psychology; and links to career opportunities at the APA. You can also view videos that offer tips on dealing with stress. 8 readings | 9 modules | Beginner level | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/less-stress-better-health | null |
354 | Generative Adversarial Networks (GANs) Specialization | 43,303 | 4.7 | 2,183 | Sharon Zhou | DeepLearning.AI | ['glossary of computer graphics', 'Generator', 'Image-to-Image Translation', 'Generative Adversarial Networks', 'Discriminator', 'glossary of computer graphics', 'Generator', 'Image-to-Image Translation', 'Generative Adversarial Networks', 'Discriminator'] | Generative Adversarial Networks (GANs) are powerful machine learning models capable of generating realistic image, video, and voice outputs. Rooted in game theory, GANs have wide-spread application: from improving cybersecurity by fighting against adversarial attacks and anonymizing data to preserve privacy to generating state-of-the-art images, colorizing black and white images, increasing image resolution, creating avatars, turning 2D images to 3D, and more. TheDeepLearning.AI Generative Adversarial Networks (GANs) Specializationprovides an exciting introduction to image generation with GANs, charting a path from foundational concepts to advanced techniques through an easy-to-understand approach. It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more. Build a comprehensive knowledge base and gain hands-on experience in GANs. Train your own model using PyTorch, use it to create images, and evaluate a variety of advanced GANs. This Specialization is for software engineers, students, and researchers from any field, who are interested in machine learning and want to understand how GANs work. This Specialization provides an accessible pathway for all levels of learners looking to break into the GANs space or apply GANs to their own projects, even without prior familiarity with advanced math and machine learning research. Applied Learning Project Course 1:In this course, you will understand the fundamental components of GANs, build a basic GAN using PyTorch, use convolutional layers to build advanced DCGANs that processes images, apply W-Loss function to solve the vanishing gradient problem, and learn how to effectively control your GANs and build conditional GANs. Course 2:In this course, you will understand the challenges of evaluating GANs, compare different generative models, use the Fréchet Inception Distance (FID) method to evaluate the fidelity and diversity of GANs, identify sources of bias and the ways to detect it in GANs, and learn and implement the techniques associated with the state-of-the-art StyleGAN. Course 3:In this course, you will use GANs for data augmentation and privacy preservation, survey more applications of GANs, and build Pix2Pix and CycleGAN for image translation. In this course, you will: - Learn about GANs and their applications
- Understand the intuition behind the fundamental components of GANs
- Explore and implement multiple GAN architectures
- Build conditional GANs capable of generating examples from determined categories
The DeepLearning.AI Generative Adversarial Networks (GANs) Specialization provides an exciting introduction to image generation with GANs, charting a path from foundational concepts to advanced techniques through an easy-to-understand approach. It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more.
Build a comprehensive knowledge base and gain hands-on experience in GANs. Train your own model using PyTorch, use it to create images, and evaluate a variety of advanced GANs.
This Specialization provides an accessible pathway for all levels of learners looking to break into the GANs space or apply GANs to their own projects, even without prior familiarity with advanced math and machine learning research. In this course, you will: - Assess the challenges of evaluating GANs and compare different generative models
- Use the Fréchet Inception Distance (FID) method to evaluate the fidelity and diversity of GANs
- Identify sources of bias and the ways to detect it in GANs
- Learn and implement the techniques associated with the state-of-the-art StyleGANs
The DeepLearning.AI Generative Adversarial Networks (GANs) Specialization provides an exciting introduction to image generation with GANs, charting a path from foundational concepts to advanced techniques through an easy-to-understand approach. It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more.
Build a comprehensive knowledge base and gain hands-on experience in GANs. Train your own model using PyTorch, use it to create images, and evaluate a variety of advanced GANs.
This Specialization provides an accessible pathway for all levels of learners looking to break into the GANs space or apply GANs to their own projects, even without prior familiarity with advanced math and machine learning research. In this course, you will: - Explore the applications of GANs and examine them wrt data augmentation, privacy, and anonymity
- Leverage the image-to-image translation framework and identify applications to modalities beyond images
- Implement Pix2Pix, a paired image-to-image translation GAN, to adapt satellite images into map routes (and vice versa)
- Compare paired image-to-image translation to unpaired image-to-image translation and identify how their key difference necessitates different GAN architectures
- Implement CycleGAN, an unpaired image-to-image translation model, to adapt horses to zebras (and vice versa) with two GANs in one
The DeepLearning.AI Generative Adversarial Networks (GANs) Specialization provides an exciting introduction to image generation with GANs, charting a path from foundational concepts to advanced techniques through an easy-to-understand approach. It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more.
Build a comprehensive knowledge base and gain hands-on experience in GANs. Train your own model using PyTorch, use it to create images, and evaluate a variety of advanced GANs.
This Specialization provides an accessible pathway for all levels of learners looking to break into the GANs space or apply GANs to their own projects, even without prior familiarity with advanced math and machine learning research. | 3 course series | Intermediate level | 2 months (at 10 hours a week) | https://www.coursera.org/specializations/generative-adversarial-networks-gans | null |
355 | Chemerinsky on Constitutional Law - The Structure of Government | 14,135 | 4.8 | 88 | Erwin Chemerinsky | University of California, Irvine | [] | This course will highlight the construction and interpretation of the U.S. Constitution through the centuries. You'll learn the history behind the Constitution, cases that formed important precedent, and how changes in interpretation have been dependent on shifts in cultural and political climate as well as the composition of the Supreme Court. We'll start with an overview of the Constitution where we'll consider questions such as "Why the Constitution?" and "What function does the Constitution serve?" Next we'll examine how the Constitution and its subsequent interpretation established the powers of the federal, legislative, and judicial branches of government and allocated powers to the states.
Join me as we look at the questions both raised and answered by the Constitution and those that interpret it!
By the end of this course, you should be able to:
- Describe how the structure of the United States government has been shaped by both the text of the Constitution and by subsequent interpretation and practice of political actors in all branches of government
- Illustrate compromises found in the Constitution by citing examples and historic background
- Articulate the importance of key cases such as Marbury v. Madison, McCullough v. Maryland, and Lochner v. New York
- Explain how the outcome of cases is often dependent upon the current cultural and political climate as well as the composition of the court by citing particular cases and important shifts in the court's jurisprudence
- Assess the relative suitability of various approaches to constitutional interpretation and analysis 2 videos3 readings In this module, we'll examine two facets of the critical question, "Why the Constitution?" First we'll answer the question, "what functions does the Constitution perform?" We'll then consider the question, "why achieve these functions in the form of a written Constitution?" 5 videos1 reading1 assignment1 peer review What is the authority of judicial review? Why is it important? If the federal judiciary can declare a statute or action unconstitutional, what checks are there on this power? These are several of the questions we will endeavor to answer in this module. 7 videos1 reading1 assignment1 peer review In this module we will consider three major questions: 1.How did McCullough vs. Maryland shape the power of the legislature? 2. What are the major powers of the Congress under the Constitution? 3. To what extent do states limit the power of the Congress? 8 videos1 reading1 assignment The central questions in this module are: 1. When can a president act without express Constitutional or Congressional authority? 2. What are the Constitutional problems posed by the federal administrative agencies? 3. What is the authority of the President with regard to foreign policy? 5 videos1 reading1 assignment The goal of this module is to consider two important ways that the power of states are kept in check by the federal government: preemption and the dormant commerce clause. 2 videos1 reading1 assignment1 peer review As the course draws to a final close, we would like to thank you for your participation. 2 readings | 7 modules | Beginner level | null | https://www.coursera.org/learn/chemerinsky-on-constitutional-law-structure-of-government | 97% |
356 | Generative AI in HR - Impact and Application of Gen AI | 6,517 | 4.4 | 137 | Board Infinity | Board Infinity | ['Ethical Considerations and Challenges', 'AI in HR', 'Applications of Generative AI in HR', 'Generative AI in HR Context'] | "Generative AI in HR - Impact and Application of Gen AI HR Tools" is a comprehensive course designed to explore the transformative role of generative AI in human resources. Across two modules, this course covers the fundamentals of generative AI, its applications in HR, and the broader implications for the future. It delves into practical uses in recruitment, employee engagement, and training, as well as critical discussions on ethics, bias, and privacy. Emerging trends and predictive analytics are also explored, preparing HR professionals for the evolving landscape of AI in the workplace. This course is ideal for HR practitioners, managers, and anyone interested in the intersection of AI and human resource management. Module 1: Introduction to Generative AI in HR offers a foundational understanding of how generative AI is revolutionizing human resources. Starting with a basic overview of generative AI, it explores the technology's evolution in HR and its key benefits. The module then examines initial applications, including AI in recruitment, enhancing employee engagement, and AI-driven training programs. This module is ideal for HR professionals and managers looking to integrate AI into their practices, enhancing efficiency and effectiveness in various HR functions.
Module 2: Broader Implications and Future Trends delves into the ethical considerations, challenges, and emerging trends in the use of generative AI in HR. This module navigates through the ethical landscape, addressing issues like bias, fairness, privacy, and data security. It also forecasts future trends, the role of predictive analytics in decision-making, and preparation for the future of work with AI in HR. Tailored for HR professionals and decision-makers, this module provides critical insights into responsibly harnessing AI for sustainable and ethical HR practices.
This course "Generative AI in HR - Impact and Application of Gen AI HR Tools" is ideal for HR practitioners and managers seeking to integrate AI into HR practices, as well as anyone interested in the intersection of AI and human resource management, including its ethical and future implications. Module 1: Introduction to Generative AI in HR offers a foundational understanding of how generative AI is revolutionizing human resources. Starting with a basic overview of generative AI, it explores the technology's evolution in HR and its key benefits. The module then examines initial applications, including AI in recruitment, enhancing employee engagement, and AI-driven training programs. This module is ideal for HR professionals and managers looking to integrate AI into their practices, enhancing efficiency and effectiveness in various HR functions. 9 videos4 readings2 assignments1 discussion prompt Module 2: Broader Implications and Future Trends delves into the ethical considerations, challenges, and emerging trends in the use of generative AI in HR. This module navigates through the ethical landscape, addressing issues like bias, fairness, privacy, and data security. It also forecasts future trends, the role of predictive analytics in decision-making, and preparation for the future of work with AI in HR. Tailored for HR professionals and decision-makers, this module provides critical insights into responsibly harnessing AI for sustainable and ethical HR practices. 8 videos3 readings3 assignments | 2 modules | Beginner level | 3 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/generative-ai-in-hr | null |
357 | International Organizations Management | 70,541 | 4.8 | 1,862 | Gilbert Probst | University of Geneva | [] | This course provides an introduction to International Organizations and the United Nations, and explores how business and management tools can be applied in these settings to achieve better, more effective results. With a focus on cross-sector partnerships in a changing world, the course offers you insights into the inner workings of international organizations and the challenges they face today. It will introduce you to effective, state-of-the art management tools and principles to help you lead change in this world – taught by senior staff of international organizations themselves. This is an introductory course offered by the International Organizations MBA (IO-MBA) of the University of Geneva, an executive program for change-makers in international organizations, NGOs and social ventures. Welcome to this course on International Organizations Management. Over the next five weeks, we will explore the inner workings of International Organizations and the United Nations and learn how business and management tools can be applied in these settings. The course is structured into five modules, each with a focus on a different aspect of international organizations, and includes lectures, discussions and readings to dive deeper into particular topics. To qualify for a course certificate, you must complete and score above 80% on all five of the end of module quizzes. See more details in the course syllabus below, then let's get started with Week 1! 1 video2 readings1 assignment1 discussion prompt In the first module of our course on International Organizations Management, we provide an overview of the historical context and different ways of classifying international organizations in today's contemporary world. We will focus in particular on the United Nations – its origins, purposes, mandate, structure and activities – as the most important inter-governmental organization that coordinates global action on peace and security, humanitarian protection, human rights, and economic and social development. 9 videos5 readings1 assignment2 discussion prompts In our second module, we will turn to the practice of international relations to understand how states engage with each other and other actors on the global stage. Today, international relations are about much more than the traditional study of states, security and power. From growing anti-trade sentiments, to the impact of climate change, to cyber-security in a hyper-connected world, most of the security threats of the 21st century will require greater cooperation across borders and collective action from governments, private sector and civil society. These shifts raise important questions for the future functioning of international organizations. 9 videos4 readings1 assignment Now that you have a better understanding of the UN system, its shifting context, challenges and opportunities, we move on to explore the concept and practice of leadership in the UN. In this module, we will outline a conceptual framework and key literature on UN leadership. We explore different styles of leadership and examples of the practice of leadership by successive Secretaries General. We analyze several instruments of leadership – leadership through the power of convening, setting goals, marshalling evidence, and what we refer to as visionary leadership. We conclude by examining prospects for future UN leadership and multilateralism in a changing world. 12 videos5 readings1 assignment The shifting context for international organizations makes collaboration on global challenges more important, but also more difficult. In addition to collaboration between nation states in traditional international organisations, public private partnerships (PPPs) have emerged as an innovative model for collaboration that transcends the conventional boundaries of the public sector, private sector and civil society. In this module, you will learn about the role of cross-sector partnerships in addressing today's complex challenges as well as the unique management approaches that are needed to bring diverse stakeholders together. We will set out theoretical frameworks to assess the opportunities and challenges of partnership, and apply these frameworks to examples of partnerships between international organisations and business, public agencies, and civil society. 9 videos6 readings1 assignment International organizations are facing increasingly competitive environments in gaining the funding and public support necessary to fulfill their missions. The current economic situation has made it more critical than ever to use effective marketing management to build positive media attention and a strong brand identity. In this last module, we blend together theoretical principles with the practical skill of marketing and fundraising in international organizations. The course is divided into four parts, each with a theoretical framework followed by the application to a real world example. 9 videos4 readings1 assignment | 6 modules | Beginner level | null | https://www.coursera.org/learn/international-organizations-management | 98% |
358 | Introduction to Python Programming | 88,220 | 4.5 | 1,141 | Brandon Krakowsky | University of Pennsylvania | ['Programming Principles', 'Python Syntax And Semantics', 'Computer Programming', 'Python Programming', 'Python Tools'] | This course provides an introduction to programming and the Python language. Students are introduced to core programming concepts like data structures, conditionals, loops, variables, and functions. This course includes an overview of the various tools available for writing and running Python, and gets students coding quickly. It also provides hands-on coding exercises using commonly used data structures, writing custom functions, and reading and writing to files. This course may be more robust than some other introductory python courses, as it delves deeper into certain essential programming topics. This first module covers an intro to programming and the Python language.
We’ll start by downloading and installing the necessary tools to begin programming and writing code in Python. After learning how to print to the console, we’ll get an understanding of Python’s basic data types, and how to do simple math. We’ll follow up by creating our first Python script, and learn how to define and assign variables, while controlling the flow of our program using conditionals. We’ll also learn how to get input from the user, including some very basic error checking. Let’s get started! 42 videos11 readings4 assignments2 programming assignments We’ll start this module with a brief intro to lists, one of Python’s most commonly used data structures. We’ll learn just enough to get us started with loops, which are used to repeat a process or run a block of code multiple times. We’ll get into functions, which are blocks of organized code used to perform a single, related action. We’ll review some of Python’s built-in functions and learn how to design our own user-defined functions to use as building blocks in our own programs. Along the way, we’ll learn best practices for documenting our code for 2 different audiences: The users who are using our code and want to understand it at a high level, and the programmers who are reading it and want to know how it works. 31 videos2 readings3 assignments1 programming assignment In this module, we’re going to start using PyCharm, another IDE for writing and running Python code. It has enhanced features that go way beyond the limited functionality of IDLE, and it’s also an industry standard. After revisiting lists, including more advanced usage of the commonly used sequence, we’ll take a deep dive into two other very important data structures : sets and tuples. We’ll learn how they can be leveraged to both store and manipulate information. And while we already have some experience working with strings, this module will explore the intricacies and more powerful functionality of strings. 16 videos3 readings3 assignments1 programming assignment There are multiple ways of loading and storing data in Python. Information can be saved in dictionaries, a data structure that is extremely useful for storing multiple attributes (or data points) about a single thing. Data can also be stored in external files and then loaded into Python. This module will allow us to work with dictionaries in a variety of ways and to interact with the local file system by opening, reading from, and writing to, external files. With these added skills, you’ll begin to get a better sense of the dynamic power of Python and how it can be easily integrated with other systems. 17 videos3 readings3 assignments1 programming assignment | 4 modules | Beginner level | null | https://www.coursera.org/learn/python-programming-intro | 94% |
359 | Natural Language Processing with Classification and Vector Spaces | 190,070 | 4.6 | 4,450 | Younes Bensouda Mourri | DeepLearning.AI | ['Machine Translation', 'Locality-Sensitive Hashing', 'Sentiment Analysis', 'Word Embeddings', 'Vector Space Models'] | In Course 1 of the Natural Language Processing Specialization, you will: a) Perform sentiment analysis of tweets using logistic regression and then naïve Bayes,
b) Use vector space models to discover relationships between words and use PCA to reduce the dimensionality of the vector space and visualize those relationships, and
c) Write a simple English to French translation algorithm using pre-computed word embeddings and locality-sensitive hashing to relate words via approximate k-nearest neighbor search.
By the end of this Specialization, you will have designed NLP applications that perform question-answering and sentiment analysis, created tools to translate languages and summarize text, and even built a chatbot!
This Specialization is designed and taught by two experts in NLP, machine learning, and deep learning. Younes Bensouda Mourri is an Instructor of AI at Stanford University who also helped build the Deep Learning Specialization. Łukasz Kaiser is a Staff Research Scientist at Google Brain and the co-author of Tensorflow, the Tensor2Tensor and Trax libraries, and the Transformer paper. Learn to extract features from text into numerical vectors, then build a binary classifier for tweets using a logistic regression! 15 videos14 readings1 assignment1 programming assignment1 app item3 ungraded labs Learn the theory behind Bayes' rule for conditional probabilities, then apply it toward building a Naive Bayes tweet classifier of your own! 13 videos12 readings1 assignment1 programming assignment1 ungraded lab Vector space models capture semantic meaning and relationships between words. You'll learn how to create word vectors that capture dependencies between words, then visualize their relationships in two dimensions using PCA. 10 videos10 readings1 assignment1 programming assignment3 ungraded labs Learn to transform word vectors and assign them to subsets using locality sensitive hashing, in order to perform machine translation and document search. 11 videos11 readings1 assignment1 programming assignment2 ungraded labs | 4 modules | Intermediate level | null | https://www.coursera.org/learn/classification-vector-spaces-in-nlp | 95% |
360 | Relational Database Design | 19,940 | 4.6 | 233 | Di Wu | University of Colorado Boulder | ['Database (DB) Design', 'Relational Models', 'Entity–Relationship (E-R) Model', 'Database (DBMS)', 'Normalization'] | Have you ever wanted to build a database but don't know where to start? This course will provide you a step-by-step guidance. We are going to start from a raw idea to an implementable relational database. Getting on the path, practicing the real-life mini cases, you will be confident and comfortable with Relational Database Design. Let's get started! Relational Database Design can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics. Learn more about the MS-DS program at https://www.coursera.org/degrees/master-of-science-data-science-boulder. Introduce students to Database Management Systems. Introduce and train students with how to build conceptual entity relationship models. 9 videos9 readings6 quizzes1 assignment1 discussion prompt Introduce the concepts about relational models. Train students with how to convert a conceptual entity relationship model to a relational model. 5 videos8 readings7 quizzes1 assignment Introduce students with the reasons and process of normalization. Train students with skills to normalize a relational model to 3NF. 4 videos8 readings7 quizzes1 assignment A summary of the knowledge we learned in this course, starting from an Entity Relationship Model to a Relational Model in 3NF and ready for implementation. 12 readings6 quizzes1 assignment | 4 modules | Beginner level | null | https://www.coursera.org/learn/relational-database-design | 96% |
361 | Introduction to Human Behavioral Genetics | 35,856 | 4.8 | 579 | Matt McGue | University of Minnesota | ['Psychology', 'Genetic Counseling', 'Genetics', 'Behavioral Medicine'] | Behavioral genetic methodologies from twin and adoption studies through DNA analysis will be described and applied to address longstanding questions about the origins of individual differences in behavioral traits. Unit # 1: Course Introduction and OverviewOverview: Unit # 1 provides an overview to the field of human behavioral genetics and to this course. We will begin by discussing the early history of the field and how behavioral genetic research influenced and was influenced by the eugenics movement. Once this historical context has been established, we will define the field of behavioral genetics and use this definition to provide an overview of the course. This week’s lectures will end with two case studies that illustrate the importance of behavioral genetic approaches. The first is the famous John/Joan case, where one member of a monozygotic twin pair was raised as a boy and the other as a girl. The second is the human genetic disorder Phenylketonuria (PKU), which has been recognized as a paradigm of human genetic disease since its discovery in 1934.Unit Objectives: At the end of this unit you should know• The history of the founding of the field of behavioral genetics• What the eugenics movement was and how it impacted psychology and behavioral genetics• What the field of behavioral genetics covers• How the John/Joan case represented the extreme of the “Blank Slate” mentality within psychology• Why Phenylketonuria is considered a public health success and model of human genetic diseaseLecture Modules:A. The Nature-Nurture Debate and Founding of Behavioral GeneticsB. The Eugenics MovementC. What is Behavioral GeneticsD. The John/Joan CaseE. Phenylketonuria (PKU) F. Huntington Disease (Supplemental) 7 videos3 readings1 assignment In Unit #2 the twin study method will be introduced and general findings from twin studies in psychology and psychiatry will be reviewed. The two types of twins, monozygotic (MZ) and dizygotic (DZ), will be described and methods for assessing their similarity will be given. We will also look critically at the limitations of the twin study method and discuss alternative research designs, including adoption studies and the study of reared-apart twins. The importance of convergent evidence from multiple research designs will be emphasized. 8 videos2 readings1 assignment Some of the most contentious issues in behavioral genetics surround the concept of heritability – Is it a meaningful statistic? Can it be accurately estimated in studies on humans? How should it be interpreted? In this unit we will discuss what is meant by heritability and describe some simple biometric (i.e., quantitative genetic) methods used for it estimation. The unit begins with a review of basic Mendelian inheritance and the introduction of some genetic terminology we will begin to use in the course. The ACE model of quantitative inheritance is described and we will discuss how this model is used to analyze twin data. Finally, the important concept of gene-environment interaction is formally introduced. Beginning this week with quantitative genetics and continuing next week with molecular genetics we will be jumping head first into the thicket of human genetic methodology. For some, this material may be more challenging than that which we covered in the first two weeks of this course. These weeks will, however, provide the foundation we will need to investigate in depth behavioral genetic research on schizophrenia and intelligence in weeks 5 and 6. Please make sure to post questions you have to the discussion forums and especially to the office hours forum. 7 videos2 readings1 assignment The Human Genome Project (HGP) was begun in 1990 and declared complete in 2003. It has revolutionized our understanding of genetics and will ultimately revolutionize medical practice. In my opinion, every educated citizen should know some basic findings from the HGP. This week’s lectures provide an introduction to molecular biology and the HGP. We will cover topics such as: What is DNA? What is a gene and how are genes structured? In what ways can human genomes differ? What is epigenetics and why do some researchers believe it is very important for understanding behavior? As in previous lectures, I will illustrate some of the basic human genetic phenomena through case studies, in this case ranging from calico cats to the human genetic disorders of Angelman and Prader-Willi syndromes.
This week’s lectures continue what we began last week: laying the foundation of genetic concepts and processes we will need to consider in some depth genetic research on schizophrenia and intelligence. Some participants in this course already have an extensive background in basic genetics and so will be very knowledgeable about material covered in the initial modules. But I think even these participants will have something to learn when we get to the later modules in the unit covering, e.g., Williams Syndrome, Prader-Willi Syndrome and Angelman Syndrome. For those with a more limited background in genetics, I recognize that the terminology introduced this week may at first seem a bit daunting. But if you stick with it, terms such as SNPs, methylation, exon, copy number variants, etc. which seem foreign now will become consolidated in your vocabulary through repeated use throughout the remaining lectures in this course.
There are several learning aids I would encourage you to use. First, we have created a Glossay, which you can link to off the navigation bar on the course website. Second, the Discussion Forums are a wonderful source of help. Other participants can be very helpful in answering your questions and a post in the Office Hours thread will be reviewed by us for response in the weekly office hour video. Finally, we give again online genetics education links in the Other Resources section below. 10 videos3 readings1 assignment Now that we have a foundation in basic biometric and molecular genetics we can begin to look in depth at genetic research for behavioral phenotypes. This week we will focus on schizophrenia. There are several reasons for this focus. First, genetics research has fundamentally changed the way researchers and mental health professionals think about this devastating illness; schizophrenia illustrates the successes as well as the limitations of the genetic approach to a psychiatric illness. Second, research on schizophrenia exemplifies what genetic researchers are finding with most common mental illnesses. Although, for example, the exact chromosomal locations of risk variants and the specific candidate genes implicated certainly vary from one psychiatric illness to the next, the basic features of the genetic architecture appears to be remarkably similar across multiple psychiatric illnesses, at least at this time. So an understanding of the genetics of schizophrenia will bring with it an understanding of much of psychiatric genetics.
Before discussing the genetics research, however, I think it useful that we all know at least a little about what schizophrenia is. Thus the first two modules in this unit describe the clinical phenotype and some of its basic epidemiology, information that will no doubt be very familiar to those of you with a background in clinical psychology or psychiatry. Twin and adoption studies helped to establish the heritable nature of schizophrenia (Module C) and characterize the nature of environmental influence (Module D). The current frontier in genetics research on schizophrenia is to identify the specific genetic variants that underlie its heritability. Initial attempts at identifying risk alleles using the positional cloning strategy were generally unsuccessful yet provided key insights into the nature of the disorder (Module E). Very recently, important breakthroughs have been achieved through Genome Wide Association Studies (GWAS; Module F) and rare variant analysis (Module G).
Although the basic foundation for this course was introduced in Units 1-4 and we strive to minimize our use of jargon, sometimes the technical term is exactly what is needed and we will continue to introduce new terms throughout the remainder of the course. So please make use of the Glossary (linked on the navigation bar). We created it in the hope it would help minimize the impact technical jargon might have on your mastering the lecture material. 9 videos2 readings1 assignment If there is an area of psychology that generates more heated debate than behavioral genetics it would be the field of intelligence research. While most of us acknowledge the differences among us in personality and even risk for mental illness, for some of us differences in intelligence seem more difficult to accept. I confess I am not completely sure why this is the case. Maybe it is because of the involvement of early intelligence researchers with the Eugenics Movement. Alternatively, maybe it is because the conclusions reached by some intelligence researchers seem to challenge our long-held beliefs about social equality, especially when those conclusions are biologically grounded. Regardless, intelligence, or as I prefer to call it general cognitive ability (GCA), has been a major focus of behavioral genetic research and we will use it as a prototype of behavioral genetic research on a quantitative psychological trait.As with the previous unit, we will begin with a brief discussion of what psychologists mean by intelligence or GCA. I will not try and review the vast empirical literature on the correlates of GCA; suffice to say that GCA is correlated, not always strongly, with many desirable outcomes including educational attainment, occupational achievement, health, mortality, criminal conviction, etc. Twin and adoption studies of GCA have implicated the importance of both genetic and nonshared as well as shared environmental influences. Behavioral genetic research has helped to identify features of the shared environment that appear to contribute to differences in intelligence, but, unlike with schizophrenia and other mental illnesses, it has been difficult to identify the specific genetic variants that contribute to the heritability of GCA. This unit will end with a discussion of genetic research on intellectual disability, an important application of intelligence research.Just FYI, one thing we will NOT consider in this unit but some of you will wonder about is developmental behavioral genetic research on intelligence. I promise that it will be covered in Unit 7. 8 videos2 readings1 assignment I am sure many of you wondered about the impact of age on biometric estimates when we discussed general cognitive ability last week. Indeed some of you asked about this issue on the Forums. You were right to raise the question because this is an important issue in the behavioral genetic literature. Given its importance, I thought it might work best to place the question of age moderation in a larger context, which we do this week. We will begin the week by returning to the distinction between shared and non-shared environmental influences, an important distinction in the behavioral genetic literature. You will see that while shared environmental influences are not important for most behavioral phenotypes, there are a few exceptions (including general cognitive ability). However, in all of these exceptional cases, the magnitude of shared environmental influences decreases with age as the heritability increases.
To understand this developmental pattern, at least from a behavioral genetic perspective, it is helpful to consider mechanisms of gene-environment correlation as well as behavioral genetic perspectives on family socialization. We end this unit with an overview of behavioral genetic research on aging. 8 videos2 readings1 assignment It is hard to believe we are already to the 8th and final week of the course. This unit begins with an overall summary of human behavioral genetic research organized around four general findings, or ‘laws’ of behavioral genetic research. We will then consider, I suppose more accurate speculate about, the application of behavioral genetic research in the field of individualized or genomic medicine and the implications of behavioral genetic research for personal responsibility. This week’s lectures will also include an interview with Professor Irving Gottesman, a pioneer in the field who undertook pioneering behavioral genetic research on schizophrenia and personality. 8 videos2 readings1 assignment | 8 modules | null | 26 hours to complete (3 weeks at 8 hours a week) | https://www.coursera.org/learn/behavioralgenetics | 96% |
362 | Baseball into the Millennium | Enrollment number not found | Rating not found | null | Tom Zeiler | University of Colorado Boulder | ['Sports', 'Culture', 'America', 'Baseball', 'US History'] | In this course, we will explore the more recent history of baseball in America, through similar lenses as ones we have already used. Money & labor, culture, shutdowns, and patriotism & nationalism are our main themes for this fourth and final course. We will also look at how contemporary trends such as COVID-19 tie back to a distant history. Welcome to the course! In this module we will cover topics surrounding the Reserve Clause, the 1970s, rising salaries, and baseball in the 21st Century. 7 videos8 assignments1 discussion prompt In this module we will cover topics surrounding iconic pitchers, the Cold War, baseball curses, and race in baseball. 11 videos11 assignments In this module we will cover topics surrounding Vietnam, the First Gulf War, and 9/11. 7 videos1 reading8 assignments In this final module we will cover topics surrounding baseball after WWII, player strikes, COVID, and the future of modern baseball. 7 videos7 assignments | 4 modules | Beginner level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/baseball-into-the-millennium | null |
363 | Electrical Characterization: MOSFETs | Enrollment number not found | Rating not found | null | Trevor Thornton | Arizona State University | ['Semiconductor Device', 'Complementary Metal Oxide Semiconductor (CMOS)', 'Semiconductors', 'Semiconductor Characterization Techniques', 'Semiconductor Materials', 'Semiconductor Device Physics'] | MOSFET transistor switches are the workhorse of semiconductor-based electronics. In this course, we begin with MOS capacitors and see how to extract the oxide charge density, which is important for controlling the MOSFET threshold voltage. We then review MOSFET electrical characteristics and see how current-voltage measurements are used to determine the threshold voltage. The course project uses real-world data to extract the threshold voltage of a 40 nm gate length MOSFET designed for 5G radio frequency integrated circuits. MOSFET transistor switches are the workhorse of semiconductor-based electronics. In this course, we begin with MOS capacitors and see how to extract the oxide charge density, which is important for controlling the MOSFET threshold voltage. We then review MOSFET electrical characteristics and see how current-voltage measurements are used to determine the threshold voltage. The course project uses real-world data to extract the threshold voltage of a 40 nm gate length MOSFET designed for 5G radio frequency integrated circuits. 1 video2 readings This week, you will learn about MOS C-V curves and flat-band voltage. 4 videos1 reading1 assignment This week, you will learn about the characterization of Metal Oxide Silicon Field Effect Transistors (MOSFETs). 3 videos1 reading1 assignment This week, you will learn about extracting MOSFET device parameters. 2 videos1 reading1 assignment This week, you will complete a case study to assess your ability to extract the threshold voltage of a MOSFET. 1 video2 assignments | 5 modules | Intermediate level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/electrical-characterization-mosfets | null |
364 | Understanding Modern Physics III: Simplicity and Complexity | 2,778 | 4.8 | 28 | Yi Wang | The Hong Kong University of Science and Technology | [] | The 20th century was known as the century of physics. In the past 120 years, concepts such as space, time, energy, entropy and particles were understood to much deeper levels. New paradigms of thinking such as relativity and quantum mechanics emerged. This course is the third course in the Understanding Modern Physics series, which covers an introduction to action principle, fundamental particle physics, entropy & information and complexity. This course offers a broad view between simplicity and complexity, to complement the first and second course in the Understanding Modern Physics series. 14 videos1 assignment 9 videos1 assignment 9 videos1 assignment 8 videos1 assignment | 4 modules | Beginner level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/understanding-modern-physics-3-simplicity-and-complexity | null |
365 | Responsible Reporting on Suicide for Journalists | Enrollment number not found | Rating not found | null | Aneri Pattani | Johns Hopkins University | ['Public Health', 'Journalism'] | Responsible Reporting on Suicide for Journalists is designed to give working journalists and students who are interested in the field an understanding of how news media can impact suicide trends and how that power can be used to improve public health. An extensive body of research shows that certain methods of reporting on suicide deaths can increase the number of subsequent suicides among the public. Conversely, responsible methods of reporting on suicide can increase the likelihood of people seeking help. The World Health Organization and the Centers for Disease Control and Prevention have both identified responsible suicide reporting among the media as a key mechanism for suicide prevention. This course aims to give journalists the concrete tools they need to fulfill that goal and make a positive public health impact with their reporting. 3 videos8 readings3 assignments1 plugin 4 videos11 readings2 assignments 6 videos14 readings3 assignments4 plugins | 3 modules | Beginner level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/responsible-reporting-on-suicide-for-journalists | null |
366 | Acing the Product Management Interview | 7,272 | 4.7 | 113 | Nancy Wang | Advancing Women in Tech | ['Estimation Interview', 'Product Design Interview', 'Strategy Interview', 'Behavioral Interview', 'Data Analysis Interview'] | Prepare to impress in your product management interviews by taking this course. You'll learn tips to showcase your skills and PM knowledge directly from the experts who hire and promote top PMs, and practice for your interview using real PM interview questions asked by companies including Meta, Microsoft, Google, and Amazon! Hear how to impress in the interview process from industry-leading experts including:
* NANCY WANG, General Manager of Data Protection Services, Amazon Web Services;
* BOB O'BRIEN, Senior Product Manager, Amazon Web Services
* JENNY TAI, Director of Product, Jam City;
*NANCY GESSLER, Product Management, Learning Products, Amazon Web Services
* TATYANA MAMUT, Chief Product Officer, Nextdoor
* SANDY CARTER, Vice President for Worldwide Public Sector Programs, Amazon Web Services
Sponsored by AMAZON WEB SERVICES (AWS).
This is the fourth of four courses in the ACE Recommended Real-World Product Management Specialization. When you complete all four courses, you can earn up to 6 college credits. Leaders listen attentively, speak candidly, and treat others respectfully. They benchmark themselves and their teams against the best. They understand that networking, like another project, might take years to bear fruit. 4 videos1 reading1 assignment1 peer review Leaders raise the performance bar with every hire and promotion. AWIP builds the foundation for you to demonstrate how you'll raise the bar during each type of PM question, so you're more confident preparing for your own interviews. 9 videos2 readings5 assignments2 peer reviews Leaders raise the performance bar with every hire and promotion. AWIT builds the foundation for you to demonstrate how you'll raise the bar during a full-length PM interview, so you're more confident preparing for your own interviews. 8 videos1 reading1 assignment1 discussion prompt There's so much stuff that has yet to be invented. There's so much new that's going to happen. To us, and to you. What journey will you embark on next? 14 videos3 readings2 peer reviews | 4 modules | Beginner level | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/acing-product-management-interviews | null |
367 | Cybersecurity Risk Management Framework Specialization | 5,014 | 4.3 | 141 | Dave Hatter | Infosec | [] | Gain a holistic understanding of NIST cybersecurity fundamentals. You will learn about the RMF process and managing risk by identifying, assessing and responding to risk. Additionally, you will learn how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. You will deep dive in to the NIST 800-171 document where you will learn how to understand each of the 110 requirements and how to satisfy each of them. You will learn ow to create a Body of Evidence (BOE) including Organizational Policy or Procedures; a System Security Plan (SSP) and Plans of Action and Milestones (POAM). Upon completion of this course, you will have the knowledge and skills to implement the controls required by the NIST 800-171 framework and build your BOE. Applied Learning Project This specialization does not have any projects. You have learned about the RMF process and managing risk by identifying, assessing and responding to risk, as well as how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. This specialization does not have any projects. This course will help you to build a basic understanding of NIST cybersecurity fundamentals. You will learn about the RMF process and managing risk by identifying, assessing and responding to risk. Additionally, you will learn how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. The Cybersecurity Framework skill path introduces the framework for improving infrastructure cybersecurity. The Risk Management Framework (RMF) provides a disciplined, structured and flexible process for managing security and privacy risk. It includes information security categorization; control selection, implementation and assessment; system and common control authorizations; and continuous monitoring. It includes activities to prepare organizations to execute the framework at appropriate risk management levels. This learning path explains the RMF steps and its processes (aka tasks) which link essential risk management processes at the system level to risk management processes at the organization level. This learning path explains the Risk Management Framework (RMF) and its processes and provides guidance for applying the RMF to information systems and organizations. NIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the National Institute of Standards and Technology (NIST). This learning path will teach you how to comply with the requirements of NIST 800-171. You will understand what CUI is and how to identify it; what a nonfederal information systems is; how to understand each of the 110 requirements in the framework and satisfy each of them if necessary; how to create a Body of Evidence (BOE) including Organizational Policy or Procedures; a System Security Plan (SSP) and Plans of Action and Milestones (POAM). Upon completion of this course, you will have the knowledge and skills to implement the controls required by the NIST 800-171 framework and build your BOE. | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/cybersecurity-risk-management-framework | null |
368 | Academic Information Seeking | 33,873 | 4.7 | 702 | Birgitte Munk | University of Copenhagen | [] | This course will introduce you to the basic elements of academic information seeking - we will explore the search process from defining a strategy to evaluating and documenting your search results. Attending the course will make you a proficient information seeker. You will learn how to carry out comprehensive literature searches based on your own research assignment. You will be guided through the various information seeking steps from selecting relevant search strategies and techniques to evaluating your search results, documenting your search process and citing your sources.
Attending the course will enable you to:
• Identify your information need
• Evaluate databases and other information resources
• Set up search strategies and use various search techniques
• Formulate search strings based on your own research assignment
• Identify relevant material types
• Undertake critical evaluation of your sources
• Search more efficiently on the internet
• Avoid plagiarism
• Cite correctly
• Work with reference management
• Document your search process
The course is intended for undergraduate students but the lessons will be useful to anyone who is interested in becoming better at finding scientific information. There are no formal requirements for the course.
The series consists of 21 lectures that are organized into three modules. The lectures include small assignments and quizzes (to check comprehension).
The lectures will each touch upon a topic that is essential to the information seeking process. To get the most out of the lecture series, we recommend that you access the lectures while you are working on an academic paper. We also recommend that you watch the lectures in the order in which we have structured them.
We recommend that you create and fill out a log book while attending the lectures. We have created a log book template that you can use during the course.
The lecture series has been developed in collaboration between information specialists at University of Copenhagen and Technical University of Denmark In Module 1, we focus on preparation. We explain how to use a log book to document your searches, provide ideas for generating search terms, introduce you to various types of literature, material and information resources, and to reference management. 8 videos10 readings1 assignment In module 2, you will learn to search for and find information. You will learn how to set up a search strategy and you will be introduced to various search methods and search techniques. 6 videos3 readings1 assignment In module 3, you will learn how to evaluate, use and document your search results. You will get tips on how to critically assess information, you will be introduced to concepts like copyright and plagiarism, and you will learn how to insert citations and bibliographies into your papers. 7 videos5 readings1 assignment | 3 modules | null | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/academicinfoseek | 97% |
369 | Fundamentals of Digital Image and Video Processing | 140,873 | 4.6 | 1,745 | Aggelos K. Katsaggelos | Northwestern University | ['Image Processing', 'Data Compression', 'Matlab'] | In this class you will learn the basic principles and tools used to process images and videos, and how to apply them in solving practical problems of commercial and scientific interests. Digital images and videos are everywhere these days – in thousands of scientific (e.g., astronomical, bio-medical), consumer, industrial, and artistic applications. Moreover they come in a wide range of the electromagnetic spectrum - from visible light and infrared to gamma rays and beyond. The ability to process image and video signals is therefore an incredibly important skill to master for engineering/science students, software developers, and practicing scientists. Digital image and video processing continues to enable the multimedia technology revolution we are experiencing today. Some important examples of image and video processing include the removal of degradations images suffer during acquisition (e.g., removing blur from a picture of a fast moving car), and the compression and transmission of images and videos (if you watch videos online, or share photos via a social media website, you use this everyday!), for economical storage and efficient transmission.
This course will cover the fundamentals of image and video processing. We will provide a mathematical framework to describe and analyze images and videos as two- and three-dimensional signals in the spatial, spatio-temporal, and frequency domains. In this class not only will you learn the theory behind fundamental processing tasks including image/video enhancement, recovery, and compression - but you will also learn how to perform these key processing tasks in practice using state-of-the-art techniques and tools. We will introduce and use a wide variety of such tools – from optimization toolboxes to statistical techniques. Emphasis on the special role sparsity plays in modern image and video processing will also be given. In all cases, example images and videos pertaining to specific application domains will be utilized. In this module we look at images and videos as 2-dimensional (2D) and 3-dimensional (3D) signals, and discuss their analog/digital dichotomy. We will also see how the characteristics of an image changes depending on its placement over the electromagnetic spectrum, and how this knowledge can be leveraged in several applications. 3 videos5 readings1 assignment In this module we introduce the fundamentals of 2D signals and systems. Topics include complex exponential signals, linear space-invariant systems, 2D convolution, and filtering in the spatial domain. 5 videos4 readings1 assignment In this module we look at 2D signals in the frequency domain. Topics include: 2D Fourier transform, sampling, discrete Fourier transform, and filtering in the frequency domain. 5 videos2 readings1 assignment In this module we cover two important topics, motion estimation and color representation and processing. Topics include: applications of motion estimation, phase correlation, block matching, spatio-temporal gradient methods, and fundamentals of color image processing 5 videos2 readings1 assignment In this module we cover the important topic of image and video enhancement, i.e., the problem of improving the appearance or usefulness of an image or video. Topics include: point-wise intensity transformation, histogram processing, linear and non-linear noise smoothing, sharpening, homomorphic filtering, pseudo-coloring, and video enhancement. 9 videos2 readings1 assignment In this module we study the problem of image and video recovery. Topics include: introduction to image and video recovery, image restoration, matrix-vector notation for images, inverse filtering, constrained least squares (CLS), set-theoretic restoration approaches, iterative restoration algorithms, and spatially adaptive algorithms. 9 videos2 readings1 assignment In this module we look at the problem of image and video recovery from a stochastic perspective. Topics include: Wiener restoration filter, Wiener noise smoothing filter, maximum likelihood and maximum a posteriori estimation, and Bayesian restoration algorithms. 6 videos2 readings1 assignment In this module we introduce the problem of image and video compression with a focus on lossless compression. Topics include: elements of information theory, Huffman coding, run-length coding and fax, arithmetic coding, dictionary techniques, and predictive coding. 8 videos2 readings1 assignment In this module we cover fundamental approaches towards lossy image compression. Topics include: scalar and vector quantization, differential pulse-code modulation, fractal image compression, transform coding, JPEG, and subband image compression. 7 videos2 readings1 assignment In this module we discus video compression with an emphasis on motion-compensated hybrid video encoding and video compression standards including H.261, H.263, H.264, H.265, MPEG-1, MPEG-2, and MPEG-4. 6 videos2 readings1 assignment In this module we introduce the problem of image and video segmentation, and discuss various approaches for performing segmentation including methods based on intensity discontinuity and intensity similarity, watersheds and K-means algorithms, and other advanced methods. 4 videos2 readings1 assignment In this module we introduce the notion of sparsity and discuss how this concept is being applied in image and video processing. Topics include: sparsity-promoting norms, matching pursuit algorithm, smooth reformulations, and an overview of the applications. 5 videos2 readings1 assignment | 12 modules | null | 35 hours to complete (3 weeks at 11 hours a week) | https://www.coursera.org/learn/digital | 96% |
370 | Targets, Assays & Screening | Enrollment number not found | 4.8 | 10 | Erland Stevens, PhD | Novartis | ['Drug Discovery'] | This course focuses on the early stages of drug discovery and the identification of promising compounds with which to begin the hunt for a novel drug. Different types of assays and methods are reviewed that are used to screen libraries of molecules in the preliminary search for compounds with activity. Methods are discussed for validating that active molecules are indeed engaging a target associated with a predicted therapeutic benefit. Target audience: This course is suitable for life scientists, clinicians, and individuals from fields that support drug discovery (e.g., patents, finance, licensing, etc.) interested in learning more about the pharmaceutical/biotechnology sector. Advanced undergraduate coursework or practical familiarity/working knowledge in biological sciences and organic chemistry is recommended. Welcome, by the end of the course students will be able to: Recognize the differences between target-based and phenotypic drug discovery. Differentiate between common library types and screening approaches for identifying small molecule hits. Describe some of the assay types used in early screening and factors to consider in their design. 5 videos2 readings3 assignments 5 videos3 readings6 assignments 5 videos2 readings3 assignments | 3 modules | Intermediate level | 8 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/targets-assays-screening | null |
371 | Medical Billing and Coding Fundamentals Specialization | 32,045 | 4.8 | 854 | Jennifer Zabel | MedCerts | ['Medical Ethics', 'Payment Processing', 'Medical language', 'Emotional Strength', 'Professional Communication', 'human anatomy', 'Medical Coding', 'Patient Interaction', 'Medical Billing', 'Insurance Verification'] | Through this Specialization, students learn the essential skills of an Insurance Billing Specialist. Knowledge of human anatomy and medicine is necessary for any healthcare role, so students are also taught this terminology and structure. Additionally, this Specialization includes skills to stand out to employers by teaching professionalism, communication, and soft skills specific to an allied health environment. IMPORTANT:This specialization is not designed to prepare students for national certification. Enrollees will gain the foundational/fundamental knowledge on subject matter relevant to the profession. However, to gain industry certification, a more comprehensive program must be completed through enrollment via approved/eligible schools such as MedCerts. Applied Learning Project MedCerts’ highly immersive courses use various unique eLearning components designed to keep students engaged, stimulated, and entertained throughout training. We are planning to add increased project opportunities and will have more details coming soon. Gain an understanding of the expectations of an allied healthcare professional in the workplace Develop and exercise emotional intelligence, self-management, and interpersonal skills Build and improve internal and external communication skills with all exchanges Enhance the patient care experience with successful interactions and patient satisfaction Analyze and understand medical terminology Recognize the structure and function of human body systems Gain an understanding of the directional terms in relationship to the human body Discuss pathology, the disease process, and endoscopy Describe the phases of the revenue cycle Gain an understanding of basic insurance terminology Demonstrate knowledge of confidentiality and billing laws, regulations, and standards Explain verification of patient financial responsibility and insurance information | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/medical-billing-coding-fundamentals | null |
372 | Advanced Reproducibility in Cancer Informatics | Enrollment number not found | Rating not found | null | Candace Savonen, MS | Johns Hopkins University | ['Informatics', 'Data Analysis', 'Github', 'Reproducibility', 'R Programming'] | This course introduces tools that help enhance reproducibility and replicability in the context of cancer informatics. It uses hands-on exercises to demonstrate in practical terms how to get acquainted with these tools but is by no means meant to be a comprehensive dive into these tools. The course introduces tools and their concepts such as git and GitHub, code review, Docker, and GitHub actions. Target Audience
The course is intended for students in the biomedical sciences and researchers who use informatics tools in their research. It is the follow up course to the Introduction to Reproducibility in Cancer Informatics course. Learners who take this course should:
- Have some familiarity with R or Python
- Have take the Introductory Reproducibility in Cancer Informatics course
- Have some familiarity with GitHub
Motivation
Data analyses are generally not reproducible without direct contact with the original researchers and a substantial amount of time and effort (BeaulieuJones, 2017). Reproducibility in cancer informatics (as with other fields) is still not monitored or incentivized despite that it is fundamental to the scientific method. Despite the lack of incentive, many researchers strive for reproducibility in their own work but often lack the skills or training to do so effectively.
