B | C | D | E | F | H | I | J | K | M | N | O | P | Q | R | U | V | W | X | Y | Z | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Information Technology | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | |||||||||||||||||||||
4 | Course Name | University / Industry Partner Name | Difficulty Level | Average Hours | Course Rating | Course Description | Skills Learned | Specialization | Specialization Course Order | Specialization Description | Hours Range | Subtitle Language | Course Language | Domain | Sub-Domain | ||||||
5 | Big Data Analytical Platform on Alibaba Cloud | Alibaba Cloud Academy | Intermediate | 3 | 4,4 | ***FREE Certification Promotion for 2021***\n\nAlibaba Cloud is now offering a free certification on the newest generation of our Elastic Compute Service. Gain a thorough understanding of what set the 6th Generation ECS instance apart, and why you should be considering it for all your Cloud computing workloads.\n\nhttps://edu.alibabacloud.com/certification/clouder_6th_ecs\n\nCourse Description\n\nBuilding an Analytical Platform on Alibaba Cloud can empower how you take in, analyze, and demonstrate clear metrics from a set of Big Data. This course is designed to teach engineers how to use Alibaba Cloud Big Data products. It covers basic distributed system theory and Alibaba Cloud's core products like MaxCompute, DataWorks, E-MapReduce as well as a bundle of ecosystem tools.\n\nTo earn an official Alibaba Cloud certificate please join the Cloud Native courses on the Academy's website:\nBig Data Analysis Specialty: https: //edu.alibabacloud.com/course/317\nMachine Learning Specialty: https://edu.alibabacloud.com/course/318\nAlibaba Cloud Big Data - Data Integration: https://edu.alibabacloud.com/certification/clouder_bigdatainteg | Mapreduce; Apache Hadoop; Multitenancy; Data Security; Data Warehousing; Software Framework; Big Data; Multi-User; Demos; Chart | Alibaba Cloud Computing | 2 | ***FREE Certification Promotion for 2021***\n\nAlibaba Cloud is now offering a free certification on the newest generation of our Elastic Compute Service. Gain a thorough understanding of what set the 6th Generation ECS instance apart, and why you should be considering it for all your Cloud computing workloads.\n\nhttps://edu.alibabacloud.com/certification/clouder_6th_ecs\n\nCourse Description\n\nThis specialization is intended for both students and businesses who aim to learn more about how Cloud technology can help them grow. With Cloud Computing, Big Data, and Cloud Security courses, users will be exposed to a series of products that combine to make architectures fit for any task.\n\nThis specialization will train the user on two levels: first, the basic specifications and functions of our principle product line, and secondly, evaluates a user's ability to use several different products together to create best practice solutions on Alibaba Cloud.\n\nUsers that pass this specialization will stand out among their peers as IT professionals that can not only build a cloud architecture on their own but administrate a larger network of cloud resources on Alibaba Cloud.\n\nTaking this training offered by our official training partner, Coursera, will also prepare you to succeed on the ACP/ACA professional certification exam series (offered here: https://edu.alibabacloud.com/certification) and launch your next career as a Cloud professional. | [1.1, 3.9] | None | English | information-technology | cloud-computing | ||||||
6 | Princípios básicos de apoio técnico | Advanced | 17,8 | 5 | Este curso é o primeiro de uma série que visa a sua preparação para uma função de especialista de apoio técnico de TI de nível básico. Neste curso, ser-lhe-á apresentado o mundo das TI (Tecnologias de Informação). Vai descobrir as diferentes facetas das Tecnologias de Informação, como o hardware informático, a Internet, o software informático, a resolução de problemas e o serviço de apoio ao cliente. Vamos analisar como é que pode ser realizada uma entrevista técnica e fornecer sugestões sobre a melhor forma de se preparar para uma. Este curso aborda uma grande variedade de tópicos relacionados com as TI que são concebidos para lhe dar uma vista geral do que esperar deste programa de certificação.\n\nNo final deste curso, será capaz de:\n● Compreender o funcionamento do sistema binário.\n● Montar um computador a partir do zero.\n● Escolher e instalar um sistema operativo num computador.\n● Compreender o que é a Internet, como funciona e o respetivo impacto no mundo moderno.\n● Saber como as aplicações são criadas e como funcionam num computador.\n● Utilizar metodologias comuns de resolução de problemas e aptidões sociais num ambiente de TI. | Unos (Operating System); Computer Architecture; Build Operate Transfer; Com File; Booting; Software; Internet; Central Processing Unit; Customer Service; Abstraction | Apoio Técnico de TI da Google | 1 | Neste programa de certificação de 5 cursos, vai preparar-se para um emprego de nível inicial na área de apoio técnico de TI através de um currículo inovador desenvolvido pela Google. 80% dos alunos da Certificação profissional de apoio técnico de TI da Google nos EUA afirmam sentir um impacto na carreira no espaço de 6 meses, tal como encontrar um novo emprego, obter um aumento ou começar uma nova empresa. O programa faz parte do Grow with Google, uma iniciativa da Google para ajudar a criar oportunidades económicas para todos. Saiba mais.\n\nApós a conclusão da certificação, os alunos elegíveis para trabalhar nos EUA podem partilhar diretamente as respetivas informações com a Google, bem como com empregadores como a Hulu, Infosys, Intel, Walmart e muitos mais.\n\nEste programa também serve como preparação para os exames CompTIA A+, a certificação padrão da indústria em TI — receberá uma acreditação dupla quando concluir ambos. Através de uma combinação de palestras em vídeo, questionários e laboratórios práticos, vai familiarizar-se com a resolução de problemas, o serviço de apoio ao cliente, as redes, os sistemas operativos, a administração de sistemas e a segurança: aptidões fundamentais de TI necessárias para uma função de nível inicial. Vai receber informações de funcionários da Google cujas bases em apoio técnico de TI serviram como ponto de partida para as suas próprias carreiras. | [10.2, 22.1] | Arabic; French; English; Spanish; Chinese; Italian; Portuguese; Vietnamese; Korean; German; Russian; Turkish | Portuguese (Portugal) | information-technology | support-and-operations | |||||||
7 | Os vários elementos das redes informáticas | Beginner | 18,7 | 5 | Este curso foi concebido para proporcionar uma vista geral das redes informáticas. Vamos abordar desde os princípios básicos das tecnologias e protocolos de redes modernos até aplicações práticas e resolução de problemas de rede. Para terminar, vamos abordar o modo como estas informações podem surgir numa entrevista de emprego e dar-lhe algumas sugestões para resolver problemas no local.\n\nNo final deste curso, será capaz de:\n● Descrever redes informáticas em termos de um modelo de cinco camadas;\n● Compreender todos os protocolos padrão envolvidos nas comunicações TCP/IP;\n● Compreender ferramentas e técnicas poderosas de resolução de problemas de rede;\n● Adquirir conhecimentos sobre serviços de rede como DNS e DHCP, que ajudam ao funcionamento das redes informáticas;\n● Compreender a cloud computing, tudo como um serviço e o armazenamento na nuvem. | Vrio; Com File; Virtual Private Networks; Dynamic Host Configuration Protocol; Computer Networking; Network Layer; Porting; Socket; Domain Name System; Cabling | Apoio Técnico de TI da Google | 2 | Neste programa de certificação de 5 cursos, vai preparar-se para um emprego de nível inicial na área de apoio técnico de TI através de um currículo inovador desenvolvido pela Google. 80% dos alunos da Certificação profissional de apoio técnico de TI da Google nos EUA afirmam sentir um impacto na carreira no espaço de 6 meses, tal como encontrar um novo emprego, obter um aumento ou começar uma nova empresa. O programa faz parte do Grow with Google, uma iniciativa da Google para ajudar a criar oportunidades económicas para todos. Saiba mais.\n\nApós a conclusão da certificação, os alunos elegíveis para trabalhar nos EUA podem partilhar diretamente as respetivas informações com a Google, bem como com empregadores como a Hulu, Infosys, Intel, Walmart e muitos mais.\n\nEste programa também serve como preparação para os exames CompTIA A+, a certificação padrão da indústria em TI — receberá uma acreditação dupla quando concluir ambos. Através de uma combinação de palestras em vídeo, questionários e laboratórios práticos, vai familiarizar-se com a resolução de problemas, o serviço de apoio ao cliente, as redes, os sistemas operativos, a administração de sistemas e a segurança: aptidões fundamentais de TI necessárias para uma função de nível inicial. Vai receber informações de funcionários da Google cujas bases em apoio técnico de TI serviram como ponto de partida para as suas próprias carreiras. | [11.1, 23.0] | Spanish; English; Russian; German; Vietnamese; Portuguese; Italian; French; Arabic | Portuguese (Portugal) | information-technology | networking | |||||||
8 | Interagir com sistemas operativos | Beginner | 18,4 | Not Calibrated | Neste curso, através de uma combinação de palestras em vídeo, demonstrações e experiências práticas, vai adquirir conhecimentos acerca dos componentes principais de um sistema operativo e como realizar tarefas críticas, como gerir software e utilizadores e configurar hardware. Vamos terminar com um exemplo de como este conteúdo pode surgir no contexto de uma entrevista.\n\nNo final deste curso, será capaz de:\n● Navegar nos sistemas de ficheiros do Windows e do Linux através de uma interface gráfica do utilizador e de um intérprete de linha de comandos.\n● Configurar utilizadores, grupos e autorizações de acesso a contas.\n● Instalar, configurar e remover software nos sistemas operativos Windows e Linux.\n● Configurar partições do disco e sistemas de ficheiros.\n● Perceber como funcionam os processos dos sistemas e como os gerir.\n● Trabalhar com registos de sistemas e ferramentas de ligação remota.\n● Utilizar os conhecimentos sobre os sistemas operativos para resolver problemas comuns como especialista de apoio técnico de TI. | Com File; Unos (Operating System); Process (Computing); Virtual Memory; File System; Disco; Divergence (Computer Science); Software; Command-Line Interface; Process State | Apoio Técnico de TI da Google | 3 | Neste programa de certificação de 5 cursos, vai preparar-se para um emprego de nível inicial na área de apoio técnico de TI através de um currículo inovador desenvolvido pela Google. 80% dos alunos da Certificação profissional de apoio técnico de TI da Google nos EUA afirmam sentir um impacto na carreira no espaço de 6 meses, tal como encontrar um novo emprego, obter um aumento ou começar uma nova empresa. O programa faz parte do Grow with Google, uma iniciativa da Google para ajudar a criar oportunidades económicas para todos. Saiba mais.\n\nApós a conclusão da certificação, os alunos elegíveis para trabalhar nos EUA podem partilhar diretamente as respetivas informações com a Google, bem como com empregadores como a Hulu, Infosys, Intel, Walmart e muitos mais.\n\nEste programa também serve como preparação para os exames CompTIA A+, a certificação padrão da indústria em TI — receberá uma acreditação dupla quando concluir ambos. Através de uma combinação de palestras em vídeo, questionários e laboratórios práticos, vai familiarizar-se com a resolução de problemas, o serviço de apoio ao cliente, as redes, os sistemas operativos, a administração de sistemas e a segurança: aptidões fundamentais de TI necessárias para uma função de nível inicial. Vai receber informações de funcionários da Google cujas bases em apoio técnico de TI serviram como ponto de partida para as suas próprias carreiras. | [10.0, 23.1] | Spanish; English; Italian; French; Arabic; Russian; German; Vietnamese; Portuguese | Portuguese (Portugal) | information-technology | support-and-operations | |||||||
9 | Serviços de infraestruturas e administração de sistemas | Beginner | 18,4 | Not Calibrated | Este curso vai fazer a transição do trabalho num único computador para uma frota inteira. A administração de sistemas é o campo das TI responsável por manter sistemas de computadores fiáveis num ambiente multiutilizador. Neste curso, vai saber mais sobre os serviços de infraestruturas que mantêm todas as entidades, sejam grandes ou pequenas, a funcionar. Vamos analisar detalhadamente a nuvem para que compreenda tudo, desde configurações de infraestruturas na nuvem habituais até saber como gerir os recursos na nuvem. Também vai aprender a gerir e a configurar servidores, bem como a utilizar ferramentas do setor para gerir computadores, informações do utilizador e a produtividade do utilizador. Por fim, vai aprender a recuperar a infraestrutura de TI da sua entidade caso ocorra um desastre.\nNo final deste curso, vai conseguir:\n● utilizar práticas recomendadas para escolher hardware, fornecedores e serviços para a sua entidade.\n● compreender como funcionam os serviços de infraestruturas mais comuns que mantêm uma entidade\nem funcionamento e como gerir servidores de infraestruturas.\n● compreender como tirar o máximo partido da nuvem para a sua entidade.\n● gerir os computadores e os utilizadores de uma entidade através dos serviços de diretório Active\nDirectory e OpenLDAP.\n● escolher e gerir as ferramentas que a sua entidade irá utilizar.\n● fazer uma cópia de segurança dos dados da sua entidade e saber como recuperar a infraestrutura de TI caso ocorra um desastre.\n● utilizar os conhecimentos de administração de sistemas para planear e melhorar os processos para ambientes de TI. | Com File; Backup; Directory Services; Maintenance; Provisioning; Network Service; Data Recovery; Handle System; Recovery Testing; Off-Site Data Protection | Apoio Técnico de TI da Google | 4 | Neste programa de certificação de 5 cursos, vai preparar-se para um emprego de nível inicial na área de apoio técnico de TI através de um currículo inovador desenvolvido pela Google. 80% dos alunos da Certificação profissional de apoio técnico de TI da Google nos EUA afirmam sentir um impacto na carreira no espaço de 6 meses, tal como encontrar um novo emprego, obter um aumento ou começar uma nova empresa. O programa faz parte do Grow with Google, uma iniciativa da Google para ajudar a criar oportunidades económicas para todos. Saiba mais.\n\nApós a conclusão da certificação, os alunos elegíveis para trabalhar nos EUA podem partilhar diretamente as respetivas informações com a Google, bem como com empregadores como a Hulu, Infosys, Intel, Walmart e muitos mais.\n\nEste programa também serve como preparação para os exames CompTIA A+, a certificação padrão da indústria em TI — receberá uma acreditação dupla quando concluir ambos. Através de uma combinação de palestras em vídeo, questionários e laboratórios práticos, vai familiarizar-se com a resolução de problemas, o serviço de apoio ao cliente, as redes, os sistemas operativos, a administração de sistemas e a segurança: aptidões fundamentais de TI necessárias para uma função de nível inicial. Vai receber informações de funcionários da Google cujas bases em apoio técnico de TI serviram como ponto de partida para as suas próprias carreiras. | [10.0, 23.1] | Spanish; Russian; German; Vietnamese; Portuguese; Italian; French; Arabic | English | information-technology | support-and-operations | |||||||
10 | Segurança de TI: defesa contra as artes negras digitais | Beginner | 18,4 | Not Calibrated | Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para salvaguardar dados. Em seguida, vamos analisar detalhadamente os três aspetos mais importantes da segurança das informações: autenticação, autorização e contabilidade. Também vamos abordar soluções de segurança de rede, desde firewalls a opções de encriptação de Wi-Fi. Por último, vamos analisar um caso prático, no qual examinamos o modelo de segurança do Chrome OS. O curso conclui ao reunir todos estes elementos numa arquitetura de segurança detalhada e de várias camadas, apresentando depois recomendações sobre como integrar uma cultura de segurança na sua entidade ou equipa.\nNo final deste curso, vai saber mais sobre:\n● como funcionam vários algoritmos e técnicas de encriptação, bem como as respetivas vantagens e limitações\n● vários tipos e sistemas de autenticação\n● a diferença entre autenticação e autorização\n● como avaliar potenciais riscos e recomendar formas de reduzir o risco\n● práticas recomendadas para proteger uma rede\n● como ajudar as outras pessoas a entender conceitos de segurança e a protegerem-se | Art; Disco; Com File; Encryption; Reverse Proxy; Antivirus Software; Symmetric-Key Algorithm; Hashing; Disk Encryption; Authentication | Apoio Técnico de TI da Google | 5 | Neste programa de certificação de 5 cursos, vai preparar-se para um emprego de nível inicial na área de apoio técnico de TI através de um currículo inovador desenvolvido pela Google. 80% dos alunos da Certificação profissional de apoio técnico de TI da Google nos EUA afirmam sentir um impacto na carreira no espaço de 6 meses, tal como encontrar um novo emprego, obter um aumento ou começar uma nova empresa. O programa faz parte do Grow with Google, uma iniciativa da Google para ajudar a criar oportunidades económicas para todos. Saiba mais.\n\nApós a conclusão da certificação, os alunos elegíveis para trabalhar nos EUA podem partilhar diretamente as respetivas informações com a Google, bem como com empregadores como a Hulu, Infosys, Intel, Walmart e muitos mais.\n\nEste programa também serve como preparação para os exames CompTIA A+, a certificação padrão da indústria em TI — receberá uma acreditação dupla quando concluir ambos. Através de uma combinação de palestras em vídeo, questionários e laboratórios práticos, vai familiarizar-se com a resolução de problemas, o serviço de apoio ao cliente, as redes, os sistemas operativos, a administração de sistemas e a segurança: aptidões fundamentais de TI necessárias para uma função de nível inicial. Vai receber informações de funcionários da Google cujas bases em apoio técnico de TI serviram como ponto de partida para as suas próprias carreiras. | [10.0, 23.1] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | |||||||
11 | Hybrid Cloud Infrastructure Foundations with Anthos | Google Cloud | Beginner | 5,8 | 4,7 | This on-demand course equips students to build reliable and manageable multi-cluster Kubernetes infrastructures using Anthos GKE, whether deployed with Anthos on Google Cloud or with Anthos deployed on VMware. It is a continuation of Architecting with GKE and assumes hands-on experience with the technologies covered in that course. | Cloud Computing; Google Cloud Platform; Cloud Platforms; Kubernetes; Data Clustering Algorithms; Authentication; Workload; Enabling; Solution Stack; Stack (Abstract Data Type) | Architecting Hybrid Cloud Infrastructure with Anthos | 1 | This specialization is intended for technical engineers, architects, and administrators using Google Cloud Platform (GCP), Kubernetes, and Istio to create, integrate, or modernize solutions. You will learn modernizing, managing, and observing microservices-based applications that span multiple clusters in GCP, on-premises, or other cloud providers. | [3.5, 6.8] | None | English | information-technology | cloud-computing | ||||||
