Online courses directory (684)
If you invest in financial markets, you may want to predict the price of a stock in six months from now on the basis of company performance measures and other economic factors. As a college student, you may be interested in knowing the dependence of the mean starting salary of a college graduate, based on your GPA. These are just some examples that highlight how statistics are used in our modern society. To figure out the desired information for each example, you need data to analyze. The purpose of this course is to introduce you to the subject of statistics as a science of data. There is data abound in this information age; how to extract useful knowledge and gain a sound understanding in complex data sets has been more of a challenge. In this course, we will focus on the fundamentals of statistics, which may be broadly described as the techniques to collect, clarify, summarize, organize, analyze, and interpret numerical information. This course will begin with a brief overview of the discipline of stat…
The topics in this course cover all the essential concepts from the Project Management Institute (PMI)'s book 'A Guide to the Project Management Body of Knowledge (PMBOK) Guide, Fourth Edition'. The course teaches topics ranging from beginner-thru-advanced level Project Management concepts. In the course students will learn about: projects versus operations, choosing a team, scheduling, budgeting, controlling cost, measuring and controlling project performance, and much more. Students who are preparing for the PMI Certification (PMP or CAPM) can use this course to help fulfill the training requirement. If you already have your PMP certification, you can also use this toward your CCRs (Continuing Certification Requirements). It will count as 20 hours of Project Planning and 15 hours of Project Controlling.
Learn how to create a classroom website and how having one can make you a more effective and dynamic teacher.
DNS is an integral part of working with the Internet, but what if you don't understand how it works? This course will give you all the insight you need to have a basic understanding of DNS and how it translates http://74.125.224.72/ into http://google.com/! The class is designed for web professionals and almost anyone looking for a walkthrough on general DNS concepts. We will begin with an introduction to the Domain naming system then move on to how the client computers translate DNS information. Lastly, we will look at the major components of a DNS server and clear up how to work with DNS zones and subdomains.
This course focuses on the fundamentals of computer algorithms, emphasizing methods useful in practice. We look into the algorithm analysis as a way to understand behavior of computer programs as a function of its input size. Using the big-O notation, we classify algorithms by their efficiency. We look into basic algorithm strategies and approaches to problem solving. Some of these approaches include the divide and conquer method, dynamic programming, and greedy programming paradigms. Sorting and searching algorithms are discussed in detail as they form part of a solution to a large number of problems solved using computers. We also provide an introduction to the graph theory and graph algorithms as they are also used in many computer-based applications today. We conclude the course with a look into a special class of problems called the NP-complete problems.
Discover how to add features to and customize websites built with WordPress, the world's most popular Web publishing platform.
This seminar provides students an opportunity to do in-depth research into an information policy topic of their interest. Students will gain an understanding of current United States Government Policy in areas involved with information and information technology. Policies are forming and changing daily. In order to keep up with these changes the class includes guest lecturers who are studying or actually creating policies in the information area. The first part of the course consists of the student selecting and defining a topic. The second part of the course involves the presentation and discussion of the topic. As an advanced graduate course there is an expectation that the final paper will be, with suitable editing, publishable in a journal. Course Level: Graduate This Work, SI 550 - Seminar on Information Policy, by Victor Rosenberg is licensed under a Creative Commons Attribution license.
An ongoing development effort in collaboration with the Software Engineering Institute’s CERT [1], this course focuses on common security issues in C and C++ development. With security expert Robert Seacord serving as lead content author, the course addresses a key need in professional education for software developers. Topics to be covered include the secure and insecure use of integers, arrays, strings, dynamic memory, formatted input/output functions, and file I/O. Continued development is being funded by partnerships with industry. [1] http://www.cert.org/
This course will present advanced topics in Artificial Intelligence (AI). We will begin by defining the term “software agent” and discussing how software agents differ from programs in general. We will then take a look at those problems in the field of AI that tend to receive the most attention. Different researchers approach these problems differently. In this course, we will focus on how to build and search graph data structures needed to create software agents, an approach that you will find useful for solving many problems in AI. We will also learn to “break down” larger problems into a number of more specific, manageable sub-problems. In the latter portion of this course, we will review the study of logic and conceptualize the differences between propositional logic, first-order logic, fuzzy logic, and default logic. After learning about statistical tools commonly used in AI and about the basic symbol system used to represent knowledge, we will focus on artificial neural network and…
As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. Course Level: Graduate This Work, SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, by Don Blumenthal is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.
The level II class takes off where the introduction stopped and gets much deeper into flash. It covers content that goes beyond the scope of an introductory level class and that couldn't be covered in depth until now. More advanced concepts appear and open a world of web design possibilities in no time. Lectures, assignments and exercises are all present to ensure a great learning experience for everyone!
This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her dat…
This course examines and evaluates the archival field's current preservation standards for storage and duplication. Critical preservation problems
To appreciate the opportunities and make wise choices about the use of technology, information professionals need to understand the architectures of modern information systems. In alternative system architectures, storage, communication, and processing substitute for and complement each other in different ways. This course introduces students, at several different levels of abstraction, to sets of functional components and alternative ways of combining those components to form systems. It also introduces a set of desirable system properties and a core set of techniques that are useful in building systems that have those properties. Course Level: Graduate This Work, SI 502 - Networked Computing: Storage, Communication, and Processing, by Charles Severance is licensed under a Creative Commons Attribution license.
This course introduces students to the conceptual, institutional, and practical foundations of information policy analysis and design. The course explores the regulatory histories, paradigms, processes, and actors shaping the ongoing development of the information field. Course topics provide a comprehensive grounding in telecommunications policy; competition and antitrust; concentration, diversity and expression; intellectual property; standards and innovation; peer production and user innovation; information privacy; digital governance; and transnational information policy. The course also emphasizes the development of core information policy skills, introducing students to relevant analytic contributions from the fields of economics, communication, law, and public policy. Course Level: Graduate This Work, SI 507 / 703 - Information Policy Analysis and Design, by Steven J. Jackson is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.
Learn how to create dynamic, interactive Web sites using PHP and a MySQL database server.
Learn how to create a dynamic Web blog using the Ruby on Rails programming environment and the Ruby programming language.
Learn to use HTML5, CSS3, JavaScript, jQuery, and Web APIs to create cross-platform mobile apps and mashups.
While CS403: Introduction to Modern Database Systems [1] covered many of the core concepts behind database management systems, there are many other considerations that should be addressed if you intend to pursue a career in this field. This course will expand upon what you learned about SQL in CS403 and introduce various other advanced topics, including query optimization, concurrency, data warehouses, object-oriented extensions, and XML. While CS403 introduced the basics of database management systems, the additional topics covered in this course will help you become more proficient in writing queries and will expand your knowledge base so that you have a better understanding of the field. By the end of this course, you should have a solid grasp on data warehouses and XML, which will prove to be invaluable as you progress further in your Computer Science studies. [1] http://www.saylor.org/courses/cs403/…
Increase your potential and maximize your value by becoming an expert Microsoft Excel user.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.