Coursera Sample
Coursera Sample
1 https://www.coursera.org/learn/introduction-to-generative-ai
Introduction to Generative AI
2 https://www.coursera.org/learn/information-systems-audit
Information Systems Auditing, Controls and Ass
3 https://www.coursera.org/learn/from-excel-to-power-bi
From Excel to Power BI
4 https://www.coursera.org/learn/cybersecurity-in-healthcare
Cybersecurity in Healthcare (Hospitals & Care Ce
5 https://www.coursera.org/learn/containerized-applications-on-aws
Containerized Applications on AWS
6 https://www.coursera.org/learn/machine-learning-on-aws
Introduction to Machine Learning on AWS
7 https://www.coursera.org/learn/introduction-to-large-language-models
Introduction to Large Language Models
8 https://www.coursera.org/learn/northeastern-data-privacy
Data Privacy Fundamentals
9 https://www.coursera.org/learn/cyber-threat-hunting
Cyber Threat Hunting
10 https://www.coursera.org/learn/introduction-iot-boards
Introduction and Programming with IoT Boards
11 https://www.coursera.org/learn/introduction-to-image-generation
Introduction to Image Generation
12 https://www.coursera.org/learn/mastering-digital-twins
Mastering Digital Twins
13 https://www.coursera.org/learn/4g-network-fundamentals
4G Network Fundamentals
14 https://www.coursera.org/learn/transformer-models-and-bert-model
Transformer Models and BERT Model
15 https://www.coursera.org/learn/cybersecurity
Cybersecurity Awareness and Innovation
16 https://www.coursera.org/learn/career-guide-and-interview-prep-for-full-stack-cloud-dev-pc
Software Developer Career Guide and Interview
17 https://www.coursera.org/learn/encoder-decoder-architecture
Encoder-Decoder Architecture
18 https://www.coursera.org/learn/ibm-building-cloud-native-and-multicloud
Building Cloud Native and Multicloud
19 https://www.coursera.org/learn/network-transformation-101
Intel® Network Academy - Network Transformat
20 https://www.coursera.org/learn/network-transformation-102
Intel® Network Academy - Network Transformat
21 https://www.coursera.org/learn/introduction-to-responsible-ai
Introduction to Responsible AI
22 https://www.coursera.org/learn/linux-on-linuxone
Linux on LinuxONE
23 https://www.coursera.org/learn/attention-mechanism
Attention Mechanism
24 https://www.coursera.org/learn/analyzing-visualizing-data-google-way
Analyzing and Visualizing Data the Google Way
25 https://www.coursera.org/learn/automation-360
Getting Started with Automation 360
26 https://www.coursera.org/learn/cloud-iot-platform
Programming with Cloud IoT Platforms
27 https://www.coursera.org/learn/check-point-jump-start-network-security
Check Point Jump Start: Network Security
28 https://www.coursera.org/learn/security-privacy-big-data-protection
Security and Privacy for Big Data - Part 2
29 https://www.coursera.org/learn/introduction-to-networking-nvidia
Introduction to Networking
30 https://www.coursera.org/learn/tencent-cloud-practitioner
Tencent Cloud Practitioner
31 https://www.coursera.org/learn/check-point-jump-start-harmony-endpoint-security
Check Point Jump Start: Harmony Endpoint Secu
32 https://www.coursera.org/learn/deploying-and-managing-windows-workloads-on-google-cloud
Deploying and Managing Windows Workloads on
33 https://www.coursera.org/learn/check-point-jump-start---cloudguard-workload-protection
Check Point Jump Start - CloudGuard Workload
34 https://www.coursera.org/learn/check-point-jump-start-cloudguard-posture-management
Check Point Jump Start: CloudGuard Posture
35 https://www.coursera.org/learn/tencent-cloud-solutions-architect-professional
Check Point Jump Start: CloudGuard Posture
1
36 https://www.coursera.org/learn/tencent-cloud-solutions-architect-associate
Tencent Cloud Solutions Architect Associate
37 https://www.coursera.org/learn/tencent-cloud-developer-associate
Tencent Cloud Developer Associate
