Unnamed: 0
int64 0
6.64k
| title
stringlengths 4
125
| enrolled
stringlengths 5
27
| rating
stringclasses 22
values | num_reviews
float64 1
229k
⌀ | Instructor
stringlengths 2
66
⌀ | Organization
stringclasses 298
values | Skills
stringlengths 2
462
| Description
stringlengths 123
32.8k
⌀ | Modules/Courses
stringclasses 43
values | Level
stringclasses 3
values | Schedule
stringclasses 130
values | URL
stringlengths 33
128
| Satisfaction Rate
stringclasses 29
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6,000 | Astronomy: Exploring Time and Space | 245,409 | 4.8 | 3,720 | Chris Impey | University of Arizona | ['Solar Systems', 'Chemistry', 'Theory Of Relativity', 'Astrobiology'] | This course is designed for anyone who is interested in learning more about modern astronomy. We will help you get up to date on the most recent astronomical discoveries while also providing support at an introductory level for those who have no background in science. Here you can find all of the introductory information, course syllabus, and current announcements. 2 videos6 readings1 assignment1 plugin Science combines logic and evidence to increase our understanding of the natural world, including remote and inaccessible regions of space and time. 18 videos3 readings2 assignments1 peer review Astronomy is the oldest science, and its history shows a growing realization of our insignificant status in a vast and ancient universe. 7 videos3 readings1 assignment A continuing revolution in telescope design and construction is giving astronomers an unprecedented set of tools for exploring the universe. 17 videos3 readings2 assignments1 peer review Astronomers harvest information across the electromagnetic spectrum, using spectra to measure the composition of distant objects and diagnose extreme physical conditions. 16 videos3 readings2 assignments Space probes have visited most planets in the Solar System, and orbiters and rovers are homing in on the habitability of Mars. Space exploration is entering an entrepreneurial phase that might let us venture beyond the Solar System. 19 videos3 readings3 assignments In the last few years, thousands of extrasolar planets have been discovered, including some that are Earth-like and possibly habitable. 11 videos3 readings1 assignment1 peer review Stars are the crucibles of heavy element creation, and the chaotic regions of their birth are being understood though long wavelength observations. Gravity is the ultimate victor in the life story of any star, leaving behind the exotic end states of white dwarfs, neutron stars, and black holes. 13 videos3 readings2 assignments1 peer review The architecture of the Milky Way galaxy is that of a disk, a bulge, and a halo, with the entire assemblage bound by enigmatic dark matter. Every galaxy contains a supermassive black hole, and entire population of galaxies is sculpted by gravity into subtle structures on large scales. 15 videos3 readings3 assignments The expanding universe points back to an extraordinary state of extremely high density and temperature called the big bang. 13 videos3 readings1 assignment1 peer review The Earth gives us a ringside seat on the physical, chemical, geological, and biological evolution of a dynamic terrestrial planet. The abundance of terrestrial planets in remote solar systems motivates the search for life and technology elsewhere in the universe. 15 videos3 readings3 assignments | 11 modules | Beginner level | null | https://www.coursera.org/learn/astro | 98% |
6,001 | Hands-on with AWS: Software Development Practices | 1,779 | 4.9 | 15 | Morgan Willis | Amazon Web Services | ['Continuous Integration', 'AWS CodeDeploy', 'Continous Delivery', 'codecommit', 'source control'] | Let’s get you working efficiently in a software development team and shorten the time it takes to get high quality applications to your customers. We start with the theory and benefits of building software with Continuous Integration and Continuous Delivery. Continuous Integration starts with source control. We get you working with AWS CodeCommit, a managed source control service that makes it easier for teams to collaborate on code and with Git repository you learn branching strategies and get hands-on committing bug fixes and writing unit tests. Your commits initiate an AWS CodePipeline pipeline where we can run automated tests for fast code quality feedback. We then use AWS CodeBuild to run tests and package code for deployment. Finally, we use AWS CodeDeploy to automate code deployment. Let’s use your coding skills to automate the process of getting quality code to production infrastructure. This course will provide a combination of video-based lectures, demonstrations and hands-on lab exercises to get you hands-on committing code that flows through a full Continuous Integration and Continuous Delivery pipeline. This week, you learn how to work on software as a team. You start by learning about best practices for continuous integration and continuous delivery (CI/CD). Next, you explore what it means to take a DevOps approach, where most of the delivery and operations of applications are automated. Finally, working in a team also means contributing to source code in a repository. You learn the basics of using Git for source control, and some best practices for branching and managing code. 8 videos4 readings2 assignments1 app item1 plugin This week, you get hands-on with some engineering responsibilities. First, you learn about testing code. When you write code, the quality of the code is important. By automating testing as you build, you can increase your confidence that you’re creating quality software. Next, you work through the process of getting a bug fix from code and updating tests. Finally, you see how the code is automatically deployed to production. 8 videos3 readings3 assignments1 app item1 plugin | 2 modules | Beginner level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/aws-software-dev | null |
6,002 | C Programming with Linux Specialization | 9,798 | 4.6 | 307 | Rémi SHARROCK | Institut Mines-Télécom | ['Software Engineering', 'Computer Science', 'Computer Programming', 'Algorithms', 'C Programming', 'Compiler', 'Debugging', 'Linux'] | In this C Programming with Linux Specialization program of seven short courses, you will learn how to write, read and debug computer programs in the C programming language while also becoming familiar with the Linux operating system. Why learn C and not another programming language? Did you know that smartphones, your car’s navigation system, robots, drones, trains, and almost all electronic devices have some C-code running under the hood? C is used in any circumstance where speed and flexibility are important, such as in embedded systems or high-performance computing. C is a foundational programming language taught at engineering schools around the world, and represents one of the building blocks of modern computer information technology. Invented in the 1970’s. It is still one of the most stable and popular programming languages in the world. Along with the C programming language comes Linux, an essential operating system used by most computer scientists and developers. Linux powers almost all supercomputers and most of the servers worldwide as well as all android devices and most internet of things devices. This Specialization will introduce the Linux command line and Linux tools for C programmers; both of which are must-have skills in today’s tech industries. Our dedicated international course team is excited to introduce you to the world of coding and guide you along your path to becoming a skilled C programmer and help you pursue a career in computer engineering. Applied Learning Project Beginners, even those without any programming experience, will be able to immediately start coding in C through our new coding tools within the web browser. No need to install anything! You will practice through guided exercises and short coding demonstrations, as well as more elaborate assignments. Define, distinguish and give examples of hardware/software, computer programs/algorithms Explain the concept of a variable and declare, initialize and modify variables of data types int, double and char Create and comment simple C-programs that may print text, special characters and variables to the screen with controlled formatting Create simple C-programs that utilize for-loops to repeat blocks of instructions Use logical conditions to control the flow of a program via branch statements (if-else), repetition (for/while loop) and nesting of these structures Create and modify arrays to store integer and floating point numbers and explain how arrays are organized in memory Create null-terminated arrays of characters to store and modify strings (of characters) Sort and search arrays of numbers and characters using bubble sort, selection sort, linear search and bisection Break acomplex programming task into a number of functions to which you pass arguments Recall how computer memory is organized to store variables and arrays Find the address of a variable Perform simple pointer arithmetic Visualize the concept of a pointer and use it to pass variables to functions by reference in order to modify them via the function Apply pointer arithmetic in order to address elements of both one-dimensional and multi-dimensional arrays Use arrays of strings to store lists of strings in one array variable Control memory usage by dynamically allocating and freeing memory at runtime Define new data types (structures) to store multiple data items in one variable and create, initialize and modify variables of these new types Find and explain the memory usage of a structure and use pointers to structures Create linked lists of structures with dynamic memory allocation at runtime Sort or search lined lists of structures Use basic commands to control the Linux Operating System Navigate and manipulate the Linux Filesystem using the command line interface Manage the memory and processes running on Linux. Compile and execute a C program in Linux Use external libraries Build an application from multiple source files Automate the building process using makefiles Pass and use arguments to the main function. Read from and write to files in C | 7 course series | Beginner level | 2 months (at 10 hours a week) | https://www.coursera.org/specializations/c-programming-linux | null |
6,003 | Disaster Recovery Planning for Organizations | Enrollment number not found | Rating not found | null | Andry Rakotomalala | Coursera Instructor Network | ['How to Develop a DRP', 'The Essential Components of DRP', 'How to Maintain a DRP', 'What are the top Industry Standards and Controls', 'How to Implement a DRP'] | "Disaster Recovery Planning" is an informative course that delves into the importance of DRP, Disaster Recovery Planning. With the world going ever deeply into tech, a lot of data servers have the potential of a disasterous incident making this DRP course the exact information you'll need. We will cover what a DRP is, how to develop, implement, and maintain said DRP. The benefit here is that the lessons will not just be organization focused but can also be personally focused. Any data and lessons from here can be done personally as well. Welcome to our comprehensive course on Disaster Recovery Planning (DRP), a short course journey designed toward ensuring your organizational resilience and continuity in the face of unknown challenges. In Lesson 1, we'll dive into the foundational cornerstones of a DRP and work towards developing an understanding of the essential components vital for crafting a robust and effective plan. From risk assessment to continuity strategies, this lesson sets the stage for safeguarding your operations. As we continue on, Lesson 2 will dive into related standards and best practices, equipping you with insights into industry benchmarks and proven methodologies adopted by leading organizations worldwide.
Moving on to Lesson 3, we'll embark on the practical aspects, guiding you through the step-by-step process of developing a tailored DRP specific to your organization's needs. Finally, in Lesson 4, we'll highlight the significance of ongoing maintenance and adaptation by exploring how to continuously improve your DRP in line with dynamic threats and changes in your organizational network. Throughout this course, we'll empower you with the knowledge, tools, and confidence to build and sustain a resilient framework, ensuring your readiness to face any issue head-on. 13 videos4 readings5 assignments | 1 module | Intermediate level | 3 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/disaster-recovery-planning-for-organizations | null |
6,004 | Advanced Competitive Strategy | 64,138 | 4.7 | 867 | Tobias Kretschmer | Ludwig-Maximilians-Universität München (LMU) | ['Pricing', 'Strategic Management', 'Marketing', 'Competitiveness'] | Advanced Competitive Strategy will introduce new topics and modules with even more real world examples and opportunities for student interaction than in the previous course Competitive Strategy (https://www.coursera.org/learn/competitivestrategy). In Advanced Competitive Strategy, we will look at how companies can build up and maintain their customer base by increasing switching costs and facilitating strategic customer lock-ins. We will find out how firms can increase their profits by pursuing suitable price discrimination and product differentiation strategies.
We will look at examples of what is acceptable behavior under the premises of EU competition and US antitrust policies and discover exciting ways of how companies can increase their returns by strategically making use of network effects and economies of size. We will further intensify our newly acquired knowledge about network effects and discuss strategies that are explicitly tailored to network markets.
We will analyze the workings of mergers and acquisitions and, moreover, support you in considering alternative strategies that can help companies grow organically. In this module we will look at strategies that can help us maintain our customer base. For this, we will take an analytical approach that helps us understand the point at which our customers will switch to a competitors and the amount of money a competitor is willing to spend to acquire our customers. Based on this understanding, we will derive applicable strategies that can help us lock in our customers strategically. We will do this by keeping in mind that also customers may apply their own strategies to avoid lock in and further, that our competitors will seek to apply strategies in the pursuit of making our customers theirs. 8 videos5 readings1 assignment We will look at the benefits of price discrimination as a strategic tool that can help us to skim off our customer’s willingness to pay and increase our utility accordingly. We are then going to learn the different ways of aligning a price discrimination strategy with successful product design and the three different ways in which a price discrimination strategy can be formulated. 8 videos2 readings1 assignment In this module we will demonstrate that if you want to operate a business you have to keep in mind that there are some powerful external entities, so-called competition authorities, that highly value and safeguard competition. While this supports and opens up opportunities for your business if it is new or relatively small and would otherwise simply be crushed by larger incumbent firms – it can also put you in danger if you have already achieved a certain size, have acquired more market power are already in a rather powerful position. 9 videos2 readings1 assignment In this module, we are going to discover two very important new concepts with which you can increase your business’s returns: Network effects and boundaries of the firm. We will find that considering these two concepts in formulating our business strategy can help us improve our strategy’s effectiveness and eventually increase our returns. 11 videos2 readings1 assignment We will build upon our knowledge from module 4 and look into competition in network markets, adoption rates and the advantage of critical mass. Following from this, we will learn why this is essential for reaching the point of critical mass. We will moreover discuss ways in which companies can raise the attention of potential consumers and reduce their perceived risk. 7 videos2 readings1 assignment We will look at the trends, goals and processes of mergers and acquisitions, differentiate the two terms and examine external and internal factors that can hinder the process. We will also find out about the striking advantages that can make a successful merger or an acquisition worthwhile if you have identified the right match for your company and we will eventually learn about the process that is involved in real world M&A activities. 11 videos2 readings1 assignment In this special bonus module, we will discuss the relationship between profitability and growth on the one hand and the limitations that are faced by small companies on the other. We will learn what organic growth is and that it can be achieved by either protecting and building up our existing customer base and product lines, or by developing new products or markets – or, in turn, by diversifying our products portfolio. We will acknowledge and address external and internal limitations to growth and – as a final consideration – will look into the possibilities of international strategies for growth. 7 videos2 readings1 assignment 1 assignment | 8 modules | null | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/advanced-competitive-strategy | 97% |
6,005 | Capstone Assignment - CDSS 5 | Enrollment number not found | Rating not found | null | Fani Deligianni | University of Glasgow | [] | This course is a capstone assignment requiring you to apply the knowledge and skill you have learnt throughout the specialization. In this course you will choose one of the areas and complete the assignment to pass. This is an advanced exercise/lesson that combines knowledge from the three earlier modules: 1) 'Data mining of Clinical Databases' to query the MIMIC database, 2) 'Deep learning in Electronic Health Records' to pre-process EHR and build deep learning models and 3) 'Explainable deep learning models for healthcare' to explain the models decision. In particular, permutation feature importance is implemented and applied on MIMIC-III extracted datasets. The technique is applied both on logistic regression and on an LSTM model. The explanations derived are global explanations of the model. 3 readings1 assignment This is an advanced exercise/lesson that combines knowledge from the three earlier modules: 1) 'Data mining of Clinical Databases' to query the MIMIC database, 2) 'Deep learning in Electronic Health Records' to pre-process EHR and build deep learning models and 3) 'Explainable deep learning models for healthcare' to explain the models decision. In particular, LIME is applied on MIMIC-III extracted datasets. The technique is applied on both logistic regression and an LSTM model . The explanations derived are local explanations of the model. 2 readings1 assignment This is an advanced exercise/lesson that combines knowledge from the three earlier modules: 1) 'Data mining of Clinical Databases' to query the MIMIC database, 2) 'Deep learning in Electronic Health Records' to pre-process EHR and build deep learning models and 3) 'Explainable deep learning models for healthcare' to explain the models decision. In particular, GradCam is implemented and applied on an LSTM model that predicts mortality based on MIMIC-III extracted datasets. The explanations derived are local explanations of the model. 1 reading1 assignment | 3 modules | Intermediate level | 2 hours to complete | https://www.coursera.org/learn/cdss5-capstoneassignment | null |
6,006 | C++ Basic Structures: Vectors, Pointers, Strings, and Files | 20,987 | 4.6 | 207 | Anh Le | Codio | ['Strings', 'Computer Science', 'C++', 'Files', 'vectors'] | Code and run your first C++ program in minutes without installing anything! This course is designed for learners with limited coding experience, providing a solid foundation of not just C++, but core Computer Science topics that can be transferred to other languages. The modules in this course cover vectors, pointers, strings, and files. Completion of C++ Basics: Selection and Iteration before taking this course is recommended.
To allow for a truly hands-on, self-paced learning experience, this course is video-free. Assignments contain short explanations with images and runnable code examples with suggested edits to explore code examples further, building a deeper understanding by doing. You'll benefit from instant feedback from a variety of assessment items along the way, gently progressing from quick understanding checks (multiple choice, fill in the blank, and un-scrambling code blocks) to small, approachable coding exercises that take minutes instead of hours. Welcome to Week 1 of the C++ Basic Structures: Vectors, Pointers, Strings, and Files course. These assignments cover using vectors to store multiple pieces of data in a single variable and iterating over vectors or using built-in methods and functions to manipulate vectors. The module ends with a lab and graded coding exercises. 6 readings5 app items Welcome to Week 2 of the C++ Basic Structures: Vectors, Pointers, Strings, and Files course. These assignments cover creating, referencing, and dereferencing pointers. The module ends with a lab and graded coding exercises. 2 readings3 app items Welcome to Week 3 of the C++ Basic Structures: Vectors, Pointers, Strings, and Files course. These assignments cover storing multiple characters or text in a string and using built-in methods and functions to manipulate strings. The module ends with a lab and graded coding exercises. 5 readings6 app items Welcome to Week 4 of the C++ Basic Structures: Vectors, Pointers, Strings, and Files course. These assignments cover importing and exporting large pieces of data from text and CSV files. The module ends with a lab and graded coding exercises. 4 readings5 app items | 4 modules | Beginner level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/cpp-basic-structures-vectors-pointers-strings-and-files | null |
6,007 | Aromatherapy: Clinical Use of Essential Oils | 23,627 | 4.9 | 474 | Janet Tomaino, DNP | University of Minnesota | ['improved symptom management', 'patient-centered care', 'wellbeing', 'evidence-based practice', 'integrative healthcare'] | This course provides an overview of essential oil therapy and current aromatherapy practices in clinical settings and gives you the skills to bring aromatherapy into your own practice. By the end of the course, you will be able to: a) explain what essential oils are to a patient and how they work; b) assess if an essential oil might be beneficial to a patient, considering patient preference and the research evidence, as well as any safety issues or contraindications; and c) suggest a protocol for use in a clinical setting. Continuing Education Credits
This course has been designed to meet Minnesota Board of Nursing continuing education requirements for 15 contact hours and may be eligible for CE credit from other professional boards that allow self-documenting of continuing education activities. It is your responsibility to check with your regulatory board to confirm this course meets your local requirements and, if necessary, to provide them with the certificate of completion you get if you pay for and fulfill all the requirements of this course. 18 videos3 readings1 assignment1 discussion prompt 10 videos5 readings2 assignments1 discussion prompt 12 videos5 readings2 assignments1 discussion prompt 8 videos10 readings1 assignment1 discussion prompt 7 videos10 readings 1 video1 reading1 peer review 5 videos8 readings1 discussion prompt | 7 modules | Beginner level | null | https://www.coursera.org/learn/aromatherapy-clinical-use-essential-oils | 99% |
6,008 | Private Equity and Venture Capital | 273,774 | 4.8 | 8,384 | Stefano Caselli | Università Bocconi | ['Valuation (Finance)', 'Venture Capital', 'Venture Capital Financing', 'Private Equity'] | The course deals with the analysis of the private equity and venture capital business. Over the course, students will be provided with a deep understanding of the mechanism underpinning the creation and/or development of a firm and the financial support it can get from the financial system through venture capital investment.
The course tries to discover how special financial intermediaries (called private equity investors) finance through equity companies belonging to different stages of their life-cycle, starting from the very beginning (startup and early stage) to a more mature phase (i.e. expansion, mature age, etc.) or also staying into crises and decline.
Private equity (named venture capital when the company is in the first phases of its life cycle) deals with very different activities, such as scouting, advisory, deal-making, valuation, and financing as financial intermediaries see it.
COURSE SYLLABUS
The course is made up of four different modules:
WEEK 1 - Introduction to Private Equity and Venture Capital
WEEK 2 - Discovering Private Equity Investors: Legal Issues and Taxation
WEEK 3 - Management of Private Equity and Venture Capital Funds
WEEK 4 - Company Valuation And Deal Making In Private Equity Settings
WEEK 5 - Final Test
Throughout the course, guest speakers and practitioners will be interviewed to provide some examples of concrete applications of the contents presented.
RECOMMENDED BACKGROUND
An understanding of the basic concepts of corporate financing accounting principles is required, while prior knowledge of private equity and venture capital is not required however it is recommended, as this is a course designed to introduce you to the fundamental concepts in private equity and venture capital. 9 videos4 readings1 assignment 11 videos2 readings1 assignment1 discussion prompt 8 videos1 reading1 assignment 9 videos2 readings1 assignment1 discussion prompt In this section you can find the final graded quiz covering all topics seen so far. 1 assignment | 5 modules | null | null | https://www.coursera.org/learn/private-equity | 97% |
6,009 | Natural Disaster and Climate Change Risk Assessment Specialization | Enrollment number not found | 4.5 | 31 | Hori Tsuneki | Banco Interamericano de Desarrollo | ['Decision-Making', 'Risk Management', 'Project', 'environment', 'Disaster risks', 'governance', 'Climate Change', 'Infrastructure', 'Resilience', 'Decision-Making', 'Risk Management', 'Project', 'environment', 'Disaster risks', 'governance', 'Climate Change', 'Infrastructure', 'Resilience'] | This specialized program is aimed at officials, professionals, and team members involved in formulating, executing, or supervising infrastructure projects, who seek to incorporate disaster risk analysis and climate change adaptation into their projects. Through 3 courses, students will be trained to identify key elements of natural disaster risk, recognize the importance of integrating risk analysis into the infrastructure project cycle, conduct qualitative and quantitative assessments to make informed decisions, discern when to apply each type of risk assessment, evaluate the technical and economic feasibility of projects through qualitative and quantitative analysis, and finally, generate informed recommendations for the design, construction, operation, and governance of infrastructure in a context of risk and climate change. It is recommended to take the courses in the suggested order. Applied Learning Project Throughout the specialized program, participants will have the opportunity to apply their learning in the analysis and study of various aspects of risk in infrastructure through different practical cases. For this purpose, they will have access to trial versions of various programs developed by iPresas. These programs only work on Windows-based computers. Recognize the importance of integrating disaster risk and climate change analysis into infrastructure projects. Recognize the components of disaster risk, as well as the differences between different types of risks. Identify the different perspectives or levels of detail in which risk analysis can be approached. Identify key aspects of qualitative and quantitative analysis of natural disaster risks in infrastructure projects. Recognize methodologies and tools that enable qualitative and quantitative analysis of natural disaster risks. Identify cases where qualitative and quantitative analysis of disaster risks is required in infrastructure projects. Identify technical and economic feasibility concepts of infrastructure projects. Distinguish the different existing quantitative indicators to prioritize investments and their calculations. Identify key components of risk governance, as well as steps for an informed public investment system. | 3 course series | Advanced level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/natural-disaster-and-climate-change-risk-assessment | null |
6,010 | idea 2 IMPACT: An Introduction to Translating Assistive Health Technologies and Other Products | Enrollment number not found | Rating not found | null | Mary Goldberg | University of Pittsburgh | [] | idea 2 IMPACT (i2I) is an online, 6-week course that will guide you step by step through the experience of developing an innovative and entrepreneurial idea in the area of assistive technology (AT). Each week, you will focus on a stage of the translational process as you work in teams to identify a problem, analyze stakeholders, define a solution, describe its benefits, research the competition, articulate differentiators, and create an action plan. Welcome to Idea 2 IMPACT: Translating Assistive Health Technologies and Other Products, where you'll learn how to translate scientific research to innovations that benefit humankind. idea 2 IMPACT (i2I) is an online, 6-week course that will guide you step by step through the experience of developing an innovative and entrepreneurial idea in assistive technology (AT), biomedical technology, and other types of technologies. The course is for academic research scientists, early-stage entrepreneurs, clinicians, and practitioner-researchers (rehabilitation engineers, OTs, PTs, MDs, PhDs, fellows, medical or other graduate-level students, undergraduates, faculty, and post-docs) who are new to entrepreneurship, and interested in translating research into practical applications to get their product or ideas to the intended audience. Each week, you will focus on a stage of the translational process to identify a problem, analyze stakeholders, define a solution, describe its benefits, research the competition, articulate differentiators and create an action plan. 5 videos4 readings1 quiz1 discussion prompt What is the problem you're solving? Who does it affect, and how do they view it? Are you sure the problem needs to be solved? How do you know? These are some of the questions we'll be asking in this module. In addition, who is impacted by the problem you've identified and the solution you'd like to propose? How do different stakeholders experience the problem differently? Have you identified all of the relevant stakeholders? 8 videos3 readings What solution are you proposing to address the problem you've identified? Is it a medical device? a drug? an app? Why is it important to be very precise in identifying what your solution is, how it works, and how it solves the problem? Find out in this module. 8 videos2 readings1 quiz You've identified a problem. You've identified stakeholders. You've outlined a solution and articulated its benefits. Now it's time to dig more deeply into who (or what) is offering a competing solution. Do you know who your competition is? Are you sure? Find out how to identify and analyze competitors in this module. 4 videos1 reading What sets your solution apart? What makes it different? In this module, you'll learn to think beyond features and functionality to explore all aspects of potential differentiation. 4 videos1 reading The marketing and sale within the United States of the healthcare product you are developing will require complying with various regulatory bodies including the U.S. Food and Drug Administration (FDA) and other industrial standards. A regulatory strategy describes the approach that will be used to meet these standards. This strategy also includes understanding and designing for requirements that third-party payors or insurers may have. Determining who will pay for the product, whether it can be reimbursed by public or private payers, or if it must be paid for out-of-pocket is important for reducing risk in your commercialization plan. 1 video2 readings Now it's time to put it all together into a final presentation pitch: problem, stakeholders, solution, benefits, competition, and differentiation. How can you make it compelling? Also, what milestones will you need to reach to take your project forward? In this module, we'll review some of the next steps as you plan your final presentation. 6 videos2 readings1 quiz1 discussion prompt | 7 modules | Intermediate level | 12 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/idea-2-impact | null |
6,011 | Artificial Intelligence on Microsoft Azure | 32,623 | 4.6 | 537 | Microsoft | Microsoft | ['Artificial Intelligence (AI)', 'Microsoft Azure'] | Whether you're just beginning to work with Artificial Intelligence (AI) or you already have AI experience and are new to Microsoft Azure, this course provides you with everything you need to get started. Artificial Intelligence (AI) empowers amazing new solutions and experiences; and Microsoft Azure provides easy to use services to help you build solutions that seemed like science fiction a short time ago; enabling incredible advances in health care, financial management, environmental protection, and other areas to make a better world for everyone. In this course, you will learn the key AI concepts of machine learning, anomaly detection, computer vision, natural language processing, and conversational AI. You’ll see some of the ways that AI can be used and explore the principles of responsible AI that can help you understand some of the challenges facing developers as they try to create ethical AI solutions.
This course will help you prepare for Exam AI-900: Microsoft Azure AI Fundamentals. This is the first course in a five-course program that prepares you to take the AI-900 certification exam. This course teaches you the core concepts and skills that are assessed in the AI fundamentals exam domains. This beginner course is suitable for IT personnel who are just beginning to work with Microsoft Azure and want to learn about Microsoft Azure offerings and get hands-on experience with the product. Microsoft Azure AI Fundamentals can be used to prepare for other Azure role-based certifications like Microsoft Azure Data Scientist Associate or Microsoft Azure AI Engineer Associate, but it is not a prerequisite for any of them.
This course is intended for candidates with both technical and non-technical backgrounds. Data science and software engineering experience is not required; however, some general programming knowledge or experience would be beneficial. To be successful in this course, you need to have basic computer literacy and proficiency in the English language. You should be familiar with basic computing concepts and terminology, general technology concepts, including concepts of machine learning and artificial intelligence. Artificial Intelligence (AI) empowers amazing new solutions and experiences, and Microsoft Azure provides easy-to-use services to help you get started. In this module, you will see how Artificial Intelligence enables the creation of powerful solutions to many kinds of problems. AI systems can exhibit human characteristics to analyze the world around them, make predictions or inferences, and act on them in ways that we could only imagine a short time ago.
You will also see how with this power, comes responsibility. As developers of AI solutions, we must apply principles that ensure that everyone benefits from AI without disadvantaging any individual or section of society. 13 videos10 readings6 assignments3 discussion prompts9 plugins | 1 module | Beginner level | null | https://www.coursera.org/learn/artificial-intelligence-microsoft-azure | 83% |
6,012 | Animals and Society Specialization | 3,896 | 4.7 | 151 | Leslie Irvine | University of Colorado Boulder | ['Animal welfare', 'Sociological concepts'] | Animals matter for human existence in so many ways that it is difficult to imagine the entity we call “society” without them. They figure heavily in our language, food, clothing, family structure, economy, education, entertainment, science, recreation, and other areas of social life. In this specialization, we will investigate a range of topics, many of them controversial. Although this is a sociology course, the field of human-animal studies is interdisciplinary. Many of the suggested readings come from fields outside of sociology, but this specialization emphasizes their sociological relevance throughout each course. Applied Learning Project This specialization is ideal for individuals employed in animal welfare including animal sheltering, veterinary medicine, trainers, rehabilitators, and animal control officers. This specialization is also excellent for learners interested in deepening their knowledge of how individuals and society treat and regard animals, from the common housepet to livestock, animals held in captivity, and animals in the wild. Demonstrate knowledge of how animals serve as symbols and metaphors in the media Summarize the practices and interactions that allow for human-animal relationships Identify the major factors that lead to animal abuse Represent instances of human-wildlife conflict Describe the status of animals used in research. Identify the trends that led to modern industrial livestock production in the United States. Determine the most appropriate roles of zoos in modern societies. Identify dilemmas faced by veterinarians and animal shelter workers. Describe components of the core self found in dogs and cats. Summarize how research on emotions in animals challenges anthropocentrism Distinguish between animal welfare and animal rights positions. Evaluate studies of the influence of animals on human health and well being. | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/animals-society | null |
6,013 | Business Strategy Specialization | 71,595 | 4.8 | 2,746 | Michael Lenox | University of Virginia | ['Strategic Analysis', 'Strategic Management', 'Strategic Thinking', 'Business Strategy', 'Strategic Analysis', 'Strategic Management', 'Strategic Thinking', 'Business Strategy'] | This Specialization covers both the dynamics and the global aspects of strategic management. You'll learn how to evaluate industry evolution, build and sustain competitive advantage, formulate and assess business strategies, and align efforts to organizational strategy. In the final Capstone Project, you’ll apply your skills by creating a comprehensive Strategic Analysis for an existing business or a venture of your own. Applied Learning Project You will bring together all that you have learned in the foundational courses and employ your toolkit to develop a comprehensive Strategic Analysis. You will analyze the current state of the organization of your choice, strategic issues facing that organization and strategic paths it might pursue. Then you will make a recommendation of the best path for the organization to pursue, and write an Executive Summary. Your finished project will showcase your ability to conduct research on/within an organization, select and apply the most appropriate analytical tools, build a well-supported case for a specific position, and effectively communicate key points with executive leadership. How to use the SWOT, competitor, and environmental analysis tools How to assess an industry's structure and how the competitive dynamics in an industry affect profitability How to complete a capabilities analysis and how to use this analysis to guide decision making How to analyze the advantages and disadvantages of four generic competitive positions The dynamics of competition, the competitive life cycle, and strategies to survive and thrive through industry disruption Internationalization strategies, how, where, and when to enter foreign markets, and foreign direct investment How businesses compete across industries, the value of being in different markets, and the right degree of diversification Stakeholder management and how engaging with non-capital stakeholders can create value How to identify and evaluate opportunities to scale an organization How to enter new markets and apply game theory to analyze, assess, and respond to competitors How to assess the impact of a potential merger and acquisition and avoid common pitfalls of this type of growth How to unlock the keys to innovation, from building an innovative capability to adding value from innovation to determining an innovation strategy How to connect strategic analysis to strategy execution using hypothesis testing to unearth key assumptions and assess their validity Four different approaches to strategy formulation and how governance ties into effective strategy formulation Use the 4A Model for effective strategy execution to ensure appropriate human and organizational resources are in place Tips from industry experts for successful strategy development and execution Employ your toolkit to develop your comprehensive Strategic Analysis Build a well-supported case recommending a specific strategic path Effectively and efficiently communicate key points with executive leadership Identify strategic paths the organization might pursue | 5 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/business-strategy | null |
6,014 | The Fundamentals of RDMA Programming | 2,403 | 4.7 | 15 | NVIDIA Training | NVIDIA | ['Execute RDMA operation', 'C Programming', 'Establish connection', 'Write and edit simple applications with RDMA', 'RDMA Programming'] | Welcome to the Fundamentals of RDMA Programming Course! Remote Direct Memory Access, RDMA, enables server-to-server data movement directly between application memory without any CPU involvement.
RDMA technology empowers advanced enterprise data centers and the world’s fastest supercomputers (HPC).
RDMA allows real CPU offloads and kernel bypass, and, as such, RDMA-based applications provide better utilization of network HW resources while increasing speed and lowering link latencies.
NVIDIA leads the interconnect industry with RDMA supported hardware and has paved the way for RDMA programming.
It has gained unique and extensive experience by accompanying the world’s leading HPC, storage, finance, and cloud companies in RDMA application development projects.
This online course offers an Innovative training experience, with short and focused videos, interactive quizzes and hands-on exercises needed to acquire the technical skills for programming RDMA-based applications.
This course provides application developers with the required knowledge and skills to start programming RDMA applications that run seamlessly over Ethernet (RoCE) and InfiniBand networks.
By the end of this course, you will be able to write and edit simple applications with RDMA.
Upon successfully passing the exam at the end of this course, you will be provided with a digital completion certificate that validates your training experience needed to acquire the technical skills for programming RDMA-based applications. In this module, you will learn what is RDMA and fundamental concepts such as memory zero copy and transport offloads. 4 videos4 assignments In this module you will be introduced to core RDMA components:
RDMA verbs
RDMA data-path
RDMA memory management 5 videos1 assignment In this module, you will learn how RDMA messages are sent and received.
In addition, you will be introduced to RDMA atomic operations. 4 videos4 readings1 assignment In this module, you will become familiar with essential code examples from the RDMA core GitHub repository. 4 videos5 readings In this module you will learn two methods to establish the initial RDMA connection between hosts - using TCP sockets or the RDMA connection manager. 2 videos2 readings In this module, you will implement the knowledge acquired in this course, by using the RCpingpong program code. 6 videos6 readings It is highly recommended that you complete all the course activities before you begin the quiz. Good luck! 1 assignment | 7 modules | Intermediate level | 5 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/the-fundamentals-of-rdma-programming | null |
6,015 | Reading and Comprehension of Text in English Module 2 | Enrollment number not found | Rating not found | null | Gabriela Cortés Sánchez | Universidad Autónoma Metropolitana | [] | Students learn reading and vocabulary (intermediate) which will make them more competent in English. They will also learn to understand and identify grammar structures that are usually complicated and could cause them problems to have a good understanding of texts in English. 2 readings 1 video4 readings5 assignments 1 video4 readings4 assignments 1 video3 readings5 assignments 1 video3 readings3 assignments 1 video5 readings4 assignments 1 video4 readings5 assignments | 7 modules | Intermediate level | 19 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/reading-and-comprehension-of-text-in-english-module-2 | null |
6,016 | Ideal Gases | 6,404 | 4.5 | 141 | John W. Daily | University of Colorado Boulder | ['Mechanical Engineering', 'Chemistry', 'Thermodynamics', 'Gases'] | Course 3 of Statistical Thermodynamics, Ideal Gases, explores the behavior of systems when intermolecular forces are not important. This done by evaluating the appropriate partition functions for translational, rotational, vibrational and/or electronic motion. We start with pure ideal gases including monatomic, diatomic and polyatomic species. We then discuss both non-reacting and reacting ideal gas mixtures as both have many industrial applications. Computational methods for calculating equilibrium properties are introduced. We also discuss practical sources of ideal gas properties. Interestingly, in addition to normal low density gases, photons and electrons in metals can be described as though they are ideal gases and so we discuss them. Module 1 starts an exploration of systems for which intermolecular forces are not important. This is done by evaluating the appropriate partition functions for translational, rotational, vibrational and/or electronic motion. In this module we explore pure ideal gases including monatomic, diatomic and polyatomic species. We also explore literature sources of properties and empirical estimation methods. 5 videos5 readings4 assignments3 discussion prompts In Module 2 we discuss both non-reacting and reacting ideal gas mixtures as both have many industrial applications. Computational methods for calculating equilibrium properties are introduced. 3 videos3 readings3 discussion prompts Interestingly, in addition to normal low density gases, photons and electrons in metals can be described as though they are ideal gases and so we discuss them. 2 videos2 readings1 assignment1 discussion prompt | 3 modules | Advanced level | 5 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/ideal-gases | null |
6,017 | The Basics of Libertarian Free Will | Enrollment number not found | Rating not found | null | Peter Tse | Dartmouth College | [] | In this course, we will dismantle arguments against free will from a philosophical perspective. Module one of the course will help you discover the differences between freedom from constraint and freedom within constraint. It will also help you to define truth and reality as they relate to our perceptions.
The second module will explore concepts such as causation and criterial causations. You will be able to define consciousness as it relates to our mental and physical worlds.
The third and the final module of this course will explore the core idea behind free will and analyze why arguments for or against free will are categorized in terms of their compatibility with determinism.
You will also be able to compare the two types of libertarian free will. This module explores the concepts of freedom, truth, and reality. 7 videos1 reading1 assignment4 discussion prompts This module explores the concepts of causation and consciousness. 4 videos1 assignment2 discussion prompts This module defines what free will is and explores concepts such as volition, types of liberatarian free will, types of arguments, critical causation etc. 16 videos4 assignments3 discussion prompts | 3 modules | null | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/the-basics-of-libertarian-free-will | null |
6,018 | English Communication for Tech Professionals | 11,832 | 4.8 | 49 | Anna Gandrabura | Arizona State University | [] | Improve your English, boost your tech career, and move toward a higher-paying job by leveling up your communication skills in English Communication for Tech Professionals brought to you by Arizona State University and English4IT. This course is for all business roles, both technical and non-technical, from developers to CEOs.
The course targets 6 main skill areas:
- vocabulary
- grammar
- pronunciation
- soft skills
- speaking & writing
After completing this course, you will:
- improve your English for professional communication;
- build your vocabulary with at least 30 new useful words and phrases from each module;
- master key grammar topics;
- have templates for emails and meetings which you can start using in your work right away;
- create a professional and attention-grabbing resume (or CV) in English and upgrade your LinkedIn profile;
- prepare for a job interview by learning useful strategies and skills that will help you preform better in interviews. In this module, you will learn the duties and responsibilities of popular tech jobs. You will revise present simple and present continuous and create a personal pitch that you can use for networking. 16 videos5 readings9 assignments3 discussion prompts1 plugin In this module, you will learn about startups and the process of creating and scaling a tech company. You will learn how to talk about past events and present results using past simple and present perfect. Finally, you will create a company pitch. 14 videos5 readings10 assignments4 discussion prompts1 plugin In this module, you will learn new vocabulary related to cutting-edge technologies. You will learn how to describe plans and future events using future tenses. Finally, you will create your own LinkedIn profile. 13 videos4 readings7 assignments6 discussion prompts1 plugin In this module, you will learn how to talk about programming languages. You will be able to compare different technologies using comparative and superlative adjectives. Finally, you will learn to write polite responses to client requests and issue reports. 9 videos4 readings8 assignments2 discussion prompts1 plugin In this module, you will learn useful vocabulary to describe version control systems and hosting platforms for managing and coordinating projects. You will be able to evaluate amounts and sizes using quantifying words (few, little, etc.). Finally, you will learn about soft skills and how to leverage them in your career. 12 videos4 readings8 assignments3 discussion prompts1 plugin In this module, you will build your vocabulary related to software testing. You will learn when and how to use passive voice. Finally, you will be able to deliver bad news and use the STAR technique to talk about your past experience. 9 videos3 readings10 assignments2 discussion prompts1 plugin In this module, you will learn useful vocabulary to talk about project management and software development. You will also use modal verbs to talk about abilities, possibilities, advice, and obligations. Finally, you will learn how to speak in a scrum standup meeting. 10 videos2 readings5 assignments2 discussion prompts1 plugin In this module, you will learn best practices for chatting in the tech workplace. You will also use modal verbs to talk about abilities, possibilities, advice, and obligations. Finally, you will learn how to build rapport with clients and colleagues. 10 videos4 readings7 assignments2 discussion prompts1 plugin In this module, you will learn useful vocabulary to talk about famous people in tech and their achievements. You will learn how to speak about consequences of different actions using zero and first conditionals. Finally, you will learn useful phrases for motivating people and giving feedback. 10 videos3 readings6 assignments4 discussion prompts1 plugin In this module, you will learn about mentorship and build useful vocabulary for talking about the mentorship process. You will understand and apply the rules of word stress so that you can pronounce commonly used words correctly. You will learn to make polite requests and talk about hypothetical situations using the second conditional. Finally, you will create a reach-out message to a mentor. 11 videos3 readings6 assignments3 discussion prompts1 plugin In this module, you will build vocabulary and receive useful tips for writing a professional resume. You will learn the rules and practical examples for using English articles. Finally, you will create your own resume. 9 videos5 readings5 assignments1 peer review2 discussion prompts1 plugin In this module, you will prepare for a job interview in English by studying common interview questions and appropriate responses to them. You will learn to use prepositions of space and time. Finally, you will practice small talk in an interview setting. 12 videos5 readings7 assignments5 discussion prompts1 plugin | 12 modules | null | 73 hours to complete (3 weeks at 24 hours a week) | https://www.coursera.org/learn/english-communication-for-tech-professionals | 98% |
6,019 | The Modern and the Postmodern (Part 1) | 136,488 | 4.8 | 1,005 | Michael S. Roth | Wesleyan University | [] | This course examines how the idea of "the modern" develops at the end of the 18th century in European philosophy and literature, and how being modern (or progressive, or hip) became one of the crucial criteria for understanding and evaluating cultural change. Are we still in modernity, or have we moved beyond the modern to the postmodern? “The Modern and the Postmodern Part I” covers the first half of a full semester course on European history, literature and philosophy. We begin with Immanuel Kant and Jean Jacques Rousseau and conclude with Friedrich Nietzsche and Charles Baudelaire and a very quick look at painting at the time they wrote. Although in the final week themes of postmodernism begin to emerge, a discussion of how modernism becomes postmodernism is at the heart of Part II of this course. 2 readings Why is philosophy relevant to modernity?
Through reading Jean-Jacques Rousseau and Immanuel Kant, we examine philosophy as a reflection on modernity and progress. 2 videos1 reading Using Rousseau’s Discourse on the Origins of Inequality, we study how the pursuit of knowledge is related to the politics of inequality. 4 videos1 reading Karl Marx is our focus here as we move from a consideration of ideas to a confrontation with alienation, class struggle and revolution. 5 videos1 reading1 peer review We read Flaubert’s Madame Bovary as a reflection on convention, stupidity and art in the wake of the failures of mid-19th century revolution. 4 videos1 reading1 peer review We situate Charles Darwin’s great achievement in the context of the English Enlightenment traditions and reimaging the world without a goal for change. 4 videos1 reading Through an examination of Charles Baudelaire and Friedrich Nietzsche, we focus on an aesthetic embrace of intensity instead of search for the “really real.” 6 videos1 reading1 peer review A Quick Survey of how advanced painting moved toward a consideration of the surface of the canvas and away from a quest for the most realistic representation of the world. 2 videos | 8 modules | null | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/modern-postmodern-1 | 98% |
6,020 | Virtual Teacher Final Project | 5,081 | 4.8 | 216 | Camille Funk | University of California, Irvine | [] | The Final Project will be a hands-on, comprehensive project that practitioners of virtual education can implement in their profession. For this final project, learners will draft a design plan for an online learning module utilizing materials learned from the virtual teacher series. Learners will choose the subject matter, method of delivery, tools, instructional strategies, and assessments, with the goal of creating a module of online or blended instruction that meets the needs of their students. Learners do not have to create, develop or teach the online learning module they design. Upon completing this course, you will be able to:
1. Design a fully online or blended instructional module
2. Apply theories and/or strategies of effective online instruction This section will give you an overview of the course, the timeline for your final project, and grading logistics. Be sure to read all the information carefully and plan accordingly. 9 readings To help you get started, we've included optional activities and resources. Also, we've compiled a list of links that tie each piece of the final project to the course content from previous courses. You'll want to review each section carefully before you begin to work on your project. Once you create a rough draft of your final project, you can submit it in the upcoming Optional Feedback Peer Review. 3 readings This section is optional for those learners who want to have additional feedback on their final project assignment prior to the Final Peer Review submission and evaluation. 1 peer review This is the final peer review project submission portion of the course. Please be mindful that there will be no extension given to learners for any deadlines set. 1 peer review This is your final peer review project evaluation portion of the course. Please be mindful that there will be no extension given to learners for any deadlines set. 1 reading 2 readings | 6 modules | Beginner level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/virtual-teacher-capstone | null |
6,021 | EKP2: Formation of Korean Neo-Confucianism | Enrollment number not found | Rating not found | null | SO JEONG PARK | Sungkyunkwan University | ['Philosophy', 'History', 'Korean Philosophy'] | In the “Exploration to Korean Philosophy” series, we will delve deeper into the subject matter than what was previously addressed in the courses “Introduction to Korean Philosophy and Culture (IKPC)” and “In Search for the Origins of Korean Philosophy (SOKP).” In EKP2, “Formation of “Korean” Neo-Confucianism,” is a course that zooms in on the era when Korean philosophy blossomed and looks into detailed topics. Here we will look at the debate between Buddhism and Confucianism, the diagrams that Koreans drew to capture the world and explore the inner self of humans, and the philosophy of salvation through the heart, which is the goal of these attempts. This week, we focus on the Confucian-Buddhist debate during the Joseon dynasty, emphasizing the rise of Neo-Confucianism over Buddhism and Daoism. We will learn about Neo-Confucian critiques against Buddhism and reflect on the role of argumentation in Korean philosophy and society. The lessons also cover the transition from syncretism to orthodoxy and highlight key historical figures. In later lessons, we will explore Sambong's critiques of Buddhism and delve into the Confucian-Buddhist debates between Sambong and Gihwa, considering their impact on modern Korean philosophy and social harmony. 9 videos2 readings1 assignment1 discussion prompt This week, we will focus on the use of diagrams in Neo-Confucianism and their role in Korean philosophy. We will learn about the emergence of these diagrams, their significance, and specific diagrams related to human relations with Heaven and Earth. The lessons also cover the Korean philosophical diagram, Doseol, which represents human existence and life in Joseon Korea. Lastly, we will explore the early development of Doseol and its role in domesticating Neo-Confucianism in Korea. 5 videos1 reading1 assignment1 discussion prompt In this week, we will explore the connection between the heart-mind and Heaven in Korean philosophy. We will gain an understanding of the Korean concept of Maum (heart-mind), its role in reaching Heaven, and its connection with Heaven and humans. The lessons also delve into the historical significance of Cheonmyeong-do and the centuries-long debate it sparked in Korea. 11 videos1 reading1 assignment1 discussion prompt In this week, we will explore the famous Four-Seven debate, delving into the distinctions between the four moral emotions and seven everyday feelings. We will analyze whether Korean Neo-Confucianism is synonymous with Korean philosophy and understand these concepts through the Li-Qi metaphysical framework. The lessons also revisit the Four-Seven debate, examining the role of Libal and the emphasis on seven feelings in Korean Neo-Confucianism. 8 videos1 reading2 assignments1 peer review1 discussion prompt | 4 modules | Intermediate level | 12 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/exploration-to-korean-philosophy-2 | null |
6,022 | Physics 101 - Energy and Momentum | 6,835 | 4.6 | 31 | Jason Hafner | Rice University | ['Mechanical Engineering', 'Problem Solving', 'Physics'] | This second course serves as an introduction to the physics of mechanical energy and momentum. Upon completion, learners will understand how mathematical laws and conservation principles describe the motions and interactions of objects around us. Learners will gain experience in solving physics problems with tools such as graphical analysis, algebra, vector analysis, and calculus. This first course covers Energy, Translational Momentum, Collisions, Statics, and Elasticity. Each of the three modules contains reading links to a free textbook, complete video lectures, conceptual quizzes, and a set of homework problems. Once the modules are completed, the course ends with an exam. This comprehensive course is similar in detail and rigor to those taught on-campus at Rice. It will thoroughly prepare learners for their upcoming introductory physics courses or more advanced courses in physics. A new approach mechanics: tracking a quantity that describes the ability to do work. 20 videos4 readings12 assignments 21 videos3 readings11 assignments 10 videos2 readings4 assignments This module contains the exam that covers Forces and Kinematics. The style is very similar to the homework problems sets, except you must complete it on your own. 1 assignment | 4 modules | Intermediate level | 23 hours to complete (3 weeks at 7 hours a week) | https://www.coursera.org/learn/physics-101-energy-momentum | null |
6,023 | Generative AI for Business Intelligence (BI) Analysts Specialization | 1,736 | 4.9 | 51 | Skill-Up EdTech Team | IBM | ['Generative AI', 'Business Intelligence', 'Data Analysis', 'Data Visualization', 'Artificial Intelligence'] | Are you a business intelligence (BI) Analyst or aspiring to start your career in this domain? This specialization can help toadvance your careerby leveraging the power of generative AI. The specialization consists ofthree short, self-paced courses, each requiring 4–6 hours to complete. Explore thecore concepts and capabilitiesof generative AI and learn to leverage these capabilities throughout the BI lifecycle. Learn thetechniques of prompt engineeringto optimize the outcomes produced by generative AI tools. Gain practical skills inusing generative AI for different use cases in BI,including querying databases and documents, automating data visualization, and creating dashboards and reports. Learn how generative AI supports data analysis, synthetic data creation, and data cleansing. Explore severalgenerative AI toolsthat can be used in the BI domain. Learn how common generative AI tools likeChatGPT and Microsoft Copilotcan be used in BI. Through thehands-on labsandprojects, you will gain valuable experience in harnessing generative AI in BI. You willhear from expertsabout their insights on the different concepts covered in the courses. Applied Learning Project Throughout this specialization, you will complete hands-on labs and projects to gain practical experience in leveraging generative AI for different use cases in the BI domains. You will learn how to draft effective prompts for generating relevant outputs regarding the common and specific scenarios in BI. Some examples of the labs includedare: Generate Text Using Generative AI Generating Text, Images, and Code Experimenting with Prompts Naive Prompting and the Persona Pattern The Chain-of-Thought Approach in Prompt Engineering The Tree-of-Thought Approach in Prompt Engineering Data generation and cleansing Querying databases and documents Generating SQL queries with AI Data analysis using generative AI tools Data visualization with AI tools Project Describe generative AI and distinguish it from discriminative AI. Describe the capabilities of generative AI and its use cases in the real world. Identify the applications of generative AI in different sectors and industries. Explore common generative AI models and tools for text, code, image, audio, and video generation. Explain the concept and relevance of prompt engineering in generative AI models. Apply best practices for creating prompts and explore examples of impactful prompts. Practice common prompt engineering techniques and approaches for writing effective prompts. Explore commonly used tools for prompt engineering to aid with prompt engineering. Explain the role of generative AI in every stage of the BI lifecycle. Use generative AI to improve data handling and analysis in BI. Leverage generative AI-powered tools for enhanced data visualization and reporting in BI. Discuss ethical considerations and challenges in implementing generative AI in BI. | 3 course series | Intermediate level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/generative-ai-for-business-intelligence-analysts | null |
6,024 | Oracle SQL Exam Prep | 2,253 | 4.8 | 10 | Rafiq Wayani | LearnQuest | ['updating database tables', 'Using SQL queries', 'Creating primary and foreign keys'] | This course is designed to help you continue learning about Oracle SQL and prepares you to take the Oracle SQL Certification Exam. We'll review methodologies and terminology that we presented in the Oracle Specialization courses, show some demos and give in-depth explanations. You'll also have the opportunity to take a practice certification exam.
We recommend that you first complete the Oracle SQL Databases Specialization. In this module, we'll introduce you to the course and discuss which topics we'll cover. We'll also explore why SQL is a powerful tool to use and some of it's uses. Then, we'll explore table design and schemas. 5 videos2 readings1 assignment In this module, we'll explore some of the key terms you'll need to know when building SQL Databases. We will compare and contrast the ANY and ALL operators, distinguish between COMMIT and ROLLBACK, and explore pseudocolumns. We will also give examples for some of these terms. 6 videos2 readings1 assignment In this module, we'll review primary and foreign keys, delving a little more into their constraints. We'll also explore the USING clause and what it is used for. 4 videos2 readings1 assignment In this module, we'll take a look at INSTRING and SUBSTRING functions and demonstrate naming a column using an alias. We will also explore subqueries and take another look at pseudocolumns. Lastly, we'll discuss views and compare them with materialized views. 5 videos2 readings1 assignment The following ungraded quiz will help you practice what you have learned before taking the Oracle SQL Certification Exam. 1 assignment | 5 modules | Beginner level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/oracle-sql-examprep | null |
6,025 | Symmetric Cryptography | 15,449 | 4.5 | 256 | Sang-Yoon Chang | University of Colorado System | [] | Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.
This course is cross-listed and is a part of the two specializations, the Applied Cryptography specialization and the Introduction to Applied Cryptography specialization. This module defines substitution cipher technique and describes multiple examples for substitution-based classical algorithms: Caesar Cipher, Monoalphabetic Cipher, and Vigenere Cipher (which is a type of Polyalphabetic Cipher). We will also discuss the mathematical concepts in Modulo Operations to use them to describe the cipher algorithms. 8 videos4 readings3 assignments1 peer review This module studies transposition cipher which, along with substitution cipher, provides a base technique for symmetric ciphers. We define transposition cipher and product cipher and discuss transposition examples in Rail Fence and Permutation Cipher. 5 videos1 reading2 assignments This module is about modern ciphers based on product ciphers. We will first define block cipher and contrast it with stream cipher. We will then describe the ideal block cipher, which maximizes the number of transformations, and Feistel Cipher, which is a practical structure framework approximating the ideal block cipher. As a widely used cipher example based on the Feistel Cipher structure; we will study Data Encryption Standard (DES). 8 videos2 readings2 assignments1 peer review To provide stronger security than DES, modern symmetric ciphers can either use multiple ciphers or use an entirely different algorithm. This module reviews examples of each in Triple-DES and AES. 4 videos2 readings2 assignments Given a cipher and a key, this module reviews how to use block cipher operation modes when the data spans across multiple blocks. The module describes five popular operation modes: ECB, CBC, CFB, OFB, and CTR mode. 6 videos1 reading1 assignment1 peer review | 5 modules | Intermediate level | null | https://www.coursera.org/learn/symmetric-crypto | 86% |
6,026 | The Science of Well-Being for Teens | 158,522 | 4.9 | 574 | Laurie Santos | Yale University | [] | A recent survey found that 37% of teens say they have poor mental health. This 6-week course aims to curb this mental health crisis by bringing together the best insights from Dr. Laurie Santos’ popular Yale course Psychology and the Good Life. In this course, you will explore what the field of psychology teaches us about how to be happier, how to feel less stressed, and how to thrive in high school and beyond. The lessons along with short weekly ‘happiness homework’ assignments will ultimately prepare you to put these scientific findings into practice. The ultimate goal is for you to feel better and build healthier habits. Parents, teachers, and other professionals supporting teenagers may also find the course beneficial. Note: This course does not confer Yale University grade, credit or student status.
THE SCIENCE OF WELL-BEING FOR TEENS WAS PRODUCED IN PART DUE TO THE GENEROUS FUNDING OF THE ARTHUR M. BLANK FAMILY FOUNDATION AND THE JOHN TEMPLETON FOUNDATION. In this module, you will learn what it means to be happy and why pursuing happiness is not a pointless endeavor. Dr. Santos addresses how our minds lie to us and how the science shows that our misconceptions about money, grades, and social media are holding us back from implementing the techniques studied in positive psychology. 12 videos3 readings1 assignment In this module, you will learn about biases that get in the way of our own happiness. Dr. Laurie Santos explores why we get used to good and bad things in life and how we can deal with growing accustomed to things and making bad predictions about what we will want in the future. Dr. Santos discusses how we compare ourselves to others using reference points and what we can do to deal with our limited attention. 12 videos2 readings2 assignments In this module, you will learn about behaviors that make us happy. Dr. Laurie Santos discusses behaviors such as engaging in social behaviors, finding time to do the things you love, and practicing healthy habits. Dr. Santos explains how a little bit of extra sleep each night or exercise can make a world of a difference. 10 videos2 readings2 assignments In this module, you will learn about thought patterns that lead to better moods. Dr. Laurie Santos addresses the power of focusing our thoughts and developing the right mindset in order to experience gratitude, practice mindfulness, and get some perspective. 9 videos2 readings2 assignments In this module, you will learn how harnessing our feelings can make us happier. Dr. Laurie Santos explores how we need both our positive and negative emotions in order to improve our well-being. Dr. Santos also explores how to regulate your fight-or-flight response using a tool that is most definitely underused, the breath. 5 videos2 readings2 assignments In this module, you will learn techniques to achieve happiness goals learned throughout the course. Dr. Laurie Santos investigates how we can put happiness tips into practice, addressing the ways in which situations and people can affect us. Dr. Santos additionally discusses how to implement better habits and hack the habits that we do have. 11 videos6 readings1 assignment2 peer reviews | 6 modules | Beginner level | null | https://www.coursera.org/learn/the-science-of-well-being-for-teens | 97% |
6,027 | Introduction to DevSecOps | Enrollment number not found | Rating not found | null | Board Infinity | Board Infinity | ['Compliance Monitoring', 'development', 'Security Testing', 'Automation', 'Integration'] | Venture into the realm of DevSecOps with this immersive course. This course is designed to provide a comprehensive overview of this integration, shedding light on the significance of embedding security into every phase of the development process. In the first module, you will delve into understanding and implementing DevSecOps. You'll gain insights into the best practices for secure development, from the initial ideation phase right through to deployment, ensuring the delivery of secure software products.
The second module covers the transformative role of automation in DevSecOps. It showcases how automation can not only enhance efficiency and code quality but also speed up release cycles and reduce vulnerabilities.
