Online courses directory (10358)
This course aims to provide basic understanding on SEO concepts and strategies on how to optimize websites to enhance their search engine ranking. It covers topics such as How Search Engine Works, SEO Factors and Optimization Strategies...
Series of videos about useful techniques to use on Google for SEO.
Slick tips from a top editor to improve your business writing, blogs, PR and copywriting skills
Interaktiver MOOC mit Operationsvideos der Universität Tübingen. Chirurgen aller Fachrichtungen und Anatomen erklären das zentrale Fach der Medizin im chirurgisch-operativen Kontext.
Interaktiver MOOC mit spannenden anatomischen und medizinischen Videos der Universität Tübingen. Anatomen und Kliniker erklären die Anatomie der Kopf- und Hals-Region im klinischen und chirurgisch-operativen Kontext.
Die Gliederung des Kurses in anatomische Regionen erfolgt anhand klinischer Fallberichte.
Die relevanten makroskopischen Strukturen dieser Regionen werden anhand qualitativ hochwertiger anatomischer Abbildungen und Präparationen sowie anhand klinischer Untersuchungen an gesunden Probanden erörtert.
Was lerne ich in diesem Kurs?
Du wirst Dir das Verständnis für die Anatomie des Kopfes und des Halses angeignen, das Dich befähigt:
- Weiterführende anatomische Kurse wie den Präparierkurs zu absolvieren
- Dich in Richtung klinischer Fachdisziplinen wie der Allgemeinen Chirurgie, HNO, MKG, Neurochirurgie, Ophthalmologie oder Radiologie zu orientieren
- Dich auf medizinnahe Fachberufe vorzubereiten
Welches Vorwissen brauche ich?
Anatomische Grundkenntnisse werden vorausgesetzt.
Kursstruktur
Kapitel 1: Übersicht, Kompartimente und Blutversorgung des Halses
Kapitel 2: Nerven, Lymphabfluß und Topographie des Halses
Kapitel 3: Schilddrüse und Pharynx
Kapitel 4: Larynx, Phonation und Spatium parapharyngeum
Kapitel 5: Der knöcherne Schädel
Kapitel 6: Kiefer, Mundhöhle und Kaumuskulatur
Kapitel 7: Zunge und Mundboden
Kapitel 8: Die Ohrspeicheldrüse und die mimische Muskulatur
Kapitel 9: Nase und Nasennebenhöhlen
Kapitel 10: Keilbein und Orbita
Kapitel 11: Schläfenbein und Ohr
Kapitel 12: Tiefe Gesichtsregion
An ongoing development effort in collaboration with the Software Engineering Institute’s CERT [1], this course focuses on common security issues in C and C++ development. With security expert Robert Seacord serving as lead content author, the course addresses a key need in professional education for software developers. Topics to be covered include the secure and insecure use of integers, arrays, strings, dynamic memory, formatted input/output functions, and file I/O. Continued development is being funded by partnerships with industry. [1] http://www.cert.org/
Bu e?itimde online internet bankac?l?k i?lemleriniz s?ras?nda nas?l güvenli i?lem yap?laca??, online teh
Given the ever-expanding role of a SQL Server database administrator in today’s security landscape, it’s critical to know how to keep data secure.
In this course, part of the SQL Server Database Administration series, join the experts for a look at user authentication—who the users are—and authorization—what they are allowed to do. Plus, find out about auditing system access and data encryption, to make sure your data is properly secured.
You’ll examine these topics through the lenses of various platforms, comparing what they look like in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
This computer science course introduces features and technologies for securing databases. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data. You will learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting.
Save 60% this fall on my Security+ Video Boot Camp by joining this free preview course today - only from Chris Bryant!
Survey of the important aspects of modern sediments and ancient sedimentary rocks. Emphasis is on fundamental materials, features, and processes. Textures of siliciclastic sediments and sedimentary rocks: particle size, particle shape, and particle packing. Mechanics of sediment transport. Survey of siliciclastic sedimentary rocks: sandstones, conglomerates, and shales. Carbonate sediments and sedimentary rocks; cherts; evaporites. Siliciclastic and carbonate diagenesis. Paleontology, with special reference to fossils in sedimentary rocks. Modern and ancient depositional environments. Stratigraphy. Sedimentary basins. Fossil fuels: coal, petroleum.
La Universidad del Claustro de Sor Juana, que tiene el privilegio de ocupar el ex Convento de San Jerónimo, desde su fundación ha asumido como vocación y compromiso, promover y difundir el conocimiento de la vida y de la obra de Sor Juana así como del mundo virreinal. Este curso tiene como propósito brindar un acercamiento a los interesados. El objetivo primordial de este material es dar al participante una muestra de la producción de la autora novohispana; de su vida y su tiempo.
The Segmentation and Clustering course provides students with the foundational knowledge to build and apply clustering models to develop more sophisticated segmentation in business contexts. You will learn: - **The key concepts of segmentation and clustering, such as standardization vs. localization, distance, and scaling** - **The concepts of variable reduction and how to use principal components analysis (PCA) to prepare data for clustering models** - **How to choose between hierarchical and k-centroid clustering models** - **How to build and apply k-centroid clustering models** Throughout this course you’ll also learn the techniques to apply your knowledge in a data analytics program called Alteryx. This course is part of the Business Analyst Nanodegree Program.
El curso aborda el estudio de conceptos fundamentales de los sistemas de automatización y control industrial, cubriendo aspectos como vulnerabilidades, amenazas, riesgos, técnicas de ataque, así como las principales buenas prácticas, etc.
¿Conoces acerca de los peligros y riesgos laborales?, ¿Sabes, cuántos accidentes de trabajo y cuántas enfermedades laborales se presentan anualmente y cuáles son sus costos? ¿Te has preguntado si las organizaciones se interesan por el ser humano que está al frente de los procesos laborales, de la misma manera en que se interesa por la obtención de beneficios y rentabilidad?
Los peligros, riesgos, accidentes y enfermedades laborales son flagelos de la productividad organizacional, que cada año cobran un alto costo social, económico y humano. Este MOOC está dirigido a todas las personas interesadas en el tema de la Seguridad y Salud en el Trabajo; empleados y/o empleadores públicos y privados, bajo cualquier modalidad de contratación y sector productivo.
A través de este MOOC reflexionaras acerca de la Seguridad y Salud en el Trabajo como un derecho fundamental que te permitirá reconocer planes de acción para aportar a procesos de mejoramiento continuo que demuestren que la Seguridad y Salud en el Trabajo es una misión posible.
The economic depression of early 2009 is a great boon for venture capitalists, and an even better time for aspiring entr
This class is a general study of modern architecture as a response to important technological, cultural, environmental, aesthetic, and theoretical challenges after the European Enlightenment. It focuses on the theoretical, historiographic, and design approaches to architectural problems encountered in the age of industrial and post-industrial expansion across the globe, with specific attention to the dominance of European modernism in setting the agenda for the discourse of a global modernity at large. It explores modern architectural history through thematic exposition rather than as a simple chronological succession of ideas.
This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.
This course is an introduction to branes in string theory and their world volume dynamics. Instead of looking at the theory from the point of view of the world-sheet observer, we will approach the problem from the point of view of an observer which lives on a brane. Instead of writing down conformal field theory on the world-sheet and studying the properties of these theories, we will look at various branes in string theory and ask how the physics on their world-volume looks like.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.