Master Computer Science on Coursera




E.g., 2016-07-29
E.g., 2016-07-29
E.g., 2016-07-29
Sep 8th 2016

Ce cours vous explique le fonctionnement des réseaux de données tels qu'Internet ou les réseaux téléphoniques qui permettent la communication et l'accès à l'information. Le cours décrit le vocabulaire, les concepts et les mécanismes communs à l'ensemble des réseaux informatiques. Ce MOOC décrit les protocoles de l'Internet TCP, UDP et IP.

No votes yet
Aug 2nd 2016

This is an advanced course for operations staff and others interested in administering MongoDB deployments. It is a deeper dive into many of the topics of M102: MongoDB for DBAs and several additional subjects.

Average: 5.7 (6 votes)
Aug 2nd 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Java driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 8 (5 votes)
Aug 2nd 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Python driver. We will also cover working in sharded and replicated environments. In the course, you will build a blogging platform, backed by MongoDB. A brief Python introduction is included in the course.

Average: 5.4 (8 votes)
Aug 2nd 2016

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Node.js driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 2.9 (10 votes)
Aug 2nd 2016

Learn everything you need to know to administer a MongoDB installation in production. This course begins by assuming you have no experience with MongoDB, taking you through the basics of installation. Then you will learn about JSON and Mongo's extensive query capabilities through the Mongo shell. We will cover importing, and exporting data into Mongo. After that, we cover replication and fault tolerance. Then it is on to scaling out with MongoDB, including indexing, performance tuning, monitoring, and sharding. Finally, we cover backups and recovery. No prior experience with MongoDB is assumed for this course but a knowledge of administration of another database will be helpful.

Average: 9 (2 votes)
Aug 1st 2016

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

No votes yet
Aug 1st 2016

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 2 (5 votes)
Jul 25th 2016

Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages.

Average: 10 (1 vote)
Jul 25th 2016

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

No votes yet
Jul 25th 2016

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 6 (5 votes)
Jul 18th 2016

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 8 (1 vote)
Jul 18th 2016

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare.

No votes yet
Jul 18th 2016

The Arduino is an open-source computer hardware/software platform for building digital devices and interactive objects that can sense and control the physical world around them. In this class you will learn how the Arduino platform works in terms of the physical board and libraries and the IDE (integrated development environment).

Average: 9 (1 vote)
Jul 18th 2016

Arduino senses the environment by receiving inputs from add-on devices such as sensors, and can control the world around it by adjusting lights, motors, and other actuators.

Average: 4 (4 votes)
Jul 18th 2016

The Raspberry Pi is a small, affordable single-board computer that you will use to design and develop fun and practical IoT devices while learning programming and computer hardware.

Average: 7.2 (6 votes)
Jul 18th 2016

The Raspberry Pi uses a variety of input/output devices based on protocols such as HDMI, USB, and Ethernet to communicate with the outside world. In this class you will learn how to use these protocols with other external devices (sensors, motors, GPS, orientation, LCD screens etc.) to get your IoT device to interact with the real world.

No votes yet
Jul 18th 2016

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.

Average: 8.3 (3 votes)
Jul 18th 2016

The explosive growth of the “Internet of Things” is changing our world and the rapid drop in price for typical IoT components is allowing people to innovate new designs and products at home.

Average: 3.7 (9 votes)
Jul 17th 2016

La posibilidad de acceder a gran cantidad de información es una de las grandes virtudes de internet, pero a la vez es un problema. Se hace necesario entonces, disponer de buenos criterios y herramientas para encontrar lo que buscamos y las mejores técnicas para mejorar nuestro filtrado, obtener información valiosa y transformarla en significativa para la construcción de conocimiento.

Average: 6 (5 votes)

Pages

 

Tell your friends: