Description This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web…
Description This specialization is intended for beginning programmers who want to learn how to program Unity games using C#. The first course assumes no programming experience, and throughout the 5 courses in the specialization you’ll learn how to program in C# and how to use that C# knowledge to program Unity games. The C# and…
Description Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according…
Description Evaluate business needs, design a data warehouse, and integrate and visualize data using dashboards and visual analytics. This Specialization covers data architecture skills that are increasingly critical across a broad range of technology fields. You’ll learn the basics of structured data modeling, gain practical SQL coding experience, and develop an in-depth understanding of data…
Description Homeland security is about safeguarding the United States from domestic catastrophic destruction. Cybersecurity has emerged as a priority homeland security concern because a coordinated cyber attack against critical infrastructure could result in the worst catastrophe in the nation’s history. This specialization examines the cybersecurity problem, and takes a close look at what is being…
Description This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and…
Description Health care is an exciting and ever growing profession that can take you many different directions. You can apply the fundamentals you learn here about emergent patient care, stabilization, and disease processes toward becoming an EMT or further health care pursuits. In this specialization you will learn to care for stable and unstable patients…
Description The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design…
Description A newborn baby is an amazing beautiful life filled with hope. Unfortunately, many babies die or experience preventable harm even in 21st century. It is imperative that babies who are born healthy get off to a healthy start in the first month of life. There are some easy tenets of care to implement that…
Description This specialization is intended for software engineers, development and product managers, testers, QA analysts, product analysts, tech writers, and security engineers. Even if you have experience in the requirements realm, this course will expand your knowledge to include new viewpoints, development styles, techniques and tools. For anyone seeking a graduate degree, certificate, or professional…