38 https://www.coursera.org/learn/check-point-jump-start-maestro
Check Point Jump Start: Maestro Hyperscale Net
39 https://www.coursera.org/learn/check-point-jump-start-quantum-management
Check Point Jump Start: Quantum Management
40 https://www.coursera.org/learn/tencent-cloud-sysops-associate
Tencent Cloud SysOps Associate
41 https://www.coursera.org/learn/check-point-jump-start-product-deployment
Check Point Jump Start: Product Deployment
2
Short Description Course Provider Educator Learning Format
Dive into Generative AI with Google Cloud. Learn from incoursera Google Cloud Self-paced
Discover Large Language Models with Google Cloud. Learcoursera Google Cloud Self-paced
3
Become a Tencent Cloud Solutions Architect Associate. Lcoursera Tencent Cloud Self-paced
Become a Tencent Cloud Developer Associate. Master clo coursera Tencent Cloud Self-paced
Jumpstart Maestro Hyperscale Network Security with Checcoursera Check Point Self-paced
Jumpstart Quantum Management with Check Point. Accele coursera Check Point Self-paced
Become a Tencent Cloud SysOps Associate. Master cloudcoursera Tencent Cloud Self-paced
Jumpstart Product Deployment with Check Point. Acceleracoursera Check Point Self-paced
4
Minimum Maximum Placement
Experience Level Learner Number Learners
Experience Experience support
Required Rating of Ratings Enrolled
Required (Years) Required (Years) available
5
Intermediate 0 4.7 11.0 No
Intermediate 0 No
Intermediate 0 No
Beginners Friendly 0 No
Intermediate 0 No
Beginners Friendly 0 No
6
Total Total
Course Duration Class Effort
Placement Support Level Course Duration Unit
Value Duration Required
(hrs) (hrs)
7
Not Available Hours 6
Not Available Hours 11
Not Available Hours 3
Not Available Hours 1
Not Available Hours 10
Not Available Hours 2
8
Total
Total
Weekly
Weekly Class
Class Course Start Date
Effort timing
duration
(hrs)
(hrs)
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
9
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
On demand On demand
10
Selection
Eligibility Criteria
Process
11
Open to all Apply onlin
Open to all Apply onlin
Open to all Apply onlin
Open to all Apply onlin
Open to all Apply onlin
Open to all Apply onlin
12
Campus
Campus
Total Course Fee Module
Fee Type EMI (Rs.) Module Alumni Status
(Rs) Duration
Filter
(Days)
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
13
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
Free 0 No 0
14
Generative
delve
potential
transfer
conduct
productioninto learning
audits,AI,
ofcommon
Power learningin BI.
identify
environments. ML
the how
tasks
context to
vulnerabilities, approach
including
of LLMs. and thesealso
You'll
attacks,
and
challenges IoT
practical (Internet
exercises,
responsibly ofandThings)
you'll vulnerabilities,
explore
ethically in the
their legal,and
classification,
delve
implement into
telemedicine
ethical, and common regression,
remediation
security.
technical NLP clustering,
tasks of
measures
aspects including
data
and
to enhance text AI the
anomaly
privacy,
projects
detection,
Moreover,
classification,
security and
and you applications.
gaining will
sentiment
reliability practical
learn how
ofanalysis, experience
to integrate
organizational named insystems.
applying
Power
entity BI
gaining
these insights
techniques into to how
real-world organizations datasets. can comply
with other
recognition,
containerized
Moreover,
with regulations Microsoft
and
students language
applications
while Office
willpreserving
learn tools,
translation,
with how othersuch AWSas
gaining
to develop
individual Excel
services,
and
privacy and
Whether
PowerPoint,
practical
Whether
such asYou'll you're
you're
Amazon to
experience aaRDS,beginner
streamline inAmazon
seasoned applying or
your an
S3, experienced
workflow
LLMs
professional and to
AWS and
solve
or new AI
these
to
implement
rights.
