New York University

Sort options

Theories of Media and Technology (edX)

Sep 20th 2021
Theories of Media and Technology (edX)
Course Auditing
Categories
Effort
Languages
Learn to apply media theory and practical, conceptual frameworks to design and digital media projects. Students in this course will build critical, applicable knowledge and understanding of the pervasive impact of media and technology on culture. You will learn influential concepts of media and technology, and be able to [...]
0
No votes yet

Information Visualization: Programming with D3.js (Coursera)

Sep 20th 2021
Information Visualization: Programming with D3.js (Coursera)
Course Auditing
Categories
Effort
Languages
In this course you will learn how to use D3.js to create powerful visualizations for web. Learning D3.js will enable you to create many different types of visualization and to visualize many different data types. It will give you the freedom to create something as simple as a bar [...]
0
No votes yet

Information Visualization: Foundations (Coursera)

The main goal of this specialization is to provide the knowledge and practical skills necessary to develop a strong foundation on information visualization and to design and develop advanced applications for visual data analysis. This course aims at introducing fundamental knowledge for information visualization. The main goal is to [...]
0
No votes yet

Information Visualization: Applied Perception (Coursera)

This module aims at introducing fundamental concepts of visual perception applied to information visualization. These concepts help the student ideate and evaluate visualization designs in terms of how well they leverage the capabilities of the human perceptual machinery.
0
No votes yet

Guided Tour of Machine Learning in Finance (Coursera)

This course aims at providing an introductory and broad overview of the field of ML with the focus on applications on Finance. Supervised Machine Learning methods are used in the capstone project to predict bank closures. Simultaneously, while this course can be taken as a separate course, it serves [...]
0
No votes yet

Reinforcement Learning for Trading Strategies (Coursera)

Sep 20th 2021
Reinforcement Learning for Trading Strategies (Coursera)
Course Auditing
Categories
Effort
Languages
This course aims at introducing the fundamental concepts of Reinforcement Learning (RL), and develop use cases for applications of RL for option valuation, trading, and asset management.
0
No votes yet
Sep 20th 2021
Course Auditing
32.00 EUR/month

Enterprise and Infrastructure Security (Coursera)

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to [...]
0
No votes yet

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]
0
No votes yet

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]
4
Average: 4 ( 3 votes )

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]
7
Average: 7 ( 3 votes )