fbpx

COMPUTER SCIENCE courses

COMPUTER SCIENCE courses

Neural Networks and Deep Learning from deeplearning.ai (taught by Stanford prof. Andrew Ng)

Algorithms: Design and Analysis from Stanford University (old Coursera course, but hosted without any paywalls directly by Stanford)

Algorithms: Design and Analysis, Part 2 from Stanford University

The Unix Workbench from Johns Hopkins University

Hacking and Patching from University of Colorado System

Machine Learning from Georgia Institute of Technology

Linux Server Management and Security from University of Colorado System

Improving Deep Neural Networks: Hyperparameter tuning, Regularization and Optimization from deeplearning.ai 

Structuring Machine Learning Projects from deeplearning.ai

Sequence Models from deeplearning.ai

Convolutional Neural Networks from deeplearning.ai

Accessible Gamification for Business from Georgia Institute of Technology

Accounting Analysis II: Measurement and Disclosure of Liabilities from University of Illinois at Urbana-Champaign

Bayesian Methods for Machine Learning from Higher School of Economics

Natural Language Processing from Higher School of Economics

Introduction to Deep Learning from Higher School of Economics

Deep Learning in Computer Vision from Higher School of Economics

Addressing Large Hadron Collider Challenges by Machine Learning from Higher School of Economics

Introduction to Reinforcement Learning from Higher School of Economics

Introduction to TCP/IP from Yonsei University

Deep Learning for Business from Yonsei University

TV Whitespaces for Museums and Archives from San Jose State University

Capstone: Autonomous Runway Detection for IoT from EIT Digital

Homeland Security & Cybersecurity Connection – It’s Not About the Terrorists from University of Colorado System

Packet Switching Networks and Algorithms from University of Colorado System

Proactive Computer Security from University of Colorado System

Introduction to Cybersecurity for Business from University of Colorado System

Cyber Threats and Attack Vectors from University of Colorado System

Detecting and Mitigating Cyber Threats and Attacks from University of Colorado System

Cybersecurity Policy for Aviation and Internet Infrastructures from University of Colorado System

Enterprise System Management and Security from University of Colorado System

TCP/IP and Advanced Topics from University of Colorado System

Peer-to-Peer Protocols and Local Area Networks from University of Colorado System

Windows Server Management and Security from University of Colorado System

Planning, Auditing and Maintaining Enterprise Systems from University of Colorado System

Homeland Security and Cybersecurity Future from University of Colorado System

Cybersecurity Policy for Water and Electricity Infrastructures from University of Colorado System

Fundamentals of Network Communication from University of Colorado System

Design and Analyze Secure Networked Systems from University of Colorado System

Secure Networked System with Firewall and IDS from University of Colorado System

Symmetric Cryptography from University of Colorado System

Cryptography and Information Theory from University of Colorado System

Cryptographic Hash and Integrity Protection from University of Colorado System

Asymmetric Cryptography and Key Management from University of Colorado System

Basic Cryptography and Programming with Crypto API from University of Colorado System

Classical Cryptosystems and Core Concepts from University of Colorado System

Архитектура ЭВМ (Computer Architecture) from Saint Petersburg State University

Sparse Representations in Signal and Image Processing: Fundamentals from Technion – Israel Institute of Technology

Sparse Representations in Image Processing: From Theory to Practice from Technion – Israel Institute of Technology

Cutting Edge Deep Learning For Coders, Part 2 from fast.ai

Architettura degli elaboratori from University of UrbinoLiberating Programming: System Development for Everyone from Weizmann Institute of Science

mk_MKMK