12 | Google Cloud Platform Fundamentals: Core Infrastructure | Google Cloud | Beginner | 13,5 | 4,7 | This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, and BigQuery. You learn about important resource and policy management tools, such as the Google Cloud Resource Manager hierarchy and Google Cloud Identity and Access Management. Hands-on labs give you foundational skills for working with GCP.\n\nNote:\n•Google services are currently unavailable in China. | Cloud Computing; Google Cloud Platform; Cloud Platforms; Cloud Storage; Google App Engine; Bigquery; Google Storage; Cloud Infrastructure; Big Data; Leadership and Management | Architecting with Google Compute Engine | 1 | 87% of Google Cloud certified users feel more confident in their cloud skills. This program provides the skills you need to advance your career, and training to support your preparation for the industry-recognized Google Cloud Associate Cloud Engineer certification.\n\nYour journey to Google Cloud certification:\n\n1) Complete the Coursera Cloud Engineering Professional Certificate\n\n2) Review other recommended resources for the Google Cloud Associate Cloud Engineer certification exam\n\n3) Review the Associate Cloud Engineer exam guide\n\n4) Complete Associate Cloud Engineer sample questions\n\n5) Register for the Google Cloud certification exam (remotely or at a test center)\n\nApplied Learning Project\n\nThis professional certificate incorporates hands-on labs using our Qwiklabs platform.\n\nThese hands on components will let you apply the skills you learn. Projects incorporate Google Cloud Platform products, used within Qwiklabs. You will gain practical hands-on experience with the concepts explained throughout the modules. | [8.2, 16.3] | Japanese; French; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
13 | Google Cloud Platform Fundamentals: Core Infrastructure dalam bahasa Indonesia | Google Cloud | Advanced | 16,3 | 4,9 | Kursus ini memperkenalkan Anda pada konsep dan terminologi penting untuk bekerja dengan Google Cloud Platform (GCP). Anda akan mempelajari dan membandingkan berbagai layanan komputasi dan penyimpanan yang tersedia di Google Cloud Platform, termasuk Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, dan BigQuery. Anda akan mempelajari referensi dan fitur pengelolaan kebijakan penting, seperti hierarki Google Cloud Resource Manager dan Google Cloud Identity and Access Management. Lab praktis memberi Anda keterampilan dasar untuk bekerja dengan GCP.\n\n\n Catatan:\n•Layanan Google saat ini belum tersedia di China. | Cloud Computing; Google Cloud Platform; Cloud Platforms; Cloud Storage; Google App Engine; Cloud Infrastructure; Bigquery; Kubernetes; Cloud Engineering; Big Data | Architecting with Google Compute Engine bahasa Indonesia | 1 | Nama Spesialisasi telah berubah dari "Architecting from Google Cloud Platform Specialization" menjadi "Architecting with Google Compute Engine Specialization" pada 12 Juni 2020.\n\nSpesialisasi ini memperkenalkan peserta pada infrastruktur dan layanan platform yang komprehensif serta fleksibel, dan tersedia melalui Google Cloud Platform. Melalui kombinasi presentasi, demo, dan lab langsung, peserta akan mengeksplorasi serta menerapkan berbagai elemen solusi, termasuk komponen infrastruktur seperti jaringan, sistem, dan layanan aplikasi. Kursus ini juga mencakup penerapan solusi praktis termasuk melakukan interkoneksi jaringan dengan aman, kunci enkripsi yang disediakan pelanggan, manajemen keamanan dan akses, kuota dan tagihan, serta pemantauan resource.\n\nKelas ini ditujukan untuk peserta berikut:\n\n● Arsitek Solusi Cloud, Engineer DevOps.\n\n● Individu yang menggunakan Google Cloud Platform untuk membuat solusi baru atau mengintegrasikan sistem, lingkungan aplikasi, dan infrastruktur yang sudah ada dengan Google Cloud Platform.\n\nSpesialisasi ini menyediakan konten yang telah diperbarui dan disempurnakan yang akan membantu Anda mempersiapkan diri untuk menempuh ujian Google Certified Professional - Cloud Architect dan Associate Cloud Engineer.\n\n>>> Dengan mendaftar untuk mengikuti spesialisasi ini, Anda menyetujui Persyaratan Layanan Qwiklabs sebagaimana diuraikan dalam FAQ dan terletak di: https://qwiklabs.com/terms_of_service <<< | [11.1, 20.0] | Japanese; French; Portuguese; German; Russian; English; Spanish | Indonesian | information-technology | cloud-computing | ||||||
14 | Google Cloud Platform Fundamentals: Core Infrastructure em Português Brasileiro | Google Cloud | Advanced | 13 | 4,8 | Este curso é uma apresentação da terminologia e dos conceitos importantes para trabalhar com o Google Cloud Platform (GCP). Você aprenderá sobre vários serviços de computação e armazenamento disponíveis no Google Cloud Platform, incluindo o Google App Engine, o Google Compute Engine, o Google Kubernetes Engine, o Google Cloud Storage, o Google Cloud SQL e o BigQuery, e também fará uma comparação dessas soluções. Você conhecerá importantes ferramentas de gerenciamento de recursos e políticas, como a hierarquia do Google Cloud Resource Manager e o Google Cloud Identity and Access Management. Os laboratórios práticos oferecem habilidades básicas para trabalhar com o GCP. | Cloud Computing; Cloud Platforms; Google Cloud Platform; Google App Engine; Virtual Machine; Application Programming Interfaces; Mysql; Com File; Recursively Enumerable Set; Kubernetes | Architecting with Google Compute Engine em Português | 1 | O nome da especialização mudou de "Architecting from Google Cloud Platform" para "Architecting with Google Compute Engine" em 12 de junho de 2020.\n\nNeste especialização, os participantes conhecerão os serviços flexíveis e abrangentes de infraestrutura e plataforma fornecidos pelo Google Cloud Platform. Por meio de uma combinação de apresentações, demonstrações e laboratórios práticos, os participantes poderão explorar e implantar elementos da solução, incluindo componentes de infraestrutura como redes, sistemas e serviços de aplicativos. Este curso também abrange a implantação de soluções práticas, incluindo a interconexão segura de redes, chaves de criptografia fornecidas pelo cliente, gerenciamento de segurança e acesso, cotas e faturamento, além do monitoramento de recursos.\n\nEsta aula destina-se aos seguintes participantes:\n\n● arquitetos de soluções em nuvem, engenheiros de DevOps\n\n● pessoas que usam o Google Cloud Platform para criar novas soluções ou integrar sistemas existentes, ambientes de aplicativos e infraestrutura com o Google Cloud Platform\n\n>>> Ao se inscrever nesta especialização, você concorda com os Termos de Serviço do Qwiklabs conforme estabelecido na seção de perguntas frequentes. Veja os Termos de Serviço aqui: https://qwiklabs.com/terms_of_service <<< | [8.5, 15.9] | English | Portuguese (Brazil) | information-technology | cloud-computing | ||||||
15 | Google Cloud Platform Fundamentals: Core Infrastructure en Français | Google Cloud | Beginner | 12,7 | 4,7 | Ce cours présente des concepts et des termes à connaître pour exploiter Google Cloud Platform (GCP). Vous y découvrirez et y comparerez de nombreux services informatiques et services de stockage disponibles sur Google Cloud Platform, tels que Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL et BigQuery. Vous y découvrirez aussi d'importants outils de gestion des ressources et des règles, comme la hiérarchie de Google Cloud Resource Manager et Google Cloud Identity and Access Management. Des ateliers pratiques vous permettront d'acquérir les compétences fondamentales dont vous aurez besoin pour exploiter GCP.\n\nRemarque :\n• Les services Google ne sont pas disponibles en Chine pour le moment. | Cloud Computing; Cloud Platforms; Google Cloud Platform; Kubernetes; Child Exploitation Tracking System; Gustave Le Bon; Joie De Vivre | Architecting with Google Compute Engine en Français | 1 | La spécialisation "Architecting from Google Cloud Platform Specialization" a été renommée "Architecting with Google Compute Engine Specialization" depuis le 12 juin 2020.\n\nCette spécialisation présente l'infrastructure et les services de plate-forme complets et flexibles de Google Cloud Platform. À travers un ensemble de présentations, de démonstrations et d'ateliers pratiques, les participants découvrent et déploient des éléments de solution, y compris des composants d'infrastructure tels que les réseaux, les systèmes et les services applicatifs. Cette spécialisation aborde également le déploiement de solutions pratiques, telles que l'interconnexion des réseaux de manière sécurisée, les clés de chiffrement fournies par le client, la sécurité et la gestion des accès, les quotas et la facturation, ainsi que la surveillance des ressources.\n\nCe cours s'adresse au public suivant :\n\n● Architectes de solutions cloud et ingénieurs DevOps\n\n● Personnes qui utilisent Google Cloud Platform pour créer des solutions, ou pour intégrer des systèmes, des infrastructures et des environnements applicatifs existants à cette plate-forme\n\n>>> En vous inscrivant à cette spécialisation vous acceptez les conditions d'utilisation de Qwiklabs décrites dans la FAQ et disponibles à l'adresse: https://qwiklabs.com/terms_of_service <<< | [8.4, 14.9] | English | French | information-technology | cloud-computing | ||||||
16 | Google Cloud Platform Fundamentals: Core Infrastructure 日本語版 | Google Cloud | Advanced | 14,4 | 4,5 | このコースでは、Google Cloud Platform(GCP)の操作に必要な重要な概念と用語について説明していきます。Google Cloud Platform で使用できる Google App Engine、Google Compute Engine、Google Kubernetes Engine、Google Cloud Storage、Google Cloud SQL、BigQuery などのさまざまなコンピューティング サービスとストレージ サービスについて説明し、それぞれを比較します。さらに、Google Cloud Resource Manager のリソース階層や Google Cloud Identity and Access Management といった、リソースとポリシーを管理するための重要なツールについても説明します。ハンズオンラボでは、GCP を操作するための基本的なスキルを習得します。\n\n注:\n• 現在、Google のサービスは中国では利用できません。 | Google Cloud Platform; Cloud Computing; Cloud Platforms; Recursively Enumerable Set; Application Programming Interfaces; Kubernetes; Business Solutions; Cloud API; IBM Cloud; Google App Engine | Architecting with Google Compute Engine 日本語版 | 1 | 2020 年 6 月 12 日より、専門講座の名称が「Architecting from Google Cloud Platform」から「Architecting with Google Compute Engine」に変わりました。\n\nこの専門講座では、Google Cloud Platform が提供する包括的で柔軟性の高いインフラストラクチャとプラットフォーム サービスの概要を学習します。講義、デモ、ハンズオンラボを通して、ネットワーク、システム、アプリケーション サービスなどのインフラストラクチャ コンポーネントを含む、ソリューションの各要素について学習し、演習を行います。このコースでは、実践的なソリューションの実装も取り上げており、セキュリティを維持しながらネットワークを相互接続する方法や、顧客指定の暗号鍵、セキュリティとアクセス管理、割り当てと課金、リソース モニタリングなどについて学習します。\n\n対象者:\n\n● クラウド ソリューション アーキテクト、DevOps エンジニア\n\n● Google Cloud Platform を使用して新しいソリューションを作成する、または既存のシステム、アプリケーション環境、インフラストラクチャを Google Cloud Platform と統合するデベロッパー。\n\n>>>この専門分野に登録することにより、Qwiklabs の利用規約に同意したとみなされます。詳しくは こちらをご覧ください。https://qwiklabs.com/terms_of_service <<< | [9.1, 17.2] | English | Japanese | information-technology | cloud-computing | ||||||