practitioner, cybersecurity
also
this learn
course aboutpolicies,
isanddesignedthe train
role of
to meet healthcare
data
Moreover,
enhance
tasks.
the field,
Lambda,
staff
privacy on to you'll
collaboration
this course
create
cybersecurity
professionals,
learn
robust how
within
isawareness,
designed
privacy
toyour use
impacttoand
scalable AWS's
organization.
equip youyour
managed
collaborate
assessments with
needs
ML
the and empower
services
knowledge
architectures. toYou streamline
andwill you
skills also to
the
needed leverage
MLto
discover Generative
workflow,
excel
how in fromAI
to
with IT and
and clinical teams to strengthen
Preview (PIAs),
in
datayour
Whether
Moreover,
information
automate
cybersecurity
projects.
preparation incident
you're
you'll
systems
deployment
posture
Upon
and
alearn
response
beginner completion,
model
how
auditing.
pipelines
across or
tothe
procedures
training
an
Upon students
to
experienced
leverage
using
in
deployment
Google
completion,
AWS
organization.
will
Excel
Institute
Video ensuring
have
and
user,
Cloud's
students the
this
CodePipeline
data
knowledge
monitoring.course
AIwill
Platform
privacy
andwill
have You'll
Long
AWS and
the andand
discover
empower
security.
skills
Description
TensorFlow
expertise
CodeBuild toyou harness
best topractices
make the
framework
totoconduct
streamline the power
forto
Email Id of Generative AIBI's and drive innovation in your
their
Link data
most
train
your
4G is preprocessing,
thorough
Whether of Power
and
the deploy
audits,
development
cutting-edge
you're aLLMs
provide
and feature
capabilities
healthcareat scale.
network engineering,
valuable
deployment and
You'll take discover
assurance
technology
professional, processes. modelthat
IT data
tobest
Moreover,
respective
evaluation, you'll
fields.
and gain
hyperparameter hands-on experience
tuning to with
optimize
analysis
practices
stakeholders,
links skills
millions
specialist,
privacy-enhancingfor
or data to
and
of the
smartphones
cybersecurity next
preprocessing,
contribute
technologies level. to Upon
to the model
the
professional,
and completion,
overall
internet.
tools training,
this
for success
But
course
data
the
you
of
how
will performance
will
evaluation,
their
Whether does
equip be itable
and
organizations.
you're
you actually
withtoaof your
create
deployment,
developer,
thework? ML
knowledge models.
compelling
empowering
DevOps data
engineer, you toor
anonymization,
Join Google
visualizations,
build powerful Cloud's encryption,
derive
and Introduction
valuable
scalable
and
NLP toand
access
insights,
applications
skills
control.
Generative
and drive AI
IT professional,
needed
You'll
course to address
discover
and unleash
this
best course
cybersecurity
practices
your
is
creativity
suitable
for challengesfor
implementing
with
anyone
the inon
latest
Whether
better
Google
Join
looking
Ideal for
healthcare you're
business
HKUST'sCloud.
tonetwork
harness a
outcomes
Information
effectively. beginner
the Upon
engineers, power or
with
Systems an
ofPower
sales experienced
completion, BI. you
Auditing,
containers
engineers, onwill
privacy
advancements
practitioner, controls, this inmanaging
AI
course technology.
is consent
suitable mechanisms,
for anyone
Controls,
AWS.
be
and Upon
application
prepared
responding and toAssurance
completion,
developers,
play
to data course
you
and
a critical
breaches roleand
will
many have take
inother
to the your
skills and
telecoms
safeguarding
protect
looking
Join
Whether
career
confidence
pros,
patient to
this toyou're
Knowledge
data learn
new toand
course MLawill
heights
deploy on
Accelerators'
beginner
ensuring inAWS.
help the
containerized
you
the Upon
From
ordynamic
to
security completion,
Excel
an understand
experienced andtoof
field
applications Power
the on
integrity
sensitive
you'll have information
the knowledge and mitigate
and skills risks.