Equipping researchers with the skills to create reproducible data analyses increases the efficiency of everyone involved. Reproducible analyses are more likely to be understood, applied, and replicated by others. This helps expedite the scientific process by helping researchers avoid false positive dead ends. Open source clarity in reproducible methods also saves researchers' time so they don't have to reinvent the proverbial wheel for methods that everyone in the field is already performing.
Curriculum
The course includes hands-on exercises for how to apply reproducible code concepts to their code. Individuals who take this course are encouraged to complete these activities as they follow along with the course material to help increase the reproducibility of their analyses.
**Goal of this course:**
To equip learners with a deeper knowledge of the capabilities of reproducibility tools and how they can apply to their existing analyses scripts and projects.
**What is NOT the goal of this course:**
To be a comprehensive dive into each of the tools discussed. .
How to use the course
Each chapter has associated exercises that you are encourage to complete in order to get the full benefit of the course
This course is designed with busy professional learners in mind -- who may have to pick up and put down the course when their schedule allows. In general, you are able to skip to chapters you find a most useful to (One incidence where a prior chapter is required is noted).
Each chapter has associated exercises that you are encourage to complete in order to get the full benefit of the course This section describes the rationale and context for this course as well as its target audience. 3 plugins This section defines reproducibility for the purposes of this course. 1 assignment1 plugin This section discusses how to get started with creating branches and pull requests on GitHub. 1 assignment1 plugin In this section we discuss the responsibility of an author of a pull request in code review. 1 assignment1 plugin In this section we discuss the responsibility of a reviewer of a pull request in code review. 1 assignment1 plugin This section walks through how to get started with Docker. 1 assignment1 plugin This section describes how to modify an existing Docker image 1 assignment1 plugin This section describes the motivation for using automation tools to enhance reproducibility. 1 assignment1 plugin | 8 modules | Advanced level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/adv-reproducibility-cancer-informatics | null |
373 | The Basics of Rocket Science | 1,910 | 4.9 | 19 | Aaron Ridley | University of Michigan | ['Space Engineering', 'Basic Orbital Mechanics', 'Rocket Science', 'Rocket Mechanics', 'Rocketry'] | Why are rockets so big? Is there gravity in space? How does a rocket engine even work? In this course, you’ll explore the major concepts of rocket science, including orbital dynamics, velocity, and different types of engines that help propel a rocket out of Earth’s atmosphere. Determine how rocket scientists use formulas and Newton’s laws to propel rockets off the ground and accelerate them to their destination. Explore how and why rockets have stages, including how rocket scientists choose between solid and liquid engines for rockets. With The Basics of Rocket Science, you’ll even get an inside look at how we might get humans to Mars, an advancement in rocket science that could change humanity's future. Welcome to the first module of the Basics of Rocket Science course, where we will dive into the fundamental concepts of motion and forces. In this module, we will cover a range of topics, including position, velocity, and acceleration, Newton's Laws and Rocket Science, and the critical concept of thrust. Whether you are an aspiring rocket scientist, aerospace engineer, or simply a curious mind eager to explore the mysteries of space, this module will provide you with a solid foundation to understand the key concepts of motion and forces in the world of rocket science. So, let's strap in and get ready for an exciting journey into the basics of rocket science! 11 videos3 readings4 assignments1 discussion prompt Welcome to the second module of the Basics of Rocket Science course, where we will delve into the fascinating world of orbits. In this module, we will cover a range of topics, including what an orbit is, escape velocity, and the different types of orbits that exist. So, get ready to discover the mysteries of orbits and the incredible technology that makes it all possible. Let's dive in! 13 videos1 reading6 assignments Welcome to the third module of the Basics of Rocket Science course, where we will explore the fascinating world of rocket engines. In this module, we will cover a range of topics, including mass flow rate vs. exhaust velocity, jet engines, solid engines, and liquid engines. By the end of this module, you will have a deep understanding of the fundamentals of rocket engines and how they are critical to modern technology and space exploration. So, get ready to dive into the world of rocket engines and discover the incredible technology that makes space exploration possible. Let's blast off! 13 videos1 reading5 assignments Welcome to the fourth and final module of the Basics of Rocket Science course, where we will explore the exciting future of rocket science. In this module, we will cover a range of topics, including electric engines, big guns and lasers, other engines such as nuclear, and going to Mars and back. By the end of this module, you will have a deep understanding of the future of rocket science and how it will shape our understanding of the universe and our place in it. So, get ready to explore the cutting edge of rocket science and discover the incredible possibilities that lie ahead. Let's embark on this final journey together! 13 videos2 readings5 assignments1 discussion prompt | 4 modules | Beginner level | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/basics-of-rocket-science | null |
374 | Micro Electromechanical Systems | Enrollment number not found | Rating not found | null | Hardik Jeetendra Pandya | Indian Institute of Science | ['Electronics', 'Material Characterization', 'PCB Design', 'Sensor Fabrication', 'Micro Electro-Mechanical Systems (MEMS)'] | Unlock the potential of Micro Electromechanical Systems (MEMS) with this comprehensive course, designed to equip you with the knowledge and hands-on skills to excel in this transformative field. Dive deep into the essential concepts, materials, and fabrication techniques that power MEMS technology, and explore how it is revolutionizing industries. From understanding foundational MEMS principles to mastering advanced sensor fabrication and characterization methods, this course offers a step-by-step guide to becoming proficient in MEMS applications.
Engage with dynamic video content and develop practical skills in cleanroom protocols, micromachining, and PCB design. Learn to fabricate MEMS sensors, interface them with advanced techniques, and apply communication protocols to create innovative solutions.
Ideal for engineers, researchers, and students passionate about microfabrication and sensor design, this course will position you at the forefront of MEMS technology, ready to innovate and lead. This module will give you a glimpse of what you will be learning in the course. 1 video1 reading1 discussion prompt This module introduces students to the world of Micro Electromechanical Systems (MEMS), providing a broad overview of its technology and applications. Students will explore the key materials used in MEMS fabrication and gain practical knowledge of cleanroom protocols essential for the development of MEMS devices. This module lays the foundation for understanding the interplay between materials, mechanical structures, and electronic components that form MEMS systems. 5 videos1 assignment1 discussion prompt This module focuses on the techniques used in MEMS fabrication, specifically oxidation processes and Physical Vapor Deposition (PVD) methods. Students will explore techniques like electron-beam (E-beam) evaporation and thermal evaporation, while also learning how thermal oxidation is used to develop layers for sensor fabrication. The module will also cover numerical calculations for oxidation processes and deposition techniques. 6 videos2 readings1 assignment1 discussion prompt This module continues exploring MEMS sensor fabrication techniques with an emphasis on PVD sputtering and Chemical Vapor Deposition (CVD). Students will learn about the sputtering process used to deposit thin films and how CVD techniques are used to create high-quality sensor materials. By the end of this module, students will be able to differentiate between PVD and CVD processes and understand their specific applications in MEMS. 4 videos1 reading1 assignment1 discussion prompt In this module, students will dive into the lithographic processes used in MEMS fabrication. Photolithography is a critical technique for patterning microstructures, and students will explore its different stages and techniques. This module also covers numerical calculations related to lithography and discusses how lithography is used in various MEMS applications. 6 videos1 reading1 assignment1 discussion prompt This module covers micromachining techniques, including bulk and surface micromachining, that are integral to MEMS sensor fabrication. Students will learn about the development of MEMS-based VOC sensors, and explore advanced techniques like Deep Reactive Ion Etching (DRIE) and Reactive Ion Etching (RIE). The module also introduces wet etching processes and the concept of Miller indices in crystalline structures. 6 videos3 readings1 assignment1 discussion prompt In this module, students will learn about sensor integration and interfacing techniques essential for MEMS applications. Topics will include 3D printing, PCB design, radar sensors, and sensor communication protocols. Students will also gain practical knowledge of interfacing MEMS sensors with electronic systems, exploring encoding methods and how sensor outputs are processed and transmitted. 8 videos1 assignment1 discussion prompt This final module focuses on the characterization techniques used to assess MEMS sensor performance and explore their real-world applications. Students will learn about wire bonding techniques and various methods for characterizing MEMS devices. Practical applications of MEMS sensors in industries like healthcare, aerospace, and consumer electronics will also be discussed 6 videos1 reading2 assignments1 discussion prompt | 8 modules | Beginner level | 27 hours to complete (3 weeks at 9 hours a week) | https://www.coursera.org/learn/micro-electromechanical-systems | null |
375 | AWS Glue Getting Started | Enrollment number not found | Rating not found | null | AWS Instructor | Amazon Web Services | ['AWS Glue concepts', 'AWS Glue use cases', 'AWS Glue implementation', 'AWS Glue DataBrew'] | With AWS Glue, you can discover, prepare, and combine data for various purposes, including analytics, machine learning (ML), and application development. In this course, you will learn the benefits and technical concepts of AWS Glue. If you are new to the service, you will learn how to start using AWS Glue through a demonstration using the AWS Management Console. You will learn about the architecture and how the built-in features can help you streamline data preparation. With AWS Glue, you can discover, prepare, and combine data for various purposes, including analytics, machine learning (ML), and application development.
In this course, you will learn the benefits and technical concepts of AWS Glue. If you are new to the service, you will learn how to start using AWS Glue through a demonstration using the AWS Management Console. You will learn about the architecture and how the built-in features can help you streamline data preparation. 1 reading1 assignment | 1 module | Beginner level | 1 hour to complete | https://www.coursera.org/learn/aws-glue-getting-started | null |
376 | Prehospital care of acute stroke and patient selection for endovascular treatment using the RACE scale | 3,194 | 4.8 | 113 | Montse Gorchs Molist | Universitat de Barcelona | [] | Acute stroke is a time-dependent medical emergency. In acute ischemic stroke, the first objective is to restore brain flow using sistemic thrombolytic treatment and, in patients with large vessel occlusion, by endovascular treatment. In hemorrhagic stroke there are also specific treatments that can improve the clinical outcome. The sooner the initiation of all these therapies the higher the clinical benefit. Thus, the organization of Stroke Code systems coordinated between emergency medical systems and hospitals is crucial to achieve early medical attention and treament.
Neurological scales facilitate stroke recognition at both hospital and pre-hospital levels and provide valuable information of stroke severity. The RACE scale is a prehospital scale validated as a tool to identify patients with suspected large vessel occlusion who are potential candidates for endovascular treatment.
This course aims to update general knowledge in acute stroke and currently available treatments, to review the protocol
of the Stroke Code and, finally, to train in the use of the RACE scale.
The target profile of this course is aimed to all health professionals working in the field of emergencies. 1 video3 readings 3 videos2 readings1 assignment 2 videos3 readings1 assignment The RACE scale is a prehospital simple and rapid neurological scale to detect acute stroke patients with a high probability of having a large vessel occlusion, candidates to be treated with endovascular techniques in a comprehensive stroke center 4 videos6 readings6 assignments | 4 modules | Intermediate level | 12 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/acute-stroke-race-scale | null |
377 | Advanced Programming in Kotlin | 11,304 | 4.7 | 102 | Taught by Meta Staff | Meta | [] | In this course, you will expand your Kotlin fluency by exploring the advanced concepts used by many Kotlin programmers. You will learn the more advanced features of Kotlin that are required to build a robust, functional Android app. Each week’s learning provides ample opportunity for you to practice and apply what you learn as you learn it.