By the conclusion of this course, learners will not just be familiar with the theoretical concepts of DevSecOps but will be equipped with the practical skills needed to implement these principles in real-world scenarios. They will be poised to champion efficiency, security, and collaboration within their respective organizations, driving impactful change. Understanding and Implementing DevSecOps! In this module, we'll explore the core principles of DevSecOps, emphasizing the cultural shift it represents in integrating security into software development. Videos 1 and 2 introduce DevSecOps and the importance of breaking silos to promote collaboration among teams. Video 3 compares DevSecOps with DevOps, highlighting the added security dimensions. In Lesson 2, Video 1 covers key DevSecOps principles, Video 2 explains the Shared Responsibility Model, and Video 3 emphasizes security considerations across the development lifecycle. Finally, Lesson 3 focuses on security automation, advocating for the Shift-Left approach and integrating security tools into the CI/CD pipeline for enhanced efficiency and robustness. Join us in mastering DevSecOps to create secure, reliable, and collaborative software applications. Let's dive into Module 1 and embrace the DevSecOps mindset. 14 videos5 readings4 assignments1 discussion prompt Leveraging Tools and Best Practices in DevSecOps! In this module, we will explore the essential tools and best practices for successful DevSecOps implementation. The first set of videos will provide an overview of popular DevSecOps tools, a deep dive into using static and dynamic security analysis tools, and insights into leveraging container security tools. Moving on, we'll delve into key best practices, covering how to integrate security throughout the SDLC, handle security incidents, and examine successful security automation implementations. In the final part, we'll look at emerging trends in DevSecOps, building a career in this field, and the ongoing evolution of DevSecOps and its impact on the IT landscape. Get ready to enhance your skills and knowledge in securing software development processes using the right tools and methodologies in this exciting DevSecOps journey. 12 videos4 readings4 assignments | 2 modules | Beginner level | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/devsecops | null |
6,028 | Python for Active Defense | 4,470 | 4.4 | 53 | Howard Poston | Infosec | ['Python Programming', 'active defense'] | This course covers Python for active defense. Python and decoy development 7 videos1 assignment Python has uses for defense and attack. 7 videos1 assignment Explore the uses for python for monitoring. 7 videos1 assignment | 3 modules | Intermediate level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/python-for-active-defense | null |
6,029 | Forensic Accounting and Fraud Examination | 153,506 | 4.7 | 5,833 | Dr. Richard Riley, Ph.D | West Virginia University | ['Fraud Detection', 'Internal Control', 'Fraud Investigation', 'Forensic Accounting'] | Everyday across the world, thousands of businesses are victimized by fraud. Who commits these bad acts? Why? And, how? In this course we are going to help you answer the questions: who commits fraud, why and how. We’ll also help you develop skills for catching them. Who are "accidental" fraudsters? Learn who accidental fraudsters are, the basic elements of fraud, and how devastating the costs of fraud are. 4 videos2 readings1 assignment1 discussion prompt What is a "preditor" fraudster? How do you protect your organization against a preditor fraudster? Learn how internal control concepts and other techniques can help you detect and prevent preditor fraudsters. 4 videos1 assignment1 discussion prompt What is "big data"? Learn how data analysis, Benford analysis and other tools can help you identify fraudulent activities. 5 videos1 assignment1 discussion prompt Money laundering. This week’s session will introduce you to the objectives and
stages of money laundering as well as the basic techniques used. 4 videos1 assignment1 discussion prompt Everything you need to know about whistleblowing. Learn the importance of
whistleblowing and the difficulty of being a whistleblower. 5 videos2 assignments1 discussion prompt | 5 modules | null | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/forensic-accounting | 97% |
6,030 | Preparing for Google Cloud Certification: Cloud Network Engineer Professional Certificate | 15,695 | 4.7 | 1,003 | Google Cloud Training | Google Cloud | ['Network Load Balancing', 'Network Topology', 'Peering (Computer Networking)', 'VPC Firewall', 'IP Addressing', 'Network Routing', 'Network Architecture', 'Cloud NAT', 'IP Routing', 'Google VPN', 'Multi-Cloud', 'Google VPC', 'Network Load Balancing', 'Network Topology', 'Peering (Computer Networking)', 'VPC Firewall', 'IP Addressing', 'Network Routing', 'Network Architecture', 'Cloud NAT', 'IP Routing', 'Google VPN', 'Multi-Cloud', 'Google VPC'] | 87% of Google Cloud certified users feel more confident in their cloud skills*. This program provides the skills you need to advance your career as a network engineer and provides training to support your preparation for the industry-recognizedGoogle Cloud Professional Network EngineerOpens in a new tabcertification. You'll also have the opportunity to practice key job skills using Google Cloud to build networks, implement VPCs, configure network services, and implement hybrid interconnectivity among other things. Your journey to Google Cloud certification - 1) Complete the Coursera Google Cloud Networking Professional Certificate 2) Review other recommended learning resources for theGoogle Cloud Professional Network EngineerOpens in a new tabexam 3) Review theGoogle Cloud Professional Network Engineer exam guide.Opens in a new tab 4) Review theProfessional Cloud Network Engineer sample questionsOpens in a new tab 5)RegisterOpens in a new tabfor the Google Cloud certification exam (Can be taken remotely or at a test center) --------------------------------------------------------------- * Percentages indicate those who strongly or somewhat agree with the statement. Findings from a survey conducted with Google Cloud certified individuals in May 2019 by an independent third-party research organization. Applied Learning Project Learners will work with VPC networks that span multiple zones and multiple regions. They will use open source tools to gather network information, including latency, connectivity, and traffic. They will use this information to determine where network performance can be improved. They will build a minimal web application with Google App Engine and then explore various ways to use Identity-Aware Proxy (IAP) to restrict application access and provide user identity information to it. They create different types of load balancers and see how they can improve network performance. Finally, they will build and test a high-throughput VPN, between a simulated VPC and on-premises network environment. This will include building VPN gateways and a tunnel between the two networks. Describe the domains covered on the Professional Cloud Network Engineer Certification exam. Identify gaps in your knowledge and skills for each domain and create a study plan. Identify the purpose and value of Google Cloud products and services. Define how infrastructure is organized and controlled in Google Cloud Explain how to create a basic infrastructure in Google Cloud Select and use Google Cloud storage options Explain the concept of multiple network interfaces (NICs) and why they’re useful in a VPC network. Connect two or more VPC networks. Differentiate between Standard and Premium Network Service Tiers. Use Network Intelligence Center, Cloud Logging, and Cloud Monitoring to troubleshoot network problems. Configure connectivity to Google Cloud VPC networks. Configure private connection options to provide access to external resources and services from internal networks. Identify the best Network Service Tier for your needs. Configure monitoring and logging to troubleshoot networks problems. Analyze the key considerations for designing a scalable, secure, performant, and cost-efficient Google Cloud network architecture. Implement a hub and spoke network topology Visualize, troubleshoot, and optimize Google Cloud networks. Apply best practices for designing and managing Google Cloud networks in cloud-only, multi-cloud, and hybrid environments. Deploy Cloud IDS and configure its settings according to specific security needs. Identify methods Google Cloud uses to mitigate the risk of DDoS for its customers. Define packet mirroring and explain its role in network analysis and troubleshooting. Implement hybrid load balancing. Manage traffic to the load balancers. Use Google Cloud Armor with your load balancers. Explain the different connectivity options available to extend your on-premises and other cloud networks to Google Cloud. Analyze the suitability of different Google Cloud hybrid and multi-cloud connectivity services for specific use cases. Implement a hybrid or multi-cloud network using Google Cloud services. Explain the purpose and capabilities of Google Cloud Observability. Implement monitoring for multiple cloud projects. Create effective monitoring dashboards and alerts.Create alerting policies, uptime checks and alerts. Explain how to collect logs using Cloud Logging and export for further analysis Install and manage Ops Agent to collect logs for Compute Engine. Explain Cloud Operations for GKE. Analyze VPC Flow Logs and firewall rules logs. Analyze resource utilization cost for monitoring related components within Google Cloud. Configure Networks via gcloud Perform basic networking tasks and troubleshooting Improve network performance Install and test load balancers Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review. | 11 course series | Intermediate level | 1 month (at 10 hours a week) | https://www.coursera.org/professional-certificates/google-cloud-networking | null |
6,031 | Feedback Loops: How to Give & Receive High-Quality Feedback Specialization | 2,113 | 4.6 | 15 | Patrick Barry | University of Michigan | ['Communication', 'People Management', 'Team Management', 'Leadership Development', 'Communication', 'People Management', 'Team Management', 'Leadership Development'] | Feedback plays a key role in the development of students and professionals of all kinds. Yet few people are taught how to give effective feedback or how to receive it. This Feedback Loops specialization is designed to change that. Based on a popular class at the University of Michigan Law School that people have called “extremely useful,” “super engaging,” and “the highlight of my week,” it is full of evidence-based tips and techniques you can use to improve your feedback skills in a wide-range of situations: in school, at work, on athletic teams, inside musical groups, and certainly when interacting with your friends and family. It also provides a number of “Feedback Labs” in which you can practice applying—in a safe, low-stakes way—the many concepts you’ll be learning. Applied Learning Project ThisFeedback Loopsseries aims to provide learners with the conceptual vocabulary and low-stakes practice opportunities necessary to improve the way they give, receive, and interpret feedback. Learners will develop the ability provide and receive helpful feedback to (1) themselves, (2) people above and below them in an organizational hierarchy, (3) their peers, and (4) big, small, and medium-sized teams. How to break out of "Feedback Ruts" How to address vague feedback, biased feedback, and "noisy" feedback How to help people (including yourself) develop effective "self-feedback" systems and strategies Become skilled at “managing up” and improve the feedback you provide your boss, teacher, mentor, coach, or other kind of supervisor Become skilled at “managing down” and improve the feedback you provide your employees, students, mentees, players, or other people you supervise. Improve how you receive feedback, both from people you supervise and from people who supervise you. Improve how you give feedback to coworkers, classmates, teammates, friends, and other peers Improve how you receive feedback from coworkers, classmates, teammates, friends, and other peers Discover the optimal balance of formal and informal feedback Provide vertical and horizontal feedback to teams Develop effective feedback systems for your team Receive vertical and horizontal feedback from teams | 4 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/feedback-loops | null |
6,032 | Web of Data | 6,536 | 4.2 | 86 | Catherine Faron Zucker | EIT Digital | ['publish Linked Open Data on the Web', 'search for occurrences of a query graph', 'access remotely data sources on the Web', 'use and mix together existing data to obtain new data'] | This MOOC – a joint initiative between EIT Digital, Université de Nice Sophia-Antipolis / Université Côte d'Azur, and INRIA - introduces the Linked Data standards and principles that provide the foundation of the Semantic web. You will learn how to publish, obtain and use structured data directly from the Web. Learning the principles, languages, and standards to exchange data on the Web will enable you to design and produce new applications, products, and services that leverage the volume and variety of data the Web holds. We divided this course into four parts that cover the core technical skills and competencies you need to master to be able to use the Web as a space for giant structure data exchange:
• in the first part, “Principals of a Web of Linked Data”: you will learn and practice the principles to publish and obtain data directly on the Web instead of Web pages;
• in the second part, “The RDF Data Model”: you will learn the standard data model for the Web and its syntaxes to publish and link data on the Web in your applications and services;
• in the third part, “SPARQL Query Language”: you will learn how to directly query and access data sources on the Web and obtain structured data relevant to your activity and domain;
• in the fourth and final part, “Integration of other Data Formats and Sources”: you will learn how the Web standards interact and interoperate with other data formats to allow the integration of a variety of data sources.
Each week alternates short videos and quizzes, as well as supplementary resources and forums to gradually progress through the different principles and standards.
After following this course successfully, you will have the skills to obtain focused and structured datasets from the Web that you can then use to augment your own datasets, enrich their dimensions, feed your applications, perform data mining, machine learning, and training, data analysis, AI processing and reasoning and other data management. This first week is dedicated to introducing the notion of a Web of Linked Data. Dr. Fabien Gandon will start with some background and general knowledge about the Web, its history and its architecture. 14 videos25 readings6 assignments4 discussion prompts This second week is dedicated to the Resource Description Framework (RDF), the standard data model to publish and link data on the Web. 10 videos22 readings5 assignments4 discussion prompts This third week presents the SPARQL Query Language that enables users to perform information retrieval by querying RDF datasets on the Web of Data. 11 videos14 readings4 assignments4 discussion prompts This last week offers an open conclusion of the MOOC by addressing several initiatives to integrate more and more data on the Web. 12 videos24 readings9 assignments2 discussion prompts | 4 modules | Intermediate level | 18 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/web-data | null |
6,033 | Advanced Topics and Future Trends in Database Technologies | 4,602 | 4.7 | 37 | Di Wu | University of Colorado Boulder | ['Big Data', 'Data Warehousing', 'Database (DBMS)', 'database administration', 'NoSQL'] | This course consists of four modules covering some of the more in-depth and advanced areas of database technologies, followed by a look at the future of database software and where the industry is heading. Advanced Topics and Future Trends in Database Technologies can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics. Learn more about the MS-DS program at https://www.coursera.org/degrees/master-of-science-data-science-boulder. In this module we will take a deeper look into the internals of DBMS software to better understand how it works. We will examine the role of the DBA (Database Administrator), the Data Scientist, the Data Architect, and other career paths in the realm of database technologies. This module covers DBMS essentials such as concurrency management, backup & recovery, and transaction logging. 6 videos2 readings3 quizzes1 peer review1 discussion prompt We have learned to design a Relational Database around the typical transactions or activities a business might have. However, in case we need to analyze data, rather than collect data, we need to create a database for the subject of interest to support decision making. In this module, we are going to learn a different perspective of organizing the data, Data Warehouse, or Online Analytical Processing. 5 videos1 peer review We are in the era of data explosion. While relational databases are still widely used, we are having new problems to deal with data that is different than the one we have been organizing. This new type of data, with 10 V's in the definition, is called Big Data. We are going to explore the definitions, the challenges, and the architecture of the Big Data in this module. 4 videos1 peer review Although relational database software has been in use for decades, relational database systems still command a huge share of the database software marketplace. However, with the more recent explosion of Big Data, relational systems are struggling to keep up. Big Data has opened the door for non-relational database solutions ("NoSQL") to capture marketshare from relational systems. In this module we will take a deeper look into the most popular NoSQL database technologies. 6 videos2 quizzes1 peer review | 4 modules | Beginner level | null | https://www.coursera.org/learn/advanced-topics-future-trends-database-technologies | null |
6,034 | SAP Technology Consultant Professional Certificate | 56,861 | 4.7 | 783 | Leslie Reynolds | SAP | ['Solution design and implementation', 'Understanding the SAP world and solutions', 'Business and process analysis', 'Client engagement and communication', 'How to launch and develop your SAP career', 'Solution design and implementation', 'Understanding the SAP world and solutions', 'Business and process analysis', 'Client engagement and communication', 'How to launch and develop your SAP career'] | Launch your career in the high-demand field of SAP consulting. Build the consulting skills successful companies are looking for through tailored training and hands-on projects designed by SAP. No experience or degree required to enroll. What does an SAP consultant do? SAP consultants are problem solvers who relish getting the details right. They are experts in process management and have a deep understanding of SAP solutions. They are also outstanding communicators and excel at collaborating with all contributors and stakeholders in a project. This program has been designed specifically for learners seeking to get their first job in the SAP domain. You’ll get the inside track on how to build a consulting career beyond just having product knowledge. You’ll learn about project management methodologies and agile processes. You’ll gain core consulting skills such as requirements gathering, stakeholder interviewing, client communication, client analysis, and solution design. Plus, you’ll go through several implementation project lifecycles to build your practical experience and complete a comprehensive hands-on project using a case study to apply the skills you have learned. With SAP customers generating 87% of total global commerce, SAP consulting skills are in high demand. Through this program, you’ll build the critical skills that the largest and highly successful companies such as Accenture, Capgemini, Deloitte and KPMG, are looking for. Applied Learning Project Each course contains a client-related project that enables you to develop your skills in context. As the courses progress, the projects give you the opportunity to deepen your consulting skills as you learn. In addition to each end-of-course project, however, you’ll conduct a comprehensive hands-on project that takes you through the full SAP implementation lifecycle from start to finish. This will include carrying out the appropriate customer analysis and gap analysis, identifying business requirements, designing a solution, implementing your proposed solution, and completing QA and testing activities. Plus, you’ll build your own SAP career development plan in readiness for when you’ve successfully earned your professional certificate. Once you’ve completed the program, you will have a variety of simulated project implementations that you can refer to in interviews to evidence your hands-on experience. SAP Professional Fundamentals is the first course in the SAP Technology Consultant Professional Certificate program. The course introduces you to the world of consulting and the range of skills that you need to succeed in this competitive field. You’ll explore SAP professional consulting roles and discover what technical consultants, functional consultants, and other professionals do. You’ll investigate the wide range of skills consultants need to have, for example strategic thinking, business process analysis, systems and design thinking, and understanding data, as well as effective soft skills, communication and relationship management. You’ll explore various planning and project management methodologies such as Waterfall, Agile, DevOps, and Cloud. Plus, you’ll start to get a feel for the whole SAP journey, from engaging with the customer to deploying a solution.
By the end of this course, you will be able to:
Explain what is meant by the SAP ecosystem and the value it brings to customers.
Describe what different SAP professionals do and how they engage with customers.
Understand the core and soft consulting skills that are both in highest demand, and frequently not taught in classroom environments.
Describe a typical SAP engagement and how key professional skills are used at each stage of the SAP Implementation Lifecycle.
Describe key roles with whom an SAP professional typically collaborates. Understanding the Enterprise Systems Environment is the second course in the SAP Technology Consultant Professional Certificate program. The course builds your understanding of the digital landscape. You’ll explore business processes and organizational alignment. You’ll get an overview of how systems are designed and developed, and consider architecture, infrastructure, application development, data science, cloud, privacy, and security. You’ll build your understanding of the SAP platform and consider key development and deployment models covering Advanced Business Application Programming (ABAP), Java, SAP API, and SAP Fiori. Plus, you’ll explore gap analysis using SAP RISE and Activate and become familiar with SAP cloud strategy, architecture, and tools.
By the end of this course, you will be able to:
Describe how digital transformation can impact a customer’s organization, business processes and tools (people/process/tools).
Identify the key elements of system design and development and how they relate to specific IT requirements.
Identify different computing models (e.g. Compute Network Storage, OnPrem, Cloud etc) and architectures (e.g. Native, Hybrid, Multi-Cloud).
Explain the key elements of the SAP platform and environment.
Describe key Application, Development and Programming models.
Explain the key elements of the SAP Cloud Strategy.
Understand the key questions to keep in mind when faced with a specific request from a prospective client. SAP Customer Engagement and Discovery is the third course in the SAP Technology Consultant Professional Certificate program. The course introduces you to SAP Activate methodology and teaches you how to engage with customers and work with them in exploring how to achieve their transformation goals. You’ll learn how to gather information and insights about a customer’s business, technology, and data. You’ll investigate SAP’s fit-to-standard analysis approach. You’ll consider how to accurately understand and assess a client’s needs. And you’ll look at SAP’s Customer Journey Roadmap, which includes how to identify and communicate the value of a solution to stakeholders and get signoff.
By the end of this course, you will be able to:
Describe the key elements of the SAP Activate methodology and Customer Engagement Model.
Explain the program planning and set up activities for a typical SAP customer project.
Explain what a technology consultant does in the Customer Engagement and Discovery phase of SAP projects.
Explain how to gather relevant information and insights about customer strategy, objectives, processes, technology, and data.
Describe how to conduct discovery workshops and interviews.
Explain SAP's fit-to-standard approach and key preparation activities and develop a Customer Journey Roadmap.
Identify and communicate the business value of a proposed SAP solution. Designing an SAP Solution is the fourth course in the SAP Technology Consultant Professional Certificate program. The course dives into the SAP Implementation lifecycle so you can immerse yourself in the key phases, including design, pitch, and re-design. You’ll work with SAP Activate methodology and look at how to identify business requirements to determine system and data requirements. You’ll learn how to interrogate the gaps between SAP technical capabilities within Business Technology Platform and the customer’s existing environment.
You’ll explore the SAP iterative approach, understand how the predefined content available for the most common SAP solutions can provide you a baseline to build your demos and showcase the solution capabilities. You’ll learn how to incorporate customer feedback so any gaps will be addressed and how to reach consensus regarding what should be developed, when it should be developed and how it should be developed.
By the end of this course, you will be able to:
Explain what a technology consultant does in the Design, Pitch and Re-Design phases of the SAP Implementation lifecycle.
Explain how to review a solution proposal and business requirements to determine SAP application technical requirements for customers.
Describe how to interrogate gaps between SAP technical capabilities and the customer’s existing environment.
Explain how to design an SAP technical solution that fulfills the business requirements documented in the customer interview, analysis, and communication phases.
Develop a Technical Design Outline in accordance with provided parameters. Implementing an SAP Solution is the fifth course in the SAP Technology Consultant Professional Certificate program. You’ll learn how to collaborate with stakeholders and other SAP professionals for key phases in the SAP Implementation lifecycle. You’ll explore how to build and prepare system and test environments for implementation and look at different types of testing. You’ll learn how to cleanse and anonymize test data, and use automation tools. You’ll look at SAP Best Practice Explorer and build your understanding of baseline configurations and integrations. You’ll learn how to document issues, bugs, and recommended fixes after testing. Plus, you’ll look at the process for going-live and getting sign off for a project.
By the end of this course, you will be able to:
Explain what a technology consultant does in the implement, monitor and QA/testing phases of the SAP lifecycle.
Implement and deploy a technical solution approved in the design, pitch, and re-design phases.
Explain how to test an implemented technical solution including creating test plans, writing test scripts, and issuing fix or bug resolutions.
Explain how to conduct a post-implementation review including developing the Post-Implementation Review Report and the Post-Production Roadmap. SAP Technology Consultant Hands-on Project is the sixth course in the SAP Technology Consultant Professional Certificate program. This is your opportunity to put the knowledge and skills you have gained over the previous five courses into practice. This fun and interesting project is a high-level challenge based on a real-world problem. You’ll identify key players in the proposed project and take the necessary steps to understand their current technical landscape. You’ll identify their business requirements and develop a solution proposal. Once you’ve obtained sign off from the customer, you’ll then identify the key technology elements you need to cover and assess the stakeholders and other SAP professionals you’ll be working with. You’ll work on and present your design, including your assumptions, proposed recommendations, and other considerations. Then you’ll implement your proposed solution and complete QA/testing activities. And finish off by creating a Post-Implementation Review Report documenting the lessons learnt and the future roadmap.
Overall, this project presents an ideal opportunity to gain experience in assessing the digital transformation drivers in a real-life situation.
By the end of this project, you will be able to:
Review, understand and respond to a customer implementing a new SAP solution.
Complete typical technology consultant project tasks for each SAP lifecycle phase.
Develop and present selected technology consultant project deliverables.
Compare course project work against provided best practice examples and identify gaps or opportunities for development. Becoming a Certified SAP Professional is the seventh course in the SAP Technology Consultant Professional Certificate program. Now that you’ve completed the first 6 courses, including the project, you’ll spend time considering the next steps in your SAP career. You’ll explore different industries, portfolios, and domains. You’ll dig deep into available career development resources, build your resume, practice interviewing, and look at the jobs available in the market. You’ll spend time assessing what SAP learning journey you wish to pursue, including what certifications are required for which role. You’ll then create your own SAP career development plan, listing the actions you need to take to achieve your desired SAP role.
By the end of this course, you will:
Know the next steps you need to take to become an SAP professional.
Have a clear understanding of the different industries, portfolios, and domains you may want to specialize in as an SAP professional.
Know the SAP certification opportunities available on the SAP Learning Hub.
Be aware of other industry-standard technical certifications and how they can support and enhance your SAP credentials and experience.
Have clear guidance on writing CVs or resumes, undertaking interviews and positioning yourself as the best you can be. | 7 course series | Beginner level | 7 months (at 3 hours a week) | https://www.coursera.org/professional-certificates/sap-technology-consultant | null |
6,035 | Parallel Programming in Java | 47,710 | 4.6 | 1,208 | Vivek Sarkar | Rice University | ['Dataflow', 'Parallel Computing', 'Java Concurrency', 'Data Parallelism'] | This course teaches learners (industry professionals and students) the fundamental concepts of parallel programming in the context of Java 8. Parallel programming enables developers to use multicore computers to make their applications run faster by using multiple processors at the same time. By the end of this course, you will learn how to use popular parallel Java frameworks (such as ForkJoin, Stream, and Phaser) to write parallel programs for a wide range of multicore platforms including servers, desktops, or mobile devices, while also learning about their theoretical foundations including computation graphs, ideal parallelism, parallel speedup, Amdahl's Law, data races, and determinism. Why take this course?
• All computers are multicore computers, so it is important for you to learn how to extend your knowledge of sequential Java programming to multicore parallelism.
• Java 7 and Java 8 have introduced new frameworks for parallelism (ForkJoin, Stream) that have significantly changed the paradigms for parallel programming since the early days of Java.
• Each of the four modules in the course includes an assigned mini-project that will provide you with the necessary hands-on experience to use the concepts learned in the course on your own, after the course ends.
• During the course, you will have online access to the instructor and the mentors to get individualized answers to your questions posted on forums.
The desired learning outcomes of this course are as follows:
• Theory of parallelism: computation graphs, work, span, ideal parallelism, parallel speedup, Amdahl's Law, data races, and determinism
• Task parallelism using Java’s ForkJoin framework
• Functional parallelism using Java’s Future and Stream frameworks
• Loop-level parallelism with extensions for barriers and iteration grouping (chunking)
• Dataflow parallelism using the Phaser framework and data-driven tasks
Mastery of these concepts will enable you to immediately apply them in the context of multicore Java programs, and will also provide the foundation for mastering other parallel programming systems that you may encounter in the future (e.g., C++11, OpenMP, .Net Task Parallel Library). Welcome to Parallel Programming in Java! This course is designed as a three-part series and covers a theme or body of knowledge through various video lectures, demonstrations, and coding projects. 1 video5 readings1 programming assignment1 discussion prompt In this module, we will learn the fundamentals of task parallelism. Tasks are the most basic unit of parallel programming. An increasing number of programming languages (including Java and C++) are moving from older thread-based approaches to more modern task-based approaches for parallel programming. We will learn about task creation, task termination, and the “computation graph” theoretical model for understanding various properties of task-parallel programs. These properties include work, span, ideal parallelism, parallel speedup, and Amdahl’s Law. We will also learn popular Java APIs for task parallelism, most notably the Fork/Join framework. 7 videos6 readings1 assignment1 programming assignment Welcome to Module 2! In this module, we will learn about approaches to parallelism that have been inspired by functional programming. Advocates of parallel functional programming have argued for decades that functional parallelism can eliminate many hard-to-detect bugs that can occur with imperative parallelism. We will learn about futures, memoization, and streams, as well as data races, a notorious class of bugs that can be avoided with functional parallelism. We will also learn Java APIs for functional parallelism, including the Fork/Join framework and the Stream API’s. 7 videos6 readings1 assignment1 programming assignment Join Professor Vivek Sarkar as he talks with Two Sigma Managing Director, Jim Ward, and Software Engineers, Margaret Kelley and Jake Kornblau, at their downtown Houston, Texas office about the importance of parallel programming. 2 videos1 reading Welcome to Module 3, and congratulations on reaching the midpoint of this course! It is well known that many applications spend a majority of their execution time in loops, so there is a strong motivation to learn how loops can be sped up through the use of parallelism, which is the focus of this module. We will start by learning how parallel counted-for loops can be conveniently expressed using forall and stream APIs in Java, and how these APIs can be used to parallelize a simple matrix multiplication program. We will also learn about the barrier construct for parallel loops, and illustrate its use with a simple iterative averaging program example. Finally, we will learn the importance of grouping/chunking parallel iterations to reduce overhead. 7 videos6 readings1 assignment1 programming assignment Welcome to the last module of the course! In this module, we will wrap up our introduction to parallel programming by learning how data flow principles can be used to increase the amount of parallelism in a program. We will learn how Java’s Phaser API can be used to implement “fuzzy” barriers, and also “point-to-point” synchronizations as an optimization of regular barriers by revisiting the iterative averaging example. Finally, we will also learn how pipeline parallelism and data flow models can be expressed using Java APIs. 7 videos7 readings1 assignment1 programming assignment The next two videos will showcase the importance of learning about Concurrent Programming and Distributed Programming in Java. Professor Vivek Sarkar will speak with industry professionals at Two Sigma about how the topics of our other two courses are utilized in the field. 2 videos1 reading | 7 modules | Intermediate level | null | https://www.coursera.org/learn/parallel-programming-in-java | 94% |
6,036 | Cybersecurity and Privacy | 2,537 | 4.7 | 46 | Microsoft | Microsoft | ['Virtual Private Network (VPN)', 'Cybersecurity', 'Password Management', 'Privacy settings', 'Multi-Factor Authentication'] | This course has been designed for individuals seeking entry-level positions in IT support. Whether you're a recent graduate, a career changer, or someone looking to kickstart your career in the tech industry, it will provide you with the foundational knowledge and practical skills needed to excel in this field. In this course, you’ll explore the fundamentals of implementing cybersecurity concepts to ensure user data privacy. Topics include the implementation of password management across various applications, including operating systems, browsers, and mobile devices. In this course, you will also delve into virtual private networks (VPNs) and how they can enhance security as well as network optimization. Addressing security considerations in diverse computing environments, including on-premises and cloud infrastructures, is also a key focus of the course.
After completing this course, you’ll be able to:
- Apply strategies for digital security and privacy management
- Evaluate and implement cybersecurity measures
- Describe elements of various computing environments
This is also a great way to prepare for the Microsoft MS-900 exam. By passing the MS-900 exam, you’ll earn the Microsoft 365 Fundamentals certification. In this module, you'll explore the critical aspects of digital security and privacy. This module offers an in-depth understanding of creating robust passwords, the use of advanced password management tools, and the intricacies of privacy settings in today's digital landscape. You'll delve into the practicalities of managing password storage solutions, including keychains and password managers, and gain insights into ensuring their digital credentials are secure and easily manageable. Through a mix of theoretical knowledge and hands-on activities, the module equips you with essential skills for maintaining digital security and privacy, addressing common challenges and providing best practices for a safer online experience. 11 videos11 readings7 assignments1 discussion prompt Cybersecurity concepts provides an in-depth look at essential topics in cybersecurity, including network traffic, VPNs, and server communication. This module covers the mechanics and management of network traffic, the implementation and security of VPNs, and the principles of server communication. With a focus on both theoretical understanding and practical application, you'll gain insights into securing digital communications and optimizing network performance. 9 videos10 readings7 assignments In Computing environments, you'll explore the diverse landscapes of on-premises computing, cloud services, and server communication. This module offers a deep dive into the architectures, operations, and security aspects of different computing environments. From the nuances of managing on-premises infrastructure to navigating the evolving world of cloud computing and ensuring secure server communication, this module equips you with the knowledge and skills to make informed decisions and implement effective solutions in varied IT environments. 12 videos7 readings7 assignments This module focuses on applying the comprehensive cybersecurity knowledge you gained from previous modules into a practical, real-world project. This project module challenges you to integrate various aspects of cybersecurity - from data protection to network security - into a coherent, actionable plan. Through this module, you will demonstrate your ability to devise and implement effective security strategies, addressing both technical and organizational aspects of cybersecurity. 2 videos2 readings3 assignments1 discussion prompt1 plugin | 4 modules | Beginner level | 17 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/cybersecurity-and-privacy | null |
6,037 | Secure Full Stack MEAN Developer | 8,027 | 4.6 | 80 | EC-Council | EC-Council | ['Mongodb', 'Web Development', 'Angularjs', 'MEAN Stack Development', 'Dependency Injection System'] | MEAN stack development is a modern approach to building dynamic web applications. It is an open-source JavaScript framework that harnesses four major technologies: MongoDB, Express, Angular, and Node.js. Given the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development. The course will begin with teaching you how to build your own application with plain JavaScript and the fundamentals of web development (HTML, CSS, and JavaScript). You will understand how Node can be used to execute JavaScript code at the back end and the powerful applicability of Node when used with the Express framework and MongoDB. Further, you will learn how to use the front-end framework with Angular for building client applications and user interfaces. Later, you will become familiar with building REST APIs with tools such as Postman and SoapUI.
By the end of this course, you will be able to successfully build secure web applications with the most advanced and updated JavaScript frameworks. In this module, To begin with, you will understand the goals, objectives, and summary of the entire course. You will get to know the author, his areas of expertise and his accomplishments. Later, you will explore Visual Studio Code, its installation process and how to set it up for your coding environment. You will start learning about the MEAN stack from the most fundamental element, which is MEAN Stack Architecture. 4 videos3 assignments In this section, you will walk through the most integral part of the MEAN Stack, i.e. Node.js. You will get your hold on its installation process. You will also get to learn many significant parameters of Node.js like Node.js module, event loops, Node.js HTTP module, how to create servers and work with them. 12 videos8 assignments In this module, you will start learning about the Express framework the installation process. You will understand the most basic functionalities like testing your framework. You will get a hold on how to create various pages in Express, how to delete the data. Finally, you will master the concept of REST APIs. 14 videos7 assignments In this module, you will start learning about MongoDB, a NoSQL database and its installation process. You will get hold on how to use MongoDB Compass, shell interface. You will learn how you can establish a connection with MongoDB Database 6 videos7 assignments Moving on to the most intersting part, in this module, you will learn and play with the CRUD (Create, Read, Update, Delete) operations of the database. You'll have fun playing withthe data by applying various sorts of command to segment or retrieve the data 4 videos5 assignments In this module, you will grasp all the fundamental concepts of front end development. You'll start by understanding Angular.Js, its key funtions and elements. You will also learn how to work woth Angular.Js, create its file structure. This section will make sure that you learn code in Angular like a pro. 11 videos9 assignments In this module, you will learn the configuration process of the front end. This section involves a detailed break down where you will know how to configure the aspects like navigations, templates. You will also work with forms and get to know how the data validation if performed. 5 videos5 assignments This section involves a lot of detailed study of CRUD operations. Learn how to read,write amd manipulate the database to retrieve the information as per your requirements. Understand the concept of dependeny injections, why they are needed and how they work. 5 videos6 assignments Get to know the final takeaways of the course. Get your hands dirty with fun and simple exercises. 1 video | 9 modules | Beginner level | 24 hours to complete (3 weeks at 8 hours a week) | https://www.coursera.org/learn/secure-full-stack-mean-developer | null |
6,038 | Water Security & Stewardship | Enrollment number not found | Rating not found | null | Erin Wilson | PepsiCo | [] | In order to access this course without a fee, please follow the below steps: 1. Click the blue ‘Enroll’ button
2. At the bottom of the pop-up window, click the ‘Audit the course’ option
3. For more information on auditing a course, please see details in this Learner Help Center article: https://www.coursera.support/s/article/209818613-Enrollment-options?language=en_US
In this course, spread over ten modules, participants will learn about:
• the water cycle
• hydrology
• groundwater models
• human impacts on freshwater ecosystems
• water governance
• water law
• the economics of water infrastructure
• scenario planning and municipal water 1 video1 reading2 assignments5 plugins 3 assignments5 plugins 4 assignments13 plugins 1 assignment1 peer review | 4 modules | Beginner level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/water-security-stewardship | null |
6,039 | Responsible Medication Prescribing for Older Adults | Enrollment number not found | 4.8 | 21 | Martine Sanon | Icahn School of Medicine at Mount Sinai | [] | Older adults are more likely to consume more prescription and non-prescription medications, and this can place them at high risk for unintended harmful effects. An important component of the care of older adults relates to medication management. This course offers healthcare professionals and learners a comprehensive understanding of the physiological changes that occur with aging and their implications on medication management. It aims to equip participants with essential knowledge and skills to ensure safe and appropriate prescribing for older adults. Through a series of engaging presentations, attendees will explore key concepts in pharmacology, evidence-based frameworks, and interdisciplinary practical strategies to optimize prescribing practices and enhance patient care across the continuum of care sites. Older adults are more likely to consume more prescription and non-prescription medications, and this can place them at high risk for unintended harmful effects. An important component of the care of older adults relates to medication management. This course offers healthcare professionals and learners a comprehensive understanding of the physiological changes that occur with aging and their implications on medication management. It aims to equip participants with essential knowledge and skills to ensure safe and appropriate prescribing for older adults. Through a series of engaging presentations, attendees will explore key concepts in pharmacology, evidence-based frameworks, and interdisciplinary practical strategies to optimize prescribing practices and enhance patient care across the continuum of care sites.