to start
BI course
practitioner,
information
Software
AWS with
technology
of healthcare and
engineering
ease,
behindunlock
this
systems course
optimize
systems. the is
auditing.power
suitable
professionals
your
the apps and devices we use of data
for
are
infrastructure anyone
in high for
building
visualization
looking
demand toand learn
around deploying
and aboutanalytics MLand
LLMs models
for and greater
theiron AWS,
business
applications.
scalability
every
Whether
empowering
It’s not
day.
you,
and
you're you
it’s athe
efficiency,
me! to
world,
privacy
unlock
What’s
and
professional,
insights,
going
the
accelerate
on?
trend
drive
shows no
innovation
compliance
success.
Upon
sign
in
Join of
your
officer, completion,
slowing.
organization.
Erasmus
or data There
University
steward, you'll are havelots
Rotterdam's
this course the
of knowledge
great jobs
Cybersecurity
is suitable and
for
innovation,
skills
You’ll
in to
available,get
Healthcarestart
abut andbuilding
solid lots
coursesolve of
overview complex
advanced
great
and candidates
of
become problems
LTE/EPCNLP a too.
(Long
trusted inHow
applications your
Term can
anyone
In
Get this
started
organization.
This course looking
course, with you
empowers to deepen
will
Cloud learn
Native their
students, about
in understanding
this Digital
self-paced
professionals Twins of
and
using
you
Join get
the
Evolution LLMs,
cybersecurity
data the
privacy
fundamentals, driving
edge
Containerized
/ Evolved
leader
fundamentals.
how in innovation
such
Packet
in
they the a competitive
Applications
Core) and
healthcare
Upon
represent 4G unlocking
on field?course
AWS
networks,
industry.
completion,
a concept new
of how
you'll
beginner
the wider
opportunities friendly
community in course!
your to deal In this
organization. with course, we will
cybersecurity
and
they
be take
work, your
well-equipped
integration how
for containerization
the tonetwork
product-related navigate skills
architecture
the data. to
evolvingThe theconcept
isnext
cover
Join
attacks
This thethe
course and core
Introduction
risks
will concepts
focused
prepare to and
Machine
youon practices
identity
to Learning
enter of
management
the building
job on AWS
level
of with
designed,
landscape
digital AWS
and
of
twins data cloud
which
is aprivacy computing.
protocols
response regulations are
toupcoming
theinto used. and
increasing
and
course
Join
market running
it is
theas and
an Cloud
kickstart
introduction
Introduction
atogreat Native
your
candidate to applications
journey
toa culture
Large thefor Language
a software and
the full
Models how to
exciting by
contribute
digitalisation
run
world
coursetheseoffocused
MLgain building
of
applications
with product
on AWS in development,
cloud
cybersecurity a multicloud of
computing. privacy
awareness. and
production,
environment. trust
Google
engineering
First,
within
and Cloud
you’ll
your
products course
position. exposure
organization.
themselves. and
It embark
provides
to the on
practical
global your journey
architecture
It
ofprovides
into the
techniques
the network, afor
exciting practical world
creating
how overview
the of LLMsinterface
essential
radio ofjob-seeking
and challenging
natural works, and
issues
language
materials
how like
security identity
processing.
such is as a credentials
guaranteed. resume and
Then management
a portfolio,
you’ll dive asand well
into
Join
Today's
You Northeastern
will
security, products
first
e-mail be University's
are
introduced
threats complex
and to
web Data
systems
Multicloud Privacy
impersonation,which concepts are
as
the auxiliary
operational
Fundamentals
not
and only
goals
tools
fulfilling
and course
learn
like
side.their a
What
about
cover
and
intended is
become
their
letter
a bearer? and
a trusted
functions
importance.
an
How elevator
and is
Nextit or
web
Welcome
pitch. hacking.