By the end of this course, you will have an array of advanced programming tools to help you engineer solutions for your future Kotlin projects, progressing you toward a better understanding of Android development. On successful completion of the course you will be able to:
Implement an Android application with an Activity
Implement advanced object-oriented features in Android
Use mocks and fakes to perform unit testing in Android
Use a Lambda expression to define a function as an object
Use collection processing methods for multistep collection processing
To be successful in this course, you require a foundational understanding of Kotlin programming fundamentals and of creating a UI in Android Studio. Learn how to work with object declarations and experience how they are used. Develop your understanding of companion objects, classes and constant values. In addition, have a walk-through of declaring an object in Android and explore what is involved with implementing a function start for an Activity. 11 videos10 readings4 assignments1 discussion prompt Learn how to add methods to classes using extension functions while defining and using extension functions in Android. Then explore functions for different kinds of collection processing using map, filter, and fold. 10 videos14 readings6 assignments Learn about Lambda expressions, Function types, Higher-order functions and collections processing. Explore how functions can be used as objects, how to use lambda expressions to define functions as objects and how to define and use higher-order and repeat functions. Finally, exploited using collection processing methods with multistep collection processing. 13 videos14 readings7 assignments Demonstrate your coding skills by upgrading and adding functionality to a Little Lemon menu app so that it can work with a list and can sort and filter. In addition, participate in peer reviews, and complete the final course assessment. 2 videos5 readings1 assignment1 peer review1 discussion prompt | 4 modules | Intermediate level | null | https://www.coursera.org/learn/advanced-programming-in-kotlin | 91% |
378 | Data Management Capstone Project | Enrollment number not found | Rating not found | null | Instructor not found | Organization not found | ['Encryption Techniques', 'Risk Management', 'Data Security', 'Data Governance', 'Data Privacy'] | null | null | Advanced level | 1 hour to complete | https://www.coursera.org/learn/data-management-capstone-project | null |
379 | A Law Student's Toolkit | 169,188 | 4.7 | 1,447 | Ian Ayres | Yale University | [] | Whether you are an advanced law student looking to review the basics, or an aspiring law student looking for head start, this course will help you build the foundation you will need to succeed in law school and beyond. This course will introduce you to terminology, concepts, and tools lawyers and legal academics use to make their arguments. It will help you follow these arguments—and make arguments of your own. This course consists of a series of short lectures and assignments. A reading list complements each lesson, providing you with a roadmap to help you explore the subject matter more deeply on your own. Although the lessons may cross-reference each other, they are modular in nature: you should feel free to approach them in whatever order fits your schedule, interests, and needs. An overview of what you will learn, how it will help you, and how to get the most from it. 1 video2 readings Dichotomies and oppositions that will help you categorize legal rules and frame policy questions. 11 videos8 readings1 assignment3 peer reviews Interactions between the law and academic disciplines such as economics, philosophy, and psychology. 10 videos10 readings1 peer review Fundamental frameworks of legal analysis and procedure. 4 videos4 readings1 peer review Concepts from the law of evidence that can help you respond to questions and make compelling arguments 2 videos2 readings The tools you need to get the most out of law school. 4 videos2 readings1 assignment1 peer review 2 videos1 reading | 7 modules | null | 15 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/law-student | 96% |
380 | English for Running a Successful Business | 2,005 | 4.8 | 24 | Karen Vallejo | University of California, Irvine | [] | In this course, as you read passages and watch videos, you will learn about the challenges of entrepreneurship, the importance of sales professionals in every company, and how to read numbers and graphs in sales reports. You will also learn how important project management and sustainability are for companies in modern times. Additionally, you will learn the correct usage of modal verbs and phrasal verbs as well as how to clearly ask for clarification. Your professional communication skills will improve as you incorporate these lessons into your English. This will help you to be more successful in using English in your business life. This week, we’ll focus on entrepreneurs—people who start a new business, even though they know it may not succeed. What qualities and skills are needed to become an entrepreneur, and what factors determine why some businesses succeed and others fail? You’ll hear about some steps to follow in starting a business and writing a business plan. You’ll also learn about how to use modal verbs for many purposes—to talk about possibilities, predictions, and requirements, or to give advice. 4 videos5 readings8 assignments This week’s topic is about sales in a company. Sales is the driving force and money-making activity in business. You will read about sales team activities and listen to a talk about strategies of sales outlets. You will also see presentations about housing sales reports and how sales numbers are reported in graphs and in English writing. 2 videos7 readings4 assignments In any type of business, there are many projects. This week, you’ll learn about project management—planning, organizing, and keeping track of projects so the work is finished correctly and on time. You’ll learn about some special concepts and terms used in this field and think about the importance of teamwork in getting a project done smoothly. You’ll also learn some useful expressions for asking for clarification or getting more information if you don’t understand something. 4 videos3 readings8 assignments The topic of sustainability, or being environmentally friendly, has become a key goal many companies plan to incorporate into their businesses. This week, we will read and listen to some passages about sustainability in business. In addition, we will listen to an interview about how one multinational company is incorporating sustainability into many facets of their corporate operations. We will also learn about how to use some phrasal verbs in writing and speaking situations in English. 2 videos5 readings6 assignments1 discussion prompt | 4 modules | null | 16 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/english-for-getting-down-to-business | null |
381 | Model Thinking | 203,118 | 4.8 | 2,221 | Scott E. Page | University of Michigan | ['Modeling', 'Economics', 'Decision-Making', 'Strategic Thinking'] | We live in a complex world with diverse people, firms, and governments whose behaviors aggregate to produce novel, unexpected phenomena. We see political uprisings, market crashes, and a never ending array of social trends. How do we make sense of it? Models. Evidence shows that people who think with models consistently outperform those who don't. And, moreover people who think with lots of models outperform people who use only one. Why do models make us better thinkers? Models help us to better organize information - to make sense of that fire hose or hairball of data (choose your metaphor) available on the Internet. Models improve our abilities to make accurate forecasts. They help us make better decisions and adopt more effective strategies. They even can improve our ability to design institutions and procedures. In this class, I present a starter kit of models: I start with models of tipping points. I move on to cover models explain the wisdom of crowds, models that show why some countries are rich and some are poor, and models that help unpack the strategic decisions of firm and politicians. The models covered in this class provide a foundation for future social science classes, whether they be in economics, political science, business, or sociology. Mastering this material will give you a huge leg up in advanced courses. They also help you in life. Here's how the course will work. For each model, I present a short, easily digestible overview lecture. Then, I'll dig deeper. I'll go into the technical details of the model. Those technical lectures won't require calculus but be prepared for some algebra. For all the lectures, I'll offer some questions and we'll have quizzes and even a final exam. If you decide to do the deep dive, and take all the quizzes and the exam, you'll receive a Course Certificate. If you just decide to follow along for the introductory lectures to gain some exposure that's fine too. It's all free. And it's all here to help make you a better thinker! In these lectures, I describe some of the reasons why a person would want to take a modeling course. These reasons fall into four broad categories: 1)To be an intelligent citizen of the world 2) To be a clearer thinker 3) To understand and use data 4) To better decide, strategize, and design. There are two readings for this section. These should be read either after the first video or at the completion of all of the videos.We now jump directly into some models. We contrast two types of models that explain a single phenomenon, namely that people tend to live and interact with people who look, think, and act like themselves. After an introductory lecture, we cover famous models by Schelling and Granovetter that cover these phenomena. We follows those with a fun model about standing ovations that I wrote with my friend John Miller. 12 videos6 readings1 assignment In this section, we explore the mysteries of aggregation, i.e. adding things up. We start by considering how numbers aggregate, focusing on the Central Limit Theorem. We then turn to adding up rules. We consider the Game of Life and one dimensional cellular automata models. Both models show how simple rules can combine to produce interesting phenomena. Last, we consider aggregating preferences. Here we see how individual preferences can be rational, but the aggregates need not be.There exist many great places on the web to read more about the Central Limit Theorem, the Binomial Distribution, Six Sigma, The Game of Life, and so on. I've included some links to get you started. The readings for cellular automata and for diverse preferences are short excerpts from my books Complex Adaptive Social Systems and The Difference Respectively. 12 videos1 reading1 assignment In this section, we study various ways that social scientists model people. We study and contrast three different models. The rational actor approach, behavioral models, and rule based models . These lectures provide context for many of the models that follow. There's no specific reading for these lectures though I mention several books on behavioral economics that you may want to consider. Also, if you find the race to the bottom game interesting just type "Rosemary Nagel Race to the Bottom" into a search engine and you'll get several good links. You can also find good introductions to "Zero Intelligence Traders" by typing that in as well. 12 videos1 reading1 assignment In this section, we cover tipping points. We focus on two models. A percolation model from physics that we apply to banks and a model of the spread of diseases. The disease model is more complicated so I break that into two parts. The first part focuses on the diffusion. The second part adds recovery. The readings for this section consist of two excerpts from the book I'm writing on models. One covers diffusion. The other covers tips. There is also a technical paper on tipping points that I've included in a link. I wrote it with PJ Lamberson and it will be published in the Quarterly Journal of Political Science. I've included this to provide you a glimpse of what technical social science papers look like. You don't need to read it in full, but I strongly recommend the introduction. It also contains a wonderful reference list. 13 videos1 reading1 assignment In this section, we cover some models of problem solving to show the role that diversity plays in innovation. We see how diverse perspectives (problem representations) and heuristics enable groups of problem solvers to outperform individuals. We also introduce some new concepts like "rugged landscapes" and "local optima". In the last lecture, we'll see the awesome power of recombination and how it contributes to growth. The readings for this chapters consist on an excerpt from my book The Difference courtesy of Princeton University Press. 10 videos1 reading1 assignment 1 assignment Models can help us to determine the nature of outcomes produced by a system: will the system produce an equilibrium, a cycle, randomness, or complexity? In this set of lectures, we cover Lyapunov Functions. These are a technique that will enable us to identify many systems that go to equilibrium. In addition, they enable us to put bounds on how quickly the equilibrium will be attained. In this set of lectures, we learn the formal definition of Lyapunov Functions and see how to apply them in a variety of settings. We also see where they don't apply and even study a problem where no one knows whether or not the system goes to equilibrium or not. 11 videos1 reading1 assignment In this set of lectures, we cover path dependence. We do so using some very simple urn models. The most famous of which is the Polya Process. These models are very simple but they enable us to unpack the logic of what makes a process path dependent. We also relate path dependence to increasing returns and to tipping points. The reading for this lecture is a paper that I wrote that is published in the Quarterly Journal of Political Science 10 videos1 reading1 assignment In this section, we first discuss randomness and its various sources. We then discuss how performance can depend on skill and luck, where luck is modeled as randomness. We then learn a basic random walk model, which we apply to the Efficient Market Hypothesis, the ideas that market prices contain all relevant information so that what's left is randomness. We conclude by discussing finite memory random walk model that can be used to model competition. The reading for this section is a paper on distinguishing skill from luck by Michael Mauboussin. 11 videos1 reading1 assignment In this section, we cover the Prisoners' Dilemma, Collective Action Problems and Common Pool Resource Problems. We begin by discussion the Prisoners' Dilemma and showing how individual incentives can produce undesirable social outcomes. We then cover seven ways to produce cooperation. Five of these will be covered in the paper by Nowak and Sigmund listed below. We conclude by talking about collective action and common pool resource problems and how they require deep careful thinking to solve. There's a wonderful piece to read on this by the Nobel Prize winner Elinor Ostrom. 9 videos1 reading1 assignment In this section, we cover replicator dynamics and Fisher's fundamental theorem. Replicator dynamics have been used to explain learning as well as evolution. Fisher's theorem demonstrates how the rate of adaptation increases with the amount of variation. We conclude by describing how to make sense of both Fisher's theorem and our results on six sigma and variation reduction. The readings for this section are very short. The second reading on Fisher's theorem is rather technical. Both are excerpts from Diversity and Complexity. 8 videos1 reading1 assignment 2 readings1 assignment | 12 modules | Intermediate level | null | https://www.coursera.org/learn/model-thinking | 97% |
382 | Quality Improvement in Healthcare Specialization | 2,910 | 4.3 | 25 | Dr Thomas Woodcock | Imperial College London | [] | Health systems worldwide seek to prevent and treat disease and illness and improve well-being and quality of life. This specialisation focuses on improving the quality of the services provided by these systems. The specialisation content is based on the academic literature and research in quality improvement, comprehensively illustrated with real-life practical examples.You will hear from leaders in the field, including a range of guest speakers to support your learning. In this specialisation, you will explore what is meant by quality in healthcare, study approaches to improving quality; and understand what has and has not been learned through scientific study of such approaches to date. You will gain an appreciation of the theory and practice of improving quality in health and care, through the scientific literature, and through case studies from around the world. You will learn the tools and techniques of quality improvement, how to apply them and to critique their use. You will learn to analyse data over time to guide and evaluate improvement initiatives. You will study these concepts in health service and population health settings, learning from quality improvement practitioners and experts in the field. Applied Learning Project In the capstone assessment for this specialisation, you will bring together what you have learnt across the three courses; from quality improvement methods, through evaluation designs for improvement initiatives, to improving population health. You will plan your own improvement initiative, tackling an important population health issue, and select methods suited to the problem. This course introduces you to the concepts, theories and application of Quality Improvement (QI) in healthcare from a global perspective. You will hear from patients, clinicians and academics what quality improvement means to them, and how they work together to deliver change. Studying the challenges, they faced and strategies they utilised to overcome those challenges, you will learn to apply and critique core QI methods, from experts in the field. By the end of this module you will be able to:
1. Recognise the characteristics of different approaches to quality improvement in order to critique them and make decisions as to when to deploy them.
2. Explain the necessary components of a structured approach to quality improvement in order to apply key quality improvement methods to support the planning, design, implementation and evaluation of improvement efforts. In this course, you will learn about the importance of measuring the quality of care and health outcomes in order to determine whether Quality Improvement(QI ) initiatives have achieved their aims. You will learn about how data is utilised to identify areas of improvement and the importance of using both quantitative and qualitative data in evaluating change. You will learn about the specific methods appropriate for improvement as distinct from methods more suited to research, including how to design measurement schemes suitable for improvement initiatives Quality improvement methods were first deployed in healthcare in e hospital settings. However, over the past decade particularly, there has been increasing focus on the application of these methods in improving population and public health. In this course, you will apply a combination of both approaches to population health improvement. You will also learn how to study and evaluate large improvement initiatives to capture learning effectively. Learning Objectives:
Apply quality improvement methods in combination with population health frameworks to design a population health improvement initiative
Understand how the use of geographic information systems contributes to quality improvement
Critique different study designs for studying quality improvement initiatives | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/quality-improvement-healthcare | null |
383 | Cybersecurity Policy for Water and Electricity Infrastructures | 5,322 | 4.6 | 178 | Richard White | University of Colorado System | [] | This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2. In this module we will examine the drinking water subsector and the NIST Cybersecurity Framework for strengthening this infrastructure's cybersecurity practices. 3 videos4 readings2 assignments1 discussion prompt In this module we will take a closer look at the NIST Cybersecurity Framework and apply its tenets to different hypothetical situations. Also included in this module is course exam #3. Good luck! 3 videos4 assignments1 discussion prompt In this module we will examine the North American electric grid and the Electricity Subsector Cyber Capability Maturity Model for strengthening this infrastructure's cybersecurity practices. 2 videos3 readings2 assignments1 discussion prompt In this module we will take a closer look at the Electricity Subsector Cyber Capability Maturity Model and apply its tenets to different hypothetical situations. Also included in this module is course exam #4 and related project assignment. Good luck! 3 videos5 assignments1 discussion prompt | 4 modules | Beginner level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/cybersecurity-policy-water-electricity | null |
384 | Space Exploration | Enrollment number not found | Rating not found | null | Dr. Thomas Reiter | Technical University of Munich (TUM) | ['Comparison and Analysis of Space Transportation Architectures', 'Understanding of Lunar and Martian Science', 'Possibilities of In-Situ Resource Utilization (ISRU)'] | The course provides an overview of European activities in the field of astronautical and robotic exploration. In the context of ESA's exploration strategy "Terrae Novae", scientific goals for the exploration of the Moon and Mars, technological challenges, potential commercial opportunities in the field of exploration, as well as physiological aspects of long-term astronautical missions in low Earth orbit and beyond will be considered. The modules of the course cover the following topics:
• Introduction to Space Exploration
• European Exploration Strategy: TERRAE NOVAE
• Earth-Moon Transportation Architectures
• ISRU – Enabling sustainable space exploration
• Earth`s Moon: the “planet next door”
• Current Status of Mars Missions and Research
• Commercialisation: ESA approach for stimulating the growth of an in-space economy
• Medical Aspects of Long-term Spaceflight Exploring our solar system is about expanding the boundaries of our understanding and specifically finding the proof that life might have emerged on other planets. We are witnessing a decade in which humans will return to the surface of the Moon to prepare for a sustainable presence, with a strong and visible role for Europe. We might eventually find evidence of past or current life on our neighboring planet Mars. This course gives an insight into strategic, scientific and technological activities related to these two destinations. 3 videos1 reading In this module, the context of the European Space Agency exploration activities will be introduced, including the drivers and reasons for exploration. You will learn about the international context of space exploration, ESA’s strategic objectives and current strategy, and the programmatic framework of Terrae Novae (ESA’s European Exploration Envelope programme). We will also look at the future evolution of the European strategy and programme. 3 videos1 reading2 assignments This module consists of three parts covering the following topics:
1. Principles - Why is the Moon important, and what are “basic principles”? The Moon’s role as a gateway into the solar system is a consequence of celestial mechanics and the current state of engineering. Given the need to “stage”, i.e., to split a space transportation system into different phases, in between which the vehicles are ejected, refilled, combined, or otherwise re-configured, the rocket equation and achievable performance in structure and propulsion systems of the vehicle determine the achievable benefit. We discuss how to apply basic principles and why they are also important in the end-to-end development of an architecture.
2. Destinations - What is the strategic high ground in cis-lunar space, and how do we get there? The gravitational field of the Earth-Moon system offers a rather complex playing field for the optimization of launch windows, transfers, and staging strategies. We investigate several key points in this gravitational field: LEO, LLO, and Earth-Moon libration points.
