Description This course will prepare you to complete all parts of the Clinical Data Science Specialization. In this course you will learn how clinical data are generated, the format of these data, and the ethical and legal restrictions on these data. You will also learn enough SQL and R programming skills to be able to…
Description Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of…
Description Since many software developers are compulsive coders, they have created software over the years to help them do their job. There are tools which make design and its associated tasks easier. The course introduces some basic tools and techniques to help you with design. Tools aren’t always tangible, however. The last two lessons of…
Description In this course, you will explore the history of LGBTQ identities, experiences, and activism. We’ll study major events in global LGBTQ history, investigate local histories of queer and transgender people and communities, and consider how LGBTQ histories have helped shape broader conversations about civil rights, equality, and justice. Price: Enroll For Free! View Class…
Description In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. The role of address prefixes and the…
Description This course evaluates the medieval history of Toledo from the era of the Visigoth Kingdom (6th-8th centuries) through its Islamic period (8th to 11th centuries) and into its reintegration into Christian Spain (after 1085 c.e.) In particular, we take note of the cultural and religious transformations that characterized the city with a special effort…
Description The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever wonder how your bank website is secure…
Description In this course, you will learn how to design balancing systems and to compute remaining energy and available power for a battery pack. By the end of the course, you will be able to: – Evaluate different design choices for cell balancing and articulate their relative merits – Design component values for a simple…
Description In your previous 2 courses, you learned some medical interventions and skills to keep newborns healthy in the days and weeks after they have been born. In this course, you will learn some key things that parents will need to do to keep their babies safe and healthy. The Guidance to Keep Newborn Babies…
Description Congratulations on reaching the Capstone Class of the Become a Sustainable Business Change Agent specialization. The class will help you apply material from the previous three classes. We have developed a case about a hypothetical ski resort that offers lots of opportunities to develop sustainability recommendations. A second option is do develop a proposal…