Re-branded from the Systematic Program Design series, this first course covers the same methodical template approach to software design while getting into more advance uses of recursion and self-reference.
A systematic, template approach to creating well structured code. The first of a three part series.
A text book disguised as an online course, that is still a decent comprehensive look at HTML and the HTML5 changes
A text book disguised as an online course made by the Linux foundation. Has good depth but poor reinforcement.
The technically in-depth continuation of the Cloud computing specialization, adding new special case topics in addition to its foundational material.
Hardware Security Institution: University of Maryland (Coursera) Date: January 5, 2015 - March 18, 2015 Bio: Part of a four course specialization on Cyber Security. The course covers the vulnerabilities and defensive for a number circuit design issues; including IP protection, physical and side channel attacks, Trojan detection, and general good practices. The course is[...]
Cloud Computing Concepts Institution: University of Illinois (Coursera) Date: February 2, 2015 - March 15, 2015 Bio: Part of a four course specialization on Cyber Computing. This first course introduces concepts such as membership, multicast, snapshots, and more. The course does a good job illustrating the core concepts by covering the history of cloud computing[...]
Cryptography Institution: University of Maryland (Coursera) Date: November 10, 2014 - January 25, 2015 Bio: Part of a four course specialization on Cyber Security. The course covers Cryptographic principles starting at Substitution ciphers and going all the way to RSA public key encryption and Digital signatures. The course offers optional programming assignments for the distinction[...]
Software Security Institution: University of Maryland, College Park (Coursera) Date: Oct 20, 2014 - Nov 28, 2014 Bio: 'Software Security' is part of a four course Specialization Certificate in Cybersecurity. It covers programming security concerns such as low level programming languages (Buffer overflow, string formatting attacks), web security (SQL injection, session hijacking, ect), and automated[...]
Usable Security Institution: University of Maryland, College Park (Coursera) Date: Sep 15, 2014 - Oct 25, 2014 Bio: "Usable Security" is part of a four course Specialization Certificate in Cybersecurity. The course is about the designing and evaluating of usability for secure systems, with a user focused perspective. The main takeaway being, System security should[...]
Big Data and Social Physics Institution: MITx Date: May 12, 2014 - May 18, 2014 Bio: This course caught my curiosity as it was only a week long, so I was expecting a sort of cram school / high intensity course load over a week. This was not the case. The topic of Big Data[...]
Discrete Optimization Institution: University of Melbourne (Coursera) Date: March 4, 2014 - May 6, 2014 Bio: This course takes a unique approach in that it makes all of the course content available upfront. Students are given a set of assignments including the Knapsack problem, Graph Coloring, Traveling Salesman, Facility Location, and Vehicle Routing; each of[...]