3. Programmes - How do current architectures perform, and what can Europe contribute? How do existing capabilities (Ariane 6, SLS, Starship) perform within an Earth-Moon exploration architecture? We compare the approaches and performances in a meaningful manner. We find that Europe can do more in the frame of international Moon exploration initiatives, if basic principles are properly applied and combined with programmatic knowledge. 4 videos1 reading2 assignments This module discusses the relevance, resources, availability, and processes of using materials found in space to enable long-term exploration of our solar system. Initially, the need for in situ resource utilization (ISRU) is highlighted and a broad introduction is given. The course then mainly focuses on how ISRU can be beneficial in the near-term exploration context with emphasis on the Moon and Mars, highlighting resources on these bodies and showcasing techniques to utilize them. Finally, more advanced applications, such as asteroid mining, and further applications, such as space based solar power, are briefly discussed. 3 videos2 readings2 assignments The Moon, with the Sun, is the most prominent object in the sky and Earth’s direct neighbor. Observation has been limited to telescopes until the beginning of the age of spaceflight. 1959, the Moon was visited for the first time by a space probe, culminating ten years later in Neil Armstrong’s famous »giant leap. « Twelve astronauts walked on the lunar surface and contributed tremendously to the scientific harvest. The Apollo program was way more than a victory in a politically motivated space race. 382 kilograms of lunar rocks returned to Earth by the six successful missions, and plenty of experimental data, opened a »window to the early Solar System«. The analyses were fundamental in understanding the origin and evolution of terrestrial bodies. Many questions, though, remained unanswered, and new questions arose. Therefore, new projects, are in preparation to return to the Moon, and soon astronauts, too. There will be exciting missions in the years to come; and with it: science. 4 videos2 readings2 assignments This presentation provides a comprehensive chronological overview of past, ongoing, and forthcoming Mars missions, which encompass exploration through orbiters, landers, and rovers. We will delve into the current state of scientific knowledge about Mars and learn about the datasets that scientists have utilized to acquire this information. Additionally, we will take a closer look at the sample collection from the Martian surface. By exploring the past and present missions, we aim to gain insights into the progress made in our understanding of Mars and its unique features. As we peer into the future, the presentation will elucidate upcoming missions, revealing the strategic endeavors planned to further unravel the mysteries of our neighboring planet. 4 videos2 readings2 assignments This module addresses the role of commercialization in delivering the ESA Space Exploration Programmes and accelerating the space exploration process in general. It is subdivided into three learning modules: Commercial Service Procurements for Space Exploration, Markets enabled by Space Exploration and Commercialisation Policy, Benefits and Risks. It provides an overview of different types of commercial procurement mechanisms, identifies markets that are impacted by Space Exploration, and explains the broader benefits and risks of commercialization. Concrete examples of ESA and NASA commercial procurement approaches are provided as well as an explanation of the broader role of Space Agencies in growing the commercial space exploration sector. 3 videos1 reading2 assignments Stress is regarded as the bodily response to all the physical, mental, or emotional pressures occurring in a living environment. In space, all body systems are affected by a myriad of strong stressors, summarized as the space exposome. Several studies have been performed in space and space-analogues to better understand the causal relationships between stress, stress overload and disease, and to thereby elaborate efficient personalized countermeasure strategies, with a mutual benefit for humans in space and on Earth. During future deep-space explorations to the moon or Mars, the intensity of space stressors will increase, which requires the further development of innovative mitigation strategies such as artificial gravity or hibernation. 3 videos1 reading2 assignments | 8 modules | Intermediate level | 15 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/space-exploration | null |
385 | The Oracle Database Multitenant Administration Course | Enrollment number not found | Rating not found | null | Packt - Course Instructors | Packt | ['Oracle Databases', 'Database Administration', 'PDB', 'database administration', 'Multitenancy', 'Multitenant', 'CDB'] | This course offers a deep dive into the Oracle Database Multitenant architecture, providing you with the necessary tools and knowledge to manage both Container Databases (CDBs) and Pluggable Databases (PDBs). You’ll begin by understanding the fundamentals of Oracle Multitenant, exploring the business challenges it addresses, and the architecture's structural components. As you progress, the course will guide you through the creation and management of CDBs and PDBs, emphasizing hands-on practice sessions that reinforce your learning. You’ll also delve into advanced topics such as PDB cloning, relocation, and the effective use of Oracle Recovery Manager (RMAN) for backup and recovery within the Multitenant environment. The course emphasizes practical skills, with multiple practice sessions that allow you to create and manage PDBs using different methods, ensuring you gain confidence in your ability to handle real-world scenarios.
By the end of this course, you will have a thorough understanding of Oracle Multitenant’s advanced features, such as managing application containers, performing application maintenance, and leveraging the new features in Oracle 18c and 19c. Whether you’re preparing for certification or aiming to enhance your database administration skills, this course will prepare you to manage Oracle Multitenant environments with proficiency and ease.
This course is ideal for Oracle database administrators and IT professionals who are responsible for managing Oracle environments. Participants should have a basic understanding of Oracle Database administration and SQL. Familiarity with database concepts and experience with Oracle 12c or later is recommended. In this module, we will introduce you to the Oracle Database Multitenant architecture and outline the course objectives. You'll gain an understanding of the key topics that will be explored and how they relate to multitenant database administration. 2 videos1 reading In this module, we will delve into the Oracle Database Multitenant Architecture, covering both the 12.1 and 12.2 versions. You will explore the architecture’s key components and examine the improvements and new features introduced in the 12.2 version. 3 videos In this module, we will guide you through the process of creating Container Databases (CDBs) and Pluggable Databases (PDBs). You will engage in hands-on practice to build a CDB, starting with preparing the environment and then creating and managing CDBs and PDBs in multiple parts. 8 videos1 assignment In this module, we will explore fundamental concepts of Oracle Database Multitenant administration and cover essential tasks such as managing CDBs and PDBs. You will also participate in practical exercises to reinforce your understanding and skills in performing basic administration tasks. 4 videos In this module, we will explore the multiple methods available for creating Pluggable Databases (PDBs) within the Oracle Multitenant framework. You’ll gain practical experience by cloning PDBs, plugging in unplugged PDBs, converting non-CDBs, and creating proxy and refreshable PDBs using advanced techniques. 9 videos In this module, we will focus on the management of connectivity and services within Oracle Multitenant environments. You will learn about different connectivity options, how to set up and manage services for effective communication, and techniques for troubleshooting common connectivity issues. 1 video1 assignment In this module, we will delve into the security aspects of Oracle Multitenant databases, focusing on user management and lockdown profiles. You’ll learn how to manage both local and common users and apply PDB lockdown profiles to enhance security. Hands-on exercises will solidify your understanding of these critical security practices. 5 videos In this module, we will cover essential strategies for managing backup, recovery, and flashback operations within Oracle Multitenant databases. You will learn how to perform backups, recover from failures, and utilize flashback and point-in-time recovery features. Hands-on practices will reinforce your ability to protect and restore both CDBs and PDBs efficiently. 6 videos In this module, we will explore the use of Oracle Resource Manager within a multitenant database environment. You will learn how to configure and manage Resource Manager plans to ensure optimal resource distribution among CDBs and PDBs, enhancing overall database performance and efficiency. 3 videos1 assignment In this module, we will cover a range of miscellaneous topics related to Oracle Multitenant databases, including advanced features and tools. You will engage in practical exercises to apply these topics, such as using the Data Pump utility for data export and import within PDBs, to further refine your multitenant database administration skills. 3 videos In this module, we will focus on managing applications and application containers within Oracle Multitenant databases. You will learn how to handle application common objects, perform essential maintenance tasks, and manage applications effectively. Hands-on practices will solidify your skills in administering applications within a multitenant environment. 5 videos In this module, we will explore the latest features introduced in Oracle Database Multitenant with versions 18c and 19c. You will learn how to prepare and configure the Oracle Database 19c environment to take full advantage of these enhancements through step-by-step practice sessions. 4 videos1 assignment In this module, we will cover the management of a CDB fleet, focusing on how to oversee multiple Container Databases within a multitenant architecture. You will learn strategies for effective fleet management and engage in hands-on practices to administer and monitor a CDB fleet successfully. 4 videos In this module, we will dive into the PDB Snapshot Carousel feature, which allows you to manage and maintain snapshots of Pluggable Databases (PDBs) over time. You’ll learn how to set up and configure a snapshot carousel, manage snapshots effectively, and practice restoring PDBs from these snapshots through a series of practical exercises. 7 videos1 assignment In this module, we will explore the process of switching over a refreshable clone Pluggable Database (PDB) within Oracle Multitenant. You will learn the scenarios where this feature is beneficial, and through practical exercises, you’ll gain the skills to perform a switchover, ensuring continuous availability and data integrity. 2 videos In this module, we will cover the process of cloning and relocating Pluggable Databases (PDBs) using the Database Configuration Assistant (DBCA). You will learn how to effectively use DBCA for these tasks, and through practical exercises, you’ll gain the skills to clone and relocate PDBs in different environments, ensuring smooth database operations. 6 videos2 assignments | 16 modules | Beginner level | 15 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/packt-the-oracle-database-multitenant-administration-course-zhi8z | null |
386 | Central Banks and Monetary Policy | 12,471 | 4.6 | 70 | Ralf Meisenzahl | University of Illinois Urbana-Champaign | ['Inflation', 'Interest Rate', 'Macroeconomics', 'Central Bank Policy', 'Financial Market', 'Interest Rates'] | The purpose of this course is to provide you with an understanding of central bank policies and how such policies affect financial markets and the economy. The main aim of this course is to provide you with insights about the macroeconomic relationships between interest rates, inflation, and unemployment that allow you to assess central bank actions and appreciate how this action will affect the economy. The ability to extract relevant information from financial market and economic data about the macroeconomic environment and central bank actions is an important skill that will be useful for your decision-marking in your professional career and your personal financial choices. You will become familiar with the course, your classmates, and our learning environment. The orientation will also help you obtain the technical skills required for the course. 1 video6 readings1 quiz In this module we will study interest rates and financial instruments. 9 videos1 reading4 quizzes In this module, we will study the Federal Reserve System, its functions, and its monetary policy tools. 10 videos1 reading4 quizzes1 peer review In this module, we will study the link between output, inflation, and unemployment and how monetary policy affects these macroeconomic variables. 9 videos1 reading4 quizzes In this module, we will study financial crises and policy responses to these crises. 8 videos3 readings3 quizzes1 plugin | 5 modules | Intermediate level | null | https://www.coursera.org/learn/central-banks-monetary-policies | null |
387 | Information Technologies and Security in Healthcare Settings | Enrollment number not found | Rating not found | null | ISC2 Education & Training | ISC2 | ['Healthcare Security', 'Information Technology', 'Information Security Management'] | This is course one in the ISC2 Healthcare Certificate Specialization. Information security and technology play a critical role in the healthcare industry. With the increasing use of electronic health records (EHRs), telemedicine, and other digital technologies, healthcare providers and organizations must prioritize the security of sensitive patient data.
Information security in healthcare involves protecting patient data from unauthorized access, use, disclosure, and destruction. Technology also plays a crucial role in healthcare by enabling more efficient and effective care delivery.
However, the use of technology in healthcare also introduces new security risks. Healthcare organizations must ensure that their systems are up-to-date and secure to protect against malicious actors and data breaches. They must also train their staff on proper security practices and be prepared to respond to security incidents.
Overall, information security and technology are essential components of healthcare delivery. By implementing effective security measures and utilizing technology in a responsible manner, healthcare organizations can provide high-quality care while protecting patient privacy and data.
This course is set up in two parts: Information Security and Information Technologies.
This course will cover the following learning objectives:
Part 1: Information Security Objectives
Define the healthcare environment.
Examine third party relationships.
Identify essential health data management concepts.
Part 2: Information Technologies Objectives
Describe the impact of healthcare information technologies on Privacy and Security.
Describe data life cycle management.
Determine the most secure methods of third-party connectivity. Welcome to the ISC2 Healthcare Essentials: Information Security in Healthcare Settings Certificate Program! The healthcare industry is relying increasingly on technology to improve patient care, streamline operations, and share information. Just like everything, however, there is a cost. With reliance on technology comes the increased risk of cyber threats, data breaches, and other security vulnerabilities that can compromise the privacy and security of sensitive patient information. As a result, information security has become a critical concern for healthcare organizations worldwide, requiring comprehensive strategies and measures to safeguard patient data from unauthorized access, theft, or misuse. In this context, understanding the importance of information security in healthcare organizations is essential for protecting the privacy and wellbeing of patients while maintaining the trust and confidence of the wider community. 1 reading The healthcare industry is exceedingly diverse, consisting of various organizations from small physician practices and large hospitals to laboratories, pharmaceutical companies, biomedical companies, payers (private, public, etc.), regulators, and public health organizations. All these organizations rely on the efficient and effective exchange of patient-related information.
Security professionals should understand the diversity of the healthcare industry, the types of technologies, and flows of information that require various levels of protection, and how healthcare information is exchanged within the industry. 77 readings17 assignments The goal of this learning experience is to provide security professionals with the necessary knowledge to manage emerging healthcare technologies and to identify emerging threats utilizing these technologies throughout the information life cycle. As healthcare organizations partner with vendors, third parties, and other business associates to execute core and noncore business operations via the cloud and other service offerings, understanding how the organization’s information is shared, accessed, used, and destroyed becomes more important to the healthcare privacy and security practitioner. 29 readings6 assignments The healthcare industry is seeing many emerging technologies, posing a challenge to security management as legacy systems and inadequately monitored devices are deployed in new ways. At the same time, regulations like GDPR and HIPAA are demanding higher levels of compliance for privacy and security. Managing data throughout its life cycle entails applying the CIA triad to each phase: creation, storage, use, sharing, archiving, and destruction. Finally, information technology management includes knowing the connectivity requirements for third parties that want, or need, to share information. The covered entity’s privacy and security protection practices must be met by the third party at an equivalent level. Data security professionals need to recommend the appropriate trust model and connection agreement for such third-party relationships. 1 assignment | 4 modules | Beginner level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/information-security-in-healthcare-settings | null |
388 | Project Initiation: Starting a Successful Project | 772,680 | 4.8 | 21,281 | Google Career Certificates | Google | ['Project Management', 'Strategic Thinking', 'Business Writing', 'Stakeholder Management', 'Project Charter'] | This is the second course in the Google Project Management Certificate program. This course will show you how to set a project up for success in the first phase of the project life cycle: the project initiation phase. In exploring the key components of this phase, you’ll learn how to define and manage project goals, deliverables, scope, and success criteria. You’ll discover how to use tools and templates like stakeholder analysis grids and project charters to help you set project expectations and communicate roles and responsibilities. Current Google project managers will continue to instruct and provide you with hands-on approaches for accomplishing these tasks while showing you the best project management tools and resources for the job at hand. Learners who complete this program should be equipped to apply for introductory-level jobs as project managers. No previous experience is necessary.
By the end of this course, you will be able to:
- Understand the significance of the project initiation phase of the project life cycle.
- Describe the key components of the project initiation phase.
- Determine a project’s benefits and costs.
- Define and create measurable project goals and deliverables.
- Define project scope and differentiate among tasks that are in-scope and out-of-scope.
- Understand how to manage scope creep to avoid impacting project goals.
- Define and measure a project’s success criteria.
- Complete a stakeholder analysis and explain its significance.
- Utilize RACI charts to define and communicate project team member responsibilities.
- Understand the key components of project charters and develop a project charter for project initiation.
- Evaluate various project management tools to meet project needs. You will learn how the program is structured, understand the significance of a project’s initiation phase and describe its key components, and understand how to determine a project’s benefits and costs. 5 videos3 readings2 quizzes1 plugin You will learn how to define and create measurable project goals and deliverables; how to define project scope, differentiate among tasks that are in-scope and out-of-scope, and avoid scope creep; and how to define and measure a project’s success criteria. 11 videos10 readings4 quizzes2 assignments1 plugin You will learn how to define project roles and responsibilities, complete a stakeholder analysis, and utilize RACI charts to define and communicate project team member responsibilities. 9 videos9 readings5 assignments2 plugins You will learn the typical resources needed to manage a project, recognize the importance of clear and consistent project documentation, understand the key components of project proposals and charters and develop a project charter, and evaluate various project management tools to meet project needs. 10 videos9 readings1 quiz3 assignments1 plugin | 4 modules | Beginner level | null | https://www.coursera.org/learn/project-initiation-google | 98% |
389 | Renewable Energy: Fundamentals and Job Opportunities | 13,975 | 4.7 | 197 | Marjaneh Issapour | University at Buffalo | ['Wind Energy', 'Solar power', 'Green building design', 'Renewable energy jobs'] | This course prepares you to recognize the complexities and nuances of different renewable energy solutions, as well as relevant career opportunities (both technical occupations and roles not typically associated with clean energy). Learners are immersed in discussions about green energy technologies, the impact of sustainability on society, energy consumption in the United States and conservation. Topics include: tenets of green building design and construction, solar energy conversion through photovoltaic cells, wind turbine site selection and design, and nanotechnology applications in clean energy. It references educational opportunities from the State University of New York (SUNY) system that correlate with each clean energy market segment. The course is suitable for anyone interested in entering the renewable energy field, whether fresh to the workforce or switching industries. Material encompasses online lectures, videos, demos, readings and discussions. Learners will create a career roadmap, whereby they define a job that interests them, conduct a gap assessment to determine additional education/training/skills they need, and document a pathway to their ideal renewable energy career. 3 readings This module provides a foundation for the course, covering energy consumption and conservation, the importance of renewable energy, and pathways to careers in renewable energy. 11 videos5 readings2 assignments1 discussion prompt Learners will gain an understanding of the fundamental principles of sustainability, why sustainability matters, and career opportunities in the field. 7 videos2 readings2 assignments1 discussion prompt Learners will develop an understanding of the value of green buildings, fundamental green building principles, and common rating systems. 5 videos5 readings2 assignments1 discussion prompt Learners will consider the benefits and limitations of solar energy, and gain an understanding of solar energy careers and educational opportunities. 15 videos4 readings2 assignments1 discussion prompt Learners will review the history of wind energy, consider wind as a fluid, explore turbine design and siting, and gain an understanding of wind power careers and educational pathways. 11 videos6 readings6 assignments1 discussion prompt Learners will be introduced to nanotechnology and its applications in renewable energy. Careers and educational pathways will also be explored. 6 videos3 readings1 assignment1 discussion prompt Using the resources provided throughout the course, you will hone in on a renewable energy career of interest. By assessing your current background and reviewing the requirements for the desired position, you will conduct a gap analysis and be able to describe the education and training needed to enter your ideal renewable energy career. This culminating project leaves learners with a roadmap to a renewable energy career. 10 readings1 assignment1 peer review | 8 modules | Beginner level | null | https://www.coursera.org/learn/renewable-energy-fundamentals | 97% |
390 | Constitutional Struggles in the Muslim World | 37,172 | 4.8 | 679 | Dr. Ebrahim Afsah | University of Copenhagen | [] | Learn what motivates the restive Muslim youth from Tunis to Tehran, what political positions Islamists from Mali to Chechnya are fighting for, where the seeming obsession with Islamic law comes from, where the secularists have vanished to, and whether it makes sense to speak of an Islamic state. Since 2009 there has been a renewed wave of popular unrest sweeping throughout much of the Muslim world. Secular, but generally repressive and inefficient autocracies have come under pressure or been swept aside entirely. At the same, the various Islamic Republics have not fared much better, but been convulsed by internal unrest, economic and social decline. Throughout the Muslim lands, existing constitutional arrangements are being challenged, often very violently.
