Back to Courses

Computer Science Courses - Page 11

Showing results 101-110 of 2309
Interpretable Machine Learning Applications: Part 4
In this 1-hour long guided project, you will learn how to use the "What-If" Tool (WIT) in the context of training and testing machine learning prediction models. In particular, you will learn a) how to set up a machine learning application in Python by using interactive Python notebook(s) on Google's Colab(oratory) environment, a.k.a. "zero configuration" environment, b) import and prepare the data, c) train and test classifiers as prediction models, d) analyze the behavior of the trained prediction models by using WIT for specific data points (individual basis), e) moving on to the analysis of the behavior of the trained prediction models by using WIT global basis, i.e., all test data considered. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
App Design and Development for iOS
In App Design and Development for iOS, the third course of the iOS App Development with Swift specialization, you will be developing foundational programming skills to support graphical element presentation and data manipulation from basic functions through to advanced processing. You will continue to build your skill set to use and apply core graphics, touch handling and gestures, animations and transitions, alerts and actions as well as advanced algorithms, threading and more. By the end of this course you will be able to develop a more advanced, fully functioning app. Currently this course is taught using Swift 2. The team is aware of the release of Swift 3 and will be making edits to the course in time. Please be aware that at this time the instruction is entirely with Swift 2.
Compute Engine: Qwik Start - Windows
This is a self-paced lab that takes place in the Google Cloud console. Google Compute Engine lets you create and run virtual machines on Google infrastructure. In this lab you create a Windows Server instance in the Google Compute Engine and access it with RDP. Watch a short preview, Launch a Windows Server Instance, GCP Essentials.
Relational Modeling in Dia
In this course you will learn to interpret and draw a relational model through hands-on exercises using a diagramming tool called “Dia”. You will complete the final step in the database design process as you convert the logical design documented in an Entity Relationship Diagram into a Relational Model. During the conversion, you will investigate relational modeling rules and practice modeling techniques as you learn to resolve one-to-many and many-to-many relationships using foreign keys and bridge tables. Your final Relational Model will become the blueprint for creating a database and its tables. Since data is at the center of any information system, knowledge and understanding of database design will serve you well as a database user or a database designer. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Save, Load and Export Models with Keras
In this 1 hour long project based course, you will learn to save, load and restore models with Keras. In Keras, we can save just the model weights, or we can save weights along with the entire model architecture. We can also export the models to TensorFlow's Saved Mode format which is very useful when serving a model in production, and we can load models from the Saved Model format back in Keras as well. In order to be successful in this project, you should be familiar with python programming, and basics of neural networks. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Creating a Virtual Bookstore using Java Basics
In this 1-hour 30-minutes long project-based course, you will learn how to (identify different data types in java, conditional statements , scanner input & iteration loops). Through the virtual book store project you can choose the book you want from the preferred genre and the best price range that suits you. By first an interactive menu appear to the user to enter his preferred genre of the book( crime, drama), then another menu appear when he enters his genre preference, to choose his price range ( cheap , expensive ). Then another menu appear showing him the option that he can buy per his choice of genre and price range. Note: This project works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Computer Hardware and Software
This course provides foundational understanding of how computers process information through hardware and software. You will investigate the world of Information Technology (IT) and survey hardware components, mobile devices, operating systems, programs and apps, network fundamentals, the Internet, and touch on security and ethics.
Digital Systems: From Logic Gates to Processors
This course gives you a complete insight into the modern design of digital systems fundamentals from an eminently practical point of view. Unlike other more "classic" digital circuits courses, our interest focuses more on the system than on the electronics that support it. This approach will allow us to lay the foundation for the design of complex digital systems. You will learn a set of design methodologies and will use a set of (educational-oriented) computer-aided-design tools (CAD) that will allow you not only to design small and medium size circuits, but also to access to higher level courses covering so exciting topics as application specific integrated circuits (ASICs) design or computer architecture, to give just two examples. Course topics are complemented with the design of a simple processor, introduced as a transversal example of a complex digital system. This example will let you understand and feel comfortable with some fundamental computer architecture terms as the instruction set, microprograms and microinstructions. After completing this course you will be able to: * Design medium complexity digital systems. * Understand the description of digital systems using high-level languages such as VHDL. * Understand how computers operate at their most basic level (machine language).
Configure Standard Access Lists on Cisco Routers
Welcome to the CCNA 1.8: Configuring Standard Access Lists (ACLs) on Cisco routers. This project is the eighth in a CCNA learning series that is designed to help you acquire the hands-on skills required to pass the CCNA certification exam. In this 2-hour guided project, you will identify the difference between standard inbound and outbound Access Control Lists (ACLs), configure inbound and outbound ACLs on Cisco routers, and setup ACLs to permit exclusive traffic on Cisco routers.
Cybersecurity and Mobility
This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect. After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.