This introductory module will introduce the Geriatric 5Ms framework and then discuss the basic science concepts of pharmacokinetics and pharmacodynamics as it relates to medication management in older adults. It will emphasize the importance of calculating accurate renal function in older adults and explore the reasoning behind the prescribing mantra “Start Low and Go Slow” in older people. It will highlight the special considerations of medication prescribing in older adults with certain geriatric syndromes like frailty, dementia and multimorbidity. 2 videos4 readings1 assignment This module will delve into key concepts and definitions of polypharmacy, adverse drug events (ADE), prescribing cascades and medication nonadherence. The module will explore types of ADEs using examples of drug-drug, drug-disease and drug-herbal interactions, and highlight the impact of ADEs on morbidity and mortality. These will serve as foundational knowledge for course participants in building their skill and behavior on safe prescribing for older adults, as they navigate through the rest of the modules of the course. 1 video1 assignment This module will identify tools and strategies to reduce inappropriate prescribing including smart phone applications, physical adherence aids and guidelines such as the AGS Beers criteria. It will also introduce a Hierarchy of Medication Evaluation which can help prescribers assess medications before they prescribe them. Patient case examples will be used to apply the concepts of rationale prescribing and deprescribing. 1 video1 assignment Older adults are more likely to experience more complex care transitions within the health care system and require additional support to address issues such as polypharmacy and adverse drug effects. This module will explore the essential components involved in safe care transitions between different settings of care for older patients. It will emphasize the role of interdisciplinary teams in ensuring seamless transitions and effective information sharing. Additionally, this module will introduce practical tools to guide clinicians in safe prescribing practices for this vulnerable patient population. 1 video1 assignment Medication management in older adults is complex and requires careful consideration to address issues such as polypharmacy and adverse drug effects. In this final module of the course, participants will review several case-based scenarios to apply concepts learned in previous modules of this course and integrate the Geriatric 5Ms framework and American Geriatrics Society (AGS) and American Society of Clinical Pharmacists (ASCP) Choosing Wisely recommendations to help guide clinical decisions related to medical management for older adults. 1 video1 assignment | 5 modules | Advanced level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/medication-prescribing | null |
6,040 | Case Studies in Personalized Medicine | 34,001 | 4.8 | 484 | Dan Roden, M.D. | Vanderbilt University | [] | Learn how advances in biomedicine hold the potential to revolutionize drug development, drug treatments, and disease prevention: where are we now, and what does the future hold? This course will present short primers in genetics and mechanisms underlying variability in drug responses. A series of case studies will be used to illustrate principles of how genetics are being brought to bear on refining diagnoses and on personalizing treatment in rare and common diseases. The ethical and operational issues around how to implement large scale genomic sequencing in clinical practice will be addressed. After completing this course, learners will understand
1. The ways in which genetic variants can contribute to human disease susceptibility
2. How to choose among drug therapies based on genetic factors
3. That the functional consequences of the vast majority of genetic variants discovered by modern sequencing are unknown.
This course is targeted primarily at physicians 5+ years out of training. Other healthcare providers, medical/health sciences students, and members of the public may also be interested.
Course launches January 15, 2016.
* The information presented in “Case Studies in Personalized Medicine” is offered for educational and informational purposes only, and should not be construed as personal medical advice. If you have questions or concerns about a medical matter, please consult your doctor or other professional healthcare provider. The first module of this course will focus on introducing the concept of personalized medicine. We will very briefly review fundamentals of genetics as these apply to personalized medicine (DNA structure; RNA; protein structures; function of DNA; coding; DNA variations; types of genetic variants), as well as review statistical concepts and skills important to clinical data analysis (odds ratios, relative risk, P values, multiple testing, sensitivity, specificity, ROCs). In Module 2 we will explore drug actions and reactions as we look closely at the general mechanisms underlying variability in drug responses, drug metabolism and transport, and genetic variability in drug-handling molecules. 11 videos1 reading1 assignment5 discussion prompts Module 3 focuses on how we study genetic variation. We'll start by looking at families and populations. Topics that will be introduced include family history and inheritance patterns, ancestry, and linkage. Then in Module 4 we shift our focus to studying the contemporary techniques and technologies used to study genetic variation, including genome-wide association and sequencing. 7 videos1 assignment4 discussion prompts In Module 5 we will begin to discuss specific cases as these apply to personalized medicine. We will first look very closely at a case of familial hypercholesterolemia as we investigate how we use genomic medicine to move from a rare disease to a common medication, using genomics to find new drug targets, and a discussion of the side effects of statin therapy. In Module 6 we will look at a collection of "high risk pharmacogenetics"cases that illustrate adverse reactions due to drug metabolism and variable drug responses. 13 videos1 assignment4 discussion prompts Module 7 continues our focus on case studies with a look at some cases that illustrate how personalized medicine informs treatment decisions related to specific diseases/conditions. These include cystic fibrosis, Marfan syndrome, heart failure, neuropsychiatric diseases, and diabetes. Three cases/lessons focus specifically on how genomic medicine informs testing for and treatment of cancer. 9 videos1 assignment4 discussion prompts Module 8 serves as a review and a continuing discussion of the cases presented in Modules 5-7, as we take a look at where we are now and what's on the horizon in personalized medicine. In Module 9 we will explore some critical considerations for implementing and operationalizing personalized medicine in a system of care, particularly in the area of informatics. We will discuss the role of the electronic medical record in a learning healthcare system, how electronic records support discovery, and using electronic records in the delivery of personalized medicine. 9 videos1 assignment3 discussion prompts We are on the verge of having patients come to their physicians with their entire genome sequenced. How can we best use this information to improve care? This course looks closely at many specific genetic variants that have been identified as playing a role in a person’s susceptibility to disease and/or potential for adverse reaction to certain substances/drugs.
In the peer review activity below, please reflect on how your learning in this course has impacted your understanding of personalized medicine. There are two versions of this activity – one for healthcare professionals (doctors, nurses, pharmacists, medical students, etc.), and one for non-healthcare professionals (patients, consumers, general interest, etc.)
Please be sure to choose the appropriate version of the activity. 2 peer reviews | 6 modules | null | 18 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/personalizedmed | 98% |
6,041 | Determining AI Needs | Enrollment number not found | 4.3 | 23 | Candace Savonen, MS | Fred Hutchinson Cancer Center | ['Artificial Intelligence (AI)', 'Project Planning'] | There are a ever increasing number of options, strategies and solutions for integrating AI solutions into a project. It can feel overwhelming to understand what these options entail let alone understand how to decide what solution best fits a use case. In this course we aim to give individuals the basic info they need to make basic plans for integrating AI tools into their project.
The course is intended for individuals who have an AI related project in mind or think that they might need to incorporate AI into their project. They are likely the leader who is guiding others in an AI related project and not necessarily the person who will write code or carry out the technical aspects of the project. This course is designed to equip participants with resource and project considerations when undertaking any AI project. Participants will gain an understanding of the decision-making process between adopting pre-built AI products and constructing custom models, taking into account project complexity and customization requirements. 9 videos8 readings7 assignments5 discussion prompts | 1 module | Intermediate level | 3 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/determining-ai-needs | null |
6,042 | Ferrous Technology II | 7,916 | 4.8 | 313 | Kim, Sung-Joon | Pohang University of Science and Technology(POSTECH) | [] | Steel, ever-evolving material, has been the most preeminent of all materials since it can provide wide range of properties that can meet ever-changing requirements. In this course, we explore both fundamental and technical issues related to steels, including iron and steelmaking, microstructure and phase transformation, and their properties and applications. In the following 3 courses, microstructure and phase transformation in steels will be discussed in detail with specific examples. This course in particular, covers the basic terminology, general explanation on iron-carbon system and concepts you must know to understand the phase transformation of steels. 4 videos1 assignment This course explains the non-equilibrium microstructure, and related displacive transformation in steels. Phenomenological theory on martensite transformation will be introduced, and other concepts such as Ms temperature and bainite microstructure will be covered as well. 4 videos1 assignment Material design based on alloying is covered in this course. Role of alloying elements in steels with respect to the control of microstructure and mechanical properties will be discussed in detail. Influence of alloying elements on phase stability, transformation kinetics, and strengthening of steels is discussed. 4 videos1 assignment In the following 3 courses, different types of steels will be introduced with their properties and applications. This course typically covers some of the first generation steels containing conventional low strength steels and HSLA (high strength low alloy) steels. Detailed explanation on the microstructures and related properties will be treated. 4 videos1 assignment Characteristics of acicular ferrite, micro-alloyed carbon steels, and multiphase steels will be discussed with information on their production and applications. Martensitic steels and effect of various heat treatments will also be discussed. 5 videos1 assignment This course introduces advanced steels such as TWIP steels, and light weight steels, and explains some other steels of pearlitic steels, Si steels and tool steels. Also, property requirements for automobile parts and low temperature applications are treated. 4 videos1 assignment This course covers from the fundamental aspects to the production, physical metallurgy, corrosion and mechanical properties of stainless steels. Detailed explanation on the microstructures, corrosion and mechanical properties of different types of stainless steels will be treated. 4 videos1 assignment | 7 modules | Beginner level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/ferrous-technology-2 | null |
6,043 | Quantum Optics 1 : Single Photons | 27,207 | 4.8 | 321 | Alain Aspect | École Polytechnique | [] | This course gives you access to basic tools and concepts to understand research articles and books on modern quantum optics. You will learn about quantization of light, formalism to describe quantum states of light without any classical analogue, and observables allowing one to demonstrate typical quantum properties of these states. These tools will be applied to the emblematic case of a one-photon wave packet, which behaves both as a particle and a wave. Wave-particle duality is a great quantum mystery in the words of Richard Feynman. You will be able to fully appreciate real experiments demonstrating wave-particle duality for a single photon, and applications to quantum technologies based on single photon sources, which are now commercially available. The tools presented in this course will be widely used in our second quantum optics course, which will present more advanced topics such as entanglement, interaction of quantized light with matter, squeezed light, etc... So if you have a good knowledge in basic quantum mechanics and classical electromagnetism, but always wanted to know:
• how to go from classical electromagnetism to quantized radiation,
• how the concept of photon emerges,
• how a unified formalism is able to describe apparently contradictory behaviors observed in quantum optics labs,
• how creative physicists and engineers have invented totally new technologies based on quantum properties of light,
then this course is for you. In this first lesson, you will discover what is canonical quantization, apply it to the quantization of a single mode of the electromagnetic field, and find that it behaves as a quantum harmonic oscillator. The notion of photon will then naturally emerge, as well as the weird but fundamental notion of vacuum fluctuations. 13 videos3 readings10 assignments In this lesson, you will discover how the quantum optics formalism leads to the particle-like behaviour of a one photon wave-packet. For this, you will have to learn the quantum optics expressions of the simple and joint photodetection signals. A comparison with the semi-classical expressions will illustrate the necessity of quantum optics. 7 videos2 readings5 assignments In this lesson, you will address the fascinating question of a single photon interfering with itself, by calculating the interference pattern for a single photon launched into a Mach-Zehnder interferometer. In order to do it you will first learn how to treat a beam-splitter in quantum optics, a very important tool that you need to know. You will also learn that when you want to describe an optical instrument in quantum optics, it is very useful to master its classical optics description. This lesson is an opportunity to think about the mysterious concept of wave-particle duality, and about the power of the quantum formalism, which can deal consistently with two behaviours apparently contradictory . 6 videos3 readings4 assignments In the real world there is nothing like purely monochromatic radiation. A correct description of radiation necessarily involves several modes. In this lesson, you will learn how canonical quantization can be easily generalized to the case of several modes, and how various observables or important quantities introduced in the single mode case are expressed in the multimode case. Beyond the formalism that you must learn to be able to read papers and books describing real situtations, you will encounter in this lesson some intriguing features of the quantum formalism: firstly, the unbelievably large size of the space of states, which is the reason for the unlimited potential power of quantum information; secondly, the question of infinities, a problem which was solved by the general procedure of renormalization. Note that optional readings are proposed as resources of some lectures. 8 videos3 readings2 assignments One photon sources are important components in quantum optics, both in research laboratories and in applied quantum technologies. The lesson of this week will present the various kinds of one-photon sources available today, from heralded one photon sources to one photon sources on demand. You will learn how to use the multimode formalism presented in a previous lesson, to describe one-photon wave packets, in particular in the case of a spontaneously emitted photon. You will start with the presentation of a theoretical tool much used in quantum optics, the Heisenberg formalism. It will allow you to discover the formula expressing the probability of a double detection at two different times. You will also learn some `tricks of the trade' about Fourier transforms. 7 videos2 readings1 assignment You are now ready to develop the description of a real experiment , which was the first one to reveal directly the dual nature -- wave and particle, of a real single photon wave-packet. You will not only be able to describe, with the formalism you have learned, both the particle-like and the wave-like behaviors, but you will also see how to take into account the features of a real experiment, which is never perfect. Last and not least, we will have the opportunity to think about the notions of wave-particle duality and complementarity, which should be not confused, and about thethe statement of Feynman, who named wave-particle duality “a great quantum mystery”. I will try to convince you that when one identifies a mysterious behavior, one should not complain, but rather explore the possibility that something new and interesting can emerge from that mystery. 8 videos2 readings2 assignments In this lesson, you will discover two quantum technologies based on one photon sources. Quantum technologies allow one to achieve a goal in a way qualitatively different from a classical technology aiming at the same goal. For instance, quantum cryptography is immune to progress in computers power, while many classical cryptography methods can in principle be broken when we have more powerful computers. Similarly, quantum random number generators yield true random numbers, while classical random number generators only produce pseudo-random numbers, which might be guessed by somebody else than the user. This lesson is also an opportunity to learn two important concepts in quantum information: (i) qubits based on photon polarization; (ii) the celebrated no-cloning theorem, at the root of the security of quantum cryptography. 7 videos1 reading2 assignments | 7 modules | null | 33 hours to complete (3 weeks at 11 hours a week) | https://www.coursera.org/learn/quantum-optics-single-photon | 96% |
6,044 | Learning Experience Design: Development and Evaluation | Enrollment number not found | 4.5 | 11 | Rebecca Quintana, PhD | University of Michigan | ['Professional Development', 'Content Creation', 'Evaluation', 'Instructional Design', 'Design Strategies'] | Development and Evaluation allows you to build on your knowledge of how people learn and use your understanding of learning design frameworks to bring your own learning designs to life! As you conceptualize assessment as a communication tool, you’ll consider the role of diagnostic, formative, and summative assessments. Look at different assessment formats and how learners can use them to show what they know. Using ideas from cognitive science and multimedia theories, explore how to create engaging and effective content for learners. Most importantly, you’ll think about evaluation approaches to understand the efficacy of your designs for learning, including formative, summative, and confirmative. This course includes an immersive activity to give you a taste of what it is like to independently meet with and consult for project stakeholders. At the conclusion of the course and the series, you’ll turn your attention again to cultivating your identity as a learning experience designer and consider how you can showcase your skills through a learning experience design professional portfolio. In Week 1 of the course, you’ll explore ideas around designing media that can support learning. You will start by discussing a theoretical perspective on multimedia learning: the dual-channel assumption. This will be the basis for a number of multimedia design principles that you can use and explore to help you effectively develop multimedia content for learning experiences. You will also consider content creation from another perspective: accessibility. You will look at resources on accessibility that can help you think about how to ensure that the content you create is accessible along multiple dimensions to support a wide range of learners. 4 videos10 readings2 assignments2 app items3 discussion prompts In Week 2 of the course, you’ll focus on different aspects of assessment and the role it plays in learning experience design. You will look at the definition assessment to contrast it with the definition of evaluation to help you see the purpose of assessment in your designs. You will then look at different types of assessment, what roles each of those play, and approaches to designing assessments. Finally, you will look at rubrics and approaches for designing rubrics as assessment tools. All of this will help you see how assessment can help you refine and describe the ultimate learning impacts of your designs. 6 videos6 readings3 assignments1 app item2 discussion prompts In Week 3 of the course, you’ll now transition to exploring evaluation and the role that it plays in learning experience design. Building on the previous lesson’s distinction with assessment, here you will look at evaluation in more detail along with the rationale for evaluation when you are designing for learning. You will look at different types of evaluation and what you gain from each approach. You will then look at some evaluation frameworks that can help you see why and how to measure the quality of your designs. 6 videos9 readings2 assignments2 app items3 discussion prompts In Week 4 of the course, you’ll focus on entering the professional practice of learning experience design. You will review different career paths that connect with different aspects of learning experience design, and take a look at where the field might be headed to help you think about what direction you might want to pursue to move towards your own professional aspirations. You will also work on developing your own professional portfolio, where you can see how portfolios are used to convey your work and skill sets, and to help you start thinking about communicating your growing skills as a learning experience designer. 1 video4 readings1 peer review2 discussion prompts | 4 modules | Beginner level | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/learning-experience-design-development-and-evaluation | null |
6,045 | Introduction to Environmental Law and Policy | 83,432 | 4.8 | 2,992 | Donald Hornstein | The University of North Carolina at Chapel Hill | ['Environmental Law', 'Common Law', 'Law', 'Environmental Protection'] | Environmental law may be the one institution standing between us and planetary exhaustion. It is also an institution that needs to be reconciled with human liberty and economic aspirations. This course considers these issues and provides a tour though existing legal regimes governing pollution, water law, endangered species, toxic substances, environmental impact analyses, and environmental risk. Note: The Environmental Law & Policy Course will close for new learner enrollment on February 22, 2019. Learners who have already enrolled will continue to see it on their Coursera Dashboard as long as they remain enrolled in the course. If you are currently enrolled in this course, please see the announcement sent on February 19, 2019, for additional details. As the course does not presume any previous knowledge of the law or legal experience, it begins by teaching students how to “read” cases, to learn from judicial opinions in real-life disputes how judges articulate and apply legal principles. We focus on the law of nuisance, starting with cases involving simple disputes between neighbors, and then move to cases involving air and water pollution and even a very recent case on the introduction of exotic species into a river system! We end the week, as we’ll end every week, with a session spent on legal theory and policy, considering, this week, the relative strengths and weakness of the court system as an institution addressing environmental problems, in comparison to other institutions such as administrative regulators and the free-market system. 7 videos3 readings1 assignment It’s impossible to understand environmental law without also understanding the important role that private property plays in people’s lives and the way in which property law recognizes these values. After using two cases involving property rights to water to introduce ourselves to property law, we’ll use the American constitutional approach to “takings” of property to determine when governments are forced to pay property-holders when environmental requirements infringe too much on private property rights. These cases are at the crux of an evolving philosophical dispute between whether we look at land merely as a personal commodity or as part of larger ecosystems that, often, demand recognition and require changes in personal behavior. In our “theory” session, we’ll introduce ourselves to a very powerful and famous economic model, the tragedy-of-the-commons model, that explains why markets often cannot adequately protect commonly held resources such as the oceans and atmosphere, and how legal regimes may be needed to correct the problem. We also post this week a peer-review essay exercise, which is mandatory for students wishing to obtain a Statement of Accomplishment with Distinction. 7 videos4 readings1 assignment1 peer review This week we start with perhaps the most influential American environmental statute ever enacted, the National Environmental Policy Act ("NEPA"), and its requirement for environmental impact analysis of certain actions that might significantly affect the environment. Over 70 countries have enacted programs similar to this one. Then, we study perhaps the strongest American environmental statute ever enacted, the federal Endangered Species Act (“ESA”) and study cases under the ESA that are, among other things, at the cutting edge in the tension between private property and environmental protection. In our theory session, we begin to discuss issues of politics and political economy, and consider a range of topics in the political economy of environmental law. 7 videos3 readings1 assignment This week we shift from land-use-related issues to the central role that “risk” plays in the regulation of toxic substances, pollution-control, and environmental law generally. We begin with an analysis of a regulatory decision involving 2,4,5-T, the active ingredient in herbicides (and in the notorious “Agent Orange” herbicide used by the United States in the Vietnam War), and learn how concerns over the “risk” of harm amplify the power of environmental law. We then analyze the role risk played in an ongoing dispute between the United States and Canada (on the one hand) and the European Community (on the other) over synthetic growth hormones given to cattle in North America. We shift to considerations of risk in the clean-up of sites contaminated with hazardous substances under a famous American statute, the so-called “Superfund” statute. in our theory session, we look at two economic dimensions of risk that explain why people rationally concern themselves with worst-case possibilities and also concern themselves with how risk is fairly (or unfairly) distributed. 7 videos3 readings1 assignment This week, we pivot mostly into issues involving fresh water and water pollution, but not before continuing our discussion of risk distribution by exploring further the concept of environmental justice. We start with legal approaches to transboundary shipments of waste, using both the United States and international trade as case histories, using both examples to illustrate the challenge posed to environmental law by claims of environmental racism and injustice. Shifting to drinking water, we introduce ourselves to the American Safe Drinking Water Act and to recent United Nations measures articulating a human right to drinking water, and also consider the worldwide phenomenon of hydraulic fracturing (“fracking”) and its intersection with fresh water resources. We introduce ourselves to the technology-based regulatory design of the American Clean Water Act. In our theory session, we explore the concept of economic cost-effectiveness and its role in pollution-control regimes generally and in the Clean Water Act in particular. We also see how this concept explains some of the interest in the design of “markets” for pollution control. This is also a week in which we post a research exercise, especially relevant for those interested in obtaining a Statement of Accomplishment with Distinction. 7 videos3 readings1 assignment This week, we continue discussing aspects of water-quality regulation, including especially elements other than the technology-based systems in the American Clean Water Act. We then shift to air-pollution control, not only introducing the environmental-quality-based philosophy of this landmark statute, but also explaining how it coordinates with common-law approaches to pollution that we studied at the very beginning of the course. We then introduce ourselves to the dawning era of greenhouse-gas regulation under both the Clean Air Act and embryonic international climate-change efforts. In our theory session, we highlight the strengths and weaknesses overall of current systems of environmental law, and underscore the need for more effective, more insightful, and more resilient systems. 7 videos3 readings1 assignment This module is optional. 3 readings1 assignment | 7 modules | null | 14 hours to complete (3 weeks at 4 hours a week) | https://www.coursera.org/learn/environmental-law | 99% |
6,046 | Systems Engineering and Program Management | 1,768 | 4.9 | 27 | William Van Atten | University of Colorado Boulder | ['Risk Management', 'System Engineering Planning', 'Test Plan', 'Systems Engineering', 'Cost Estimate'] | This course teaches the learner how to apply Systems Engineering to the overall management of a complex program. This includes tailoring the systems engineering process to the specific needs of a particular program. The risk management process is described, including how to identify risks and develop a mitigation strategy. The key management tools are described along with how the scope of a program is defined and managed according to the terms of the contract. This course can be taken for academic credit as part of CU Boulder’s Master of Engineering in Engineering Management (ME-EM) degree offered on the Coursera platform. The ME-EM is designed to help engineers, scientists, and technical professionals move into leadership and management roles in the engineering and technical sectors. With performance-based admissions and no application process, the ME-EM is ideal for individuals with a broad range of undergraduate education and/or professional experience. Learn more about the ME-EM program at https://www.coursera.org/degrees/me-engineering-management-boulder. We will begin Course 3 be examining the documentation that is sued to define the scope of a project and then manage to that scope. Unmanaged scope growth is detrimental to the performance of a program and is equally frustrating for both the customer and the supplier. Getting things carefully documented at the outset is key to the early identification of changes in scope. Lets look at the tools of the trade for keeping ourselves on task and focused on meeting the end user's needs. 8 videos5 readings3 quizzes1 discussion prompt In this module, we will learn about how to manage cost on a program. We will look at some considerations for creating a forecast and how to measure performance against the forecast. In the second half of the module, we will go over some contracting fundamentals. I don't want to make anyone into a Contracts Manager, but rather convey some top-level considerations on how various contract types impact behavior on the engineering team. 6 videos1 reading3 quizzes In this module, we will learn the process for managing risks and opportunities. Systems Engineers bring a lot to the table for this important task because they have been trained to look at things in terms of system-level impacts and with a lifecycle view. Our goal will be to learn how to develop actionable intelligence that will help your program mitigate the impact of realized risks or prevent their occurrence altogether. In the second half of the Module, we will learn about change management - both from a contractual standpoint as well as managing engineering changes, which are two distinct processes. 5 videos3 readings2 quizzes This module could be considered kind of depressing because it is about dealing with failures. However, a little bit of preparation can go a long way to helping the team recover from a disappointing outcome with dignity and professionalism. We will examine the process for establishing and conducting failure reviews. Thankfully, most failures are not terribly catastrophic, but even the more inconsequential failures can benefit from a rigorous investigative process. One of the most important, and often illusive aspects of dealing with a failure is identifying the root cause. We will spend some time learning about a handful of pragmatic tools to assist with this. 2 videos6 readings1 quiz | 4 modules | Beginner level | null | https://www.coursera.org/learn/systems-engineering-and-program-management | null |
6,047 | TensorFlow: Data and Deployment Specialization | 38,276 | 4.7 | 1,356 | Laurence Moroney | DeepLearning.AI | ['Tensorflow', 'Object Detection', 'Machine Learning', 'JavaScript', 'advanced deployment'] | Continue developing your skills in TensorFlow as you learn to navigate through a wide range of deployment scenarios and discover new ways to use data more effectively when training your machine learning models. In this four-course Specialization, you’ll learn how to get your machine learning models into the hands of real people on all kinds of devices. Start by understanding how to train and run machine learning models in browsers and in mobile applications. Learn how to leverage built-in datasets with just a few lines of code, learn about data pipelines with TensorFlow data services, use APIs to control data splitting, process all types of unstructured data, and retrain deployed models with user data while maintaining data privacy. Apply your knowledge in various deployment scenarios and get introduced to TensorFlow Serving, TensorFlow, Hub, TensorBoard, and more. Industries all around the world are adopting Artificial Intelligence. This Specialization fromLaurence MoroneyandAndrew Ngwill help you develop and deploy machine learning models across any device or platform faster and more accurately than ever. Looking for a place to start? Master the foundational basics of TensorFlow with theDeepLearning.AI TensorFlow Developer Professional CertificateOpens in a new tab. Looking to customize and build powerful real-world models for complex scenarios? Check out theTensorFlow: Advanced Techniques SpecializationOpens in a new tab. Applied Learning Project In the TensorFlow: Data and Deployment Specialization, you will learn to apply your knowledge in various deployment scenarios and get introduced to TensorFlow Serving, TensorFlow, Hub, TensorBoard, and more, implementing projects you can add to your portfolio and show in interviews. Train and run inference in a browser Handle data in a browser Build an object classification and recognition model using a webcam Prepare models for battery-operated devices Execute models on Android and iOS platforms Deploy models on embedded systems like Raspberry Pi and microcontrollers Perform efficient ETL tasks using Tensorflow Data Services APIs Construct train/validation/test splits of any dataset - either custom or present in TensorFlow Hub Dataset library - using Splits API Use different modules and functions of the TFDS API to prepare your data for training pipelines Identify bottlenecks in your input pipelines and increase your workflow efficiency by input parallelization Use TensorFlow Serving to do inference over the web Navigate TensorFlow Hub, a repository of models that you can use for transfer learning Evaluate how your models work and share model metadata using TensorBoard Explore federated learning and how to retrain deployed models while maintaining data privacy | 4 course series | Intermediate level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/tensorflow-data-and-deployment | null |
6,048 | English for Effective Business Communications | 4,884 | 4.8 | 100 | Karen Vallejo | University of California, Irvine | [] | In this course, we will delve into some business topics that illustrate how all company departments and teams need to work together to be successful. We will have some interesting topics learning vocabulary and ideas about human resources, management, and marketing. All of these departments need to work well together to avoid confusion and to be productive and efficient. We will also cover the very important topic of balancing our work tasks and our life outside of work. You will also learn about the language skills of passive voice, non-count nouns, making recommendations, and using dates and numbers in business situations. This week, you’ll learn about human resources—the ways that companies recruit, hire, and train their employees. We’ll think about how companies attract and keep the best people to make their organization successful and learn about job interviews and how to do well if you’re being interviewed. You’ll also hear a human resources professional discuss current trends and challenges in this important field. Finally, you’ll learn how to use passive voice sentences in many business situations. 6 videos3 readings6 assignments Management of people and teams is the focus of this week’s lesson. You will read about a challenge for a general manager and listen to passages about meetings and staff recognition. Through these passages, you will reinforce your management related vocabulary in English. You will also learn about how to use count and noncount nouns in business communication. 1 video6 readings5 assignments Marketing is our topic for this week. Analysis, planning, and promotion are major activities for a marketing team. We will read about basic ideas of marketing and listen to passages about the promotion and placement of products. We will also learn about how to speak, read, and write about numbers in American business contexts. 3 videos4 readings4 assignments This week, we’ll look at some very current topics in the world of work. You’ll learn about the benefits to both companies and employees when workers balance their lives to avoid stress and burnout. We’ll hear about why many companies are turning to remote or hybrid work and how this is becoming a part of the future of work. You’ll also learn useful ways to consider possible options and make recommendations. 3 videos5 readings8 assignments1 discussion prompt | 4 modules | null | 15 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/english-for-working-together-in-business | null |
6,049 | Discrete Mathematics | 53,836 | 3.3 | 188 | Dominik Scheder | Shanghai Jiao Tong University | [] | Discrete mathematics forms the mathematical foundation of computer and information science. It is also a fascinating subject in itself. Learners will become familiar with a broad range of mathematical objects like sets, functions, relations, graphs, that are omnipresent in computer science. Perhaps more importantly, they will reach a certain level of mathematical maturity - being able to understand formal statements and their proofs; coming up with rigorous proofs themselves; and coming up with interesting results.
This course attempts to be rigorous without being overly formal. This means, for every concept we introduce we will show at least one interesting and non-trivial result and give a full proof. However, we will do so without too much formal notation, employing examples and figures whenever possible.