17 | Google Cloud Platform Fundamentals: Core Infrastructure | Google Cloud | Beginner | 13,5 | 4,7 | This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, and BigQuery. You learn about important resource and policy management tools, such as the Google Cloud Resource Manager hierarchy and Google Cloud Identity and Access Management. Hands-on labs give you foundational skills for working with GCP.\n\nNote:\n•Google services are currently unavailable in China. | Cloud Computing; Google Cloud Platform; Cloud Platforms; Cloud Storage; Google App Engine; Bigquery; Google Storage; Cloud Infrastructure; Big Data; Leadership and Management | Architecting with Google Kubernetes Engine | 1 | The Architecting with Google Kubernetes Engine specialization will teach you how to implement solutions using Google Kubernetes Engine, or GKE, including building, scheduling, load balancing, and monitoring workloads, as well as providing for discovery of services, managing role-based access control and security, and providing persistent storage to these applications. | [8.2, 16.3] | French; German; Russian; Spanish; Japanese | English | information-technology | cloud-computing | ||||||
18 | Google Cloud Platform Fundamentals: Core Infrastructure en Français | Google Cloud | Beginner | 12,7 | 4,7 | Ce cours présente des concepts et des termes à connaître pour exploiter Google Cloud Platform (GCP). Vous y découvrirez et y comparerez de nombreux services informatiques et services de stockage disponibles sur Google Cloud Platform, tels que Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL et BigQuery. Vous y découvrirez aussi d'importants outils de gestion des ressources et des règles, comme la hiérarchie de Google Cloud Resource Manager et Google Cloud Identity and Access Management. Des ateliers pratiques vous permettront d'acquérir les compétences fondamentales dont vous aurez besoin pour exploiter GCP.\n\nRemarque :\n• Les services Google ne sont pas disponibles en Chine pour le moment. | Cloud Computing; Cloud Platforms; Google Cloud Platform; Kubernetes; Child Exploitation Tracking System; Gustave Le Bon; Joie De Vivre | Architecting with Google Kubernetes Engine en Français | 1 | La spécialisation Architecting with Google Kubernetes Engine vous apprendra comment implémenter des solutions à l'aide de Google Kubernetes Engine ou GKE, y compris la création, la planification, l'équilibrage de charge et la surveillance des charges de travail, ainsi que la découverte de services, la gestion du contrôle d'accès basé sur les rôles et sécurité et fournir un stockage persistant à ces applications. | [8.4, 14.9] | English | French | information-technology | cloud-computing | ||||||
19 | Google Cloud Platform Fundamentals: Core Infrastructure em Português Brasileiro | Google Cloud | Advanced | 13 | 4,8 | Este curso é uma apresentação da terminologia e dos conceitos importantes para trabalhar com o Google Cloud Platform (GCP). Você aprenderá sobre vários serviços de computação e armazenamento disponíveis no Google Cloud Platform, incluindo o Google App Engine, o Google Compute Engine, o Google Kubernetes Engine, o Google Cloud Storage, o Google Cloud SQL e o BigQuery, e também fará uma comparação dessas soluções. Você conhecerá importantes ferramentas de gerenciamento de recursos e políticas, como a hierarquia do Google Cloud Resource Manager e o Google Cloud Identity and Access Management. Os laboratórios práticos oferecem habilidades básicas para trabalhar com o GCP. | Cloud Computing; Cloud Platforms; Google Cloud Platform; Google App Engine; Virtual Machine; Application Programming Interfaces; Mysql; Com File; Recursively Enumerable Set; Kubernetes | Architecting with Google Kubernetes Engine en Portuguese | 1 | A especialização Arquitetura do Google Kubernetes Engine ensinará como implementar soluções usando o Google Kubernetes Engine ou GKE, incluindo criação, programação, balanceamento de carga e monitoramento de cargas de trabalho, além de fornecer descoberta de serviços, gerenciar controle de acesso baseado em funções e segurança e fornecimento de armazenamento persistente para esses aplicativos. | [8.5, 15.9] | English | Portuguese (Brazil) | information-technology | cloud-computing | ||||||
20 | Google Cloud Platform Fundamentals: Core Infrastructure 日本語版 | Google Cloud | Advanced | 14,4 | 4,5 | このコースでは、Google Cloud Platform(GCP)の操作に必要な重要な概念と用語について説明していきます。Google Cloud Platform で使用できる Google App Engine、Google Compute Engine、Google Kubernetes Engine、Google Cloud Storage、Google Cloud SQL、BigQuery などのさまざまなコンピューティング サービスとストレージ サービスについて説明し、それぞれを比較します。さらに、Google Cloud Resource Manager のリソース階層や Google Cloud Identity and Access Management といった、リソースとポリシーを管理するための重要なツールについても説明します。ハンズオンラボでは、GCP を操作するための基本的なスキルを習得します。\n\n注:\n• 現在、Google のサービスは中国では利用できません。 | Google Cloud Platform; Cloud Computing; Cloud Platforms; Recursively Enumerable Set; Application Programming Interfaces; Kubernetes; Business Solutions; Cloud API; IBM Cloud; Google App Engine | Architecting with Google Kubernetes Engine 日本語版 | 1 | Architecting with Google Kubernetes Engine 専門講座では、Google Kubernetes Engine(GKE)を使用してソリューションを実装する方法について説明します。具体的には、ワークロードの構築、スケジュール、負荷分散、モニタリングを行う方法、サービス ディスカバリの方法、役割ベースのアクセス制御とセキュリティを管理する方法、アプリケーションに永続ストレージを提供する方法などを説明します。\n\nこの専門講座には Qwiklabs プラットフォームを使用したハンズオンラボが組み込まれています。 | [9.1, 17.2] | English | Japanese | information-technology | cloud-computing | ||||||
21 | AWS Cloud Technical Essentials | Amazon Web Services | Intermediate | 10,1 | 4,8 | Are you in a technical role and want to learn the fundamentals of AWS? Do you aspire to have a job or career as a cloud developer, architect, or in an operations role? If so, AWS Cloud Technical Essentials is an ideal way to start. This course was designed for those at the beginning of their cloud-learning journey - no prior knowledge of cloud computing or AWS products and services required!\n\nThroughout the course, students will build highly available, scalable, and cost effective application step-by-step. Upon course completion, you will be able to make an informed decision about when and how to apply core AWS services for compute, storage, and database to different use cases. You’ll also learn about cloud security with a review of AWS' shared responsibility model and an introduction to AWS Identity and Access Management (IAM). And, you’ll know how AWS services can be used to monitor and optimize infrastructure in the cloud.\n\nAWS Cloud Technical Essentials is a fundamental-level course and will build your competence, confidence, and credibility with practical cloud skills that help you innovate and advance your professional future. Enroll in AWS Cloud Technical Essentials and start learning the technical fundamentals of AWS today!\n\nNote: This course was designed for learners with a technical background. If you are new to the cloud or come from a business background, we recommend completing AWS Cloud Practitioner Essentials (https://www.coursera.org/learn/aws-cloud-practitioner-essentials) before enrolling in this course. | Cloud Computing; High Availability; Databases; Amazon Dynamodb; Virtual Machine; Benefits; Accounting; Running; Security; Mathematical Optimization | AWS Fundamentals | 1 | This specialization gives current or aspiring IT professionals an overview of the features, benefits, and capabilities of Amazon Web Services (AWS). As you proceed through these four interconnected courses, you will gain a more vivid understanding of core AWS services, key AWS security concepts, strategies for migrating from on-premises to AWS, and basics of building serverless applications with AWS. Additionally, you will have opportunities to practice what you have learned by completing labs and exercises developed by AWS technical instructors. | [5.6, 13.8] | None | English | information-technology | cloud-computing | ||||||
22 | AWS Fundamentals: Addressing Security Risk | Amazon Web Services | Beginner | 5 | 4,2 | Welcome to AWS Fundamentals: Addressing Security Risk!\n\nThis course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video lectures, hands-on exercise guides, demonstrations, and quizzes to dive deep on concepts about security on AWS. You will learn about the concept of “least privilege” and the AWS Shared Responsibility Model, as well as view demonstrations of Amazon GuardDuty, AWS Secrets Manager, and cross-account access.\n\nWe encourage IT professionals and leaders who are interested in learning about best practices for securing an AWS environment and applications developed on AWS to enroll in this course. Before taking this course, we recommend you complete AWS Fundamentals: Going Cloud Native (https://www.coursera.org/learn/aws-fundamentals-going-cloud-native).\n\nClass forums will also allow you to ask questions and interact with AWS training instructors. | Security; Cloud Computing; Amazon Web Services; Web Service; Web; Cloud Computing Security; Risk; Databases; Leadership and Management; Identity Management | AWS Fundamentals | 2 | This specialization gives current or aspiring IT professionals an overview of the features, benefits, and capabilities of Amazon Web Services (AWS). As you proceed through these four interconnected courses, you will gain a more vivid understanding of core AWS services, key AWS security concepts, strategies for migrating from on-premises to AWS, and basics of building serverless applications with AWS. Additionally, you will have opportunities to practice what you have learned by completing labs and exercises developed by AWS technical instructors. | [2.1, 6.9] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