You to
will theIn addition
Intel® to
Network this, you
Academy will have– a a
quickly
steward
quality
you willbut
practical
comprehensive
of arelearn
configured
data
familiarize
appreciation privacy
also
training
and how
ofin
communicating
yourself
totoday's
released? find and
withto
innovation
program
How assess
digital
via
Containers,
onthem,
does
applied
network
world. 4G
tolay
prospective
handle
communicationmillions job of positions,
terminals
networks apply
with that are
other on theandmove
components,
Learn
these repeatable,
Modernization
concepts
transformation.
the groundwork and
through
In
for documentable
data
this migration.
an
program,
interviewing. interview cyber
we Thiswith
will threat
course
be a hunting methodologies and types of tools that will make y
all the time?
products,
places clouds,
importance and
anfraud services.
application of skills asThe well,
renowned
Internet
covering
Welcome of
the expert
Things
towill topic
theabout in
(IoT)
areas
Intel®smart is of and
an
Network softwarecybercrime.
emerging Academy area
defined – a information and communications technology (ICT) involvi
of
We
and are
so
teaching
infrastructuretalking
you staff practice
consists
(SDI) networkof applying
Iván products
Pau,
functions skills
UPM that
in: integrate
researcher
virtualization
The
This
A course
course
comprehensive
certificate
services intoin doesn’t
introduces
of
the training
completion stopdiffusion
products there,
programis awarded
and however.
aremodels,
on network
by
continuously aYou family
Coursera will of machine learning models that recently showed prom
microservices,
and
(NFV),
also expert
get software-defined
inside DevOps,
usable
tips and CI/CD,
security,networking
steps and
you Docker,
canRomán
(SDN)
useKubernetes,
Ramírez,
to and
transformation.
to learners
supported.
and OpenShift. who In
achieve this program,
a grade we
above will 50%.be
hacker
beyond.
perform
covering andthecybersecurity
The Network
professionally
topic areas andofexpert.
Academy includes
effectively
software at a broad
defined
Learning
collection
interviews.
infrastructure
This course will
ofYou
hasbe
online
(SDI)carried
will content
received out
learnfinancial
network how by
and introducing
to
functionstechnical
approach
support use
training
a code
virtualization
from the
This
cases
aimed course
challenge related
to assist
and is suitable
toget cybersecurity
technical
to for
practice anyone
professionals
completingwanting
incidents, in intheto
a way
them. learn
(NFV),
Patrick
This software-defined
course
Automation & Lina Drahi
sensitizes
360(tm) networking
Foundation.
isregarding
the privacy (SDN) and
and data
about
that
network theindustry
ensures
Additionally,
beyond.
guidingparticipants
itBigprovides principles
to improve toleading
of
get
information theirbuilding
really cloud-native
cloud
involved
knowledge
about theof in
protection
This
native course
end-to-end
the course.
key Intel® inintroduces
intelligent
applications
You will
technologies, Data and
easilyenvironments.
you
automation
managingto
acquire
industry the them You
Transformer
platform
practical
trends, will
across
and used
skills architecture
by and the Bidirectional Encoder Representatio
regular
discover functions
privacy and
preserving tasks of software
methodologies, engineers, as well
the
and world's
multiple
be
technical
This
as course
well as cloud
ready top
aspects
the will to enterprises
platforms,
face real both
of NFV deployments.
introduce
opportunities you to
threats
of toautomate
private
in
thethe a and
digitalbusiness
attention
profession public.
world.
Network
as data
processes
Also covered Transformation
protection
across in regulations
systems
this course 102
and is covers
and
applications.
how to topics
concepts
automate inand
such as
your
mechanism,
some
VNF
Big Dataoptions
Operations
system. a powerful
for & Bycareer
Development,
the technique
development.
end ofcourse, the that
Cryptography,
course, allows you and
will
many
After
neural ofnetworks
the
completing common tothis focus functions
training onBig specificof building please
parts ofand find
an
Hyperscan
This
be
This
runningcourse
ready
course to
cloud technology,
gives
plan
is designed
native you
your a students
synopsis
next
to introduce
applications will
of
Data andthe dive
project
Robotic into
encoder-decoder
orchestrating the architecture, which is a powerful and prevalent
Welcome
Network
input
benefits sequence.
of toIntel
the hardware
Transformation Introduction
You will 102
learn
and tohow Networking
offered
software by and
attention Intel®
successfully,
Process Automation ensuring that
(RPA), all privacy
howyour and data
the environment
Course.