The main topics of this course are (1) sets, functions, relations, (2) enumerative combinatorics, (3) graph theory, (4) network flow and matchings. It does not cover modular arithmetic, algebra, and logic, since these topics have a slightly different flavor and because there are already several courses on Coursera specifically on these topics. This module gives the learner a first impression of what discrete mathematics is about, and in which ways its "flavor" differs from other fields of mathematics. It introduces basic objects like sets, relations, functions, which form the foundation of discrete mathematics. 2 videos1 assignment2 peer reviews Even without knowing, the learner has seen some orderings in the past. Numbers are ordered by <=. Integers can be partially ordered by the "divisible by" relation. In genealogy, people are ordered by the "A is an ancestor of B" relation. This module formally introduces partial orders and proves some fundamental and non-trivial facts about them. 2 videos1 assignment1 peer review A big part of discrete mathematics is about counting things. A classic example asks how many different words can be obtained by re-ordering the letters in the word Mississippi. Counting problems of this flavor abound in discrete mathematics discrete probability and also in the analysis of algorithms. 3 videos1 assignment1 peer review The binomial coefficient (n choose k) counts the number of ways to select k elements from a set of size n. It appears all the time in enumerative combinatorics. A good understanding of (n choose k) is also extremely helpful for analysis of algorithms. 3 videos1 assignment2 peer reviews 1 video1 assignment2 peer reviews Graphs are arguably the most important object in discrete mathematics. A huge number of problems from computer science and combinatorics can be modelled in the language of graphs. This module introduces the basic notions of graph theory - graphs, cycles, paths, degree, isomorphism. 3 videos1 assignment2 peer reviews We continue with graph theory basics. In this module, we introduce trees, an important class of graphs, and several equivalent characterizations of trees. Finally, we present an efficient algorithm for detecting whether two trees are isomorphic. 3 videos1 assignment2 peer reviews Starting with the well-known "Bridges of Königsberg" riddle, we prove the well-known characterization of Eulerian graphs. We discuss Hamiltonian paths and give sufficient criteria for their existence with Dirac's and Ore's theorem. 2 videos1 assignment1 peer review We discuss spanning trees of graphs. In particular we present Kruskal's algorithm for finding the minimum spanning tree of a graph with edge costs. We prove Cayley's formula, stating that the complete graph on n vertices has n^(n-2) spanning trees. 2 videos1 assignment2 peer reviews This module is about flow networks and has a distinctively algorithmic flavor. We prove the maximum flow minimum cut duality theorem. 2 videos1 assignment1 peer review We prove Hall's Theorem and Kőnig's Theorem, two important results on matchings in bipartite graphs. With the machinery from flow networks, both have quite direct proofs. Finally, partial orderings have their comeback with Dilworth's Theorem, which has a surprising proof using Kőnig's Theorem. 3 videos1 peer review | 11 modules | Intermediate level | null | https://www.coursera.org/learn/discrete-mathematics | 82% |
6,050 | Information Systems Auditing, Controls and Assurance | 98,233 | 4.7 | 3,667 | Garvin Percy DIAS | The Hong Kong University of Science and Technology | ['Information Technology (IT) Management', 'Risk Management', 'Change Management', 'Information Security (INFOSEC)', 'Audit'] | The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year (2021 Edition) by Class Central (http://www.classcentral.com). ---
Information systems (IS) are important assets to business organizations and are ubiquitous in our daily lives.
With the latest IS technologies emerging, such as Big Data, FinTech, Virtual Banks, there are more concerns from the public on how organizations maintain systems’ integrity, such as data privacy, information security, the compliance to the government regulations. Management in organizations also need to be assured that systems work the way they expected. IS auditors play a crucial role in handling these issues.
In the course “Information Systems Auditing, Controls and Assurance”, you will explore risks of information systems, and how to mitigate the risks by proper IS Controls. You will also get familiar with the IS Audit procedures and how they are applied during the IS development throughout the Systems Development Life Cycle (SDLC).
Finally, you will get to observe how we can make the system changes more manageable using formal IS Management practices, such as Change Management Controls and Emergency Changes.
The conversations between the course instructor - Prof. Percy Dias, and the IS auditing practitioner will give you a concrete idea on how IS auditors perform their duties, the qualities to become IS auditors and future prospects of IS auditing industry.
This course is suitable for students and graduates from Information Systems, Information Technology and Computer Science, and IT practitioners who are interested to get into the IS auditing field. It is also a good starting point for learners who would like to pursue further studies for IS audit certifications – such as Certified Information Systems Auditor (CISA). IS Auditing is related to risks, controls and assurance. In the first module, Prof. Dias introduces what risk is about. Getting deeper to risk, the 3-step risk management process is elaborated. To manage risks, controls need to be established. Prof. Dias also demonstrates with daily examples on what the controls are. 8 videos2 readings1 assignment You may have heard of financial auditing, do you know the difference between IS auditing and financial auditing? You are going to explore more about IS auditing through the conversation between Prof. Dias and the IS audit practitioner. Prof. Dias then explains the general IS audit procedures and two major testings that IS auditors/compliance officers have to conduct. Prof. Dias also explains the procedure to obtain evidence in order to produce justified audit reports. 5 videos1 reading2 assignments IT practitioners develop business applications following the Systems Development Life Cycle (SDLC). IS auditors are in place to ensure the controls are implemented to mitigate the risks of developing application systems throughout the SDLC. Prof. Dias is going to review what IT practitioners usually do, and further elaborate the role that IS auditors play in different phases of SDLC. 9 videos1 reading1 assignment Information systems seldom remain static, it is common for users to make change requests to add new features, or refine existing functions some time after the information system launches. Organizations should follow a formal procedure to make the changes in their systems manageable. Prof. Dias is going to give you an overview on the change management controls which organizations should follow. Different kinds of maintenance practices, and Emergency Controls are also discussed in this module. Finally, Percy's conversations with the IS audit practitioner give you better insights on the future development of IS audit and how IS audit support the newly emerged FinTech industry. 8 videos2 readings1 assignment | 4 modules | Beginner level | null | https://www.coursera.org/learn/information-systems-audit | 98% |
6,051 | Construction Aspects of Formwork | Enrollment number not found | Rating not found | null | Subject Matter Expert | L&T EduTech | ['Students will be able to comprehend the construction aspects of Formwork System, Scaffolding'] | The "Construction Aspects of Formwork" course offers a concise yet comprehensive overview of formwork planning, modular formwork, and its applications, blending theoretical knowledge with practical applications. In Module 1, we will delve into crucial aspects of formwork planning and monitoring, aiming to enhance productivity and improve construction processes. Module 2 provides a thorough understanding of modular and aluminum formwork systems, highlighting their practical applications and advantages. Module 3 focuses on formwork assembly for wall and column panels, covering erection, inspection, safety, and correction techniques. In Module 4, learners explore scaffolding aspects, including installation sequence, innovation, and global practices, ensuring a well-rounded understanding of construction formwork. Upon completing the "Construction Aspects of Formwork" course, learners will acquire a comprehensive understanding of formwork planning, modular formwork, and its practical applications. They will gain insights into formwork planning and monitoring to optimize productivity and improve construction processes ensuring safety and efficiency. The learners will develop proficiency in formwork assembly for wall and column panels, including erection, inspection, safety protocols, and correction techniques and understand scaffolding practices.
Target Learners:
Undergraduate students of Civil & Structural Engineering
Post-Graduate Students of Structural Engineering
Practicing Engineers in Structural Design
Faculties of Civil Engineering Domain This module delves into Formwork Planning and Monitoring, a crucial aspect in construction, encompassing the strategic configuration, scope, and costing of formwork. Learners will know about meticulous formwork cost estimation, addressing the logistics of formwork, and implementing effective strategies to optimize construction efficiency. The module aims at well-executed formwork strategy in construction which contributes enhancing of formwork productivity and facilitates continuous improvement in construction processes. 10 videos1 assignment This comprehensive module aims to provide Learners with a thorough understanding of modular formwork and aluminum formwork systems. Beginning with an introduction to modular formwork, Learners will explore its advantages and limitations, vertical and horizontal application methodologies, and the precise shuttering and deshuttering sequence. The module will delve into the practical application of modular formwork in various construction scenarios. Additionally, Learners will be introduced to aluminum formwork, understanding its basic principles, selection criteria, and associated drawings and components. The module highlights numerous advantages offered by aluminum formwork, empowering Learners to make informed decisions and effectively implement these construction solutions in diverse projects. 16 videos1 assignment This module aims to impart a thorough understanding of formwork assembly for wall and column panels, covering components like stop ends and box outs. Learners will learn equipment handling, layout planning, and safety protocols for efficient formwork erection. The module includes insights into inspection and correction techniques, along with the requirements of plant and machinery aligned with codal and contractual standards. Additionally, it provides essential information on the common causes of formwork failure, empowering Learners to adopt a proactive approach in preventing and addressing challenges during formwork construction. 15 videos1 assignment This module aims to develop a comprehensive understanding of scaffolding, exploring its history and applications, while gaining practical skills in ladder safety, scaffold loading classification, and system scaffold applications for safe and efficient construction practices. 13 videos1 assignment | 4 modules | Advanced level | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/construction-aspects-of-formwork | null |
6,052 | Data Mining Project | 7,427 | 4.5 | 45 | Jiawei Han | University of Illinois Urbana-Champaign | ['Data Clustering Algorithms', 'Data Analysis', 'Natural Language Processing', 'Data Mining'] | Note: You should complete all the other courses in this Specialization before beginning this course. This six-week long Project course of the Data Mining Specialization will allow you to apply the learned algorithms and techniques for data mining from the previous courses in the Specialization, including Pattern Discovery, Clustering, Text Retrieval, Text Mining, and Visualization, to solve interesting real-world data mining challenges. Specifically, you will work on a restaurant review data set from Yelp and use all the knowledge and skills you’ve learned from the previous courses to mine this data set to discover interesting and useful knowledge. The design of the Project emphasizes: 1) simulating the workflow of a data miner in a real job setting; 2) integrating different mining techniques covered in multiple individual courses; 3) experimenting with different ways to solve a problem to deepen your understanding of techniques; and 4) allowing you to propose and explore your own ideas creatively.
The goal of the Project is to analyze and mine a large Yelp review data set to discover useful knowledge to help people make decisions in dining. The project will include the following outputs:
1. Opinion visualization: explore and visualize the review content to understand what people have said in those reviews.
2. Cuisine map construction: mine the data set to understand the landscape of different types of cuisines and their similarities.
3. Discovery of popular dishes for a cuisine: mine the data set to discover the common/popular dishes of a particular cuisine.
4. Recommendation of restaurants to help people decide where to dine: mine the data set to rank restaurants for a specific dish and predict the hygiene condition of a restaurant.
From the perspective of users, a cuisine map can help them understand what cuisines are there and see the big picture of all kinds of cuisines and their relations. Once they decide what cuisine to try, they would be interested in knowing what the popular dishes of that cuisine are and decide what dishes to have. Finally, they will need to choose a restaurant. Thus, recommending restaurants based on a particular dish would be useful. Moreover, predicting the hygiene condition of a restaurant would also be helpful.
By working on these tasks, you will gain experience with a typical workflow in data mining that includes data preprocessing, data exploration, data analysis, improvement of analysis methods, and presentation of results. You will have an opportunity to combine multiple algorithms from different courses to complete a relatively complicated mining task and experiment with different ways to solve a problem to understand the best way to solve it. We will suggest specific approaches, but you are highly encouraged to explore your own ideas since open exploration is, by design, a goal of the Project.
You are required to submit a brief report for each of the tasks for peer grading. A final consolidated report is also required, which will be peer-graded. In this module, you will become familiar with the course, your instructor, your classmates, and our learning environment. 1 video6 readings1 discussion prompt1 plugin 2 readings1 peer review 2 readings1 peer review 2 readings1 peer review 2 readings1 peer review 2 readings1 peer review 2 readings1 peer review1 plugin | 7 modules | null | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/data-mining-project | null |
6,053 | Major Engineering Project Performance | 23,191 | 4.7 | 909 | Dr Giorgio Locatelli | University of Leeds | ['Project Management'] | Manage large projects by identifying their key characteristics, examining the key factors and risks that affect their performance and exploring methods to counter their impact on the successful delivery of projects. Looking into examples of best practice, you'll explore the relationship between projects, programmes and portfolios. You'll also discover the roles performed by the project manager, examine the difficulties associated with quantifying transaction costs in major project management and consider how different management approaches impact on these costs. Optimism bias and strategic misinterpretation regularly cause delays to major engineering projects. Using stimulating case studies, you'll evaluate the measures of success and compare and contrast 'project success' versus 'project management success'. In the final week of the course, you'll research and present a contemporary example of a major engineering project from your own country.
This course explores concepts analysed in the University’s Online MSc in Engineering Management. If you are interested to develop your skills further, take a look at our online degree. 3 videos18 readings2 assignments4 discussion prompts 1 video16 readings1 assignment3 discussion prompts 2 videos18 readings1 peer review3 discussion prompts 18 readings2 assignments3 discussion prompts 10 readings1 peer review2 discussion prompts | 5 modules | Intermediate level | null | https://www.coursera.org/learn/major-engineering-project-performance | 98% |
6,054 | Strategies for Converting and Retaining Customers Online | 6,735 | 4.7 | 105 | Stephane Muller | University of California, Irvine | ['Landing Page', 'Search Engine Marketing', 'ad campaigns', 'Marketing', 'PPC'] | Welcome to Course 2 of the E-Marketing Specialization: Strategies for Converting and Retaining Customers Online. In this course, we will begin with an introduction to Search Engine Marketing. We will then explore elements of an effective marketing campaign, landing pages, and strategies for converting and retaining your customer base. You are highly encouraged to use this course experience to begin building a digital marketing plan for your current or future business. The activities in this course are all designed to guide you through different sections of a digital marketing plan.
Our learning goals for this course are to:
- Explore how to leverage keywords and search engine marketing in your ad campaigns
- Develop a sample pay per click (PPC) ad campaign that aligns with your marketing goals
- Analyze a landing page and identify successful and unsuccessful elements
- Recognize how to apply calls-to-action to increase customer conversion
- Identify tactics of customer conversion and retention to add to your digital marketing plan Welcome to Module 1: Introduction to Search Engine Marketing. In this module, we will cover the terminology and foundational concepts associated with Search Engine Marketing or SEM. We will review the tactics and strategies that will make your website more visible on the Internet, and how to use Search Engine Optimization and Keywords to attract new consumers and grow your customer base. 1 video3 readings1 assignment1 discussion prompt Welcome to Module 2: Pay-Per-Click (PPC) and Search Engine Optimization (SEO). In this module, we will explore aspects of the PPC online marketing strategy. We will cover the main differences between paid and organic search engine optimization models, and how each model will affect the search results your potential customers will find. Finally, we will use this knowledge to weigh the pros and cons of each strategy and discuss how to decide which one is best for your business or website. 3 readings1 assignment1 discussion prompt Welcome to Module 3: Landing Pages. In this module, we will explore the elements of an effective landing page and which aspects to focus on for successful conversion. We will review what mistakes to avoid when building a landing page and common problems to consider. And finally, we will build on the concepts you have learned in the previous modules to draw connections between various search engine marketing models and how they influence landing pages in terms of advertisement rankings and quality scores. 1 video4 readings1 assignment1 discussion prompt Welcome to Module 4: Conversion and Retention. In this module, you will begin to think about conversion as a journey that the customer takes. You will also study how you can influence this journey with a creative digital strategy. You will then discuss tactics for achieving audience conversion before moving onto a lesson about the final step in the process: retention. You will learn why retention is so important in a sales strategy and the digital tactics that contribute to retaining customers. Finally, you will study microsites and how they can be instrumental in reaching the target niche audiences for your website or business. 1 video5 readings1 assignment1 discussion prompt | 4 modules | Beginner level | 10 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/strategies-for-converting-and-retaining-customers-online | null |
6,055 | Fundamentals for Implementing a Hypertension Program | 1,596 | 4.9 | 30 | Kunihiro Matsushita, MD, PhD | Johns Hopkins University | ['Management Of Hypertension', 'Hypertension Diagnosis', 'Management of Hypertension programs'] | This course provides the fundamental knowledge necessary for program managers and implementors in a hypertension control program, especially in resource-limited settings. The course is interactive and includes useful tips relevant to different settings. The course should be also relevant to physicians, nurses, pharmacists, community health workers, and others who are interested in learning about hypertension diagnosis and management. This module—Module 1— will walk you through the fundamentals of hypertension, such as its burden and complications, and will provide you with an overview of two approaches to managing hypertension. You will learn that hypertension is a major health problem and how it can be managed, while also learning about major challenges that can make effective and efficient management of hypertension difficult. We will end with a few real-world examples of programs that have overcome those challenges and succeeded in improving hypertension management. In Modules 2 to 6, you will learn more about the diagnosis and treatment of hypertension, optimal clinic settings, use of the community as a platform of hypertension care, medication supply, and tips for effective and efficient program operation. 10 readings1 assignment10 plugins Once a diagnosis of hypertension is confirmed, medical personnel should treat patients to reduce the risk of heart attack and stroke. In this module, we will discuss two "complementary" treatment approaches: lifestyle modifications and blood pressure-lowering medications.
Lifestyle modifications have a beneficial effect on blood pressure as well as on health in general. Since lifestyle modifications are not easy to adopt, and even more challenging to maintain, most patients with hypertension also require one or more blood pressure-lowering medications. We will learn that hypertension in most patients can be controlled by following a simple medication protocol. These protocols are especially useful in resource-limited settings since it simplifies medication procurement and treatment processes at clinics, making it feasible to implement a hypertension program in any community you serve.
Understanding these basics are essential to designing, planning, and operating successful hypertension programs. 7 readings1 assignment7 plugins The medical clinic is the primary place where hypertension is diagnosed and managed. Although there is no established estimate, it is likely that there are more than 1 million clinics in the world. Medical clinics vary across countries and even within a country, in terms of the number and type of staff and equipment. Although each clinic is unique, several key elements make a clinic effective and efficient for hypertension care. Appropriately trained staff and adequate facilities for effective hypertension management are crucial, and most clinics may already have these in place. Also, the staff at clinics should collaborate with the patients, recognizing their needs and ensuring that the clinic is accessible to them. This concept is called “patient-centered care.” Let’s take a look at key features of clinic settings for hypertension control in this module. 6 readings1 assignment7 plugins In this module, you will learn about diverse settings in the community where you may find good opportunities to control hypertension. You will also learn about task-sharing/shifting among teams of personnel with different backgrounds such as community health workers, nurses, pharmacists, physicians, and others in delivering efficient and effective care. We will provide real-world examples of community-based programs that have succeeded in improving hypertension control. You will also learn the key factors that made those hypertension programs in the community a success. 5 readings1 assignment6 plugins In this module, we will review the basics of the medication supply system and share some tips for monitoring and managing medication inventories. We will also identify some challenges to medication supply and discuss potential solutions. All of these are crucial for improving both medication supply and access in hypertension programs. 4 readings1 assignment5 plugins In this course thus far, you have learned key concepts for hypertension diagnosis and management, and can describe why hypertension is important and what kind of options are available to address it. However, knowledge is not enough for successful hypertension control programs. Why? Because knowledge is within each individual, and a program needs to have a number of individuals with different values and thoughts acting collaboratively and effectively towards the same goals. There are several key elements for any program (not only for hypertension) to be successfully implemented. Since there are other resources or courses that specifically and comprehensively summarize these elements, we will not cover them all in this module. We will focus on the following three that we believe are especially important: program planning, program monitoring and evaluation, and communication 4 readings1 assignment5 plugins | 6 modules | Beginner level | 3 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/hypertension-program | null |
6,056 | Power BI & Power Virtual Agents | Enrollment number not found | Rating not found | null | Microsoft | Microsoft | ['Power Virtual Agents', 'Data Visualization', 'power virtual agents', 'Power BI', 'Chatbot'] | This cover will cover the capabilities of Power BI, a business intelligence tool that transforms raw data into data visualizations and interactive dashboards. The course will guide you through connecting various data sources, shaping your data for analysis, and designing compelling visualizations to uncover hidden trends and patterns all within the Power BI platform. You'll also learn about the security features of Power BI, ensuring your data remains protected and accessible only to authorized users. Moving forward, you'll discover the ease of creating chatbots with Power Virtual Agents. This no-code platform will allow you to build intelligent bots that can talk to your customers and employees and enhance their overall user experience. You'll learn how to define conversation topics, design interactive dialogues, and publish your chatbot across various platforms like Microsoft Teams, Facebook, and etc. The course concludes by demonstrating how to analyze your chatbot's performance, allowing you to continuously refine and improve its effectiveness. Power BI helps business users and developers alike to easily analyze, visualize, and collaborate on data. This module will teach you how to do all of that without effecting your underlying dataset. 11 videos16 readings6 assignments1 discussion prompt2 plugins Learn how Power Virtual Agents, will help you publish bots to engage with your customers on multiple platforms or channels. These can include live websites, mobile apps, and messaging platforms like Microsoft Teams and Facebook, etc. 7 videos12 readings6 assignments1 discussion prompt | 2 modules | Beginner level | 8 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/power-bi-and-power-virtual-agents | null |
6,057 | Number Sense for Primary Education with PhET Simulations | Enrollment number not found | Rating not found | null | Rebecca Vieyra | University of Colorado Boulder | ['Teaching', 'Pedagogy', 'Mathematics Education', 'Lesson Planning', 'Number Sense'] | PhET Interactive Simulations (https://phet.colorado.edu/), a project of the University of Colorado Boulder, provides fun, free, interactive, research-based science and mathematics simulations for use across, primary, secondary, and higher education levels. We extensively test and evaluate each simulation to ensure educational effectiveness. All simulations are open source and free to all students and teachers. In this course, you will (a) acquire teaching and facilitation strategies for how to use PhET simulations in a K-2 classroom, (b) explore how PhET simulations can support multilingual students, and (c) engage with lessons supporting students’ learning of counting, number sense, and place value.
To finish this course, you need to complete one assignment with peer review: complete one early math teacher guide (using a template) to plan a lesson on numeracy using one of the three PhET simulations introduced in this course. In this module, you will activate your prior knowledge of what it means to have number sense, and brainstorm ways to support all students. 2 videos9 readings8 assignments3 discussion prompts1 plugin It is common for many students–and their teachers–to approach math with some trepidation. This module aims to help you unpack how you and your students might approach math, and what you can do to shift from math anxiety toward mathematical curiosity and joy. 1 reading1 assignment2 discussion prompts In this module, you will learn the importance of providing a strong foundation of number sense for early mathematics learners, specifically to diverse populations. 2 readings2 discussion prompts In this module, you will learn how to effectively facilitate a lesson using the Number Play simulation. 8 videos19 readings1 assignment17 discussion prompts In this module, you will learn about PhET’s teaching philosophy and how this philosophy is supported with meaningful sim-based lessons. 1 video12 readings4 discussion prompts In this module, we now return to sample lessons, with which you will learn how to effectively facilitate a lesson utilizing another simulation called Make a Ten. 4 videos15 readings10 discussion prompts In this module, you will learn how to build effective sim-based lessons in different contexts. 17 readings6 discussion prompts In this module, you will learn how to leverage the functionality of Number Compare to support students’ learning of how to compare numbers in multiple ways. 4 videos16 readings8 discussion prompts In this module, you will learn about resources available on the PhET website that can support you as you plan to use simulations with your students. 7 readings1 assignment1 discussion prompt This module is a summary and wrap-up of the simulations and resources with which you have engaged in this course. As you think about your experience with the simulations and accompanying lessons, reflect on ways the sims and lessons support student confidence, agency, ownership, growth mindset, and positive mathematical identity in all learners. 4 readings1 peer review2 discussion prompts In this module, you will take appropriate steps to complete the course and download your certificate. 1 reading1 assignment1 plugin | 11 modules | Beginner level | 15 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/number-sense-for-primary-education-with-phet-simulations | null |
6,058 | Connecting to Devices and Networks | Enrollment number not found | Rating not found | null | Elise Deitrick | Codio | ['Shell Script', 'Bash (Unix Shell)', 'Computer Network', 'Unix Shells'] | Practice managing devices and networks without installing anything! This course is designed for learners with no technical experience, providing a solid foundation of connecting to devices and networks. Learners will gain hands-on practice on an Ubuntu system that can be easily transferred to other Unix-based operating systems. The modules in this course cover managing devices and partitions, basic networking tools and name resolution, and securely transferring data over networks to create backups.
To allow for a truly hands-on, self-paced learning experience, this course is video-free. Assignments contain short explanations with images and runnable examples with suggested edits to explore examples further, building a deeper understanding by doing. You'll benefit from instant feedback from a variety of assessment items along the way, gently progressing from quick understanding checks (multiple choice, fill in the blank, and un-scrambling code blocks) to small, approachable exercises that take minutes instead of hours. Learn about some different types of devices, how to connect or mount devices to the system, how to partition storage disks, and configure disks into a RAID configuration. 5 readings4 app items Learn basic identifiers of systems such as MAC addresses, IP addresses, and hostnames, how to look up the IP address of a given hostname, and test your network connection. 3 readings4 app items Learn how to establish an SSH connection, create a network-hosted backup, and how to configure a firewall. 3 readings4 app items | 3 modules | Beginner level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/codio-connecting-to-devices-and-networks | null |
6,059 | Advanced Computer Vision with TensorFlow | 39,907 | 4.8 | 498 | Laurence Moroney | DeepLearning.AI | ['Salience', 'Image Segmentation', 'Model Interpretability', 'Class Activation Maps', 'TensorFlow Object Detection API'] | In this course, you will: a) Explore image classification, image segmentation, object localization, and object detection. Apply transfer learning to object localization and detection.
b) Apply object detection models such as regional-CNN and ResNet-50, customize existing models, and build your own models to detect, localize, and label your own rubber duck images.
c) Implement image segmentation using variations of the fully convolutional network (FCN) including U-Net and d) Mask-RCNN to identify and detect numbers, pets, zombies, and more.
d) Identify which parts of an image are being used by your model to make its predictions using class activation maps and saliency maps and apply these ML interpretation methods to inspect and improve the design of a famous network, AlexNet.
The DeepLearning.AI TensorFlow: Advanced Techniques Specialization introduces the features of TensorFlow that provide learners with more control over their model architecture and tools that help them create and train advanced ML models.
This Specialization is for early and mid-career software and machine learning engineers with a foundational understanding of TensorFlow who are looking to expand their knowledge and skill set by learning advanced TensorFlow features to build powerful models. Get a conceptual overview of image classification, object localization, object detection, and image segmentation. Also be able to describe multi-label classification, and distinguish between semantic segmentation and instance segmentation. In the rest of this course, you will apply TensorFlow to build object detection and image segmentation models. 10 videos3 readings1 assignment1 programming assignment3 ungraded labs This week, you’ll get an overview of some popular object detection models, such as regional-CNN and ResNet-50. You’ll use object detection models that you’ll retrieve from TensorFlow Hub, download your own models and configure them for training, and also build your own models for object detection. By using transfer learning, you will train a model to detect and localize rubber duckies using just five training examples. You’ll also get to manually label your own rubber ducky images! 12 videos8 readings1 assignment1 programming assignment2 ungraded labs This week is all about image segmentation using variations of the fully convolutional neural network. With these networks, you can assign class labels to each pixel, and perform much more detailed identification of objects compared to bounding boxes. You’ll build the fully convolutional neural network, U-Net, and Mask R-CNN this week to identify and detect numbers, pets, and even zombies! 11 videos4 readings1 assignment1 programming assignment3 ungraded labs This week, you’ll learn about the importance of model interpretability, which is the understanding of how your model arrives at its decisions. You’ll also implement class activation maps, saliency maps, and gradient-weighted class activation maps to identify which parts of an image are being used by your model to make its predictions. You’ll also see an example of how visualizing a model’s intermediate layer activations can help to improve the design of a famous network, AlexNet. 6 videos6 readings1 assignment1 programming assignment4 ungraded labs | 4 modules | Intermediate level | null | https://www.coursera.org/learn/advanced-computer-vision-with-tensorflow | 93% |
6,060 | Unsupervised Learning, Recommenders, Reinforcement Learning | 230,161 | 4.9 | 3,694 | Andrew Ng | DeepLearning.AI | ['Anomaly Detection', 'Unsupervised Learning', 'Reinforcement Learning', 'Collaborative Filtering', 'Recommender Systems'] | In the third course of the Machine Learning Specialization, you will: • Use unsupervised learning techniques for unsupervised learning: including clustering and anomaly detection.
• Build recommender systems with a collaborative filtering approach and a content-based deep learning method.
• Build a deep reinforcement learning model.
The Machine Learning Specialization is a foundational online program created in collaboration between DeepLearning.AI and Stanford Online. In this beginner-friendly program, you will learn the fundamentals of machine learning and how to use these techniques to build real-world AI applications.
This Specialization is taught by Andrew Ng, an AI visionary who has led critical research at Stanford University and groundbreaking work at Google Brain, Baidu, and Landing.AI to advance the AI field.
This 3-course Specialization is an updated and expanded version of Andrew’s pioneering Machine Learning course, rated 4.9 out of 5 and taken by over 4.8 million learners since it launched in 2012.
It provides a broad introduction to modern machine learning, including supervised learning (multiple linear regression, logistic regression, neural networks, and decision trees), unsupervised learning (clustering, dimensionality reduction, recommender systems), and some of the best practices used in Silicon Valley for artificial intelligence and machine learning innovation (evaluating and tuning models, taking a data-centric approach to improving performance, and more.)
By the end of this Specialization, you will have mastered key concepts and gained the practical know-how to quickly and powerfully apply machine learning to challenging real-world problems. If you’re looking to break into AI or build a career in machine learning, the new Machine Learning Specialization is the best place to start. This week, you will learn two key unsupervised learning algorithms: clustering and anomaly detection 13 videos1 reading2 assignments2 programming assignments 15 videos3 assignments2 programming assignments1 ungraded lab This week, you will learn about reinforcement learning, and build a deep Q-learning neural network in order to land a virtual lunar lander on Mars! 18 videos3 readings3 assignments1 programming assignment1 ungraded lab | 3 modules | Beginner level | null | https://www.coursera.org/learn/unsupervised-learning-recommenders-reinforcement-learning | 96% |
6,061 | Reconstructing America's Story | Enrollment number not found | Rating not found | null | Professor Kermit Roosevelt, III | University of Pennsylvania | [] | America has long defined itself as a country born out of a rebellion against tyranny with freedom and equality as its founding principles. But a closer examination of the historical record reveals problems with the standard American story – how can we be a country built on freedom and equality when our Founding Fathers embedded inequality in our founding documents? Guided by the expertise of constitutional law scholar Kermit Roosevelt, this course invites students to critically examine the narratives that have shaped America, from the celebrated to the contentious. Through a deep exploration of foundational moments and overlooked histories, it lays bare the myths and realities that compose the American experience.
With a focus on the transformative periods of American history, such as the drafting of the Declaration of Independence, the Civil War, and the civil rights movement, the course scrutinizes the construction and impact of national stories. It questions how these narratives have served to unite or divide, to obscure truths, and to perpetuate injustices. By unearthing the diverse and often silenced voices from America’s past and present, Roosevelt encourages a more inclusive understanding of what it means to be American. This introductory module examines America's national narrative and the complex historical context from which our narrative was born. We will examine the "standard story" of America's founding and the complex contradictions between America's declared ideals and the reality of our historical practices of slavery and discrimination. 4 videos4 readings1 assignment This module examines the political philosophy of the Declaration of Independence, discussing the relationship between slavery and the Revolution, and describes the nature and purpose of the Founders’ Constitution. 5 videos1 reading1 assignment This module examines American history as the consistent search for unity and equality. It also covers the impact of the Declaration of Independence on American constitutional history. 4 videos2 readings1 assignment This module examines the modern reading of the Declaration to antislavery activists and why those ideals entered the Constitution. 3 videos1 reading1 assignment This module examines the nature of the conflict that precipitated the Civil War, and describes how the Civil War changed from a war for unity to a war for freedom. It also explores the connections, or lack thereof, between the ideologies of the two sides and the political theory of Founding America. 3 videos1 reading1 assignment This module examines the changes made to the Constitution by the Reconstruction Amendments. It also covers Redemption, the coup against the Reconstruction governments, and how the history of Reconstruction and Redemption was framed to promote white unity. 3 videos1 reading1 assignment This module examines why the standard story is counterproductive in terms of creating real unity among Americans and seeing the continuing struggle between the ideologies of the Founding and Reconstruction. Finally, it looks to explain how a better story can open a path forward. 4 videos1 reading1 assignment | 7 modules | Beginner level | 25 hours to complete (3 weeks at 8 hours a week) | https://www.coursera.org/learn/reconstructing-americas-story | null |
6,062 | Microsoft Azure Machine Learning for Data Scientists | 13,022 | 4.3 | 151 | Microsoft | Microsoft | ['Microsoft Azure', 'Machine Learning', 'regression', 'Supervised Learning', 'Regression Analysis'] | Machine learning is at the core of artificial intelligence, and many modern applications and services depend on predictive machine learning models. Training a machine learning model is an iterative process that requires time and compute resources. Automated machine learning can help make it easier. In this course, you will learn how to use Azure Machine Learning to create and publish models without writing code. This is the second course in a five-course program that prepares you to take the DP-100: Designing and Implementing a Data Science Solution on Azurecertification exam.