23 | AWS Fundamentals: Migrating to the Cloud | Amazon Web Services | Beginner | 4,8 | 4,5 | This four week course focuses on migrating workloads to AWS. We will focus on analyzing your current environment, planning your migration, AWS services that are commonly used during your migration, and the actual migration steps. \n\nHands-on labs are available, though not required for this class. Access to the labs is limited to paid enrolled students. You can audit this course without taking the labs. As we dive into each of the services covered in this class, there will be links to documentation where you can find example applications and code samples.\n\nThis course is also available in Spanish. To join the fully translated Spanish version, visit this page:\nhttps://www.coursera.org/learn/aws-fundamentals-cloud-migration-es. | Cloud Computing; Amazon Web Services; Web Service; Web; System Migration; Databases; Cloud Databases; Cloud Storage; Security; Data Migration | AWS Fundamentals | 3 | This specialization gives current or aspiring IT professionals an overview of the features, benefits, and capabilities of Amazon Web Services (AWS). As you proceed through these four interconnected courses, you will gain a more vivid understanding of core AWS services, key AWS security concepts, strategies for migrating from on-premises to AWS, and basics of building serverless applications with AWS. Additionally, you will have opportunities to practice what you have learned by completing labs and exercises developed by AWS technical instructors. | [1.9, 6.5] | Arabic; French; Portuguese; Italian; Vietnamese; Korean; German; Russian; Spanish | English | information-technology | data-management | ||||||
24 | AWS Fundamentals: Building Serverless Applications | Amazon Web Services | Beginner | 4,9 | 4,7 | This course will introduce you to Amazon Web Services (AWS) serverless architecture. Through demonstrations and hands-on exercises you'll learn skills in building and deploying serverless solutions. \n\nUsing real-world examples of a serverless website and chat bot, you'll build upon your existing knowledge of the AWS cloud to take advantage of the benefits of modern architectures for greater agility, innovation, and lower total cost of ownership across a range of AWS services, including AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon Lex.\n\nIn this course, you'll have the option to complete hands-on exercises. We strongly suggest you take advantage of the AWS Free Tier to follow the lab exercises provided by throughout the course. Be aware that any services used outside of the free tier may result in you incurring charges through your AWS account. Class forums will also allow you to ask questions and interact with AWS training instructors. After completing this course, you'll have the knowledge and skills to build serverless solutions on AWS. \n\nThis course has been developed by AWS, and is delivered by AWS technical instructors who teach cloud computing courses around the globe. | Amazon Web Services; Amazon Dynamodb; Amazon Cloudfront; Web; Web Service; Lexical Analysis; Serverless Computing; Cloud Computing; Application Programming Interfaces; Continuous Integration | AWS Fundamentals | 4 | This specialization gives current or aspiring IT professionals an overview of the features, benefits, and capabilities of Amazon Web Services (AWS). As you proceed through these four interconnected courses, you will gain a more vivid understanding of core AWS services, key AWS security concepts, strategies for migrating from on-premises to AWS, and basics of building serverless applications with AWS. Additionally, you will have opportunities to practice what you have learned by completing labs and exercises developed by AWS technical instructors. | [1.6, 7.2] | Arabic; French; Portuguese; Italian; Vietnamese; Korean; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
25 | Cloud Computing Foundations | Duke University | Beginner | 8,6 | 5 | Welcome to the first course in the Building Cloud Computing Solutions at Scale Specialization! In this course, you will learn how to build foundational Cloud computing infrastructure, including websites involving serverless technology and virtual machines. You will also learn how to apply Agile software development techniques to projects which will be useful in building portfolio projects and global-scale Cloud infrastructures. \n\nThis course is ideal for beginners as well as intermediate students interested in applying Cloud computing to data science, machine learning and data engineering. Students should have beginner level Linux and intermediate level Python skills. For your project in this course, you will build a statically hosted website using the Hugo framework, AWS Code Pipelines, AWS S3 and GitHub. | Cloud Computing; Continuous Delivery; Microservices; Continuous Integration; Software As A Service; Google Cloud Platform; Platform As A Service; Deployment Environment; Project; C Dynamic Memory Allocation | Building Cloud Computing Solutions at Scale | 1 | With more companies leveraging software that runs on the Cloud, there is a growing need to find and hire individuals with the skills needed to build solutions on a variety of Cloud platforms. Employers agree: Cloud talent is hard to find. This Specialization is designed to address the Cloud talent gap by providing training to anyone interested in developing the job-ready, pragmatic skills needed for careers that leverage Cloud-native technologies.\n\nIn the first course, you will learn how to build foundational Cloud computing infrastructure, including websites involving serverless technology and virtual machines, using the best practices of DevOps. The second course will teach you how to build effective Microservices using technologies like Flask and Kubernetes that are continuously deployed to a Cloud platform: Amazon Web Services (AWS), Azure or Google Cloud Platform (GCP). The third course begins to put together all of the Cloud concepts introduced in the first two courses to tackle more complex data engineering solutions. And finally, in the fourth course you will apply Machine Learning Engineering to build a Flask web application that serves out Machine Learning predictions. | [3.6, 12.1] | None | English | information-technology | cloud-computing | ||||||
26 | Cloud Virtualization, Containers and APIs | Duke University | Beginner | 7,5 | 4,8 | Welcome to the second course in the Building Cloud Computing Solutions at Scale Specialization! In this course, you will learn to design Cloud-native systems with the fundamental building blocks of Cloud computing. These building blocks include virtual machines and containers. You will also learn how to build effective Microservices using technologies like Flask and Kubernetes. Finally, you will analyze successful patterns in Operations including: Effective alerts, load testing and Kaizen. \n\nThis course is ideal for beginners as well as intermediate students interested in applying Cloud computing to data science, machine learning and data engineering. Students should have beginner level Linux and intermediate level Python skills. For your project in this course, you build a containerized Flask application that is continuously deployed to a Cloud platform: Amazon Web Services (AWS), Azure or Google Cloud Platform (GCP). | Microservices; Load Testing; Continuous Delivery; DevOps; Virtual Machine; Javascript Syntax; Cloud Computing; Abstraction; Web; A/Rose | Building Cloud Computing Solutions at Scale | 2 | With more companies leveraging software that runs on the Cloud, there is a growing need to find and hire individuals with the skills needed to build solutions on a variety of Cloud platforms. Employers agree: Cloud talent is hard to find. This Specialization is designed to address the Cloud talent gap by providing training to anyone interested in developing the job-ready, pragmatic skills needed for careers that leverage Cloud-native technologies.\n\nIn the first course, you will learn how to build foundational Cloud computing infrastructure, including websites involving serverless technology and virtual machines, using the best practices of DevOps. The second course will teach you how to build effective Microservices using technologies like Flask and Kubernetes that are continuously deployed to a Cloud platform: Amazon Web Services (AWS), Azure or Google Cloud Platform (GCP). The third course begins to put together all of the Cloud concepts introduced in the first two courses to tackle more complex data engineering solutions. And finally, in the fourth course you will apply Machine Learning Engineering to build a Flask web application that serves out Machine Learning predictions. | [3.3, 9.5] | None | English | information-technology | cloud-computing | ||||||
27 | Cloud Data Engineering | Duke University | Beginner | 8,6 | 5 | Welcome to the third course in the Building Cloud Computing Solutions at Scale Specialization! In this course, you will learn how to apply Data Engineering to real-world projects using the Cloud computing concepts introduced in the first two courses of this series. By the end of this course, you will be able to develop Data Engineering applications and use software development best practices to create data engineering applications. These will include continuous deployment, code quality tools, logging, instrumentation and monitoring. Finally, you will use Cloud-native technologies to tackle complex data engineering solutions. \n\nThis course is ideal for beginners as well as intermediate students interested in applying Cloud computing to data science, machine learning and data engineering. Students should have beginner level Linux and intermediate level Python skills. For your project in this course, you will build a serverless data engineering pipeline in a Cloud platform: Amazon Web Services (AWS), Azure or Google Cloud Platform (GCP). | Cloud Applications; Algorithms; Cloud Computing; Information Engineering; Microservices; Google Cloud Platform | Building Cloud Computing Solutions at Scale | 3 | With more companies leveraging software that runs on the Cloud, there is a growing need to find and hire individuals with the skills needed to build solutions on a variety of Cloud platforms. Employers agree: Cloud talent is hard to find. This Specialization is designed to address the Cloud talent gap by providing training to anyone interested in developing the job-ready, pragmatic skills needed for careers that leverage Cloud-native technologies.\n\nIn the first course, you will learn how to build foundational Cloud computing infrastructure, including websites involving serverless technology and virtual machines, using the best practices of DevOps. The second course will teach you how to build effective Microservices using technologies like Flask and Kubernetes that are continuously deployed to a Cloud platform: Amazon Web Services (AWS), Azure or Google Cloud Platform (GCP). The third course begins to put together all of the Cloud concepts introduced in the first two courses to tackle more complex data engineering solutions. And finally, in the fourth course you will apply Machine Learning Engineering to build a Flask web application that serves out Machine Learning predictions. | [4.1, 11.4] | None | English | information-technology | cloud-computing | ||||||