This course is a survey of the constitutional ideas and institutions that have developed since the mid 19th century throughout predominantly Muslim countries, but its focus will lie on the actors that have dominated this discourse and shaped its outcomes. We will look at the large body of classical writings on the Islamic state only in so far as it is necessary to understand the contemporary debate, but concentrate on the legal and political developments of the 20th and 21st centuries.
Three common themes will characterise the course:
We privilege the study of the legal and social reality and seek to highlight where it is at odds with dogmatic stipulations, be they religious or constitutional.
We seek to illustrate the practical tensions posed by limited administrative capabilities and political legitimacy that resulted from the incomplete reception of modern bureaucratic statehood.
We seek to examine how popular dissatisfaction with the practical performance of Muslim governments has fuelled demands for greater accountability under the guise of cultural authenticity.
Ultimately, the course aims to equip participants to better understand Muslim contemporary discourse about the res publica, better contextualise the demands for religious law in public life, and to better ascertain the theoretical and practical feasibility of postulated religious alternatives to the still-dominant secular model of governance. This week, we try to give you an overview of the themes and principles that we will focus on during the course. We look at the current state of the countries in the region and present the role of religion, the challenge of modernity and the different responses to modernity, which we will revisit thematically during the next weeks. It is highly recommend to read my article "Contested Universalities of International Law. Islam’s Struggle with Modernity" in this week's readings to gain a better understanding of the argument put forward throughout the course. 7 videos1 reading1 assignment This week, we look at Turkey and at the history of the Ottoman Empire, whose legacy continues to influence many countries in the region today. Turkey occupies a special place due to its explicit constitutional and social commitment to secularism and a self-conscious emulation of the Western model. Keep the four models of adaptation in mind while watching the lectures of this week as well as the next ones. 6 videos1 reading1 assignment This week concerns the region where the so-called "Arab Spring" originated: North Africa. We will focus especially on Egypt due to its historical importance, relative size and the impact its politics have had on other Arab and Muslim countries. Following the Secularism/Emulation model exemplified by Turkey last week, this region represents the second broad approach to modernity, namely Religious Modernism/Reform. 7 videos1 reading1 assignment This week we will look at the Gulf Monarchies, especially at Saudi Arabia. The impact of essentially free oil income defines the social and governmental structure of this sub-region, so we will focus on the character of so-called rentier economies and their socio-political impact. These countries represent the third broad approach to modernity, namely Traditionalism, that is the notion that there is no need to change inherited socio-political structures. 7 videos1 reading1 assignment Iran is the one place where the fundamentalist response to the challenge of modernity has had its longest and most thorough chance of carrying out the promise of Islamist governance. One of the main questions of the week regards the extent to which this promise has been fulfilled. In other words, whether Islamist claims to have a functioning and qualitatively better form of government have been sustainable, or whether the practical challenges of government have led to widespread popular disillusionment. 7 videos1 reading1 peer review This week, even more than throughout the rest of the course, we are dealing with a very topical issue: The Western military invasion of Iraq led to the destruction of its state institutions and brought about the much predicted collapse of social order in that country. In Syria we are witnessing the disintegration of state institutions, caused by internal revolt rather than external attack, but with similarly disastrous humanitarian outcomes. While Jordan has generally managed to avoid being drawn into its neighbours' internal conflicts, Lebanon's fragile political system has shown much greater exposure to neighbouring events, especially in Syria. 7 videos1 reading1 assignment Due to the importance of the Afghan conflict for world politics of the last decade or so, this conflict will be the main focus of this week's lectures. It is a truly interesting story, replete with exotic locales, tales of betrayal and great heroism, and more. This focus regretfully entails that the fascinating story of Bangladesh and Pakistan does not get as much attention as it deserves. 7 videos1 reading1 assignment This week deals with the very rich historical, ethnic, linguistic and geographic tapestry of the two archipelagic nations of Malaysia and Indonesia. Truly fascinating places and very different from the localities we have so far discussed in the course. We look at both nations before and after their independence and end with a thorough investigation of the challenges they face today. The week's material is sure to be an eye opener to many. 6 videos1 reading1 assignment This week, we will look at sub-saharan Africa and the particular challenges faced by Muslim-majority societies there. For obvious reasons, colonialism plays a very large role here and so we will return to many of the same issues already touched upon in earlier classes. But perhaps even more important is the endemic weakness of institutions. For more on those African nations that have successfully broken out of the vicious cycle of weak institutions, endemic poverty, bad governance, and domestic conflict, please see this week's readings. 6 videos1 reading1 peer review This week, we move beyond the geographical focus as we try to tie up some of the loose ends and highlight some of the recurring issues we have studied during the past weeks together. We look at what the different countries have in common, what separates them and at the different kinds of tensions that we have found across the region. At the end of the week, you should have a good understanding of how issues in different countries relate to to each other and of the challenges that the region as a whole is facing today. 7 videos1 reading1 assignment | 10 modules | null | 40 hours to complete (3 weeks at 13 hours a week) | https://www.coursera.org/learn/muslim-world | 97% |
391 | Fundamentals of Digital Design for VLSI Chip Design | 3,210 | 4.8 | 39 | Subject Matter Expert | L&T EduTech | ['Combinational and Sequential Circuits', 'FPGA Architecture and Applications', 'VHDL Programming', 'Digital Circuit Design', 'Memory Types and Programmable Logic Devices (PLDs'] | This comprehensive learning module delves into Boolean algebra and its applications in digital circuit design, covering fundamental concepts like Boolean variables, logic gates, and their relationship with digital logic circuits. Participants explore Boolean expressions, simplification techniques, and consensus theorems, including the advanced Quine McCluskey method. The module also addresses combinational circuits, detailing the design and functionality of adders, subtractors, parity circuits, and multipliers. Encoding complexities are navigated with insights into encoders, decoders, multiplexers, and demultiplexers. Binary shifting operations, emphasizing logical and arithmetic shifting with multiplexers for efficient design, are covered.
Moving forward, the module provides an in-depth exploration of sequential circuits, including latch and flip-flop circuits like SR latch, JK flip-flop, and more. Hazards in digital circuits, along with registers, bidirectional shift registers, and various counters, are thoroughly explained. The exploration concludes with Mealy and Moore state sequential circuits.
Additionally, participants gain a comprehensive understanding of memory systems, programmable logic devices, and VLSI physical design considerations. The module covers SRAM and DRAM, tri-state digital buffers, Read-Only Memory (ROM), and Programmable Logic Devices (PLD) such as PROM, PLA, and PAL. Architecture and implementation of Complex Programmable Logic Devices (CPLD) and Field-Programmable Gate Arrays (FPGA) are discussed, along with the VLSI design cycle and design styles for CPLD, SPLD, and FPGA.
By the end of this course, you will be able to:
Understand the distinctions between analog and digital signals and the transformative benefits of digitization.
Comprehend various number systems, Boolean algebra, and its application to logic gates.
Master Boolean expression manipulation, canonical forms, and simplification techniques.
Proficiently handle SOP and POS expressions, recognizing relationships between minterms and maxterms.
Recognize the universality of NAND and NOR gates, implementing functions using De Morgan's Law.
Master Karnaugh map techniques, including advanced methods and handling don't care conditions.
Gain a comprehensive understanding of combinational circuits, covering principles and applications.
Understand binary addition principles and design various adder circuits, including 4-bit ripple carry adders.
Explore advanced adder designs for arithmetic operations.
Proficiently design binary subtractors, analyze overflow/underflow scenarios, and understand signed number representation.
Understand parity generation, detection, and various methods of binary multiplication.
Master the design and application of various multipliers, incorporating the Booth algorithm.
Understand applications of comparators, encoders, and decoders in digital systems.
Proficiently use multiplexers and demultiplexers in digital circuit design, recognizing their role as function generators.
Understand binary shifting operations, designing logical shifters, and principles of arithmetic and barrel shifting.
Grasp foundational principles of sequential circuits, focusing on storage elements and designing an SR latch.
Understand the operation of JK flip-flops, addressing race around conditions, and design master-slave JK flip-flops and Gated SR latches.
Gain proficiency in designing and analyzing various types of counters in sequential circuits.
Understand principles and design techniques for Mealy and Moore state sequential circuits.
Grasp fundamental principles of memory, differentiating internal structures between SRAM and DRAM, and gain practical skills in addressing memory, controlling tri-state digital buffers, and understanding ROM, PLD, and various PLDs. This comprehensive learning module provides a detailed exploration of Boolean algebra and its practical applications in digital circuit design. Participants will delve into fundamental concepts such as Boolean variables, logic gates, and the relationship between Boolean algebra and digital logic circuits. The module progresses to cover Boolean expressions, simplification techniques, and the derivation of consensus theorems. Practical aspects, including the implementation of Boolean functions using universal gates and the use of Karnaugh maps for simplification, are thoroughly examined. The module also introduces the Quine McCluskey method as an advanced tool for Boolean expression simplification. 45 videos3 readings1 assignment This comprehensive module delves into the intricate world of combinational circuits and arithmetic operations in digital systems. Participants will explore the design and functionality of various circuits, including adders, subtractors, parity circuits, and multipliers. The module navigates through the complexities of encoding and decoding, introducing different types of encoders, decoders, multiplexers, and demultiplexers. Additionally, the module covers binary shifting operations, including logical and arithmetic shifting, utilizing multiplexers for efficient design. 35 videos1 assignment This comprehensive module provides an in-depth exploration of sequential circuits, covering the fundamental concepts, storage elements, and various types of flip-flops. Participants will gain insights into the design and operation of latch and flip-flop circuits, including SR latch, JK flip-flop, master-slave JK flip-flop, Gated SR latch, D latch, and D flip-flop. The module delves into hazards in digital circuits and explains the characteristics and applications of sequential circuits. Furthermore, the structure, operation, and types of registers are examined, alongside bidirectional shift registers. The module concludes with an extensive coverage of counters, including ring counters, Johnson counters, asynchronous up/down counters, synchronous up/down counters, and mod-n synchronous counters. The concepts of Mealy and Moore state sequential circuits are introduced, including the design of state diagrams, equivalent state tables, and reduction techniques. 24 videos1 assignment This module provides a comprehensive understanding of memory systems and programmable logic devices, along with insights into physical design considerations in VLSI. Participants will explore various types of memories, including SRAM and DRAM, examining their internal structures and addressing mechanisms. The module covers tri-state digital buffers, Read-Only Memory (ROM), Programmable Logic Devices (PLD) such as PROM, PLA, and PAL. Additionally, the architecture and implementation of Complex Programmable Logic Devices (CPLD) and Field-Programmable Gate Arrays (FPGA) are discussed. The module delves into the VLSI design cycle, hierarchical design, routing, compaction, extraction, and verification. Various VLSI design styles are explored, and the design processes for CPLD, SPLD, and FPGA are elucidated. 27 videos1 assignment | 4 modules | Intermediate level | 17 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/fundamentals-of-digital-design-for-vlsi-chip-design | null |
392 | Implementing an SAP Solution | 9,939 | 4.8 | 59 | Dr Omar Sharaf | SAP | ['Best Practice', 'QA and Testing', 'Go-Live', 'Systems Building', 'deployment'] | Implementing an SAP Solution is the fifth course in the SAP Technology Consultant Professional Certificate program. You’ll learn how to collaborate with stakeholders and other SAP professionals for key phases in the SAP Implementation lifecycle. You’ll explore how to build and prepare system and test environments for implementation and look at different types of testing. You’ll learn how to cleanse and anonymize test data, and use automation tools. You’ll look at SAP Best Practice Explorer and build your understanding of baseline configurations and integrations. You’ll learn how to document issues, bugs, and recommended fixes after testing. Plus, you’ll look at the process for going-live and getting sign off for a project.
By the end of this course, you will be able to:
Explain what a technology consultant does in the implement, monitor and QA/testing phases of the SAP lifecycle.
Implement and deploy a technical solution approved in the design, pitch, and re-design phases.
Explain how to test an implemented technical solution including creating test plans, writing test scripts, and issuing fix or bug resolutions.
Explain how to conduct a post-implementation review including developing the Post-Implementation Review Report and the Post-Production Roadmap. In this module, you will learn about RISE with SAP and the Implementing an SAP Solution phase of the SAP Implementation Lifecycle. You will learn about your role as a Technology Consultant in collaborating with stakeholder teams to configure and implement the technical solution and for training users and stakeholders. You will understand the preparation needed for conducting a dry run of the solution and how to deploy the technical solution. As a Technology Consultant, you will work with other SAP professionals to develop functional and UAT test plans and use cases. In this module, you will learn about the QA testing processes and monitoring of the implemented solution in the production environment. You will also gain an understanding of your role as a subject matter expert, reviewer, and train-the-trainer for user training. You will understand how to provide post-implementation support, conduct post-implementation review sessions, and present the review report and roadmap for future enhancements to the customer. 5 videos3 readings2 assignments3 discussion prompts In this module, you will learn about setting up system environments to prepare for implementation. You will understand your role in collaborating with different stakeholder teams to prepare the environments for implementation and leverage the Technical Solution document for configuring the required test environments. You will gain an understanding of a typical infrastructure setup required for system environments, how to cleanse and anonymize data for testing, and the privacy and compliance considerations you need to factor. You will learn about the role of automation tools in automating the management of test and system environments. In this module, you will also walk through the steps for setting up containers using Docker and deploying a Docker image to Kubernetes using a delivery pipeline. 8 videos2 readings2 assignments2 discussion prompts In this module, you will learn how to use SAP Best Practice Explorer and guides for baseline configurations and integrations. You will learn how to implement the process and data model, the technical and functional solution, the platform, architecture, integrations, and security. You will understand how to configure the functional design and settings and implement integrations across A2A and B2B scenarios. You will learn how to develop cutover and roll-back plans, user and stakeholder communication plans, testing signoff plans, operational handover plan, and post-production support plans. You will also learn how best to schedule and conduct a dry run or dress rehearsal of the technical solution prior to go live. 4 videos2 readings2 assignments2 discussion prompts In this module, you will learn best practices for communicating and presenting the Technical Design Solution and implementation roadmap to your customer stakeholders and decision-makers. You will learn how to incorporate customer feedback in your solution and manage design limitations through the implementation roadmap before you move for a sign-off on the solution and the roadmap. The sign-off is followed by finalizing the proposed architecture, associated tools, and the proposed Bill of Materials before you finally move into the execution, configuration, and testing phase of the SAP implementation lifecycle. 5 videos2 readings2 assignments2 discussion prompts In this module, you will learn about the Go Live and production system activities. You will learn about some of the monitoring activities that need to be performed for an SAP implementation in production. These include providing post-implementation support, responding to user feedback, validating customer technical support requirements for post-production, and preparing to transition the system to customer operational teams. You will learn how to conduct and document the post-implementation review session based on which the handover plan and post-production roadmap is created. Based on the handover plan, the system is then handed over to the customer technical and operational teams, followed by the post-implementation signoff processes and project wrap-up. 6 videos2 readings2 assignments2 discussion prompts You will be provided with an Organization Case study that describes how a set of applications for collaboration and data analysis is built. You will evaluate how those applications should be tested and you will determine the inputs required for a test plan. You will create a go/no-go decision matrix based on parameters provided to you. To put your learning into practice you'll review the assessment submission of two (2) peers using the peer review rubric provided. 2 videos3 readings1 assignment1 peer review2 discussion prompts | 6 modules | Beginner level | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/implementing-an-sap-solution | null |
393 | Stakeholder Management | 4,011 | 4.5 | 49 | Igor Arkhipov | Starweaver | ['Needs Assessment', 'Change Management', 'Stakeholder Management', 'Stakeholder Analysis', 'Collaboration Skills'] | This course offers a comprehensive overview of stakeholder management approaches and techniques. It combines useful theoretical models with practical advice and recommendations. You will learn the best practices, tools, and techniques for managing stakeholder relationships. The course will teach you the key skills in identifying and analyzing stakeholders, understanding their needs and expectations, planning collaboration, and helping stakeholders navigate organizational change.