The certification exam is an opportunity to prove knowledge and expertise operate machine learning solutions at a cloud-scale using Azure Machine Learning. This specialization teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. Each course teaches you the concepts and skills that are measured by the exam.
This Specialization is intended for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. It teaches data scientists how to create end-to-end solutions in Microsoft Azure. Students will learn how to manage Azure resources for machine learning; run experiments and train models; deploy and operationalize machine learning solutions, and implement responsible machine learning. They will also learn to use Azure Databricks to explore, prepare, and model data; and integrate Databricks machine learning processes with Azure Machine Learning. Training a machine learning model is an iterative process that requires time and compute resources. Automated machine learning can help make it easier. In this module, you'll learn how to identify different kinds of machine learning model and how to use the automated machine learning capability of Azure Machine Learning to train and deploy a predictive model. 3 videos8 readings1 quiz2 assignments1 discussion prompt1 plugin Regression is a supervised machine learning technique used to predict numeric values. In this module, you will learn how to create regression models using Azure Machine Learning designer. 2 videos8 readings1 quiz2 assignments Classification is a supervised machine learning technique used to predict categories or classes. In this module, you will learn how to create classification models using Azure Machine Learning designer. 2 videos8 readings3 assignments Clustering is an unsupervised machine learning technique used to group similar entities based on their features. In this module, you will learn how to create clustering models using Azure Machine Learning designer. 3 videos9 readings3 assignments1 discussion prompt | 4 modules | Intermediate level | 11 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/microsoft-azure-machine-learning-for-data-scientist | null |
6,063 | Disability Inclusion in Education: Building Systems of Support | 23,364 | 4.9 | 648 | Judith McKenzie | University of Cape Town | ['teaching activities', 'Building Systems of Support', 'classroom strategies', 'Disability Inclusion'] | Worldwide millions of children are not able to fully participate in schooling, and this is especially a problem for children with disabilities. In this course, we explore the support that teachers need in order to meet the needs of children with severe to profound hearing, visual and intellectual disabilities. We consider how this can be done by talking with a range of experts - from teachers to activists - about inclusive education as well as sharing experiences of education. Inclusive education is only possible if teachers are supported and empowered to make the curriculum accessible to all learners. The topics in this course cover developing disability confidence and what exactly children with specific impairments need to be able to learn. This includes sharing specific classroom strategies and teaching activities for learners who are D/deaf or hard of hearing, blind or have low vision or have a severe to profound intellectual disability. By the end of the course, you will be familiar with the impairment specific needs of learners with disabilities, and how to build systems of support for inclusive education.
You will be able to purchase a Verified Certificate if you wish to show evidence of your achievements, but this is optional, and you may apply for Financial Aid if you are unable to pay the certificate fee.
This course was developed as part of the project ´Strengthening teaching for Children with profound Hearing, Visual and Intellectual Disabilities in South Africa` co-funded by Christoffel-Blinden Mission (CBM) and the European Union. This week, we consider what disability inclusion means by exploring different models of disability as well as disability rights and policies. Drawing from the history of special and inclusive education we look at how mainstream schools can move towards becoming inclusive schools and how special education can fit into an inclusive education framework. At the end of this week, there is a graded quiz, where you can check your understanding of the key concepts. Every week, you are invited to reflect on the topics in the discussions where you can talk with others about what this means for your practice as an educator. 8 videos3 readings3 assignments2 discussion prompts This week focuses on teacher empowerment and what teachers need to know to better support learners with disabilities. We begin by sharing with you what the Teacher Empowerment for Disability Inclusion (TEDI) project's research findings revealed about teachers’ educational needs. This week we hear powerful personal testimonies of individuals living with disabilities about their schooling which highlights the importance of the empowered teacher in their lives when they were learners. At the end of this week, there is a graded peer review and opportunity for reflection through discussion. 8 videos5 readings1 peer review1 discussion prompt This week focuses on the systemic support structures that are available to teachers and educators in order to support learners with impairments. A former teacher and two district officers share their experiences of support structures and the roles they had to shape and implement policies within the spaces they found themselves in. We will also explore some insights from the TEDI research project on how teachers feel they are supported. At the end of the week, there is a graded quiz and optional Honours Peer Review assignment where you can explore these topics further. 9 videos2 readings3 assignments1 peer review2 discussion prompts This week discusses how to make the curriculum accessible for all - particularly focusing on those with severe to profound disabilities. This includes understanding some of the causes of specific impairments (hearing, visual and intellectual) and their impacts on learning. We also have the pleasure of learning from experts who outline which principles and approaches can be adopted to best support learners with these specific impairments. At the end of the week, there is a graded quiz where you can test your knowledge of what you have learnt, and through a discussion reflect on your own teaching practices. 10 videos1 reading4 assignments1 discussion prompt In this week, the concept of universal design for learning is introduced as a way of approaching teaching and learning to tackle any problems of exclusion from education. Building on the lectures from last week, this week, experienced teachers describe in some detail what teaching strategies they use in their classrooms to include and support learners with specific impairments. Finally, in the peer review assignment you will be given the chance to create your own plan to support a learner, using the universal design principles. 7 videos2 readings1 peer review1 discussion prompt | 5 modules | Beginner level | null | https://www.coursera.org/learn/disability-inclusion-education | 99% |
6,064 | Networking in Google Cloud: Routing and Addressing | 24,967 | 4.8 | 1,038 | Google Cloud Training | Google Cloud | [] | "Welcome to the second course in the networking and Google Cloud series routing and addressing. In this course, we'll cover the central routing and addressing concepts that are relevant to Google Cloud's networking capabilities.
Module one will lay the foundation by exploring network routing and addressing in Google Cloud, covering key building blocks such as routing IPv4, bringing your own IP addresses and setting up cloud DNS. In Module two will shift our focus to private connection options, exploring use cases and methods for accessing Google and other services privately using internal IP addresses.
By the end of this course, you'll have a solid grasp of how to effectively route and address your network traffic within Google Cloud." Welcome to the Networking in Google Cloud: Routing and Addressing course. 1 video In this module, we will explore foundational elements that guide traffic through the Google Cloud network. We'll start with the building blocks: routing, IPv4, and BYOIP. We'll also explore Cloud DNS. 7 videos1 assignment1 app item In this module, we’ll discuss some general methods of accessing Google and other services privately by using internal IP addresses. Then, we will cover each of the methods: Private Google Access, Private Service Connect, private services access and Cloud NAT. After that, you will try what you learned in a Cloud NAT lab exercise. 7 videos1 assignment1 app item | 3 modules | Intermediate level | null | https://www.coursera.org/learn/networking-gcp-hybrid-connectivity-network-management | 96% |
6,065 | Energy management for real estate. Methods and digital tools | 2,624 | 4.5 | 117 | Claudio Del Pero | Politecnico di Milano | [] | The figure of the Energy Manager (EM), introduced in the United States in the early 1970s, during the first oil crisis, brought to light the need to get more work out of less energy. In Italy, this figure was officially introduced by Law 308/82, but had its first strong impulse thanks to Law 10/91, aimed at implementing the National Energy Plan on the rational use of energy, energy saving and the development of renewable energy sources. More in detail, an Energy Manager is a person whose task is to manage what concerns energy within a company, a public body, or more generally a structure, verifying the energy consumption, optimising it, and promoting interventions aimed at energy efficiency and the use of renewable sources. In such respect, the course will provide the necessary information to:
- verify consumption, through ad hoc audits or, if available, through digital models or reports produced by remote management;
- optimise consumption through the correct regulation of systems and their appropriate use from an energy point of view;
- promote energy-aware behaviour by employees and/or occupants of the facility;
- propose improvement investments, possibly improving production processes or the performance of related services.
The course is structured into 4 Weeks.
In the first week a brief introduction about the course, highlighting the main skills of the energy manager, is provided. After that, the fundamental about energy in buildings is discussed in the second week. More in detail, the week aims to define the main energy, regulatory and market framework in which the energy manager has to deal with. Within the same week, the fundamentals of building physics and technical plants are also introduced. During week 3, the specific methodology to carry out the energy survey and audit as well as the available solution to improve the energy efficiency of existing buildings are treated. In the last week, the general approach to face with specific digital tools are also shown and, finally, all the knowledge acquired over the weeks is applied in two exemplifying case studies. 1 video 5 videos1 assignment 4 videos1 assignment 2 videos3 readings1 assignment | 4 modules | Beginner level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/energy-management-for-real-estate | null |
6,066 | Hacking COVID-19 — Course 3: Unraveling COVID-19's Origins | Enrollment number not found | Rating not found | null | Mikhail Rayko | University of California San Diego | ['Bioinformatics'] | In this course, you will follow in the footsteps of the bioinformaticians investigating the COVID-19 outbreak by investigating the origins of SARS-CoV-2. Whether you’re new to the world of computational biology, or you’re a bioinformatics expert seeking to learn about its applications in the COVID-19 pandemic, or somewhere in between, this course is for you! As you go through this journey, we will introduce and explain genomic concepts and give you many opportunities to practice your skills, and we will provide a series of problems with gradually increasing complexity. This third course will only discuss the multiple sequence alignment and maximum-likelihood phylogenetic inference of SARS-CoV-2 genomes, but future courses in this series will explore follow-up bioinformatics analyses used in the COVID-19 pandemic. In Chapter 5, we will use sequence alignment to explore the "Artificial Origin Hypothesis" about the origin of SARS-CoV-2. 1 video1 reading1 app item In Chapter 6, we will use phylogenetics to explore the "Direct Zoonotic Transfer" and "Intermediate Host" hypotheses about the origin of SARS-CoV-2. 1 video1 app item | 2 modules | Beginner level | 6 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/hacking-covid-19--course-3-unraveling-origins-of-covid-19 | null |
6,067 | Fixing Healthcare Delivery 2.0: Advanced Lean | 5,267 | 4.7 | 42 | Frederick S. Southwick, MD | University of Florida | [] | Lean or Toyota Production System (TPS) is responsible for revolutionizing the auto industry by creating highly reliable and safe cars and trucks. In this course healthcare providers, administrators, engineers, and healthcare professional students will be taught how to apply the principles and tools of Lean to health care. They will learn how to identify and remove of waste, design standardized work, apply 5S, map Value streams, create process maps, conduct rapid improvement events (RIEs), level workflow, use A3 forms and Paredo charts, apply error proofing, and create effective visual controls. The instructional videos minimize Lean technical language, and include patient cases to make the lessons more appealing to students in healthcare. Acknowledging that patients are very different from cars we have carefully adapted Lean to health care and call our system: Patient-centered Healthcare Delivery System (PHDS). The name and abbreviation emphasize two key principles taught in our course: 1. Just like PhDs the scientific method must be continually applied when creating plans to improve our systems of care. 2. All improvements must be made looking through the eyes of patients. Armed with this new knowledge students will be able to design and implement sustainable healthcare delivery system improvements. Toyota Production System (TPS) or Lean has allowed Toyota to become the number one automobile manufacturer in the world by progressively improving the quality and reliability of their products. The System of Profound Knowledge developed by the American, W. Edward Deming is the basis for TPS or Lean. This system has now been adapted to healthcare by Virginia Mason Medical Center and Denver Health with exciting results. You will be introduced to the 4 principles of TPS, as well as the TPS House that illustrates how the various tools of TPS fit together to continually add value to the care of patients. The challenges faced by both health systems will be discussed and their approaches to transforming their delivery systems described. When Lean is applied to healthcare, patient care improves, and both patient mortality and the cost of care decrease. Applying Lean to healthcare systems can revolutionize how healthcare is delivered. 5 videos3 readings1 assignment1 peer review1 discussion prompt Waste is a huge problem in modern health care. It has been estimated that 30-60% of all that we do is wasteful and is not of value. Lean has categorized 8 forms of waste allowing everyone on the front lines to recognize waste and work to remove it. 5S is a very helpful tool that can be used early in the implementation of lean and can remove clutter and quickly improve efficiency. A major form of waste is the excessive use of diagnostic tests, as well as delayed or missed diagnosis. In this session you will be introduced to the 8 forms of waste, the use of 5S, how illness scripts can be used to create a tiered diagnostic list, and how Bayes Theorem can be used to select the highest yield tests. Using this approach diagnosticians can more quickly and cost effectively arrive at diagnoses. Waste is the foundation of Lean and by removing waste we can progressively increase the value of patient care. 5 videos2 readings1 assignment1 peer review1 discussion prompt Standardized work is an absolute necessity for improvement. Without standardized work there can be no improvement. This is one of the most difficult concepts to relay to those on the front lines particularly physicians, who call this "cookbook medicine". In this module the philosophy behind creating standardized work is reviewed, and the importance of everyone on the front line participating in creating and continually modifying standardized work emphasized. You will be introduced to tools that will help you to effectively design standardized work: the spaghetti diagram and the Time Observation Sheet. Lead Time, Cycle Time and Takt Time will be defined. You will learn how time the individual steps of a work process. You will also learn how to use a percentage load chart to calculate how many workers are required to meet production demand. 5 videos1 reading1 assignment1 peer review1 discussion prompt Value stream mapping is at the heart of TPS or Lean. Using the Time Observation Sheets you will learn how to fill out a Value Stream Map, including determining WIP (work in progress) depicting physical movement and process flow along with information flow, and assessing when work is value-added and when it is non-value added. Value stream maps are used to identify bottlenecks and wasteful steps in a work process and then process mapping and rapid improvement events (RIEs) can be used to remove these wasteful processes and impediments to workflow. Finally you will be introduced to the principles of leveling both under elective and emergency treatment conditions. Applying these tools can dramatically improve efficiency and productivity without increasing overall manpower. 7 videos1 reading1 assignment1 peer review1 discussion prompt Preventable medical errors are estimated to kill 100,000 to 440,000 people per year in the U.S. and similar levels of harm due to medical errors have also been observed in other countries. In order to effectively eliminate errors, we must first be able to recognize and report them and different types of error reporting are described. Secondly there must be a culture in place that deals fairly with errors by differentiating systems errors from individual human errors. This can be accomplished by applying a Just Culture. Additional tools for eliminating errors and improving processes are introduced including: the Pareto Chart, Failure Mode and Effects Analysis (FMEA), an expanded Plan, Do, Study, Adjust cycle, and the A3 form. There are 6 levels of error proofing and their effectiveness in preventing errors from reaching patients is assessed using clinical examples. Visual controls can be helpful for reducing errors and for following the progress of work process improvements. In the final video the major topics covered in this course are summarized, and a new name for TPS or Lean adapted to healthcare is proposed: Patient-centered Healthcare Delivery System (PHDS). This name emphasizes the importance of applying the scientific method, like PhDs, to continually improve healthcare delivery while always focusing on the needs of patients. 7 videos1 reading1 assignment1 peer review1 discussion prompt | 5 modules | null | 16 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/fixing-healthcare-delivery-advanced-lean | null |
6,068 | People, Technology and the Future of Mobility | 14,197 | 4.7 | 661 | Elisabeth Gerber | University of Michigan | ['Social impact', 'mobility', 'Autonomous vehicles', 'technology', 'Electric Vehicles'] | Welcome to the People, Technology, and the Future of Mobility course! This course provides a lay-person’s introduction to some of the major technological innovations currently underway in the mobility space and asks learners to apply a variety of social science concepts to understand the likely social impacts of these technologies. The course is appropriate for learners from all backgrounds and does not require prior training in engineering or social science. The content presented in this course draws on a number of interviews and lectures and was created through a partnership with Siemens. The course also includes an interactive 360 video experience that allows learners to explore the key components of an autonomous vehicle, go on a ride-along in an autonomous car, and learn about new sensing technology we could see in smart cities of today and tomorrow.
This course challenges learners to envision mobility of the future that is safer, cleaner, and more equitable. We will examine recent technological advances, as well as the socio-economic and policy implications, of two major evolving mobility-related technology spaces: electrification and automation. In Week 1 of the course, we'll lay out some of the basic concepts that we’ll be working with throughout the course, concepts like Mobility, Electrification & Automation 5 videos4 readings2 assignments2 discussion prompts1 plugin In week 2, we'll start talking about electrification. What is the state-of-the-art technology, in terms of batteries and other features of the vehicles themselves. 5 videos2 readings2 assignments1 discussion prompt In week 3, we'll continue our discussion of electrification, shifting our focus from batteries to the electricity infrastructure that will support electric vehicles. We'll also think about stakeholders and different perspectives on electrification. 7 videos6 readings2 assignments2 discussion prompts What impacts will electrification have on human lives (environment, economy, health) from a sustainability and equity perspective? 7 videos2 assignments1 discussion prompt What is automation and what role does it play in the automotive and transportation sectors? 9 videos7 readings2 assignments3 app items1 discussion prompt What impacts will automation have on human lives (environment, economy, health) from equity and safety perspectives? 6 videos1 reading1 assignment2 discussion prompts | 6 modules | Beginner level | null | https://www.coursera.org/learn/people-technology-and-the-future-of-mobility | 97% |
6,069 | Gemini for Google Cloud Learning Path Specialization | Enrollment number not found | 4.6 | 8 | Google Cloud Training | Google Cloud | ['Application Development', 'Generative AI', 'DevOps', 'Gemini for Google Cloud', 'Application development', 'Security Engineering'] | The Gemini for Google Cloud learning path provides examples of how Gemini can help make engineers of all types more efficient in their daily activities. Gemini provides a natural language chat interface which you can quickly chat with to get answers to cloud questions, or receive guidance on best practices. Whether you're writing apps, calling APIs, or querying data, Gemini can help complete your code while you write, or generate code blocks based on comments. This learning path provides guidance for multiple roles, including developers, data analysts, cloud engineers, architects, and security engineers. Applied Learning Project This specialization features automatically graded quizzes composed of multiple choice questions. It also heavily features hands-on labs delivered via the Qwiklabs platform. These labs give learners first hand experience with real Google Cloud features and systems. Enable Gemini for use with Cloud Code. Use Gemini assistance to develop applications. Prompt Gemini to provide commands that you can use to deploy a basic app to a GKE cluster. Create, explore, and modify a GKE cluster by using Gemini to explain and generate shell commands. Use Gemini and BigQuery to analyze data and predict product sales. Identify and categorize new customers using BigQuery and Gemini. Use Gemini, Vertex AI and BigQuery to generate useful next steps for a marketing campaign. Enable Gemini. Use Gemini to get information needed to plan, implement, and maintain a Google Cloud VPC network. Enable Gemini. Identify and remediate security misconfigurations with Gemini. Use Gemini to find and explain log entries. Plan and implement a build system with assistance from Gemini. Enable Gemini for application development and management. Use Gemini in the software development lifecycle. | 7 course series | Intermediate level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/gemini-for-google-cloud-learning-path | null |
6,070 | Introduction to Dental Medicine | 65,965 | 4.8 | 1,460 | Dr. Uri Hangorsky | University of Pennsylvania | [] | The mouth is the window into human health. This course provides an overview of dental medicine to engage, educate, excite and assist you in improving the oral health of your patients and members of your community. We will review topics in dental medicine including scope of the field, what to expect in function, and some of the many ways that dysfunction may present for different patients. This will include discussions of mouth, jaw, and tooth anatomy, pathology, and treatment. We will talk about differences between patients and the unique roles that different members of the dental field may play in treatment depending on the patient and condition. This course starts from basic concepts and proceeds to review trends in current research and technology. We offer scientific background, some skills for patient evaluation and interview, and some suggestions for further learning for those interested in or involved in dental education. In this course, you will learn about basic dental anatomy, how to evaluate a patient, and the causes and impact of oral diseases. We will use case examples and live demonstrations with patients to illustrate these points. Please note that some lectures in this course contain graphic medical images, including illustrations of the human body, oral cavity, early development, and photographs of medical conditions and deformities. Discretion is advised. The materials in this course are intended for education purposes only and are not intended to serve as professional medical advice, diagnosis, or treatment. Please seek the advice of your dentist, physician, or other qualified health professional if you have any questions related to this material and its relevance to your health or that of someone else. Week 1 is your introduction to dental medicine! This includes oral health's relation to general health, sources of infection, modern technology in dentistry, and the public health impact of dental medicine. Let's get started! 8 videos1 assignment The modules in week 2 describe basic dental anatomy including embryology of the oral cavity, oral functions, basic tooth structure, and clinical implications of disease. Emphasis is placed on the clinical implications of these concepts and structures. 4 videos1 assignment These modules will demonstrate the evaluation of extra- and intraoral structures. They also review the taking of a thorough medical history, with live patient demonstrations. This unit emphasizes the complex relationship between the systemic and oral health. 8 videos1 assignment Diseases affecting the dentition and its surrounding structures have a profound influence on the patient and his/her health. Untreated conditions can result in severe pain, localized, and systemic infections and result in partial or complete loss of teeth.The etiology and the contributing factors to these diseases are discussed in detail. 4 videos1 assignment Possible oral and mucosal conditions include anomalies, ulcers, cancer and associated diseases. Some of these conditions have localized or idiopathic etiology; others are manifestations of systemic diseases of the body. Many times these oral conditions appear as the initial symptom of a systemic disease. The management of such conditions often involves an interdisciplinary approach to management involving the patient's dentist, physician, and medical specialists. 3 videos1 assignment These modules address oral and facial pain from common conditions to rare ones, including an exploration of the psychological aspects of oral and facial pain. Dental pain can originate not only from diseased dentition, but also from various disorders affecting the TMJ, nerves, soft and hard tissue infections and other sources. Dental pain can have underlying psychosocial etiology as well, and the diagnosis in such cases can be challenging. 10 videos1 assignment Selected cases in dental medicine ranging from oral surgery to prosthetic reconstruction are discussed in the context of the important role of dental specialists. Each presenter discusses the challenges of focused dental treatment and presents cases with "before" and "after" documentation. 7 videos2 assignments | 7 modules | Beginner level | null | https://www.coursera.org/learn/dental-medicine-penn | 97% |
6,071 | Design Computing: 3D Modeling in Rhinoceros with Python/Rhinoscript | 19,034 | 4.9 | 95 | Glenn Wilcox | University of Michigan | ['Computer Programming', 'Code structure', 'Python Programming', 'Rhinoscript', 'Programing Logic'] | Why should a designer learn to code? As our world is increasingly impacted by the use of algorithms, designers must learn how to use and create design computing programs. Designers must go beyond the narrowly focused use of computers in the automation of simple drafting/modeling tasks and instead explore the extraordinary potential digitalization holds for design culture/practice.
Structured around a series of fundamental design problems, this course will show you Python code in terms of its rules and syntax, and what we can do with it in its application and design. So, by the end of this course, you will know the fundamentals of Python and Rhino script, but importantly, through the lens of their application in geometrically focused design lessons and exercises.
Subjects covered in this course
- An introduction to Design Computing as a subject and why designers should learn to code.
- The fundamentals of coding in the Python scripting language. By the end of the course students will be familiar with the basic structure and syntax of this language.
- The understanding and application of Rhinoscriptsyntax, a native coding language in Rhinoceros that’s imported into Python, which allows one to create and control geometries through authoring code.
- The application of Procedural Logics - the structuring of coding systems to produce variable geometric form.
- The output of geometries in still and animate forms. Following an introduction to the fundamentals of the interface and explaining what code does, we will look at Variables and Points, the building blocks of code and geometry. 19 videos12 readings2 assignments1 app item1 discussion prompt This week we dive deeply into the specific elements of Python coding and explore the possibilities of using them to create more complex and variable geometric systems. 20 videos11 readings5 assignments2 app items Building on the material from the previous two weeks we will expand the possibilities and interconnectivity of our geometric systems by introducing higher level elements of Python code. 16 videos10 readings3 assignments2 app items This week we jump into 3D and explore the design possibilities of 3D matrix structures culminating in the design of a wall structure. 10 videos6 readings1 app item In this final week we will explore the possibilities of NURB surfaces as generative base geometries and complete the course with a tower project. 20 videos11 readings2 app items | 5 modules | Beginner level | null | https://www.coursera.org/learn/3d-modeling-rhinoscript | 98% |
6,072 | Responding, Revising and Assessing Student Writings | Enrollment number not found | Rating not found | null | Mark Farrington | Johns Hopkins University | ['Involving students in assessment', 'Assessing Writing', 'Teaching Revision', 'Responding to Student Writing'] | When writers write, readers respond. Responding to student writing gives teachers one of the most meaningful avenues to help students learn and grow. In this module, learners will identify best practices in effectively responding to student writing. You will also define revision, identify how revision differs from editing, and examine strategies for teaching students how to engage in effective revision. Finally, because writing can also be used for testing, and because all students learn in increments over time, learners will identify a number of strategies for evaluating and assessing student writing, both for individual writings and a student writer’s progress over a period of time. Learners will also consider ways to involve students in both the responding and assessment processes. At the conclusion of this course, learners will have a toolbox full of strategies and practices for these three significant components of any writing class: responding to, revising and assessing student writing. It’s interesting to consider the verbs we often use to describe what we teachers do with a batch of student papers. We have papers to “grade;” papers to “correct.” Seldom do we say that we have a batch of papers we need to “respond to.” And yet it’s through our responses that students can best learn and grow. That doesn’t always happen; if you’ve taught before, you’ve probably had the experience of giving back papers on which you’ve worked hard to provide responses and instructions, only to watch your students take the papers you’re returning and turn right to the grade, ignoring everything else you’ve written. In this module, we’ll identify strategies for responding to student writing so that students will first of all, read and understand your comments, and then be able to use those comments for learning and growth. We’ll look at different ways to respond to student writing, including through conferences and peer review, and we’ll even consider effective ways to respond to students’ use of grammar. At the end of this module, you’ll reflect on how you might apply your learning to your own teaching situation. 14 videos10 readings2 assignments1 peer review2 discussion prompts Verbs are interesting to consider when thinking of revision, too. In your classes, do (or will) you “require” revision? Will you “allow” revision? Will you “teach” revision? We might do all of these at some point, but the most challenging task – and the one that might be most valuable – is “teaching” revision. In this module, learners will identify what constitutes revision, particularly how revision differs from editing, and will examine strategies for teaching revision to their students. They will practice a variety of approaches to revision and reflect on how they might encourage revision in their classes. 7 videos7 readings1 assignment2 discussion prompts A confession: I love to read what my students write; I love to try and help them make that writing better. I hate having to put a grade on their writing – and yet, I am required to do so. In this module, learners will identify strategies for evaluating and assessing student writing. They will examine the nature of rubrics, and how learning objectives connect to both assignments and assessments. They’ll identify the portfolio system of writing assessment and evaluate its benefits and challenges. They’ll reflect on their own feelings about grading student writing and identify a grading system they believe would be fair and workable in their classes. 10 videos8 readings1 assignment1 peer review2 discussion prompts It’s been said that if you really want to know if you’ve learned something, teach it to someone else. In this module, learners will identify strategies for engaging students in practices most often reserved for only teachers, from having students engage in peer review to involving students in how an assignment might be assessed. They’ll identify ways that students, through reflection, can assess their own learning and identify areas of growth. They’ll reflect on their own learning throughout this course and create a plan for bringing aspects of that learning into their classrooms. 6 videos9 readings1 peer review2 discussion prompts | 4 modules | Beginner level | 20 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/responding-revising-assessing-student-writings | null |
6,073 | Remote Leadership for Managers Specialization | Enrollment number not found | Rating not found | null | Patty Malone | University of California, Irvine | ['Constructive Feedback', 'Employee Conflict Resolution', 'Relationship Building', 'Email Management', 'Meeting Facilitation', 'Collaborative Communications', 'People Management', 'Employee Communications'] | Are you ready to excel as a remote leader? Enhance your leadership skills with the Remote Leadership for Managers specialization, designed to equip you with the tools to lead a successful, productive, and collaborative virtual team. This comprehensive specialization covers key aspects of leading remote teams, including building trust, developing virtual relationships, creating a positive team culture, and addressing silos and burnout. By the end of this specialization, learners will be able to implement practical strategies to prevent and manage conflict, set healthy communication boundaries, enhance engagement in virtual team meetings, hone their personal leadership style, and bolster team morale, productivity, and engagement. Discover the art of effective remote leadership and lead your virtual team with confidence. Applied Learning Project Throughout the specialization, learners will work with real-world remote work scenarios. To close, learners will showcase their knowledge in a final exam, where they will apply concepts from all three courses to address common remote work leadership challenges. Identify ways to build trust, strengthen relationships, develop collaboration, and effectively communicate in remote work Discuss personal experiences regarding remote work challenges, relationship dynamics, and remote team collaboration Recognize the impact of the silo mentality on remote team communication and strategies to improve information sharing and collaboration across teams. Define various leadership styles and adapt them effectively to a remote work setting Identify how to overcome burnout and other remote work challenges, apply methods to promote employee well-being, and manage conflicts constructively. Identify and implement effective strategies to boost team productivity, prevent task duplication, and ensure task completion. Recognize and apply techniques to increase participation, re-engage team members, and create a collaborative virtual meeting experience. Apply core remote leadership concepts from the Remote Leadership for Managers specialization to real-world remote leadership scenarios. | 3 course series | Beginner level | 3 months (at 2 hours a week) | https://www.coursera.org/specializations/remoteleadership | null |
6,074 | AI for Cybersecurity Specialization | Enrollment number not found | Rating not found | null | Lanier Watkins | Johns Hopkins University | ['Reinforcement Learning in Cybersecurity', 'Performance Evaluation of AI Models', 'Cybersecurity Threat Analysis', 'Network Anomaly Detection', 'Feature Engineering for AI Systems', 'Reinforcement Learning in Cybersecurity', 'Performance Evaluation of AI Models', 'Cybersecurity Threat Analysis', 'Network Anomaly Detection', 'Feature Engineering for AI Systems'] | This Specialization is designed for post-graduate students aiming to master AI applications in cybersecurity. Through three comprehensive courses, you will explore advanced techniques for detecting and mitigating various cyber threats. The curriculum covers essential topics such as AI-driven fraud prevention, malware analysis, and the implications of Generative Adversarial Networks (GANs). You will gain hands-on experience in identifying anomalies in network traffic, implementing reinforcement learning techniques for adaptive security measures, and evaluating AI model performance against real-world challenges. By completing this Specialization, you will develop a deep understanding of how to secure AI systems while addressing the complexities of adversarial attacks. This knowledge will prepare you to tackle emerging cybersecurity challenges, making you a valuable asset in the rapidly evolving field of digital security. With a focus on practical applications and industry-relevant skills, you will be well-equipped for a career in AI-driven cybersecurity. Applied Learning Project In the "AI for Cybersecurity" specialization, learners will apply AI techniques to develop practical cybersecurity tools. They will create both machine learning (ML) and deep learning (DL) models to detect IoT botnet activity in network traffic, emphasizing feature engineering for ML and optimizing raw data for DL. Additionally, participants will design a metamorphic malware detector using a Hidden Markov Model, analyzing opcode sequences to classify them as malware or legitimate software. Throughout these projects, learners will export models, test them on unseen data, and submit video demonstrations along with their code. This hands-on approach equips learners with skills in AI-driven threat detection and model implementation for real-world cybersecurity challenges. Use AI techniques to detect and mitigate various cyber threats, protecting digital assets and data. Develop and apply machine learning models to identify, classify, and filter spam and phishing emails. Implement AI-driven biometric solutions like keystroke dynamics and facial recognition to enhance user authentication security. Understand various types of malware and apply foundational analysis techniques to effectively detect and classify them. Implement advanced machine learning algorithms, including clustering and decision trees, for efficient malware detection. Explore anomaly detection techniques using botnet data and learn how to analyze network traffic for unusual patterns. Collaborate and present research findings on current trends in network anomaly detection, enhancing communication and analytical skills. Learn to implement AI-based solutions to detect and prevent credit card fraud in cloud environments. Explore the fundamentals of Generative Adversarial Networks and their applications in generating synthetic data. Gain hands-on experience with black-box and white-box adversarial attacks to assess and enhance model resilience. Master techniques in feature engineering and performance evaluation to optimize AI models for cybersecurity applications. | 3 course series | Intermediate level | 3 months (at 5 hours a week) | https://www.coursera.org/specializations/ai-for-cybersecurity | null |
6,075 | Drugs, drug use, drug policy and health | 34,849 | 4.8 | 256 | Michel Kazatchkine | University of Geneva | [] | This MOOC is the first of its kind, since it addresses critical issues related to drugs from a multidisciplinary, health and human rights-based approach. Throughout the course you will cover a range of questions including what are drugs and why they controlled? What are the benefits and harms of taking drugs? How public health policies can address drug use? You will also learn about the intricacies of the international drug control framework and the negative consequences of widespread prohibitionist drug policies around the world. Finally, you will examine ways of furthering drug policy reform.
The topics will be presented by over 40 speakers from scientific, academic and institutional backgrounds, spokespersons of civil society as well as people who use drugs presenting their views.
By the end of the course you will have:
- a strong understanding of the major health issues related to drug use and drug policy;
- a clear vision of why drug policy is debated today;
- and, if you so wish, you will be equipped to engage in the drug policy reform movement at your local or regional level. Welcome to Module 1! This week's material starts by looking at seemingly simple questions such as : « what are drugs ? » and « why do people use drugs ? » It then addresses the question : « why are drug internationally controlled ? » As you will see the answer to this question constitutes one of the founding blocks of the rest of this course. You will learn what legal elements make up the international drug control framework and what that means for countries putting in place different drug policies around the world. Once you have finished this week, you will be able to: explain what drugs and controlled substances are; describe the main elements of the International Drug Control Framework and recognize the diversity of national drug policies under a unique International Drug Control Framework. We hope that you are prepared to work through the interesting and wide-ranging material we have prepared for you. We also encourage you to stop and answer as many of the in-video (or stand-alone) reflective questions we have placed throughout the week, and look forward to receiving any feedback you may have for us! Have a great first week learning about drugs and the international drug control framework! Best wishes,The Drugs, Drug Use, Drug Policy and Health team 10 videos5 readings4 assignments2 discussion prompts Welcome to Module 2 ! This week is all about epidemiology and drug use. Indeed, it seems pretty obvious that when looking at drug use around the world, we need to know what we are talking about ; but as you will see, for various reasons, it isn’t always that easy. You will also hear from people who use drugs, telling you about the stigmatisation they often face as well as from scientists who will share their knowledge about how drugs should be classified according to their harms and what the benefits and harms of taking certain drugs are. You will also learn what dependence really means and what health-related issues can sometimes arise with certain drugs and forms of drug use. By the end of the Module you will be able to : • Recall facts, figures and misconceptions about drug use; • Categorize drugs and their relative harms; • Describe problematic drug use and dependence and their negative consequences for individuals and the community. Don’t forget to have a look at the additional optional resources. We hope this week challenges a number of ideas you may have about drug use and their benefits and harms for example; and that you learn a lot about questions related to drugs and health. Best wishes,The Drugs, Drug Use, Drug Policy and Health team 10 videos2 readings4 assignments1 discussion prompt Welcome to Module 3 which focuses on public health, harm reduction and treatment. In this Module you will see how public health policies address drug use ; become familiar with various harm reduction concepts and tools and learn a bit about the history as well. You will learn a lot about harm reduction itself, seeing how it can fit into existing health policies and look at how policies can include prevention, harm reduction and treatment in a complementary fashion. By the end of the Module you will be able to : • Recall the concepts and list the tools of harm reduction.• Assess treatment options for dependence• and Explain how prevention, harm reduction and treatment complement each other.We hope this week will provide you with a good sense of what harm reduction is and how it fits within wider public health–oriented policies. This week also builds on what you have learnt in Module 2, with regard to certain health issues and looking at when treatment for dependence may be necessary. Don’t forget to go through the essential reading list and look at the optional additional resources. Best wishes,The Drugs, Drug Use, Drug Policy and Health team 11 videos3 readings3 assignments3 discussion prompts Welcome to Module 4 which looks at questioning prohibition-based policies. In this Module, you will discover that most drug policies in the world are based on prohibition law enforcement and criminalization of drug use ; and see that such policies have a number of negative consequences on people’s health as well as on their human rights. This Module will also look at law enforcement more closely and reveal how it can cooperate to improve health. You will learn about the human rights framework and the drug control framework and see what human rights violations, stemming from the implementation of prohibitionist drug policies, look like around the world. Finally, you will also see that drug policies are connected to development and the environment, most often not in a good way, with prohibition fueling violence, crime and corruption and impeding development. By the end of this Module you will be able to: • Evaluate the extent to which prohibition-based policies have succeeded or failed in reducing drug production, trafficking and consumption; • Describe the negative impacts of prohibition-based policies on health, human rights and development; • Recall how prohibition-based policies fuel organized crime and trafficking. We hope this week will provide you with valuable insight into the reality of prohibitionist drug policies, for people in communities all over the world ; and help you see what have been the consequences of these policies, in terms of their impact on human rights, health and development. We also hope you enjoy the essential reading and optional additional resources we have prepared for you. Best wishes,The Drugs, Drug Use, Drug Policy and Health team 20 videos2 readings2 assignments3 discussion prompts Welcome to Module 5 which looks at access to controlled medicines. During this week, you will learn how the international scheduling of drugs works; be presented with some of the main barriers to access to essential medicines and look specifically at the case of the opioid epidemic which is ravaging through the United States at the moment. The medical use of cannabis and cannabinoids is also a highlight of this week and one that is particularly relevant in a number of countries around the world at present. By the end of this Module you will be able to: • Describe the scheduling of controlled medicines; • Recognize the barriers to access to controlled medicines and discuss the challenges posed by prescription drugs epidemics; • and examine the current issues around the medical use of cannabis and cannabinoids. We hope you enjoy this week, which is slightly different to the other Modules in terms of its specific topic but adds a lot of important information in terms of understanding the international drug control framework and issues related to drugs, drug use and policies as well as possible. Best wishes,The Drugs, Drug Use, Drug Policy and Health team 7 videos2 readings5 assignments Welcome to Module 6! Congratulations, you have made it to the last Module of the Course! This week focuses on how prohibitionist drug policies have failed and how it is time for drug policy reform. Some highlights include decriminalisation, legalisation and regulation being broken down for you, so that you really understand what the terms mean and how countries can move towards them in terms of drug policy goals. A big part of this Module also concentrates on how to get involved in the drug reform movement: you will hear from people who have intimate experience with this: from civil society actors working in the field to networks of people who use drugs; before being able to you, yourself think about how and what you could do to join the drug reform movement. By the end of this Module you will be able to: • Give examples of decriminalization and regulation of drugs and discuss outcomes; • Defend the involvement of civil society and people who use drugs in the design and evaluation of drug policies; • Reflect on and develop your potential role in the world drug debate.The final evaluation will consist of a peer – review, during which you will have the possibility to think about how what you have learnt throughout the course applies to the situation in your own country with regard to drug policy (specifically in relation to protecting human rights and promoting health); and to reflect on how people who use drugs are perceived and/or treated and consider what role you could play in this possible reform. Please don’t forget to go through the essential reading list and some of the optional additional resources available to you. We hope you have enjoyed the six Modules and look forward to receiving your peer-evaluations as well any feedback you may have. Best wishes,The Drugs, Drug Use, Drug Policy and Health team 13 videos2 readings1 assignment1 peer review1 discussion prompt | 6 modules | Beginner level | null | https://www.coursera.org/learn/drugs | 94% |
6,076 | Ash-Related Operational Challenges in Energy Utilization of Sustainable Fuels | 2,500 | 4.8 | 27 | Flemming Jappe Frandsen | Technical University of Denmark (DTU) | [] | The basic idea behind this MOOC, is to present recent data on fuel characterization, slagging, fouling, corrosion, and trace element transformations, in a course that can be readily provided for students and industry people. This ensures understanding and application of the research, and provides the students and industry with a forum for discussion of the very latest research results, as well as feedback from industry to the research group at DTU, on important new research subjects in the field.
The specific aim of the MOOC, is that students will be able to;
Explain basic physical and chemical differences between solid fuels like coal, biomass, waste etc., be able to characterize solid fuels, and to interpret fuel analyses of them
Interpret and utilize data from advanced fuel and ash analyses (SEM, DTA/TGA, chemical fractionation, ash melting temperatures)
Describe chemically and physically, how critical ash-forming elements are released to the gas phase, the mechanisms for formation of aerosols and fly ash particles, and explain how ash is transported from bulk gas to heat transfer surfaces
Quantify the processes of deposit build-up, sintering and shedding
Explain the fundamentals of high-temperature corrosion in thermal fuel conversion systems
Can calculate viscosities as a function of temperature and composition, temperature profiles in a deposit, rates of deposit build-up and sintering, as well as porosity changes vs. time. This module will introduce the basic content of the course to the student. 1 video1 reading Module 2 (Fuel and Ash Chemistry and Characterization) is subdivided into 7 lessons, dealing with fuel and ash characterization, and is meant as an introduction to different techniques, applied to characterize fuels or ash samples. Both simple techniques like proximate and ultimate analyses, but also advanced techniques like Simultaneous Thermal Analysis (STA) analysis of ash fusion and Scanning Electron Microcospy (SEM), are introduced. There is also included an introduction to online fuel databases. 7 videos7 readings7 assignments This module gives an introduction to how critical ash-forming elements like K, S, and Cl, but also Na, Zn and Pb, are released from fuels, during thermal conversion.Module 3 (Release of Critical Ash-Forming Elements) deals with release of critical ash-forming elements, mainly K, S and Cl, but also Na, Zn, and Pb. The module has four lessons and deal with both fixed-bed and entrained flow release quantification. Further, there is a thorough introduction to K-release from K-Ca-P-rich ashes. 4 videos4 readings4 assignments As soon as the critical ash-forming elements have been released to the gas, formation of fly ash and aerosols begin, which is the subject of Module 4 (Formation of Fly Ash and Aerosols). This module is subdivided into 5 lessons, introducing both fundamental and detailed physical aspects of residual fly ash formation, as well as formation of and harmful health effects of combustion-derived aerosols. Finally, there is a thorough introduction to the pioneering Danish full.scale aerosol formation studies at Haslev respectively Slagelse CHP. 5 videos5 readings5 assignments Next natural step in the chain of events leading to troublesome deposit formation is the transport and adhesion of ash species (gases, aerosols and particles), which is the subject of Module 5 (Transport and Adhesion of Ash Particles), thoroughly addressing both important transport mechanisms like diffusion, thermophoresis and inertial impaction, as well as mechanisms of adhesion and different criteria for sticking of ash species. 7 videos7 readings7 assignments As soon as the ash species stick to the surface of the deposit, a build-up, consolidation and shedding of deposit begins. These are extremely complex, interaction phenomena, involving both physical and chemical aspects. This is the subject of Module 6 (Deposit Build-Up, Consolidation and Shedding), which also covers practical experiences in performing deposit measurements in full-scale. 9 videos9 readings9 assignments One of the consequences of deposit formation is the possible chemical interaction between the deposit and the heat transfer tube, better known as corrosion, which is outlined in Module 7 (High-Temperature Cl-Corrosion), based on several years of research in this field at our Department at DTU. Aspects of corrosion underneath deposits formed in biomass- as well as waste-fired units are covered in details. 4 videos4 readings4 assignments There are a number of ways to minimize corrosion, aerosol and ash deposit formation in boilers, one of them being the use of additives to affect the chemistry in the freeboard of the boiler, thereby minimizing e.g. the concentration of Cl in the inner layers of the deposit, or, minimizing the mass loading of aerosols and thereby the environmental impact of these. This has for years been a major research activity at DTU and Module 8 (Use of additives to Minimize Deposit Formation and High-Temperature Corrosion) therefore deals with the application of additives, both the classical Al-Si- and the more sophisticated S-based additives. 7 videos7 readings7 assignments Finally, Module 9 (Danish Case-Studies on Ash and Deposit Formation) in this MOOC deals with Danish case studies of ash and deposit formation in utility boilers. The module covers three classical cases from dedicated straw-fired grate units: the Haslev/Slagelse, Rudkøbing and Masnedø CHPs. After this, an introduction to the MKS1 demoprogramme on co-firing of coal and straw in pc-fired units follow, this campaign marked a progressive step toward the ultimative shift from pure biomass-firing in grate units, to biodust-firing in pf-units. The last two lessons in this module covers biodust-firing at the Avedøre Power Station, with special focus on aerosol and deposit formation and chemistry, with and without the use of coal fly ash as an additive. 7 videos7 readings7 assignments | 9 modules | Intermediate level | 68 hours to complete (3 weeks at 22 hours a week) | https://www.coursera.org/learn/sustainability-fuels-ash-chemistry-deposits-corrosion-additives | null |
6,077 | Generative AI for Executives and Business Leaders - Part 2 | Enrollment number not found | Rating not found | null | IBM AI Academy | IBM | ['AI Use Case', 'AI Applications', 'Governance and compliance', 'Generative AI (GenAI)', 'Artificial Intelligence'] | As an executive or business leader in your organization, integrating AI well is likely number one for your strategic priorities. In this short course, hear what IBM leaders think about the essentials when it comes to strategically integrating GenAI at scale cross-functionally and within their domains. Listen to their advice and gain insights into these key areas for your own business sectors:
- Driving ROI and creating value
- Leveraging your data to maintain competitive advantages
- Devising appropriate use cases
- Model selection
- Compliance and governance
Additionally, in this short, self-paced course, these leaders share their views on GenAI's potential within their respective business segments. No prior AI background is required. Join us in helping you get started with practical guidance on AI adoption! In this course, you will hear the perspectives of IBM thought leaders on AI in conjunction with business strategy and its effects on enterprise elements. You will also learn about the impact of genAI in marketing, HR, ITOps, FinOps, and finance. These discussions will provoke your thinking on AI in many areas and across multiple business functions. 12 videos7 readings1 assignment1 discussion prompt | 1 module | Beginner level | 3 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/generative-ai-for-executives-and-business-leaders-part-2 | null |
6,078 | Physics 102 - Electric Potential and DC Circuits | 4,155 | 4.8 | 27 | Jason Hafner | Rice University | ['Force Fields', 'Problem Solving', 'Physics', 'Electronic Circuits', 'Electrical Engineering'] | This second course serves as an introduction to the physics of electricity and magnetism. Upon completion, learners will understand how mathematical laws and conservation principles describe fields and how these fields are related to electrical circuits. Learners will gain experience in solving physics problems with tools such as graphical analysis, algebra, vector analysis, and calculus. This second course covers Electric Potential, Capacitance, Current, Resistors, and DC Circuits. Each of the two modules contains reading links to a free textbook, complete video lectures, conceptual quizzes, and a set of homework problems. Once the modules are completed, the course ends with an exam. This comprehensive course is similar in detail and rigor to those taught on-campus at Rice. It will thoroughly prepare learners for their upcoming introductory physics courses or more advanced courses in physics. 25 videos7 readings13 assignments 29 videos6 readings11 assignments 1 video1 assignment | 3 modules | Intermediate level | 21 hours to complete (3 weeks at 7 hours a week) | https://www.coursera.org/learn/physics-102-electric-potential-and-dc-circuits | null |
6,079 | Introduction to battery-management systems | 63,238 | 4.8 | 2,120 | Gregory Plett | University of Colorado Boulder | ['Understand the requirements of a battery-management system', 'Understand how lithium-ion battery cells work'] | This course can also be taken for academic credit as ECEA 5730, part of CU Boulder’s Master of Science in Electrical Engineering degree. This course will provide you with a firm foundation in lithium-ion cell terminology and function and in battery-management-system requirements as needed by the remainder of the specialization. After completing this course, you will be able to:
- List the major functions provided by a battery-management system and state their purpose
- Match battery terminology to a list of definitions
- Identify the major components of a lithium-ion cell and their purpose
- Understand how a battery-management system “measures” current, temperature, and isolation, and how it controls contactors
- Identify electronic components that can provide protection and specify a minimum set of protections needed
- Compute stored energy in a battery pack
- List the manufacturing steps of different types of lithium-ion cells and possible failure modes This week, you will learn some important terminology used to describe battery cells, and will learn the principles of operation of standard electrochemical battery cells. 8 videos14 readings7 assignments1 discussion prompt This week, you will learn some of the principal advantages of lithium-ion cells versus standard electrochemical battery cells, what are their primary components, and how they work. 7 videos7 readings7 assignments This week, you will begin to learn about BMS requirements, and will study the requirements for sensing and high-voltage control in detail. 9 videos9 readings8 assignments This week, you will continue to learn about BMS requirements, studying requirements for protection, interface, performance management, and diagnostics in detail. 8 videos8 readings8 assignments This week, you will learn in more detail than before how lithium-ion cells are made and how they can fail. 5 videos5 readings4 assignments | 5 modules | Intermediate level | null | https://www.coursera.org/learn/battery-management-systems | 95% |
6,080 | Generative AI in Business Specialization | Enrollment number not found | 4.9 | 5 | Andrew Wu | University of Michigan | ['Business Process Management', 'Generative AI', 'Decision Making', 'Business Strategies', 'Business Process Management', 'Generative AI', 'Decision Making', 'Business Strategies'] | With companies worldwide exploring how to harness generative AI’s potential, it’s critical to make informed decisions about when and how to adopt these technologies. The “Generative AI in Business”course series provides business leaders with a step-by-step guide to incorporate generative AI into their business operations, product offerings, and organizational structures. Through this series, you’ll gain a deep understanding of generative AI’s capabilities, learn to create a tailored action plan based on your specific business challenges, and develop effective strategies to execute that plan. By the end, you'll be equipped with the tools and knowledge to evaluate, implement, and scale generative AI solutions that meet your unique business needs. Applied Learning Project In this series, you’ll follow the"See, Plan, Act"action sequence to tackle several real-world and simulated business cases. In the first course, you'llsee firsthand the new and exciting possibilities that generative AI offers for businesses. Then, in the next course, you’ll develop a detailed planto turn those possibilities into value for your business, and develop the blueprint for your solution. In the final course, you’ll learn the specific strategies toimplementthis plan and maximize its chance of success. You'll work with the same cases throughout the series, allowing you to deepen your understanding and apply the framework in a cohesive, hands-on way. Understand the core capabilities of leading generative AI tools as applied to business and professional settings Envision and forecast new business possibilities offered by generative AI in the short and medium-term Understand the key technical components of the generative AI technology Identify the right problems in your business where generative AI can deliver the highest value Align your problems with the right generative AI solution types Determine the right data in your business to integrate into your generative AI solution Understand the current landscape of generative AI-driven business model transformation across a variety of industries and organization types Identify and communicate effectively with various stakeholders affected by the transformation Develop and apply a quantitative framework to rigorously assess the impact of generative AI on your organization | 3 course series | Beginner level | 1 month (at 2 hours a week) | https://www.coursera.org/specializations/generative-ai-in-business | null |
6,081 | Classical Cryptosystems and Core Concepts | 17,134 | 4.5 | 406 | William Bahn | University of Colorado System | [] | Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability. This module covers an introduction of the specialization and instructors, covers what to expect from this educational experience and also, an introduction to the course Classical Cryptosystems and Core Concepts. 3 videos3 readings In this module we present an introduction to cryptography, differentiate between codes and ciphers, describe cryptanalysis, and identify the guiding principles of modern cryptography. After completing this course you will be able to read material related to cryptographic systems, understanding the basic terminology and concepts. You will also have an appreciation for the historical framework of modern cryptography and the difficulty of achieving its aims. 4 videos9 readings2 assignments1 discussion prompt Delving deeper into cryptanalysis, in this module we will discuss different types of attacks, explain frequency analysis and different use cases, explain the significance of polyalphabetical ciphers, and discuss the Vigenere Cipher. When you have completed this module, you will have an appreciation of the different types of attacks and under what kinds of situations each might be applicable. 6 videos11 readings2 assignments1 discussion prompt Continuing on our exploration of the fundamental concept of cryptography, this module will explain the Hash Function, its purpose and application, potential attack vectors, and the importance of hash functions on cryptographic design. Upon completion you will be able to understand the role that hash functions play in cryptography and how cryptographic hash functions differ from other types of hash functions. 5 videos8 readings2 assignments1 discussion prompt | 4 modules | Beginner level | null | https://www.coursera.org/learn/classical-cryptosystems | 98% |
6,082 | Future Ready Company Specialization | 2,700 | 4.8 | 58 | David Lewis | London Business School | ['Artificial Intelligence (AI)', 'Sustainability', 'Machine Learning', 'ESG', 'Agility', 'Corporate Social Responsibility', 'Digital transformation', 'Artificial Intelligence (AI)', 'Sustainability', 'Machine Learning', 'ESG', 'Agility', 'Corporate Social Responsibility', 'Digital transformation'] | For a company to stay relevant, the capacity to changeinsidehas to match the rate of changeoutside. And that’s a tall order in today’s volatile and unpredictable business environment. This specialization from London Business School is designed to help you future-proof your company – to make sense of the biggest external changes underway and to provide you with practical advice on what you should do differently. In four complementary courses, we provide you with a wealth of up-to-date examples of what leading companies are doing, and we show how you can move forward with your own adaptation plans, whatever your level of seniority. Applied Learning Project In each course, you'll be introduced to key concepts, case studies, scenario planning and worked examples throughout the courses. You will have the opportunity to study real-world business examples and world-class research, created and curated by the faculty members based on their extensive experience in business. You are encouraged to reflect and apply your learning in the discussion forums where you can share and develop your understanding with your peers from all around the world. Strategic Resilience: Explore the concepts and frameworks needed to ensure your organisation can adapt to a shifting business context Operational Resilience: Increase your awareness of the potential sources of risk in your supply chains and how you manage finance and information. Behavioural Resilience: Learn about team dynamics and how your role affects the people you manage. The Sustainability Challenge The Sustainability Advantage Sustainability Leadership in Action Sustainable Pathways to Value Creation and The Roadmap to Sustainability While other programmes are organised around AI technologies, this programme is focused on creating value in your business. Throughout the two phases of this programme, you'll gain a solid understanding of the characteristics of the technology and then work to gain clarity regarding your business challenge and your data source, so you can select the appropriate AI technologies to connect the two. Digital transformation is an incredible opportunity for both individuals and for organisations because it's an opportunity to personalise, to customise, to serve customers in new ways, to help them to achieve new things that matter to the world in which we live. Whatever level you are in your organisation, you have some mandate for taking digital transformation seriously within your own area of responsibility. | 4 course series | Intermediate level | 4 months (at 4 hours a week) | https://www.coursera.org/specializations/future-ready-company | null |
6,083 | Security Analyst Fundamentals Specialization | 11,390 | 4.8 | 857 | IBM Skills Network Team | IBM | ['Computer Security Incident Management', 'Data Breach', 'threat intelligence', 'Digital Forensics', 'cybersecurity analyst', 'Computer Security Incident Management', 'Data Breach', 'threat intelligence', 'Digital Forensics', 'cybersecurity analyst'] | There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a cybersecurity analyst. Throughout this specialization, you will learn concepts around digital forensics, penetration testing and incident response. You will learn about threat intelligence and tools to gather data to prevent an attack or in the event your organization is attacked. You will have the opportunity to review some of the largest breach cases and try your hand at reporting on a real world breach. The content creators and instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the System Analyst Fundamentals IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/security-analyst-fundamentalsOpens in a new tab Applied Learning Project Throughout the program, you will use virtual labs and internet sites that will provide you withpractical skills with applicability to real jobsthat employers value, including: Tools:e.g. Wireshark, IBM QRadar, IBM MaaS360, IBM Guardium, IBM Resilient, i2 Enterprise Insight Labs:SecurityLearningAcademy.com Libraries:Python Projects:Investigate a real-world security breach identifying the attack, vulnerabilities, costs and prevention recommendations. In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume. Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK. How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence. Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality. Explain the principles and importance of incident response in cybersecurity. Implement techniques for detecting and analyzing security incidents. Implement methods for collecting and examining digital data. Analyze and report digital forensic findings to support cybersecurity efforts. This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization.
Finally, you will explore the costs of data breaches through research studies and well known breaches.
This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course.
This course is intended for anyone who wants to explore examples of Cybersecurity breaches to work in the Cybersecurity field as a Cybersecurity Analyst or a Cybersecurity Specialist.
The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge.
In this course, you will learn to:
● Apply incident response methodologies.
● Research and describe a watering hole attack.
● Research and describe ransomware threats and the consequences to organization.
● Research and describe 3rd party breaches and how they affect an organization.
● Research and describe the effects of a phishing attack.
● Research and describe a point of sale attack and approximate cost of data breaches.
● Perform a case study on a current cyber attack and breach. | 3 course series | Beginner level | 1 month (at 10 hours a week) | https://www.coursera.org/specializations/security-analyst-fundamentals | null |
6,084 | Leading Healthcare Quality and Safety | 57,189 | 4.8 | 1,321 | Gregory Pawlson | The George Washington University | [] | Ensuring patient safety and healthcare quality is critical and should be a key focus of everyone in healthcare practice. This course provides healthcare practitioners and others with an introduction to the knowledge and skills needed to lead patient safety and quality improvement initiatives at the micro and macro levels. Participants will explore the foundations of health care quality and the science underlying patient safety and quality improvement, design and select effective health care measures, analyze patient safety problems and processes using tools such as human factors analysis, apply systematic approaches including the Plan-Do-Study-Act (PDSA) model to address quality improvement challenges, and learn strategies to lead a culture of change. The course takes a world view of patient safety and quality, linking participants to research and resources from the World Health Organization (WHO), the US Agency for Healthcare Research and Quality (AHRQ), the Joint Commission and other international organizations. Course highlights include personal stories, lessons learned from other industries and interviews with the President of the National Committee for Quality Assurance (NCQA) and other leaders in quality movement. Pawlson, g. & Johnson, J. (2021). Advancing Health Care Quality: Protecting Patients, Improving Lives. DEStech Publications Inc.
About The George Washington University School of Nursing
Ranked among the top nursing schools by U.S. News & World Report, the George Washington University School of Nursing educates and inspires nurses to provide high-quality, compassionate person-centered health care. The school develops leaders actively engaged in health promotion, patient advocacy and healthcare innovation, and prepares exceptional nurse educators who pursue quality and advance the profession. The School of Nursing is committed to improving the health and wellbeing of people and communities locally, nationally and globally. The school values lifelong learning and its students advance nursing practice, leadership and education as they make a difference in the world. Welcome to Module 1! During this module, you'll learn about the current state of healthcare quality and safety in the US and globally, and the essential characteristics and expected outcomes of safe, high-quality healthcare. We'll also discuss the core elements of quality improvement, and the data needed to assess the safety and quality of care. Finally, we'll examine lessons learned from other industries & disciplines that can be applied to healthcare improvement efforts. We're looking forward to getting started! 5 videos2 readings1 assignment3 discussion prompts Welcome to Module 2! This week, we examine the criticality of patient safety to healthcare and the sciences underlying patient safety. You'll learn a model for systems engineering and a process for anticipating and addressing medical errors. You'll also learn about the importance of a just culture approach to medical error prevention. 6 videos1 reading1 assignment2 discussion prompts Welcome to Module 3! This week we delve into measures and measurement. You'll learn to apply the basic Donebedian framework for measuring quality in healthcare in terms of structure, process and outcomes. We'll discuss the key attributes of useful (good) healthcare measures and the core concepts of validity and reliability. You'll also learn the most critical elements to consider in choosing and applying a measure or measures to measurement in a given health care setting or situation, and the key characteristics of a measurement process that must be present to provide information that is a valid and useful reflection of quality of care. 6 videos2 readings1 assignment2 discussion prompts Welcome to Module 4! This week you'll learn how to identify quality improvement opportunities and apply the PDSA cycle to address them. We'll also discuss the importance and benefits of team-based approaches to quality improvement, and the value of Health Information Technologies (HIT) and other innovations in improving health care quality. 6 videos1 reading1 assignment1 peer review2 discussion prompts Welcome to Module 5! This week we explore the importance of leadership in supporting and advancing quality and safety at all levels of the healthcare organization. We'll discuss strategies that contribute to a quality culture in health care, and examine different models of organizational change that you can apply as you lead your own quality and safety initiatives. 6 videos1 reading1 assignment2 discussion prompts | 5 modules | Beginner level | null | https://www.coursera.org/learn/quality-healthcare | 98% |
6,085 | Feminism and Social Justice | 121,610 | 4.8 | 6,174 | Bettina Aptheker | University of California, Santa Cruz | [] | "Feminism and Social Justice" is an adaptation of Distinguished Professor Bettina Aptheker's long-running course at UC Santa Cruz. In the course, Professor Aptheker presents a broad definition of feminism that serves to frame three significant events in the history of feminism and social justice: the Empire Zinc strike of 1951, the 1971-1972 trial of Angela Davis, and the #metoo Movement. Feminism is a movement, a philosophical perspective, and a driver of social change. It has various goals and constituencies, and it continues to be adapted in response to new conditions.
In this module, you will be introduced to Dr. Aptheker's working definition of feminism, which she has cultivated and refined over her prolific career. You will also have an opportunity to discuss the meaning and purpose of feminism with your fellow learners. 2 videos1 reading1 assignment1 discussion prompt In 1951, zinc miners in southwestern New Mexico went on strike in response to the Empire Zinc Company's discriminatory treatment of Mexican-American workers and their families. After the miners were prevented from protesting by a court order, their wives maintained the picket line.
In this module, you will learn about the causes, conditions, and outcomes of the strike. You will also hear the story of the controversial 1954 feature film (called "Salt of the Earth") that documented the struggle of its key figures. The entire film is available in the module. 2 videos1 assignment1 discussion prompt In 1970, FBI agents arrested the feminist scholar and activist Angela Davis for her alleged connection to the Soledad Brothers, inmates of Soledad Prison in central California who were accused of killing a guard. At the time of the arrest, President Richard Nixon referred to Davis as a "terrorist." In this module, you will hear Dr. Aptheker's personal experience of Davis' arrest and trial, and you will learn about the extraordinary movement that grew in support of Davis. 1 video1 assignment1 discussion prompt The hashtag "metoo" appeared on social media in 2017 in response to a number of high-profile sexual assault allegations in the entertainment industry. It quickly spread to other societal domains and continues to spur discussion and action around the world. In this module, you will learn about the causes and outcomes of the #metoo movement, and its contribution to feminism and social justice. You will also have an opportunity to discuss recent changes resulting from the #metoo movement with your fellow learners. 1 video1 assignment1 discussion prompt Dr. Aptheker writes and lectures on a variety of topics. You can find new materials that she produces in this optional module. 1 video1 reading | 5 modules | Beginner level | null | https://www.coursera.org/learn/feminism-social-justice | 99% |
6,086 | Intro to Operating Systems 2: Memory Management | 10,788 | 4.7 | 50 | Patrick Ester | Codio | ['Operating Systems', 'C Dynamic Memory Allocation'] | Learn the inner workings of operating systems without installing anything! This course is designed for learners who are looking to maximize performance by understanding how operating systems work at a fundamental level. The modules in this course cover segmentation, paging, swapping, and virtual memory.