28 | Introduction to Cloud Computing | IBM | Beginner | 9 | 4,7 | This course introduces you to the core concepts of cloud computing. You gain the foundational knowledge required for understanding cloud computing from a business perspective as also for becoming a cloud practitioner. You understand the definition and essential characteristics of cloud computing, its history, the business case for cloud computing, and emerging technology usecases enabled by cloud. We introduce you to some of the prominent service providers of our times (e.g. AWS, Google, IBM, Microsoft, etc.) the services they offer, and look at some case studies of cloud computing across industry verticals. \n\nYou learn about the various cloud service models (IaaS, PaaS, SaaS) and deployment models (Public, Private, Hybrid) and the key components of a cloud infrastructure (VMs, Networking, Storage - File, Block, Object, CDN). We also cover emergent cloud trends and practices including - Hybrid Multicloud, Microservices, Serverless, DevOps, Cloud Native and Application Modernization. And we go over the basics of cloud security, monitoring, and different job roles in the cloud industry. \n\nEven though this course does not require any prior cloud computing or programming experience, by the end of the course, you will have created your own account on IBM Cloud and gained some hands-on experience by provisioning a cloud service and working with it.\n\nThis course is suitable for a large variety of audiences - whether you are an executive / manager / student who wants to become familiar with cloud computing terminology and concepts, or someone who wants foundational grounding in cloud computing to start a career in this field or become a cloud practitioner - such as a cloud engineer, developer, analyst, etc.\n\nThe completion of this course also makes you eligible to earn the Cloud Computing Core IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/introduction-to-cloud-computing | Cloud Computing; Cloud Storage; Cloud Infrastructure; IBM Cloud; Security; Cloud Computing Security; Architecture; Cloud Computing Architecture; DevOps; Microservices | Cloud Application Development Foundations | 1 | This program will equip you with all the key skills and technical know-how to kickstart your career as a full-stack Cloud Native Developer. Guided by experts at IBM, you will learn to build your own cloud-based applications and practice working with the technologies behind them. The Cloud Application Development Foundations Specialization program will teach you the tools and technologies that successful software developers use to build, deploy, test, run, and manage Cloud Native applications – putting you in an advantageous position to begin a new career in a highly in-demand area. You do not require any prior programming experience or Cloud background to start this program. The courses in this program will help you develop skillsets in a variety of technologies including, Cloud foundations, HTML, CSS, JavaScript, GitHub, Node.js, React, Cloud Native practices, DevOps, CI/CD, and more. After completing all the courses in the program, you will have developed and deployed several applications on a cloud platform and delivered Software as a Service (SaaS) solutions using Cloud Native methodologies. | [3.2, 12.4] | Spanish; Arabic; French; Portuguese; Italian; Vietnamese; German; Russian | English | information-technology | cloud-computing | ||||||
29 | Introduction to Cloud Development with HTML, CSS, JavaScript | IBM | Beginner | 9,5 | 4 | Want to take the first steps to become a Cloud Application Developer? This course will lead you through the languages and tools you will need to develop your own Cloud Apps.\n\nBeginning with an explanation of how internet servers and clients work together to deliver applications to users, this course then takes you through the context for application development in the Cloud, introducing front-end, back-end, and full-stack development.\n\nYou’ll then focus on the languages you need for front-end development, working with HTML, CSS, and JavaScript.\n\nFinally, you will discover tools that help you to store your projects and keep track of changes made to project files, such as Git and GitHub. | Html; CSS; Javascript; Web Development; Distributed Version Control; Front And Back Ends; Version Control; Cloud Computing; DevOps; IBM Cloud | Cloud Application Development Foundations | 2 | This program will equip you with all the key skills and technical know-how to kickstart your career as a full-stack Cloud Native Developer. Guided by experts at IBM, you will learn to build your own cloud-based applications and practice working with the technologies behind them. The Cloud Application Development Foundations Specialization program will teach you the tools and technologies that successful software developers use to build, deploy, test, run, and manage Cloud Native applications – putting you in an advantageous position to begin a new career in a highly in-demand area. You do not require any prior programming experience or Cloud background to start this program. The courses in this program will help you develop skillsets in a variety of technologies including, Cloud foundations, HTML, CSS, JavaScript, GitHub, Node.js, React, Cloud Native practices, DevOps, CI/CD, and more. After completing all the courses in the program, you will have developed and deployed several applications on a cloud platform and delivered Software as a Service (SaaS) solutions using Cloud Native methodologies. | [5.7, 12.1] | None | English | information-technology | cloud-computing | ||||||
30 | Google Cloud Platform Fundamentals: Core Infrastructure 日本語版 | Google Cloud | Advanced | 14,4 | 4,5 | このコースでは、Google Cloud Platform(GCP)の操作に必要な重要な概念と用語について説明していきます。Google Cloud Platform で使用できる Google App Engine、Google Compute Engine、Google Kubernetes Engine、Google Cloud Storage、Google Cloud SQL、BigQuery などのさまざまなコンピューティング サービスとストレージ サービスについて説明し、それぞれを比較します。さらに、Google Cloud Resource Manager のリソース階層や Google Cloud Identity and Access Management といった、リソースとポリシーを管理するための重要なツールについても説明します。ハンズオンラボでは、GCP を操作するための基本的なスキルを習得します。\n\n注:\n• 現在、Google のサービスは中国では利用できません。 | Google Cloud Platform; Cloud Computing; Cloud Platforms; Recursively Enumerable Set; Application Programming Interfaces; Kubernetes; Business Solutions; Cloud API; IBM Cloud; Google App Engine | Cloud Architecture with Google Cloud 日本語版 | 1 | Google Cloud 認定資格を取得したユーザーのうち 87% が、クラウド関連のスキルについて一層自信がついたと感じています。このプログラムでは、キャリアアップに必要なスキルを身に付け、業界で一目置かれる Google Cloud Associate Cloud Engineer 認定資格の取得に向けたトレーニングを受けることができます。\n\nGoogle Cloud 認定資格の取得までのステップ:\n\n1. Coursera の Cloud Engineering with Google Cloud プロフェッショナル認定資格取得向けプログラムを修了する\n\n2. Google Cloud Associate Cloud Engineer 認定試験に関するその他の推奨リソースを確認する\n\n3. Associate Cloud Engineer の試験ガイドを確認する\n\n4. Associate Cloud Engineer 認定試験の質問例に回答する\n\n5. Google Cloud 認定資格取得のための登録を行う(リモートまたはテストセンターでの受験)\n\n応用学習プロジェクト\n\nこのプロフェッショナル認定資格取得に向けたプログラムには、Qwiklabs プラットフォームを使用したハンズオンラボが組み込まれています。\n\nこうしたハンズオン コンポーネントにより、学んだスキルを実際に使ってみることができます。プロジェクトでは、Google Cloud Platform のプロダクトを Qwiklabs 内で使用できるようになっています。モジュール全体で説明されている概念を使用して、実践的な経験を積むことができます。 | [9.1, 17.2] | English | Japanese | information-technology | cloud-computing | ||||||
31 | Preparing for the Google Cloud Professional Cloud Architect Exam 日本語版 | Google Cloud | Advanced | 10,2 | 4,5 | コースより抜粋: 「最善の試験対策は職務に必要なスキルを身に付けることである」\n \n このコースではトップダウン アプローチを用いて既知の知識とスキルを把握し、情報とスキルが不十分な分野を特定します。本コースを受講することにより、独自の対策計画を立てることができます。わかっていることとわからないことを明確にし、この職務の担当者に必要なスキルの習得と向上にお役立てください。\n \n 本コースでは試験ガイドの概要に沿って、受講者が特定の分野と関連する概念を十分に理解しているか、またはさらなる学習が必要かを判断できるように、「判断基準」となる概念を提示します。また、ケース分析、技術的に注意すべきポイントの特定、提案ソリューションの開発などの認知スキルを含む主要な職務スキルについて学び、実践する機会も用意されています。これらは職務スキルであると同時に試験スキルでもあります。また、アクティビティ トラッキング チャレンジラボを使って基礎能力もテストします。試験問題と同じような例題と解答も多数用意されており、コースの最後には採点式ではない模擬試験問題と、受験を想定した採点式の模擬試験問題が含まれています。 | Email; Telephone Number; Mapping; Lookup Table; Virtual Machine; Instrumentation (Computer Programming); Confidentiality; Rounding; Ansi C; High Availability | Cloud Architecture with Google Cloud 日本語版 | 6 | Google Cloud 認定資格を取得したユーザーのうち 87% が、クラウド関連のスキルについて一層自信がついたと感じています。このプログラムでは、キャリアアップに必要なスキルを身に付け、業界で一目置かれる Google Cloud Associate Cloud Engineer 認定資格の取得に向けたトレーニングを受けることができます。\n\nGoogle Cloud 認定資格の取得までのステップ:\n\n1. Coursera の Cloud Engineering with Google Cloud プロフェッショナル認定資格取得向けプログラムを修了する\n\n2. Google Cloud Associate Cloud Engineer 認定試験に関するその他の推奨リソースを確認する\n\n3. Associate Cloud Engineer の試験ガイドを確認する\n\n4. Associate Cloud Engineer 認定試験の質問例に回答する\n\n5. Google Cloud 認定資格取得のための登録を行う(リモートまたはテストセンターでの受験)\n\n応用学習プロジェクト\n\nこのプロフェッショナル認定資格取得に向けたプログラムには、Qwiklabs プラットフォームを使用したハンズオンラボが組み込まれています。\n\nこうしたハンズオン コンポーネントにより、学んだスキルを実際に使ってみることができます。プロジェクトでは、Google Cloud Platform のプロダクトを Qwiklabs 内で使用できるようになっています。モジュール全体で説明されている概念を使用して、実践的な経験を積むことができます。 | [5.8, 12.9] | English; Spanish; Portuguese | Japanese | information-technology | cloud-computing | ||||||
32 | Enterprise System Management and Security | University of Colorado System | Beginner | 8,7 | 4,7 | The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we discuss what makes home computing systems different from enterprise computing systems. This course will also help you prepare and design your own home lab to explore enterprise operating systems.\n\nThis course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. This course may also be for those who are looking to understand how computer security plays an important role in system management. \n\nAt the end of the course, you will also be able to illustrate how different enterprise technologies play role in computing at an enterprise level. You will also be able to discuss the three pillars of the CIA triad and how they apply to enterprise systems. \nWhile there is no technical and software component installs necessary for the completion of this course, supplemental how-to guides will be provided if you wish to follow along on the technical portion presented during the course. | Security; Enterprise System; Leadership and Management; Security Management; Enterprise Private Network; Osi Model; Information Security; Subnetwork; Enterprise Software; Wireless | Computer Security and Systems Management | 1 | The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely. | [4.4, 11.0] | Russian; Spanish; Arabic; French; Portuguese; Italian; Vietnamese; German | English | information-technology | security | ||||||
33 | Windows Server Management and Security | University of Colorado System | Beginner | 6,5 | 4,6 | Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself. \nThis course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system. | Security; Leadership and Management; Authentication; Security Management; Access Control; Encryption; System Security; Window Installation; Authorization; Security Controls | Computer Security and Systems Management | 2 | The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely. | [3.1, 8.4] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
34 | Linux Server Management and Security | University of Colorado System | Beginner | 7,8 | 4,5 | Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. \nIn week 1 we will look at what Linux is used for in the enterprise. By the end of week 1, you will be able to differentiate between different versions of Linux and understand how they are used in an enterprise environment. In week 2, we will explore how Linux systems are configured. By the end of week 2, you will be able to demonstrate different Linux commands and how they are used. You will also be able to interact with a Linux system. In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system. By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications. | Security; Leadership and Management; Linux Console; Linux Security Modules; Security Controls; Access Control; Studentized Residual; Euler'S Totient Function; Authentication; Control Function (Econometrics) | Computer Security and Systems Management | 3 | The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely. | [3.1, 10.6] | Arabic; French; Portuguese; Italian; Vietnamese; Korean; German; Russian; Spanish | English | information-technology | security | ||||||
35 | Planning, Auditing and Maintaining Enterprise Systems | University of Colorado System | Beginner | 5,9 | 4,7 | Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management. \nThis course explores many of the behind the scenes requirements of good system management. The first half of the course covers how to build security into system management process and the organization policies necessary for any enterprise to follow. The latter half of the course focuses on auditing and maintenance of systems once they have been designed, and implemented. \nBy the end of the course you should be able to design and construct organizational policies based on a set of requirements, audit a system based on those requirements, and make sure systems adhere technically to the set of requirements. | Audit; Enterprise System; Planning; Security; Separation Of Duties; Attack Surface; Backup; Maintenance; Environment Variable; Disaster | Computer Security and Systems Management | 4 | The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely. | [2.2, 8.1] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
36 | Contact Center AI: Conversational Design Fundamentals | Google Cloud | Intermediate | 7,1 | 4,5 | Welcome to "Contact Center AI Conversational Design with Dialogflow", the first course in the "Customer Experiences with Contact Center AI" specialization. \n\nIn this course, learn how to design, develop, and deploy customer conversational solutions using Contact Center Artificial Intelligence (CCAI). You will be introduced to Contact Center AI and its three pillars, Dialogflow, Agent Assist, and Insights, the concept of conversational experiences and how the study of them influences the design of your virtual agent, the objects, tools, and methods to get your basic virtual agent up and running, and using context so that you can take your virtual agent to the next level of intelligent conversation.\n\nThis is an intermediate course, intended for learners with the following types of roles: \n• Architects and systems integrators implementing Contact Center AI \n• Conversational Architects \n• Contact center virtual agent and application developers \n• Business managers \n\nPrerequisite: To be successful in this course, learners should have completed Google Cloud Product Fundamentals or have equivalent experience. | Speech Recognition; Natural Language; Natural Language Understanding; Experience; Actor (Uml); User Journey; Language; Training; Persona (User Experience); User Agent | Customer Experiences with Contact Center AI | 1 | Learn how to design, develop, and deploy customer conversational solutions using Contact Center Artificial Intelligence (CCAI). You'll also learn some best practices for integrating conversational solutions with your existing contact center software, establishing a framework for human agent assistance, and implementing solutions securely and at scale. Google partners with leading telephony providers to complete a contact center solution that will delight your customers and increase efficiencies for your business. | [4.4, 8.4] | None | English | information-technology | cloud-computing | ||||||
37 | Contact Center AI: Operations and Implementation | Google Cloud | Intermediate | 3,9 | 4,8 | Welcome to "Contact Center AI: Operations and Implementation", the third course in the "Customer Experiences with Contact Center AI" specialization. \n\nIn this course, learn some best practices for integrating conversational solutions with your existing contact center software, establishing a framework for human agent assistance, and implementing solutions securely and at scale. In this course, you'll be introduced to Agent Assist and the technology it uses so you can delight your customers with the efficiencies and accuracy of services provided when customers require human agents, connectivity protocols, APIs, and platforms which you can use to create an integration between your virtual agent and the services already established for your business, Dialogflow's Environment Management tool for deployment of different versions of your virtual agent for various purposes, compliance measures and regulations you should be aware of when bringing your virtual agent to production, and you'll be given tips from virtual agent subject matter experts on how to avoid mishaps in your design and implementation that will result in a poor experience for your customers.\n\nThis is an intermediate course, intended for learners with the following types of roles: \n• Architects and systems integrators implementing Contact Center AI \n• Conversational Architects \n• Contact center virtual agent and application developers \n• Business managers \n\nPrerequisite: Before taking this course, learners should have already taken the "Contact Center AI Conversational Design with Dialogflow" course. Learners who are not comfortable with development concepts may skip the "Contact Center AI: Conversational Design Fundamentals" course, the second in the specialization, if desired. | Business Analytics; Audio Recording; Version Control; Customer Experience; Knowledge Bases; Pattern Matching; Operations Management; Contact Center Software; Data Security; Telephone Number | Customer Experiences with Contact Center AI | 3 | Learn how to design, develop, and deploy customer conversational solutions using Contact Center Artificial Intelligence (CCAI). You'll also learn some best practices for integrating conversational solutions with your existing contact center software, establishing a framework for human agent assistance, and implementing solutions securely and at scale. Google partners with leading telephony providers to complete a contact center solution that will delight your customers and increase efficiencies for your business. | [2.1, 5.2] | None | English | information-technology | cloud-computing | ||||||
38 | Introduction to Cybersecurity for Business | University of Colorado System | Beginner | 7,9 | 4,7 | The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever wonder how your bank website is secure when you connect to it? Wonder how other business owners secure their network? Wonder how large data breaches happen? This is practical computer security. It will help you answer the question – what should I focus on? | Security; Risk; Risk Assessment; Information Security; Attack Surface; Confidentiality; Leadership and Management; Cyberwarfare; Message Authentication; Public-Key Cryptography | Cybersecurity for Business | 1 | It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP. | [3.1, 10.3] | Arabic; French; Portuguese; Chinese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
39 | Cyber Threats and Attack Vectors | University of Colorado System | Beginner | 6,9 | 4,7 | Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems. | Threat; Data Breaches; Security; Breach (Security Exploit); Cloud Computing; Cloud Computing Security; Wireless; Vulnerability (Computing); Passive Attack; Resource Consumption | Cybersecurity for Business | 2 | It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP. | [2.4, 9.1] | Russian; Spanish; Arabic; French; Portuguese; Italian; Vietnamese; German | English | information-technology | security | ||||||
40 | Detecting and Mitigating Cyber Threats and Attacks | University of Colorado System | Intermediate | 6,4 | 4,7 | Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach. | Leadership and Management; Computer Security Incident Management; Intrusion Detection Systems; Relative Change And Difference; Demos; Ordered Pair; Threat; Security; Data Breaches; Breach (Security Exploit) | Cybersecurity for Business | 3 | It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP. | [2.8, 8.4] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