Network
works,
explore
Harmony
protection and Academy
how how
Endpoint itthey
to accelerate
related
to
issues
runused
is aadvance
can be in. toRPA
compute-intensive
complete
are under improve
solution
can bethe
technical
control. that
used to
You will
identify
expertise.
performance business of aIntel® processes
variety for
of machine automation, learning and tasks,
operations
protects
look
how at
to the with
decent-sized
use remote
Automation big QuickAssist
workforce
data
Anywhere from
projects Technology
today’s
with
Robotic privacy-
In this course
including
(Intel® QAT). machine we will cover thetext
translation, basics of
summarization,
complex
skilled
Interface
networking, threat
eyes, (AARI) being landscape.
introduce toableautomate commonly It prevents
to recognize backused office the
dangers. and
TCP/IP most This
front
and
will question
imminent
Thisallow threats
you answering. to the endpoint such as
office isbusiness
protocols and to
an introductory-level improve
processes.
cover your
the fundamentals systemsof
microlearning
Experienced toan
and acourse
grownaimed at explaining what responsible AI is, why it's im
novice
ransomware,
and
This sustainable
RPA developers
Ethernet
course is phishing,
network. forwilllevel.
Linux learn or howdrive-by
Systems malware,
toAdministrators,
build simplewhile toArchitects and Developers who are already familiar with
quickly
complex
In addition,minimizing
RPAyou’ll botsbe breach
using impact
Automation
equipped with
with the autonomous
360basic action
detection
If you are to
packages
knowledge and
an ICT response.
toautomate professional
understand theor
repetitive main someone
anddata mundane who
center
This
requirements and how they can be fulfilled. the process of utilizing various data sources and multiple G
designs
work learning
and
processes experience
manages to reduce guides
systems human in you
big
errorsthrough
data and
With remote
environments,
improve business users connecting
course is fortoyou!
thisoutcomes. yourKnowledge
corporate
applications
about
Upon Big Data
successful from and anywhere,
IT
completion is your
advantageous, organization’s
but ifof you
Internet
attack of Things
surface is (IoT) is an of
increasingly
the course's
emerging
expanding. area finalinformation and communications technology (ICT) involvi
are
exam, e.g. a
you product
will receive manager a digital just touching
completion the
In this course
surface of Big brought andtoprivacy, you by this industry leader Check Point, they will cover cybersecurity threats and el
certificate thatData confirms your understanding course willof suit
Check
you as well.
Ethernet Point Harmony is
technology basics and data forwarding the industry’s first unified
security
within ansolution Ethernet fornetwork.
users' devices and access.It
protects devices and internet connections from the
This
mostcourse
sophisticated is primarily attacks aimed while at cloud
ensuring professionals
zero- who are interested in learning about Tencent Cloud
trust access to corporate applications.
This course teaches you about deploying and managing Microsoft Windows® workloads on Google Cloud
The purpose of this program is to give you an insight into the security challenges involving workload pro
In this course, you will learn about what is Posture Management, why you need a Posture Management
This course equips learners with knowledge in cloud architecture design at the professional level and pr
15
This course is primarily aimed at cloud professionals who are interested in learning about Tencent Cloud
This course equips learners with a foundational knowledge in cloud application development and prepa
In this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator in
"Check Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising
This course is primarily aimed at cloud professionals who are interested in learning about Tencent Cloud
In this course, you will learn the concept of software deployment and the methods and tools used for de
16
types of tools that will make your threat hunting more effective. This learning path progresses through six courses, in which you will build
ations technology (ICT) involving many disciplines of computer science and engineering including sensors/actuators, communications netw
dels that recently showed promise in the image generation space. Diffusion models draw inspiration from physics, specifically thermodyna
ctional Encoder Representations from Transformers (BERT) model. You learn about the main components of the Transformer architecture
ch is a powerful and prevalent machine learning architecture for sequence-to-sequence tasks such as machine translation, text summariza
at responsible AI is, why it's important, and how Google implements responsible AI in their products. It also introduces Google's 7 AI princi
s who are already familiar with Linux components and everyday tasks, but need a primer on how to best take advantage of the LinuxONE p
us data sources and multiple Google Cloud products (including BigQuery and Google Sheets using Connected Sheets) to analyze, visualize,
ations technology (ICT) involving many disciplines of computer science and engineering including sensors/actuators, communications netw
er cybersecurity threats and elements of Check Point's Security Management architecture. This course will prepare you for the exam, #156
n learning about Tencent Cloud's products and services. It equips learners with a foundational knowledge in cloud computing and prepares
ws® workloads on Google Cloud. This course uses lectures and hands-on labs to show you how to plan and configure Microsoft Windows S
llenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program
u need a Posture Management solution, and what makes Check Point CloudGuard Posture management solution the Global leader in Cloud
t the professional level and prepares them to take the Tencent Cloud Solutions Architect Professional examination. After completing this c
17
n learning about Tencent Cloud's cloud architectures. It equips learners with a foundational knowledge in cloud architecture design and pr
ation development and prepares them to take the Tencent Cloud Developer Associate examination. After completing this course, learners
er the Maestro Orchestrator initial installation, creation and configuration of security group via the web user interface and SmartConsole f
rket! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks. Check Point Quantum Netwo
n learning about Tencent Cloud's system operations. It equips learners with a foundational knowledge in deploying, monitoring, and opera
methods and tools used for deployment of Check Point products. And, we will drill down into each deployment tool, providing an overvie
18
urses, in which you will build core hunting skills such as intelligence gathering, investigation techniques and remediation methods. Upon co
ators, communications networking, server platforms, data analytics and smart applications. IoT is considered to be an essential part of the
ics, specifically thermodynamics. Within the last few years, diffusion models became popular in both research and industry. Diffusion mod
he Transformer architecture, such as the self-attention mechanism, and how it is used to build the BERT model. You also learn about the d
e translation, text summarization, and question answering. You learn about the main components of the encoder-decoder architecture and
heets) to analyze, visualize, and interpret data to answer specific questions and share insights with key decision makers.
ators, communications networking, server platforms, data analytics and smart applications. IoT is considered to be an essential part of the
pare you for the exam, #156-412, at PearsonVUE.(https://home.pearsonvue.com/checkpoint)
oud computing and prepares them to take the Tencent Cloud Practitioner examination. After completing this course, learners will be able t
figure Microsoft Windows Server and Microsoft SQL Server in Google Cloud. You will configure identity solutions including Managed Servic
se challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the Cloud
on the Global leader in Cloud Protection.
ation. After completing this course, learners will be able to design and develop complex business systems and cloud native applications, im
19
d architecture design and prepares them to take the Tencent Cloud Solutions Architect Associate examination. After completing this course
mpleting this course, learners will be able to reconstruct and migrate traditional applications to the cloud and design and develop cloud nati
nterface and SmartConsole features. This course provides a demonstration of the Maestro product.
Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center
ying, monitoring, and operating Tencent Cloud's basic products and prepares them to take the Tencent Cloud SysOps Associate examinatio
nt tool, providing an overview of how to use it given a common use case.
20
mediation methods. Upon completion, you'll have the knowledge and skills to carry out cyber threat hunting activities with an organization
o be an essential part of the 4th Industrial Revolution along with AI and Big Data. This course will be very useful to senior undergraduate a
and industry. Diffusion models underpin many state-of-the-art image generation models and tools on Google Cloud. This course introduce
l. You also learn about the different tasks that BERT can be used for, such as text classification, question answering, and natural language i
der-decoder architecture and how to train and serve these models. In the corresponding lab walkthrough, you’ll code in TensorFlow a simp
es unique to LinuxONE. It is comprised of videos, links to online resources, and a final test for a badge.
o be an essential part of the 4th Industrial Revolution along with AI and Big Data. This course aims at introducing IoT Cloud platforms from
ourse, learners will be able to explain the different features, advantages, uses cases, and billing methods of several core Tencent Cloud pro
ns including Managed Service for Microsoft Active Directory, deploy Windows workloads to Compute Engine and Google Kubernetes Engin
us solutions under the CloudGuard umbrella.
loud native applications, implement cloud native transformation based on the characteristics of the business, and apply agile developmen
21
After completing this course, learners will be able to design cloud solutions that incorporate the principles of high availability, high securit
esign and develop cloud native applications and distributed microservices using Tencent Cloud.
22
ctivities with an organization that will ultimately deliver proactive defenses against possible debilitating data compromise.
ul to senior undergraduate and graduate students as well as engineers who are working in the industry. This course aims at introducing the
Cloud. This course introduces you to the theory behind diffusion models and how to train and deploy them on Vertex AI.
ering, and natural language inference. This course is estimated to take approximately 45 minutes to complete.
ll code in TensorFlow a simple implementation of the encoder-decoder architecture for poetry generation from the beginning.
ng IoT Cloud platforms from Samsung, Microsoft, Amazon, IBM and Google and how they can be used in developing IoT applications. This
nd Google Kubernetes Engine, and learn to manage and operate Windows workloads with Cloud Console, Cloud Logging, and Cloud Monit
and apply agile development, DevOps, containers, artificial intelligence, and packaged business capabilities in their respective organization
23
high availability, high security, high scalability, and cost optimization.
24
ompromise.
ourse aims at introducing the general concepts and architecture of IoT applications, networking technologies involved, IoT development ki
Vertex AI.
m the beginning.
oping IoT applications. This course will be offered in English. Subtitles/captions in English and will be also provided.
25
26
nvolved, IoT development kits including Arduino, Raspberry Pi, Samsung ARTIK, and how to program them. This course will be offered in En
27
28
s course will be offered in English. Subtitles/captions in both of English and Korean will be also provided.
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
1-Google Cloud-I1-Google-Cloud-Introduction-to-Generativ
4-Erasmus Univer4-Erasmus-University-Rotterdam-Cybersecurity-in-Healthca
5-Amazon Web Ser
5-Amazon-Web-Services-Containerized-Application
6-Amazon Web Ser
6-Amazon-Web-Services-Introduction-to-Machine-L
7-Google Cloud-I7-Google-Cloud-Introduction-to-Large-Lan
8-Northeastern U8-Northeastern-University-Data-Privacy-Fundamentals
9-Infosec-Cyber 9-Infosec-Cyber-Threat-Hunting
10-Pohang Univer10-Pohang-University-of-Science-and-Technology-Introduction-and-Program
11-Google Cloud-11-Google-Cloud-Introduction-to-Image-Gen
12-EIT Digital-Ma12-EIT-Digital-Mastering-Digital-Twins
89
36-Tencent Cloud36-Tencent-Cloud-Tencent-Cloud-Solutions-A
37-Tencent Clou 37-Tencent-Cloud-Tencent-Cloud-Developer-A
38-Check Point-C38-Check-Point-Check-Point-Jump-Start--M
39-Check Point-C39-Check-Point-Check-Point-Jump-Start--Q
40-Tencent Clou 40-Tencent-Cloud-Tencent-Cloud-SysOps-Asso
41-Check Point-C41-Check-Point-Check-Point-Jump-Start--P
90
and-Technology-Information-Systems-Audit
ecurity-in-Healthca
Fundamentals
chnology-Introduction-and-Programm
Fundamentals
d-with-Auto
chnology-Programming-with-Cloud-Io
91
92