To allow for a truly hands-on, self-paced learning experience, this course is video-free. Assignments contain short explanations with images and runnable code examples with suggested edits to explore code examples further, building a deeper understanding by doing. You’ll benefit from instant feedback from a variety of assessment items along the way, gently progressing from quick understanding checks (multiple choice, fill in the blank, and un-scrambling code blocks) to slowly building features, resulting in large coding projects at the end of the course. 2 readings1 app item 5 readings4 app items 5 readings4 app items 4 readings3 app items 4 readings3 app items | 5 modules | Advanced level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/codio-intro-to-operating-systems-2-memory-management | null |
6,087 | Ventilation, Life Safety, and Smoke Extraction in Building | Enrollment number not found | Rating not found | null | Subject Matter Expert | L&T EduTech | ['Ventilation for Buildings', 'Design of Lift Well/Lift Lobby Pressurization System'] | This course underscores the critical role of ventilation in maintaining indoor air quality, particularly in shared spaces like office environments. Using the example of an office space where numerous individuals continuously respire, the constant release of carbon dioxide necessitates a consistent introduction of fresh air to prevent air dilution. The natural ventilation system is explored in-depth, unraveling the mechanisms of the Stack effect and Wind effect. These concepts are not only instrumental in understanding natural ventilation but also serve as the basis for calculating pressure differentials between the windward and leeward sides of a building. Moving forward, the course delves into the basics of Mechanical Ventilation Systems, offering insights into their advantages and disadvantages compared to natural ventilation. This knowledge is crucial for selecting the appropriate ventilation system based on specific applications. Learners are guided through calculating ventilation equipment capacity using air flow rate calculation methods. Additionally, the course addresses the importance of Life Safety Systems in commercial buildings, covering various components that contribute to enhancing occupant safety.
The focus then shifts to the significance of Staircase Pressurization Systems in ensuring building occupant life safety during emergencies. The intricate process of creating pressurization in staircases for efficient building evacuation is explored, accompanied by a sample calculation to determine the required equipment capacity. By the course's conclusion, learners will be adept at conducting air flow rate and staircase pressurization calculations, drawing from practical experiences on large projects.
The course further expands its scope to Lift Well and Lift Lobby Pressurization Systems, explaining their critical role in maintaining safe exits during fire emergencies, thereby safeguarding both life and property. Learners gain an understanding of the guidelines set forth by the National Building Code (NBC) and the American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) regarding these pressurization systems. The course delves into considerations of air leakages and gains in lift lobbies and wells, aiding in the calculation of pressurization fan capacities to meet standards.
A crucial aspect covered in the course is the danger posed by smoke in emergency situations. Smoke extraction systems are explored in detail, encompassing various components and the requisite codes for designing such systems. National Building Code (NBC) standards are highlighted, providing students with a solid foundation for designing smoke extraction systems tailored to different spaces, including car parks, office spaces, and atriums.
Upon completing this course, students not only acquire practical skills in air flow rate and pressurization calculations but also gain a profound understanding of the standards and codes governing ventilation, life safety, and smoke extraction systems.
Target Learners:
1. Knowledge of Thermodynamics & Heat Transfer
2. Undergraduate students of Mechanical who are in either Vth, VIth, VIIth or VIIIth semester
3. Graduate students of Mechanical
4. Working professionals with B.Tech./B.E., in Mechanical
5. Diploma students of Mechanical This module begins the importance of Ventilation to maintain the Indoor Air Quality. Significance of ventilation can explain with an example of any office space, where many people are working together. As we know people are continuously doing respiration in which they are consuming oxygen and constantly releasing carbon dioxide diluting the indoor air constantly. To maintain the quality of indoor air, fresh air needs to be introduced continuously.
The module delves how the natural ventilation works and how Stack effect and Wind effect drive the Natural Ventilation. This concept is useful to calculate pressure difference between windward and leeward sides of the building
The module explores the basics of Mechanical Ventilation System and its merits and demerits over the Natural ventilation based on application. It will be help full to select ventilation system as per requirement. Learners will calculate the ventilation equipment capacity for given application using air flow rate calculation methods & learn the need of Life Safety System in Commercial building and its various component.
The module extends its focus to significance of Staircase Pressurization System for building occupant life safety. This will help to create pressurization in staircase which make pave to evacuate from building in emergency. Learners will understand very fascinating topic that how to arrive the required equipment capacity by understanding given sample calculation for given building layout. It will help to select equipment to match design condition.
After completion of this module learners will familiar to carry out air flow rate & staircase pressurization calculation based on L & T experience on very large project. 14 videos1 reading1 assignment The module begins with understanding significance of the Lift Well and Lift lobby pressurization system. Lift well & lift lobby pressurization system maintain safe exit during any fire emergency & save commodity and life.
Students will acknowledge what National Building Code (NBC) and American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE) says about the Lift Well and Lift Lobby Pressurization system. This will help students to be familiar with these standard and design Lift Well and Lift Lobby Pressurization system as per standard.
The module delves into various air leakages and air gains from/to the lift lobby and lift well which help to arrive the capacity of pressurization fan. This will help to calculate total air leakage & select fan capacity to maintain standard pressurization in lift lobby and lift well. Student will come to how smoke is dangerous the occupant life and why smoke extraction system is so much important.
The module explores the various component of Smoke Extraction system and code requirement while designing this system. Student will familiar with National Building Code (NBC) to design smoke extraction system. Students will understand minimum requirement for designing smoke extraction system for various spaces like Cark Park, Office spaces, Atriums, etc.
After completion of this module students will familiar to carry out lift well & lift lobby pressurization calculation based on L & T experience on very large project. Also, students will aware of smoke extraction system standards, codes & calculation for car park, office space & attriums. 11 videos1 assignment | 2 modules | Intermediate level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/ventilation-life-safety-and-smoke-extraction-in-building | null |
6,088 | Liberty Mutual Insurance Sales Agent Professional Certificate | Enrollment number not found | Rating not found | null | Liberty Mutual Insurance | Liberty Mutual Insurance | ['Sales Techniques', 'Prospecting and Lead Generation', 'Strategies for Building and Maintaining Relationships', 'Insurance Product Knowledge'] | This program will equip you with a comprehensive foundation in insurance and sales, empowering you to make a real difference in people’s lives while securing a promising career for yourself with generous earning potential. The insurance sector is experiencing a surge in job openings, with companies struggling to hire quickly enough as they grow their business. Learn how to become a trusted advisor for your customers by having a deep understanding of different policy options, mastering the art of explaining insurance coverage and learning how to best protect future customers with personalized insurance solutions. Our unique approach combines industry-specific content with engaging, real-life examples and first-hand tips from seasoned experts using everyday language rather than confusing insurance jargon. By earning this certification, you'll stand out as a highly-trained and knowledgeable professional ready to thrive in the dynamic world of insurance sales. Liberty Mutual, a Fortune 100 property and casualty insurance company with over a century of experience, ensures you're learning from the best in the industry. Applied Learning Project Project 1: Customized Insurance Proposals You’ll develop tailored insurance proposals for various typical client scenarios. This task will challenge you to consider clients' unique risks and needs while highlighting key features and benefits of your products. Project 2: Market Launch Sales Plan You’ll create a detailed sales plan for launching an insurance product to your target market with a goal of securing new clients. You’ll master prospecting and lead generation techniques, craft compelling consultation strategies and solutions, and apply relationship-building and client retention strategies. Project 3: Professional Skills Showcase You’ll develop a resume addendum to showcase the critical professional skills essential for an insurance sales agent to demonstrate industry readiness. Highlight your experience using these skills, how you demonstrate them in your work, and the ways you’re honing them through continuous training, coaching, and practice. Build a comprehensive understanding of the insurance industry, its principles, risk management strategies, and regulatory frameworks. Gain in-depth knowledge of a wide range of insurance products, including personal, commercial, and specialized insurance segments. Master insurance sales: prospecting, client acquisition, needs analysis, presenting solutions, and long-term relationship management. Develop key skills, such as communication, time management, goal setting, sales performance analysis, ethical behavior, and professional networking. | 4 course series | Beginner level | 4 months (at 4 hours a week) | https://www.coursera.org/professional-certificates/libertymutual-insurancesalesagent | null |
6,089 | A Brief History of Human Spaceflight | 17,567 | 4.4 | 427 | Dr. Chuck Layne | University of Houston | [] | This course provides a view of the history of spaceflight, from early writings telling of human's fascination of space through the early Russian and American space stations. Developed as an interesting and entertaining slice of space history that is accessible to anyone with an interest in human spaceflight A welcome video and course syllabus 1 video1 reading Learn about the Apollo 11 moon landing with interesting interviews with the astronauts who made history 1 video1 reading1 assignment Learn about how previous generations thought about the possibility of space travel 1 video1 reading3 assignments Learn about how rockets were developed from the ancient Chinese through today's powerful rockets 1 video1 reading2 assignments Learn about steps the Soviet Union took to launch the first man in space 1 video1 reading3 assignments Learn about the United State's first efforts to put a human in space 1 video1 reading2 assignments Learn about how NASA refined their human space flight program in preparation for a moon landing 1 video1 reading3 assignments Learn about the last technical innovations required to land a human on the moon 3 videos1 reading3 assignments Learn about how the early steps taken to send humans in space for extended missions 1 video1 reading2 assignments Learn how the Soviet Union and US began to learn to collaborate in space 1 reading1 assignment Learn about activities on the Russian Mir space station and the extensive activities with the Americans 1 reading3 assignments Learn about the various disasters that occur during the period of human spaceflight 1 reading2 assignments | 12 modules | null | 20 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/human-spaceflight | 95% |
6,090 | Agroforestry II: Major Systems of the World | Enrollment number not found | Rating not found | null | Jennifer Vogel, Online Programs Coordinator | University of Florida | ['Biology', 'Forestry', 'Agronomy', 'Ecology', 'Horticulture'] | Welcome to Agroforestry II: Major Systems of the World A focused exploration of agroforestry practices from around the world. This is the second module of the five-module course covering the various aspects of agroforestry including the global distribution of the practices, their underlying principles, and major scientific advances during the past nearly five decades, presented by leading experts in the field. Students will gain extensive knowledge and skills related to agroforestry systems, best practices and scientific management that can be useful in promoting their professional development and sharpening their land management skills. Welcome! Thank you for joining us in this continuing exploration of agroforestry practices, history and developments from around the world. This course is the second module of a series of courses covering many aspects of agroforestry by premiere experts in the field. Students will gain extensive knowledge and skills related to agroforestry systems, best practices and active management that they can use in their land management and planning. 2 readings1 assignment Exploring traditional and modern agroforestry systems of different climate zones 7 videos2 assignments | 2 modules | Intermediate level | 7 hours to complete (3 weeks at 2 hours a week) | https://www.coursera.org/learn/agroforestry2 | null |
6,091 | Collaborative Robot Safety: Design & Deployment | 9,058 | 4.7 | 255 | Brian Carlisle | University at Buffalo | [] | As robots evolve and increasingly interact with humans, enhancing the safety of personnel working with these “collaborative robots” (cobots) is vital. This course equips you to assess the safety of a collaborative robot workcell and prevent the chances of injury or harm. It imparts industry-endorsed safety standards, technical report recommendations and best practices from the International Organization for Standardization (ISO), Robotic Industries Association (RIA) and Occupational Safety and Health Administration (OSHA). Learners are introduced to similarities and differences between traditional robots, cobots and conventional machinery before delving into risk assessments, causes of robot accidents and collaborative applications. Material also includes key design techniques for reducing collision forces and a methodology for safety testing. Main concepts are delivered through videos, demos and hands-on exercises. To learn more, please watch the overview video by copying and pasting the following link into your web browser: https://www.youtube.com/watch?v=j-NU710WjM0. In this module, we will discuss safety training, robots, conventional machinery, risk assessments and standards. 8 videos5 readings5 assignments In this module, we will discuss accidents and design of safe work cells. 5 videos3 readings4 assignments This module contains information regarding robot applications and safety. 7 videos3 readings4 assignments This module provides information on collaborative work cell design, risk and design. 1 video3 readings2 assignments | 4 modules | Beginner level | null | https://www.coursera.org/learn/collaborative-robot-safety | 97% |
6,092 | The People, Power, and Pride of Public Health | 6,445 | 4.7 | 240 | Beth A. Resnick, MPH | Johns Hopkins University | [] | The People, Power, and Pride of Public Health provides an engaging overview of the incredible accomplishments and promise of the public health field. The first module includes interviews with legendary public health figures whose work led to millions of lives saved with vaccines, air bags and car seats, and the federal Women Infants and Children (WIC) nutrition program. The second module brings key public health tools to life -- including use of data, communications, and policy - through discussions with experienced professionals who have used these tools to save lives. The third module includes a "Carpool Karaoke"-style trip through Baltimore County, Maryland with NACCHO President Dr. Umair Shah to see and hear real public health workers talking about how they serve their communities. Learners will come away from this course with a deeper understanding of the public health field and a greater enthusiasm for their own work in public health.
Preview the course on YouTube: goo.gl/RXKbUr In this module, we’ll hear from three public health heroes about some incredible accomplishments that have saved millions of lives in the United States and around the world. 8 videos1 assignment3 discussion prompts In this module, we’ll discuss examples of how public health saves lives with data, messaging, and policy changes. 6 videos1 assignment4 discussion prompts In this module, Harris County Health Officer Dr. Umair Shah drives “carpool karaoke”- style around Baltimore County, Maryland to hear from real health department workers about their work. 6 videos1 assignment3 discussion prompts | 3 modules | Beginner level | 4 hours to complete (3 weeks at 1 hour a week) | https://www.coursera.org/learn/public-health | null |
6,093 | Nursing Research: Principles and Methods(护理研究:基本原理与方法) | Enrollment number not found | Rating not found | null | 于明明 | Peking University | [] | Are you a nursing professional looking to enhance your research skills and advance your career? Look no further than our comprehensive Nursing Research course! Designed for nurses at all levels of experience, our course will provide you with the knowledge and tools you need to conduct high-quality nursing research and contribute to the field. Our course is the perfect opportunity to gain the skills and knowledge needed to conduct high-quality research. In this course, you will learn about the fundamentals of nursing research, including identifying research question, literature search and review, study design, data collection, research proposal and ethical considerations, and paper writing.
Whether you are a new nurse looking to build your research skills or an experienced professional seeking to expand your knowledge, our Nursing Research course is the perfect choice. Our experienced instructors will guide you through the process, providing valuable insights and practical tips along the way. With flexible scheduling and online learning options, you can fit the course into your busy schedule and take your career to the next level.
If you are ready to take your nursing career to the next level, enroll in our Nursing Research course today. Elevate your skills, enhance your knowledge, and contribute to the future of nursing practice and patient care. We look forward to helping you achieve your goals! Join us today and take the first step towards becoming a successful nurse researcher! 4 videos 4 videos 10 videos 4 videos 6 videos 4 videos 9 videos 3 videos 1 peer review | 9 modules | Intermediate level | 9 hours to complete (3 weeks at 3 hours a week) | https://www.coursera.org/learn/nursing-research-principles-and-methods | null |
6,094 | Global Financial Markets and Instruments | 116,622 | 4.5 | 2,126 | Arzu Ozoguz | Rice University | ['Bond Valuation', 'Financial Markets', 'Finance', 'Investment'] | Get a running start in the high-stakes world of financial investment! This first course is designed to help you become an informed investor by providing you with the essential concepts for long-term success in managing money. You’ll start by learning the role of financial markets and financial assets in a well-functioning economy. From there, you’ll learn about the wide range of financial instruments available in major asset classes, their features and valuations. You’ll explore how financial markets actually operate in the real world, focusing on how and where securities are traded and how various market types differ from one another in practice. You will also learn the basics of algorithmic trading, dark pools, buying on margin and short selling.
By the end of the course, learners will be able to:
• List and distinguish the different financial instruments available to an investor
• Compare global financial markets
• Explain the features of equity, debt, and derivative instruments
• Define traditional and alternative asset classes
• Discuss different trading venues and mechanics of securities trading
• Discuss the current trends affecting today’s financial markets
This course is designed to be accessible for students of all knowledge levels and gives you the actionable foundation needed to manage money in a post-crisis world.
________________________________________
WEEK 1
Module 1: Introduction & Review of Elementary Finance Tools
This module introduces the Investment and Portfolio Management Specialization, which is made up of four courses. This module discusses how the first course, Global Financial Markets and Assets, is organized. It outlines the different stages of the investment management process, which guides the focus of the Specialization. It also reviews basic finance concepts and tools such as time value of money, computing returns, discounting and compounding.
Topics covered include:
• Familiarize with the organization of the class
• Meet the professor and your peers
• Explain the investment management process
• Review elementary concepts in finance
• Compute present value or future value of a single cash flow
• Compute present value of future value of a stream of cash flows
• Define an annuity or perpetuity
• Apply time value of money tools to solve basic mortgage, loan or retirement problems
________________________________________
WEEK 2
Module 2: Financial system & financial assets: fixed income securities
In this and the next two modules, we cover the key institutional features of financial markets and instruments. We ask the following questions: Why do financial markets exist? What role do they play? What are financial assets and how are they different than real assets? How does it all come together? Basically, this is where I hope you will get to see the big picture of the entire financial system and how it comes together.
Module 2 focuses on fixed income securities. We'll get started with a review of basics of bond valuation. You will learn about short-term money market instruments, U.S. Treasury securities as well as corporate bonds. After module 2, you will be able to describe fixed income securities, be familiar with their institutional features, and identify their cash flows. Finally, you will learn how to value fixed income securities such as Treasury bills, zero-coupon or coupon-bonds and compute yields.
Topics covered include:
• Explain the roles of financial markets
• Distinguish between real and financial assets
• Define and explain money market instruments, zero-coupon and coupon- bonds and features
• Identify the cash flows associated with fixed-income securities
• Define and explain bond market features
• List the different types of Treasury securities and explain pricing and quoting conventions
• List and define other long-term debt instruments such as corporate bonds, mortgage-backed securities, sovereign debt
• Find the value of a zero-coupon or coupon-bonds
________________________________________
WEEK 3
Module 3: Financial system & financial assets: equity securities and derivatives
In Module 3, we continue our overview of financial markets and instruments. We next focus on two other major asset classes: equity securities and derivative instruments. You will learn about how equity differs from fixed income securities, the cash flows associated with stock and preferred stock and how to find the value of a share. You will also learn about option strategies. After completing module 3, you will be able to describe all major asset classes, including derivative instruments such as options, forwards and futures. You will be able to explain how these differ from each other and their payoffs.
Topics covered include:
• Distinguish between equities and fixed income securities
• Define and explain the features of equity securities
• Identify the cash flows associated with equity securities
• Explain dividend discount model
• Find the value of a share of common stock or preferred stock
• Define and list different types of derivative securities
• Explain option payoffs
• Distinguish between a forward and futures contract
• Explain forward and futures payoffs
• Identify traditional and alternative asset classes
________________________________________
WEEK 4
Module 4: Organization of financial markets and securities trading
In this module, we discuss how financial markets actually work. We will talk about different trading venues and the mechanics of securities trading. I will emphasize a lot of terminology and the latest trends in securities trading to familiarize you with the institutional workings of financial markets. After this module, you will be able to compare different trading venues, trading mechanisms, and be able to explain different types of orders, including transactions like margin buying and short- selling; you will be familiar with the language and terminology you need in order to become an informed practitioner of investments.
Topics covered include
• Explain the roles of corporations, households, government, and financial intermediaries in the financial system
• Explain price discovery process
• Define different type of orders
• Distinguish between dealer vs. auction markets; different trading platforms
• Explain margin buying and short-selling transactions
• Understand the current trading environment such as algorithmic or high frequency trading, dark pools etc. This module introduces the Investment and Portfolio Management Specialization, which is made up of four courses. This module discusses how the first course, Global Financial Markets and Instruments, is organized. It outlines the different stages of the investment management process, which guides the focus of the Specialization. It also reviews basic finance concepts and tools such as time value of money, computing returns, discounting and compounding. 17 videos15 readings5 assignments2 discussion prompts In this and the next module, we cover the key institutional features of financial markets and instruments. We ask the following questions: Why do financial markets exist? What role do they play? What are financial assets and how are they different than real assets? How does it all come together? Basically, this is where I hope you will get to see the big picture of the entire financial system and how it comes together. Module 2 focuses on fixed-income securities. We'll get started with a review of basics of bond valuation. You will learn about short-term money market instruments, U.S. Treasury securities as well as corporate bonds. After module 2, you will be able to describe fixed income securities, be familiar with their institutional features, and identify their cash flows. Finally, you will learn how to value fixed income securities such as Treasury bills, zero-coupon or coupon-bonds and compute yields. 9 videos11 readings5 assignments1 discussion prompt In Module 3, we continue our overview of financial markets and instruments. We next focus on two other major asset classes: equity securities and derivative instruments. You will learn about how equity differs from fixed income securities, the cash flows associated with stock and preferred stock and how to find the value of a share. You will also learn about option strategies. After completing module 3, you will be able to describe all major asset classes, including derivative instruments such as options, forwards and futures. You will be able to explain how these differ from each other and their payoffs. 7 videos9 readings3 assignments In this module, we discuss how financial markets actually work. We will talk about different trading venues and the mechanics of securities trading. I will emphasize a lot of terminology and the latest trends in securities trading to familiarize you with the institutional workings of financial markets. After this module, you will be able to compare different trading venues, trading mechanisms, and be able to explain different types of orders, including transactions like margin buying and short-selling; you will be familiar with the language and terminology you need in order to become an informed practitioner of investments. 8 videos10 readings3 assignments | 4 modules | null | 19 hours to complete (3 weeks at 6 hours a week) | https://www.coursera.org/learn/global-financial-markets-instruments | 90% |
6,095 | Finance of Mergers and Acquisitions: Designing an M&A Deal | 9,958 | 4.8 | 41 | Heitor Almeida | University of Illinois Urbana-Champaign | ['Capital Structure', 'Financial Modeling', 'Mergers And Acquisitions', 'Valuation', 'Leveraged Buyout'] | This course focuses on the theory and practice of mergers and acquisitions (M&A), with a focus on the Finance. The Finance of M&A uses tools from different areas of Finance to help managers and investment bankers design successful M&A deals. In particular, we will learn to value and price M&A deals and how to choose the optimal financing mix for an M&A deal. The course focuses on all the major types of M&A deals including strategic M&A, private equity leveraged buyouts (LBOs), and restructuring deals such spinoffs and asset transfers. The course will benefit any student who desires to increase their ability to understand and execute M&A deals, including (but not limited to), entrepreneurs, consultants, bankers, investors, analysts, corporate managers, marketers, strategists, and deal-makers of all types. The course will also deepen students’ understanding of financial modeling and capital structure, both in theory and practice. You will learn the basic accounting and taxation principles of M&A deals, and how accounting and taxation choices interact and potential implications for M&A financing decisions. This module will also discuss the key trade-offs that acquirers and targets face when deciding between cash and stock deals, including taxes, valuation issues and uncertainty about synergies. 13 videos6 readings6 quizzes M&A deals can cause significant changes in corporate leverage. In this module you will learn how leverage affects company value both in theory and in practice. You will also learn how to choose the optimal financing mix in an M&A deal, using the trade-off model of capital structure and other state-of-the art tools including credit ratings and debt structure. 10 videos1 reading3 quizzes Private equity deals have become an essential component of the M&A market and studying private equity deals is an excellent learning tool for an M&A practitioner. You will learn the Finance issues that are essential to private equity deals including highly leveraged valuation, complex financing structures, and the key sources of value creation. You will also learn the complete modeling of a leverage buyout (LBO), including valuation, financing, exit plans and calculation of IRR (internal rates of return). 10 videos1 reading5 quizzes Companies create value not only by buying assets but also by selling assets and downsizing. You will learn how and why companies can create value by breaking up. This module will also discuss the specifics of divestitures and spin-offs, including tax implications and the benefits of corporate focus. 7 videos2 readings2 quizzes1 peer review 1 video2 readings1 plugin | 5 modules | Intermediate level | null | https://www.coursera.org/learn/mergers-acquisitions-ma-deal | null |
6,096 | Anatomy: Cardiovascular, Respiratory and Urinary Systems | 41,533 | 4.8 | 1,012 | Glenn M. Fox | University of Michigan | ['Cardiovascular system', 'human anatomy', 'Respiratory system', 'urinary system'] | In this anatomy course, part of the Anatomy Specialization, you will explore the interactive relationships of the cardiovascular, respiratory and urinary systems, and the roles they play in your body. This course is a primer for the cardiovascular, respiratory, and urinary systems in which students learn the pertinent details of the structures and functions through a combination of lectures, videos, labeling activities and quizzes. 8 videos4 readings9 assignments3 discussion prompts 12 videos11 assignments3 discussion prompts 9 videos11 assignments2 discussion prompts 8 videos2 readings7 assignments3 discussion prompts | 4 modules | Beginner level | null | https://www.coursera.org/learn/anatomy403-2x | 98% |
6,097 | JavaScript Deep Dive | Enrollment number not found | 4.6 | 10 | Per Harald Borgen | Scrimba | ['Computer Science', 'Computer Programming', 'Web Development', 'JavaScript'] | If you want to be a developer, the language to learn is JavaScript. It’s the engine of the web and if you know JavaScript, you can make software usable by everybody on any possible device. However, navigating the JavaScript ecosystem today is harder than ever before. What exactly do you need to learn? And how do you learn it all? Where do you even begin?
Welcome to "JavaScript Deep Dive", a course designed to teach you JavaScript in the best way possible, so you can build amazing apps, master the language, and transform your career.
You’ll learn next-level JavaScript from the beginning, so that you later can adapt any JavaScript library or framework you want to learn (like React, Angular, Vue).
You’ll learn concepts essential to making any serious app or program, break through the hard parts of the language, all while working through fun coding challenges to practice all of these concepts. And to top it off, you’ll solidify your learning by building practical, real-world apps. In this module, you will learn the basics of JavaScript, like Variables, Functions, Data Types, and Conditionals. 3 assignments33 plugins In this module, you will learn about complex data types like Arrays, Objects, Sets, and Maps. 3 assignments37 plugins In this module, you will learn how to work with the DOM to make websites interactive, and how to run asynchronous operations in JavaScript. 2 assignments16 plugins In this module, you will learn how to build two epic projects: a Google Keep clone and a Hacker News clone. You will also learn some essential concepts in-between to level up your project-builing skills. 1 assignment27 plugins | 4 modules | Intermediate level | 16 hours to complete (3 weeks at 5 hours a week) | https://www.coursera.org/learn/javascript-deep-dive | null |
6,098 | UX Design Fundamentals | 119,785 | 4.8 | 2,165 | Michael Worthington | California Institute of the Arts | ['Adobe Illustrator', 'Adobe Indesign', 'Adobe XD', 'Marvel', 'InVision'] | This hands-on course examines how content is organized and structured to create an experience for a user, and what role the designer plays in creating and shaping user experience. You will be led through a condensed process that acts as a roadmap for developing robust UI/UX design: from ideation and sitemapping, to the creation of paper and digital prototypes. Building on the design skills learned in Visual Elements of User Interface Design, you will apply this methodology to produce a digital prototype for a multi-screen app of your own invention. By the end of this course, you will be able to describe and apply current best practices and conventions in UX design, and employ the fundamental principles of how UX design functions to shape an audience's experience of a given body of content.
This is the second course in the UI/UX Design Specialization, which brings a design-centric approach to user interface (UI) and user experience (UX) design, and offers practical, skill-based instruction centered around a visual communications perspective, rather than on one focused on marketing or programming alone.
These courses are ideal for anyone with some experience in graphic or visual design and who would like to build their skill set in UI or UX for app and web design. It would also be ideal for anyone with experience in front- or back-end web development or human-computer interaction and want to sharpen their visual design and analysis skills for UI or UX. Welcome! In this first module I will summarize the assignments and expectations of this course. 4 videos9 readings Your assignment at the end of this week is the first stage in a multi-step process towards developing a clickable prototype: coming up with a clearly articulated idea for an app with a specific goal in mind. So this week we will focus on how to articulate and structure your ideas and goals, how to use naming and language as a part of your app’s identity. We will also look at audience research and user centered design. 8 videos2 readings1 assignment1 peer review1 discussion prompt This week we’re going to continue to develop, plan, and test your app idea. We’ll start by sketching out more extensive content and mapping it into a structure. To test what aspects of your app are working, we’ll look at how to create a non-visual paper prototype and work our way towards a sitemap. While you’re developing the logic of your app, you’ll also begin to develop the look and feel of it: the visual development process. 8 videos2 readings1 assignment3 peer reviews1 discussion prompt At this stage in our process we are going to take our site map, look and feel research, and user testing to the next level in order to get a more accurate static prototype. By building a wireframe of our interface, we’ll figure out what goes where, and on which pages, utilizing our user testing information to figure out the hierarchy and structure of our app. This week is about the logic and functionality of our interface, and how it’s actually going to work within the app. 10 videos1 reading2 assignments1 peer review In this final week of the course, you will be taking your wireframes or app screens and make a simple functioning digital prototype to simulate the experience of interactivity. We’ll be using simple prototyping software to put your static screens into a realistic context, and simulating interaction in order to understand how your app feels, in order to troubleshoot and fix problems. This is the part of the course where all your talents come together! For me this is the most exciting part of UI/UX development, when it all starts to become real and you have a believable prototype in your hands. 9 videos4 readings1 assignment1 peer review | 5 modules | Beginner level | null | https://www.coursera.org/learn/ux-design-fundamentals | 97% |
6,099 | Renew your CBRS Professional Installer certification | Enrollment number not found | Rating not found | null | Google | Google - Spectrum Sharing | [] | This course is for existing CBRS Certified Professional Installers who want to renew their certification. You will find practical information about the re-certification process and how to install your new certificate as well as all the modules in the basic CBRS Certification training material. No exam is required to renew the certification.
Upon completing the course , you will receive your CPI credentials and your new certificate will be automatically registered with WinnForum.
If you are new to CBRS or want to get certified for the first time check out our Become a CBRS Professional Installer course <coursera.org/learn/google-cbrs-cpi>. This is the only required module. Once you have filled out the form at the end of this module, you have completed all necessary steps. You should expect to receive your renewed credentials at least 3 business days before your certificate expired. 1 video1 reading1 plugin A quick overview of shared spectrum and terminology. This module is entirely optional and is being made available for your convenience. As long as you have filled out the form in the previous module, you will still receive your replacement credentials. 3 videos2 readings2 assignments What are CPIs and why are they needed? This module is entirely optional and is being made available for your convenience. 1 video1 assignment Terminology and concepts. This module is entirely optional and is being made available for your convenience. 1 video1 assignment Detailed information on how to fulfill your responsibilities. This module is entirely optional and is being made available for your convenience. 7 videos6 assignments The path to become CPI certified. This module is entirely optional and is being made available for your convenience. 1 video1 assignment Continuing responsibilities for the CPI and TPA. This module is entirely optional and is being made available for your convenience. 1 video1 reading1 assignment | 7 modules | Advanced level | 2 hours to complete | https://www.coursera.org/learn/google-cbrs-cpi-renewal | null |
Subsets and Splits