Description In this course, you will develop the knowledge and skills to assess and stabilize certain types of patients for transport. By the end of this course, you will be able to: (1) Identify the signs and symptoms associated with a patient in shock, to describe the major categories of shock, to assess a patient…
Description In this course, we deal with the general issues regarding packet switching networks. We discuss packet networks from two perspectives. One perspective involves external view of the network, and is concerned with services that the network provides to the transport layer that operates above it at the end systems. The second perspective is concerned…
Description Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics…
Description Congratulations! You progressed your way through all four of the Newborn Baby Care courses, each with their own focal points on the many dimensions of maintaining newborn health in the first month of life. Now we arrive at a crucial part of your learning –the Newborn Baby Care Capstone- Case Studies, which is your…
Description Relational Database Support for Data Warehouses is the third course in the Data Warehousing for Business Intelligence specialization. In this course, you’ll use analytical elements of SQL for answering business intelligence questions. You’ll learn features of relational database management systems for managing summary data commonly used in business intelligence reporting. Because of the importance…
Description The Business School at the University of Colorado Denver wants to help you become a change agent for sustainable business. We hope that with the skills and concepts you gain from this specialization that you will help your business reduce its social and environmental impact. Being a change agent is hard. It takes courage…
Description I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In…
Description In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the…
Description In Requirements Goal Development and Language Analysis, we move from the spoken word to precise writing. A first step in this is writing goals. We will talk about goals used in requirements engineering and, from this, writing use cases from what we learn. Use cases can be in diagram and written form. Then- the…
Description Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is used for…