Master Computer Science on Coursera




E.g., 2016-06-26
E.g., 2016-06-26
E.g., 2016-06-26
Jun 13th 2016

Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.

Average: 3.5 (13 votes)
Jun 1st 2016

Learn how to develop responsive and adaptive consumer apps with Windows 10 and the Universal Windows Platform and publish to the app store. Want to be an app developer? Get your start with Windows 10. In this app development course, you’ll learn the basic concepts of consumer app development that can be used across platforms and how to develop responsive and adaptive apps that can be deployed across a wide range of Windows 10 devices.

No votes yet
May 30th 2016

Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages.

No votes yet
May 30th 2016

Learn Power BI, a powerful cloud-based service that helps data scientists visualize and share insights from their organizations’ data. Power BI is quickly gaining popularity among professionals in data science as a cloud-based service that helps them easily visualize and share insights from their organizations’ data.

Average: 9 (1 vote)
May 26th 2016

Comment les données sont acheminées dans l'Internet ? Comment améliorer la transmission de ces données ? Dans ce MOOC, nous abordons les problématiques de routage interne et externe et la mise en place de qualité de service par réservation de ressource ou par ingénierie de trafic dans les réseaux. Vous vous exercerez à la mise en place de qualité de service au-travers de plusieurs protocoles, exercices et "LAB".

Average: 1 (1 vote)
May 24th 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Java driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 9.7 (3 votes)
May 24th 2016

This is an advanced course for operations staff and others interested in administering MongoDB deployments. It is a deeper dive into many of the topics of M102: MongoDB for DBAs and several additional subjects.

Average: 5.7 (6 votes)
May 24th 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Python driver. We will also cover working in sharded and replicated environments. In the course, you will build a blogging platform, backed by MongoDB. A brief Python introduction is included in the course.

Average: 5.4 (8 votes)
May 24th 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Node.js driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 2.8 (9 votes)
May 24th 2016

Learn everything you need to know to administer a MongoDB installation in production. This course begins by assuming you have no experience with MongoDB, taking you through the basics of installation. Then you will learn about JSON and Mongo's extensive query capabilities through the Mongo shell. We will cover importing, and exporting data into Mongo. After that, we cover replication and fault tolerance. Then it is on to scaling out with MongoDB, including indexing, performance tuning, monitoring, and sharding. Finally, we cover backups and recovery. No prior experience with MongoDB is assumed for this course but a knowledge of administration of another database will be helpful.

Average: 9 (2 votes)
May 24th 2016

In this interactive computer science course from MIT you’ll learn how to turn a processor into an entire computer system. Digital systems are at the heart of the information age in which we live, allowing us to store, communicate and manipulate information quickly and reliably. This computer science course is a bottom-up exploration of the abstractions, principles, and techniques used in the design of digital and computer systems. If you have a rudimentary knowledge of electricity and some exposure to programming, roll up your sleeves, join in and design a computer system!

No votes yet
May 23rd 2016

This course is a hands-on introduction to internet measurements. You will learn about measuring the structure of the internet and the routes through that structure, about delays, losses and connectivity, about bandwidth, and about traffic.

Average: 10 (1 vote)
May 23rd 2016

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.

Average: 10 (1 vote)
May 23rd 2016

Coproduit par l'INP Toulouse et l'INSA Toulouse, ce MOOC constitue un module de positionnement général des systèmes embarqués et objets connectés dans leurs contextes opérationnels. Fortement novateur, il aborde ces systèmes selon un ensemble de points de vue pluridisciplinaires. L'objectif de ce MOOC est de vous permettre d'acquérir une démarche méthodologique, de mettre en place une pensée globale prenant en compte l'écosystème du domaine des systèmes embarqués et objets connectés dans une finalité de compréhension générale du système.

No votes yet
May 16th 2016

The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Average: 7.7 (7 votes)
May 16th 2016

What makes WiFi faster at home than at a coffee shop? How does Google order its search results from the trillions of webpages on the Internet? Why does Verizon charge $15 for every GB of data we use? Is it really true that we are connected in six social steps or less? These are just a few of the many intriguing questions we can ask about the social and technical networks that form integral parts of our daily lives. This course is about exploring the answers, using a language that anyone can understand.

Average: 10 (2 votes)
May 16th 2016

Learn how to make your application lifecycle faster and more predictable for both developers and the operations team. DevOps is the union of people, process and products to enable the continuous delivery of value to end users. It aims to create a culture and environment where building, testing, and releasing software can happen rapidly, frequently, and more reliably, so you can innovate like a startup and scale for the enterprise.

No votes yet
May 16th 2016

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 4.5 (4 votes)
May 16th 2016

Learn how to plan and implement enterprise content management practices leveraging Microsoft SharePoint. Ever wanted to know how to make your content easier to find via search? Or how to best support users’ ingestion and use of content in SharePoint? Or how to not make SharePoint a glorified document storage?

No votes yet
Self Paced

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.

Average: 4.8 (6 votes)

Pages

 

Tell your friends: