To Be Announced

A lo largo de este curso vamos a estudiar desde cero el fenómeno de las redes sociales, profundizando en las Comunidades virtuales y los nuevos roles como el de Community Manager o el de curador de contenidos.

0
No votes yet
September 2014

Se conocerán los distintos sistemas de georreferenciación/navegación aplicados a dispositivos móviles, la estructura de los Sistemas de Información Geográfica (SIG) y su aplicabilidad a la gestión del territorio y se describirán los sistemas de comunicación existentes (GPRS/UMTS, internet), con el objeto de analizar las aplicaciones a la ingeniería y la gestión del territorio que proporciona la integración de estos tres sistemas en los dispositivos móviles. Asimismo, se describirán los principales software de navegación y gestión de la información (SIG) existentes en el mercado para dispositivos móviles. Por último, se realizara una valoración de las distintas aplicaciones que pueden proporcionar los dispositivos móviles para la gestión del territorio, para la ingeniería, geografía, geología, ciencias medio ambientales…

0
No votes yet
Sep 22nd 2014

This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.

3
Average: 3 (2 votes)
Sep 15th 2014

Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.

0
No votes yet
Aug 26th 2014

In this course, you will explore several structured, risk management approaches that guide information security decision-making.

8
Average: 8 (1 vote)
Aug 26th 2014

Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.

0
No votes yet
Aug 18th 2014

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

0
No votes yet
Aug 1st 2014

Develop a good working knowledge of Linux using both the graphical interface and command line, covering the major Linux distribution families.

0
No votes yet
Self Paced Course - Start anytime

CSCO 2020 is the second of four course series designed by Cisco to guide the student toward the CCNA certification. CCNA 2 focuses on routing fundamentals.

10
Average: 10 (1 vote)
Self Paced Course - Start anytime

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Jul 21st 2014

In this course----the third in a trans-institution sequence of MOOCs on Mobile Cloud Computing with Android--we will learn how to connect Android mobile devices to cloud computing and data storage resources, essentially turning a device into an extension of powerful cloud-based services on popular cloud computing platforms, such as Google App Engine and Amazon EC2.

0
No votes yet
Self Paced Course - Start anytime

You will learn about challenges of building applications that can serve hundreds of thousands of users, and how you can prepare for them as a developer. And more importantly - you will learn how to harness the power of App Engine - Platform as a Service, run by Google, so you can focus on your application's features, not on managing infrastructure that runs your app. Let Google run and scale the infrastructure and do what you do best - write code!

0
No votes yet
Jul 15th 2014

Learn everything you need to know to administer a MongoDB installation in production.

8
Average: 8 (1 vote)
Jul 15th 2014

This is an advanced course for operations staff and others interested in administering MongoDB deployments. It is a deeper dive into many of the topics of M102 and several additional subjects.

0
No votes yet
Jun 30th 2014

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)

Pages

 

Tell your friends: