Online courses directory (684)

Sort by: Name, Rating, Price
Start time: Any, Upcoming, Recent started, New, Always Open
Price: Any, Free, Paid
4 votes
Saylor.org Free Closed [?] Computer Sciences Customer Service Certification Program Evaluation Navigation+SAP Nutrition Taking derivatives

If you invest in financial markets, you may want to predict the price of a stock in six months from now on the basis of company performance measures and other economic factors. As a college student, you may be interested in knowing the dependence of the mean starting salary of a college graduate, based on your GPA. These are just some examples that highlight how statistics are used in our modern society. To figure out the desired information for each example, you need data to analyze. The purpose of this course is to introduce you to the subject of statistics as a science of data. There is data abound in this information age; how to extract useful knowledge and gain a sound understanding in complex data sets has been more of a challenge. In this course, we will focus on the fundamentals of statistics, which may be broadly described as the techniques to collect, clarify, summarize, organize, analyze, and interpret numerical information. This course will begin with a brief overview of the discipline of stat…

4 votes
eClasses.org $240 Business evaluation Book distribution Cardiac valves

The topics in this course cover all the essential concepts from the Project Management Institute (PMI)'s book 'A Guide to the Project Management Body of Knowledge (PMBOK) Guide, Fourth Edition'. The course teaches topics ranging from beginner-thru-advanced level Project Management concepts. In the course students will learn about: projects versus operations, choosing a team, scheduling, budgeting, controlling cost, measuring and controlling project performance, and much more. Students who are preparing for the PMI Certification (PMP or CAPM) can use this course to help fulfill the training requirement. If you already have your PMP certification, you can also use this toward your CCRs (Continuing Certification Requirements). It will count as 20 hours of Project Planning and 15 hours of Project Controlling.

4 votes
ed2go $149.00 Computer Sciences Advanced+Cryptography

Learn how to create a classroom website and how having one can make you a more effective and dynamic teacher.

4 votes
eClasses.org $180 Computer Sciences ForgotPassword Post dam Preload and Afterload

DNS is an integral part of working with the Internet, but what if you don't understand how it works? This course will give you all the insight you need to have a basic understanding of DNS and how it translates http://74.125.224.72/ into http://google.com/! The class is designed for web professionals and almost anyone looking for a walkthrough on general DNS concepts. We will begin with an introduction to the Domain naming system then move on to how the client computers translate DNS information. Lastly, we will look at the major components of a DNS server and clear up how to work with DNS zones and subdomains.

4 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course focuses on the fundamentals of computer algorithms, emphasizing methods useful in practice.  We look into the algorithm analysis as a way to understand behavior of computer programs as a function of its input size.  Using the big-O notation, we classify algorithms by their efficiency.  We look into basic algorithm strategies and approaches to problem solving.  Some of these approaches include the divide and conquer method, dynamic programming, and greedy programming paradigms.  Sorting and searching algorithms are discussed in detail as they form part of a solution to a large number of problems solved using computers.  We also provide an introduction to the graph theory and graph algorithms as they are also used in many computer-based applications today.  We conclude the course with a look into a special class of problems called the NP-complete problems.

4 votes
ed2go $149.00 Computer Sciences Advanced+Cryptography

Discover how to add features to and customize websites built with WordPress, the world's most popular Web publishing platform.

4 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences human sexuality ImperialX Obesity Polynomial and rational functions Qa testing training in Tecnológico de Monterrey

This seminar provides students an opportunity to do in-depth research into an information policy topic of their interest. Students will gain an understanding of current United States Government Policy in areas involved with information and information technology. Policies are forming and changing daily. In order to keep up with these changes the class includes guest lecturers who are studying or actually creating policies in the information area. The first part of the course consists of the student selecting and defining a topic. The second part of the course involves the presentation and discussion of the topic. As an advanced graduate course there is an expectation that the final paper will be, with suitable editing, publishable in a journal. Course Level: Graduate This Work, SI 550 - Seminar on Information Policy, by Victor Rosenberg is licensed under a Creative Commons Attribution license.

4 votes
OLI. Carnegie Mellon University Free Computer Sciences Glass ionomers Newborn respiratory diseases

An ongoing development effort in collaboration with the Software Engineering Institute’s CERT [1], this course focuses on common security issues in C and C++ development. With security expert Robert Seacord serving as lead content author, the course addresses a key need in professional education for software developers. Topics to be covered include the secure and insecure use of integers, arrays, strings, dynamic memory, formatted input/output functions, and file I/O. Continued development is being funded by partnerships with industry. [1] http://www.cert.org/

4 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course will present advanced topics in Artificial Intelligence (AI).  We will begin by defining the term “software agent” and discussing how software agents differ from programs in general.  We will then take a look at those problems in the field of AI that tend to receive the most attention.  Different researchers approach these problems differently.  In this course, we will focus on how to build and search graph data structures needed to create software agents, an approach that you will find useful for solving many problems in AI.  We will also learn to “break down” larger problems into a number of more specific, manageable sub-problems. In the latter portion of this course, we will review the study of logic and conceptualize the differences between propositional logic, first-order logic, fuzzy logic, and default logic.  After learning about statistical tools commonly used in AI and about the basic symbol system used to represent knowledge, we will focus on artificial neural network and…

4 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences ImperialX Investments Polynomial and rational functions Trauma

As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. Course Level: Graduate This Work, SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, by Don Blumenthal is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.