The course is broken down into 4 Lessons:
• Identify stakeholders: this focuses on strategies to identify different stakeholder groups and individual stakeholders
• Stakeholder analysis: with the focus on different ways to analyze the key stakeholders' characteristics, including their attitudes and expectations
• Stakeholder collaborations: which will teach you how to build a working relationship with your stakeholders
• Change support: this will give an overview of organizational change management to support managing stakeholders
Content for the course is designed and delivered by Igor Arkhipov who is a certified business analysis professional and industry expert with over 15 years of experience in corporate project environments.
This course is designed for anyone interested in building long-lasting working relationships with their stakeholders in the work environment.
It will be especially useful for project and change management professionals, such as project managers, business analysts, change managers, relationship managers, and line managers.
There are no formal prerequisites for the course, however, some understanding of what is a project and how people usually collaborate in working environments will help (meetings, formal emails, etc.) This module offers a comprehensive overview of stakeholder management approaches and techniques.
It combines useful theoretical models with practical advice and recommendations. You will learn the best practices, tools, and techniques for managing stakeholder relationships. The course will teach you the key skills in identifying and analyzing stakeholders, understanding their needs and expectations, planning collaboration, and helping stakeholders navigate organizational change. 21 videos1 reading5 assignments | 1 module | Beginner level | 5 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/stakeholder-management | null |
394 | Machine Learning and Human Learning | Enrollment number not found | Rating not found | null | Dr William Cope | University of Illinois Urbana-Champaign | [] | This course examines the differences between machine and human learning and the ways in which machines can complement human learning. It examines technical definitions of supervised and unsupervised machine learning, as well as broader views of mechanical intelligence able to replicate or exceed human intelligence. The course will also explore practical applications of learning analytics and artificial intelligence in learning management systems and other educational tools and critically interrogate the applications of AI in education. The course is designed to aspiring and current educators, and anyone who is interested in the intersection of human and machine learning, and AI applications in education. This course examines the differences between machine and human learning and the ways in which machines can complement human learning. It examines technical definitions of supervised and unsupervised machine learning, as well as broader views of mechanical intelligence able to replicate or exceed human intelligence. The course will also explore practical applications of learning analytics and artificial intelligence in learning management systems and other educational tools and critically interrogate the applications of AI in education. 7 videos9 readings3 peer reviews4 discussion prompts1 plugin 10 videos6 readings4 peer reviews4 discussion prompts 4 videos2 peer reviews2 discussion prompts 7 videos1 reading4 peer reviews4 discussion prompts1 plugin | 4 modules | Beginner level | 36 hours to complete (3 weeks at 12 hours a week) | https://www.coursera.org/learn/machine-learning-and-human-learning | null |
395 | Advanced Programming in Swift | 7,244 | 4.7 | 79 | Taught by Meta Staff | Meta | ['iOS App Development', 'Application development', 'Swift Programming'] | At the heart of any remarkable iOS applies a thorough understanding of the Swift programming language. Embark on a journey to expand your knowledge and skillset with Advanced Programming in Swift. Discover Swift’s advanced custom data types, explore code organization best practices, tap into error handling to improve your program’s performance, and foster an understanding of programming the functional way with higher-order functions like map, filter and reduce. Then, to further understand the inner workings of successful app development, learn how to implement unit tests to ensure that your applications function as intended. By the end of this course, you will practice creating the functionality you often encounter in apps with large lists of items. You’ll implement advanced programming concepts including higher-order functions to process collections and build your own list in Xcode.
Upon completion of this course, you will be able to:
• Create custom data types including enumerations and sets.
• Organize and optimize your code by using subclassing and inheritance, typecasting and polymorphism.
• Discover how to set restrictions in your code using access control.
• Create blueprints for your code with optional and required protocols.
• Give control and pass responsibilities from one instance to another with delegation.
• Employ appropriate error handling approaches, implement throwable functions and catch errors.
• Describe what recursion is and identify common use cases.
• Implement higher-order functions like map, filter and reduce.
• Ensure your applications perform as expected by implementing unit tests.
This course is ideal for intermediate learners who would like to prepare themselves for a career in iOS development. To succeed in this course, you need a foundational understanding of the programming fundamentals of Swift and SwiftUI. Get started with advanced programming in Swift by learning about the advanced custom data types that act as general-purpose programming blocks for your code. 6 videos12 readings5 assignments1 discussion prompt Discover how to inherit properties and methods with subclassing and explore access control, typecasting and polymorphism, protocols and delegation to better organize and optimize your code. 9 videos11 readings7 assignments Learn how to throw and handle errors with code, explore how to harness functional programming strategies, and discover unit testing in Swift. 9 videos16 readings7 assignments Implement the skills you've learned in this course to build your own list with filtering and sorting functionality. 2 videos4 readings1 assignment1 peer review1 discussion prompt | 4 modules | Intermediate level | 19 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/advanced-programming-in-swift | null |
396 | Business Implications of AI: Full course | 6,187 | 4.1 | 44 | Henrik Blomgren | EIT Digital | ['Strategic Management', 'Leadership', 'Project', 'strategy'] | The Business Implications of AI Throughout the course you will receive an answer to these key questions
* How shall we, as leaders, understand AI from a corporate strategy point of view?
* What is it and how can it be deployed?
* What are the crucial strategic decisions we have to make, and how to make them?
* What consequences can we expect if we decide on doing AI projects and what kind of competencies do
we need?
* Where shall we start, and what could be a good second as well as a third step?
* What implications for the organization can we expect? These are the questions answered in this course.
If you want to deep-dive even more into how artificial intelligence is changing the business landscape, with face-to-face training, group activities, and hands-on exercises, register for the live course https://professionalschool.eitdigital.eu/business-implications-of-ai Introduction to the course, practicalities and what it is about. 4 videos3 readings1 assignment1 plugin 5 videos2 readings4 assignments1 peer review 5 videos2 readings3 assignments1 peer review 3 videos2 readings2 assignments | 4 modules | Beginner level | 5 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/business-implications-ai | null |
397 | Microsoft SQL Server Development for Everyone | Enrollment number not found | Rating not found | null | Packt - Course Instructors | Packt | ['CRUD operations', 'SQL Server 2024', 'SQL Server course', 'Database Management', 'database management', 'SQL security', 'CRUD Operations'] | This course offers a deep dive into SQL Server, starting with an introduction to the basics of databases and data types. You'll be guided through setting up SQL Server on various platforms, including Windows, Mac, and Linux, ensuring a smooth start to your learning journey. By exploring SQL Server Management Studio and Azure Data Studio, you’ll gain familiarity with the essential tools for database management. Next, the course covers foundational skills such as creating, manipulating, and removing databases using both graphical tools and SQL scripts. You’ll also delve into key concepts like normalization, foreign keys, and table relationships to ensure your databases are optimized and efficient. Moreover, you’ll learn about CRUD operations, transactions, and SQL query techniques like filtering, aggregation, and joining tables to handle large datasets and complex queries effectively.
Finally, the course transitions into more advanced topics, including views, functions, and stored procedures. You’ll also learn how to implement security measures such as user logins and authentication, rounding off your knowledge with crucial skills for real-world database management. By the end, you’ll have a solid foundation in SQL Server and be equipped with the tools to manage databases confidently.
This course is designed for database administrators, software developers, and IT professionals looking to enhance their SQL Server skills. Prior knowledge of basic databases is helpful but not required. In this module, we will introduce you to the world of SQL Server and databases. You'll gain an understanding of how data is stored, categorized, and managed, providing you with the basic tools needed to navigate SQL databases. 2 videos1 reading In this module, we will walk through the installation process of SQL Server Express on Windows, Mac, and Linux platforms. By the end, you'll have your environment set up and ready for development. 2 videos In this module, we will explore key tools used to interact with SQL Server, including SQL Server Management Studio and Azure Data Studio. You'll also learn how to visualize your database structures using Draw.io. 3 videos In this module, we will guide you through creating, modifying, and removing databases. You’ll use different methods to manage databases efficiently, helping you get hands-on experience with SQL Server. 6 videos1 assignment In this module, we will cover everything from creating tables to manipulating data using SQL. You’ll also learn about the core operations: CRUD (Create, Read, Update, Delete) and practice querying data using SQL scripts. 15 videos In this module, we will delve into normalization techniques and relationships within a SQL Server database. You'll learn how to efficiently structure data and manage relationships between tables, enhancing database integrity. 9 videos In this module, we will focus on grouping data and using aggregate functions to perform calculations. You'll explore how to apply these functions in your queries for meaningful data summaries. 6 videos1 assignment In this module, we will explore advanced SQL Server objects, including functions, triggers, and stored procedures. You will also learn how to generate scripts for database management, backups, and restoration. 9 videos In this module, we will focus on securing your SQL Server environment. You'll learn how to create user logins, add Windows-authenticated logins, and manage access to your server using secure methods. 4 videos2 assignments | 9 modules | Beginner level | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/packt-microsoft-sql-server-development-for-everyone-3pojn | null |
398 | The Economics of Health Care Delivery | 19,491 | 4.8 | 667 | Ezekiel J. Emanuel, MD, PhD | University of Pennsylvania | [] | In this course, you’ll learn about the key components of health care, and the economics behind their principles and pricing strategies. Professors Ezekiel Emanuel of Penn Medicine and Guy David of the Wharton School have designed this course to help you understand the complex structure of the health care system and health insurance. Through study and analysis of providers and insurance through an economic lens, you’ll learn how basic economic principles apply to both principles and payment methods. By the end of this course, you’ll be able to identify different types of health care providers and understand the dynamic between the providers and patient so you can employ best practices and maximize profit for your health care organization. This module was designed to give you a deeper understanding of the history and structure of the American health care system. You’ll begin by examining the history of health care providers and improvements in health care technology throughout the years. Then you’ll look at the different evolutions of insurance throughout history, the purpose of health insurance, and the inherent issues and solutions within the concept of insurance. You’ll learn key aspects of Medicare, Medicaid, and other government programs that increase access to health care. Then, you’ll evaluate the Iron Triangle of Health Care—quality, cost, and access—and the main areas of focus and tension for health care policy. By the end of this module, you’ll have a richer understanding of the growth of health care providers, insurance, and government programs and their impact on health care access. 9 videos1 reading1 assignment In this module, you’ll be introduced to the concept of insurance, and focus more closely on the structure and components of insurance. You’ll also learn what determines the size of an insurance premium and why people demand health insurance. Through analyzing the problem of moral hazard and asymmetric information, you’ll accurately measure the impact of cost-sharing arrangements, such as deductibles and copays. By the end of this module, you’ll be able to identify why people are willing to pay insurance, how companies quantify how much people are willing to pay for insurance, and effectively discover solutions to both asymmetric information and adverse selection. 6 videos1 reading1 assignment In this module, you’ll examine the role of the physicians and hospitals in the health care ecosystem. You’ll explore the different types and payment methods for both physicians and hospitals, and how hospitals utilize these methods to maximize profit. Through analyzing the Health Care Value Chain and Principal-Agent Problem from Economics, you’ll be able to establish the unique importance of physicians in the health care markets as a perfect agent, and the different approaches and implications of this relationship. You’ll also gain a general overview of the characteristics that define hospitals, the effects of different trends on the decline in number of beds in hospitals, and two common hospital practices to address this issue: cost shifting and cross subsidization. By the end of this module, you’ll be able to better understand the role of physicians and hospitals in health care markets and employ best practices and maximize profit for your health care organization. 8 videos1 reading1 assignment In this module, you’ll explore a range of other health care providers outside of physicians and hospitals. Through the examination of different examples of post-acute care such as hospices, you’ll develop a better understanding of the shift toward holistic care and support in post-acute care providers. You’ll also discover the benefits of vertical integration, and how you can better allocate resources and offer competitive pricing. Finally, you’ll be introduced to the methods of government intervention in health care and learn more about various antitrust legislations such as the Sherman Act, the Clayton Antitrust Act, and Federal Trade Commission Act. By the end of this module, you’ll have a deeper understanding of the health care ecosystem, and how various providers of health care affect each other within that system. 5 videos1 reading1 assignment | 4 modules | null | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/health-economics-us-healthcare-systems | null |
399 | Cities and Consumption: Urban Sustainability and the Sharing Economy | 8,892 | 4.7 | 164 | Kes McCormick | Lund University | ['sustainable development', 'Systems Thinking', 'city futures'] | How can we govern consumption and the sharing economy in our cities? This course explores cities, consumption and the sharing economy in Europe and around the world. We connect together the key themes of the sharing economy, cities, governance, consumption and urban sustainability. We explore how the sharing economy can contribute to increasing social, environmental and economic sustainability. And we argue that it is imperative that the sharing economy is shaped and designed to advance urban sustainability.
This course was launched in May 2020, and it was updated in September 2021 with new podcasts, films and publications. This course is produced by Lund University in cooperation with partners from Sharing Cities Sweden – a national program for the sharing economy in cities with a focus on governance and sustainability. It features researchers, practitioners and entrepreneurs from a range organisations. By studying this module you can gain an increased knowledge and a deeper understanding of the sharing economy in cities. The concept of sharing cities is presented and discussed in relation to governance and urban sustainability with examples from Europe and around the world. 6 videos4 readings1 assignment1 plugin By studying this module you can gain an increased knowledge and a deeper understanding of self-governing (or leading by example) by municipalities to shape the sharing economy in cities. Examples and experiences of the sharing economy in Stockholm are presented. Critical thinking and a broader perspective is provided through a documentary film and podcast. 7 videos2 readings1 assignment1 peer review2 plugins By studying this module you can gain an increased knowledge and a deeper understanding of providing by municipalities to shape the sharing economy in cities. Examples and experiences of the sharing economy in Umeå are presented. Critical thinking and a broader perspective is provided through a documentary film and podcast. 5 videos1 reading1 assignment1 plugin By studying this module you can gain an increased knowledge and a deeper understanding of enabling by municipalities to shape the sharing economy in cities. Examples and experiences of the sharing economy in Gothenburg are presented. Critical thinking and a broader perspective is provided through a documentary film and podcast. 5 videos1 reading1 assignment2 plugins By studying this module you can gain an increased knowledge and a deeper understanding of collaborating by municipalities to shape the sharing economy in cities. Examples and experiences of the sharing economy in Malmö are presented. Critical thinking and a broader perspective is provided through a documentary film and podcast. 7 videos1 reading1 assignment2 plugins | 5 modules | Beginner level | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/sharing-cities | null |