Courses tagged with "USMx" (65)
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them.
This course provides you with opportunities to integrate and apply your information security knowledge.
Learn how to make effective decisions about your future career and how to take control of your professional development by honing your critical thinking and employability skills. Suitable for anyone undertaking some form of study, regardless of academic discipline, interests or employment background.
This course introduces concepts, algorithms, programming, theory and design of spatial computing technologies such as global positioning systems (GPS), Google Maps, location-based services and geographic information systems. Learn how to collect, analyze, and visualize your own spatial datasets while avoiding common pitfalls and building better location-aware technologies.
Build a modern computer system, starting from first principles. The course consists of six weekly hands-on projects that take you from constructing elementary logic gates all the way to building a fully functioning general purpose computer. In the process, you will learn -- in the most direct and intimate way -- how computers work, and how they are designed.
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
This course introduces concepts, languages, techniques, and patterns for programming heterogeneous, massively parallel processors. Its contents and structure have been significantly revised based on the experience gained from its initial offering in 2012. It covers heterogeneous computing architectures, data-parallel programming models, techniques for memory bandwidth management, and parallel algorithm patterns.
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
What is the Internet? How was it created? How does it work? How do we secure communications on the Internet?
Join the data revolution. Companies are searching for data scientists. This specialized field demands multiple skills not easy to obtain through conventional curricula. Introduce yourself to the basics of data science and leave armed with practical experience extracting value from big data. #uwdatasci
This course covers database design and the use of database management systems for applications.
Learn about Databases, one of the most prevalent technologies underlying internet and computing applications today.
Learn how to build a simple SQL Server database to collect and analyze your data in this Microsoft SQL server training
Learn the basics of MySQL during this introductory course.
Covering the Basic Architecture, Roles, and Processes of Being an Oracle Database Administrator
I quick set of videos that show you how to use phpMyAdmin to build an online MySQL database.
Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.
This class teaches algorithms for extracting models and other information from very large amounts of data. The emphasis is on techniques that are efficient and that scale well.
Learn about MySQL and Databases with Bucky Roberts!
Learn MySQL and Take Your Web Development to the Next Level.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.