3 votes
eClasses.org $220 Computer Sciences Dental+porcelain Medical+microbiology Procedures

The level II class takes off where the introduction stopped and gets much deeper into flash. It covers content that goes beyond the scope of an introductory level class and that couldn't be covered in depth until now. More advanced concepts appear and open a world of web design possibilities in no time. Lectures, assignments and exercises are all present to ensure a great learning experience for everyone!

3 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her dat…

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences 1400-1500 Renaissance in Italy and the North Diplomacy Fetus Newcastle+University Nonprofit organizations Patient communication

This course examines and evaluates the archival field's current preservation standards for storage and duplication. Critical preservation problems

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Health+&+Safety RWTHx Social+Science Thermo Can University of Bath

To appreciate the opportunities and make wise choices about the use of technology, information professionals need to understand the architectures of modern information systems. In alternative system architectures, storage, communication, and processing substitute for and complement each other in different ways. This course introduces students, at several different levels of abstraction, to sets of functional components and alternative ways of combining those components to form systems. It also introduces a set of desirable system properties and a core set of techniques that are useful in building systems that have those properties. Course Level: Graduate This Work, SI 502 - Networked Computing: Storage, Communication, and Processing, by Charles Severance is licensed under a Creative Commons Attribution license.

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences human sexuality writing instruction Introduction to Programming Literature Open Educational Resource Polynomial and rational functions

This course introduces students to the conceptual, institutional, and practical foundations of information policy analysis and design. The course explores the regulatory histories, paradigms, processes, and actors shaping the ongoing development of the information field. Course topics provide a comprehensive grounding in telecommunications policy; competition and antitrust; concentration, diversity and expression; intellectual property; standards and innovation; peer production and user innovation; information privacy; digital governance; and transnational information policy. The course also emphasizes the development of core information policy skills, introducing students to relevant analytic contributions from the fields of economics, communication, law, and public policy. Course Level: Graduate This Work, SI 507 / 703 - Information Policy Analysis and Design, by Steven J. Jackson is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.

3 votes
ed2go $149.00 Error occured ! We are notified and will try and resolve this as soon as possible.
WARNING! [2] count(): Parameter must be an array or an object that implements Countable . Line 151 in file /home/gelembjuk/domains/myeducationpath.com/tmp/templates_c/0fb24f4aaee6a6f9372371e569cf0910415dbe41_0.file.course_thumbnail_half.htm.php. Continue execution. 1721180; index.php; 216.73.216.221; GET; url=courses/&categoryid=4&sortby=rating&start=420&categoryid=4&sortby=rating&start=420; ; Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com); ; Executon time: 0Error occured ! We are notified and will try and resolve this as soon as possible.
WARNING! [2] count(): Parameter must be an array or an object that implements Countable . Line 151 in file /home/gelembjuk/domains/myeducationpath.com/tmp/templates_c/0fb24f4aaee6a6f9372371e569cf0910415dbe41_0.file.course_thumbnail_half.htm.php. Continue execution. 1721180; index.php; 216.73.216.221; GET; url=courses/&categoryid=4&sortby=rating&start=420&categoryid=4&sortby=rating&start=420; ; Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com); ; Executon time: 1 Advanced+Cryptography

Learn how to create dynamic, interactive Web sites using PHP and a MySQL database server.

3 votes
ed2go $149.00 Closed [?] Advanced+Cryptography place

Learn how to create a dynamic Web blog using the Ruby on Rails programming environment and the Ruby programming language.

3 votes
ed2go $149.00 Computer Sciences Advanced+Cryptography

Learn to use HTML5, CSS3, JavaScript, jQuery, and Web APIs to create cross-platform mobile apps and mashups.

3 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

While CS403: Introduction to Modern Database Systems [1] covered many of the core concepts behind database management systems, there are many other considerations that should be addressed if you intend to pursue a career in this field.  This course will expand upon what you learned about SQL in CS403 and introduce various other advanced topics, including query optimization, concurrency, data warehouses, object-oriented extensions, and XML.  While CS403 introduced the basics of database management systems, the additional topics covered in this course will help you become more proficient in writing queries and will expand your knowledge base so that you have a better understanding of the field.  By the end of this course, you should have a solid grasp on data warehouses and XML, which will prove to be invaluable as you progress further in your Computer Science studies. [1] http://www.saylor.org/courses/cs403/…

3 votes
ed2go $119.00 Closed [?] Computer Sciences Advanced+Cryptography

Increase your potential and maximize your value by becoming an expert Microsoft Excel user.

Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.