41 | Proactive Computer Security | University of Colorado System | Beginner | 5,8 | 4,5 | I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment. | Security; Penetration Test; Metasploit Project; Information Security; Owasp; Combinatorial Map; Security Management; Breach (Security Exploit); Data Breaches; Threat | Cybersecurity for Business | 4 | It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP. | [2.1, 8.0] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
42 | Cloud Security Basics | University of Minnesota | Advanced | 19,2 | 4,5 | This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques. | Protocol Stack; Network Service; Public-Key Cryptography; Principle Of Least Privilege; Cryptography; Public Key Certificate; Security; Cloud Computing Security; Separation Of Duties; Attack Surface | Cybersecurity in the Cloud | 1 | This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks. | [12.0, 23.8] | French; Portuguese; Russian; Spanish | English | information-technology | cloud-computing | ||||||
43 | Cloud Data Security | University of Minnesota | Advanced | 11,1 | 3,5 | This course gives learners an opportunity to explore data security in the cloud. In this course, learners will:\n\n* Dive into the data services offered by cloud providers and compare their security features.\n* Analyze a data breach and trace it back to the vulnerability that made it possible.\n* Learn about database injection and aggregation attacks.\n* Follow the life cycle of a data item and its relationship to privacy and integrity.\n* Associate modern privacy requirements with US and European laws. | Payment Card Industry Data Security Standard; Key-Value Databases; Access Control; Data Security; Cryptography; Cloud Computing Security; Principle Of Least Privilege; Code Injection; Privacy; Storage Systems | Cybersecurity in the Cloud | 2 | This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks. | [8.1, 13.8] | None | English | information-technology | cloud-computing | ||||||
44 | Cloud Application Security | University of Minnesota | Advanced | 7,8 | 3,5 | After completing the course, the student should be able to do the following:\n● List and describe the OWASP Top 10 vulnerabilities.\n● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment.\n● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client.\n● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication.\n● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed. | Software Security; Cloud Computing Security; Strong Authentication; Cross-Site Scripting; Web Api; State (Computer Science); Network Packet; Telecommunications Network; Authentication; Cloud Computing | Cybersecurity in the Cloud | 3 | This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks. | [4.6, 9.5] | None | English | information-technology | cloud-computing | ||||||
45 | Cloud Top Ten Risks | University of Minnesota | Advanced | 7,9 | 3 | After completing the course, the student should be able to do the following:\n● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.\n● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.\n● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. \n● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring. | Risk; Access Control; Resource Exhaustion Attack; Code Injection; Cross-Site Scripting; Cloud Computing Security; Serialization; Authentication; Denial-Of-Service Attacks; Component-Based Software Engineering | Cybersecurity in the Cloud | 4 | This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks. | [4.4, 10.3] | None | English | information-technology | cloud-computing | ||||||
46 | Preparing for the Google Cloud Professional Data Engineer Exam en Español | Google Cloud | Advanced | 3,1 | 5 | Del curso: "La mejor manera de prepararse para el examen es ser competente en las habilidades necesarias para el trabajo".\n\nEn este curso, se emplea un enfoque descendente a fin de identificar las habilidades y los conocimientos adquiridos, así como poner en evidencia la información y las áreas de habilidades que requieren una preparación adicional. Puede aprovechar este curso para crear su propio plan de preparación personalizado. Lo ayudará a distinguir lo que sabe de lo que no. Además, le permitirá desarrollar y practicar las habilidades que se les exigen a los profesionales que realizan este trabajo.\n\nEl curso está organizado según el esquema de la Guía para el examen. Se le presentan los conceptos de mayor nivel (es decir, los conceptos clave) para que determine si se siente seguro con respecto a sus conocimientos sobre esa área y los conceptos relacionados, o si necesita estudiar más. También podrá aprender y practicar las habilidades clave para el trabajo, incluidas las cognitivas, como el análisis de casos, la identificación de puntos de análisis técnicos y el desarrollo de las soluciones propuestas. Esas habilidades para el trabajo también son necesarias a fin de rendir el examen. Por otra parte, pondrá a prueba sus capacidades básicas con los Labs de desafío de seguimiento de actividades. Además, tendrá muchas preguntas de ejemplo similares a las del examen, incluidas las soluciones. Al final del curso, se incluyen dos tests del examen de práctica: uno sin calificación seguido de otro con calificación, que simula la experiencia de rendir el examen. | Peering; Routing; Telephone Number; Google Cloud Dataproc; Little B (Programming Language); Deployment Environment; Stack (Abstract Data Type); Pixel; Javascript; Porting | Data Engineer with Google Cloud en Español | 6 | Este programa le proporciona las habilidades que necesita para impulsar su carrera de ingeniería de datos y le ofrece una ruta para obtener la certificación Google Cloud Professional Data Engineer, reconocida en la industria. Gracias a una combinación de presentaciones, demostraciones y labs, podrá tomar decisiones basadas en datos mediante la recopilación, transformación y publicación de datos. También obtendrá experiencia real a través de proyectos prácticos de Qwiklabs que podrá compartir con sus posibles empleadores.\n\nAdemás, podrá practicar las habilidades clave del puesto de trabajo, como diseñar, compilar y ejecutar sistemas de procesamiento de datos y poner en funcionamiento modelos de aprendizaje automático. Para aquellos participantes que quieran certificarse, este programa también ofrece preguntas de muestra similares a las del examen y soluciones y cuestionarios de práctica que simulan la experiencia de realizar el examen.\n\nLuego de completar con éxito este programa, obtendrá un certificado de finalización que podrá compartir en su red profesional y con sus posibles empleadores. Si quiere obtener su certificación de Google Cloud, deberá registrarse y aprobar el examen de certificación. Tenga en cuenta que este programa le permite adquirir las habilidades para tomar el examen de certificación, pero la certificación y su tarifa no se incluyen en el costo de este programa de capacitación. | [1.7, 3.9] | English | Spanish | information-technology | cloud-computing | ||||||
47 | Introduction to Data Engineering | IBM | Advanced | 8,8 | 4,6 | This course introduces you to the core concepts, processes, and tools you need to know in order to get a foundational knowledge of data engineering. You will gain an understanding of the modern data ecosystem and the role Data Engineers, Data Scientists, and Data Analysts play in this ecosystem. \n\nThe Data Engineering Ecosystem includes several different components. It includes disparate data types, formats, and sources of data. Data Pipelines gather data from multiple sources, transform it into analytics-ready data, and make it available to data consumers for analytics and decision-making. Data repositories, such as relational and non-relational databases, data warehouses, data marts, data lakes, and big data stores process and store this data. Data Integration Platforms combine disparate data into a unified view for the data consumers. You will learn about each of these components in this course. You will also learn about Big Data and the use of some of the Big Data processing tools. \n\nA typical Data Engineering lifecycle includes architecting data platforms, designing data stores, and gathering, importing, wrangling, querying, and analyzing data. It also includes performance monitoring and finetuning to ensure systems are performing at optimal levels. In this course, you will learn about the data engineering lifecycle. You will also learn about security, governance, and compliance. \n\nData Engineering is recognized as one of the fastest-growing fields today. The career opportunities available in the field and the different paths you can take to enter this field are discussed in the course. \n\nThe course also includes hands-on labs that guide you to create your IBM Cloud Lite account, provision a database instance, load data into the database instance, and perform some basic querying operations that help you understand your dataset. | Extract, Transform, Load; Databases; Big Data; Data Warehousing; Information Engineering; SQL; Data Integration; Data Lake; NoSQL; Data Architecture | Data Engineering Foundations | 1 | Data engineering is one of the fastest-growing tech occupations, where the demand for skilled data engineers far outweighs the supply. The goal of data engineering is to make quality data available for fact-finding and data-driven decision making. This Specialization from IBM will help anyone interested in pursuing a career in data engineering by teaching fundamental skills to get started in this field. No prior data engineering experience is required to succeed in this Specialization.\n\nThe Specialization consists of 5 self-paced online courses covering skills required for data engineering, including the data engineering ecosystem and lifecycle, Python, SQL, and Relational Databases. You will learn these data engineering prerequisites through engaging videos and hands-on practice using real tools and real-world databases. You'll develop your understanding of data engineering, gain skills that can be applied directly to a data career, and build the foundation of your data engineering career.\n\nUpon successfully completing these courses, you will have the practical knowledge and experience to delve deeper into data engineering and work on more advanced data engineering projects. | [6.5, 10.9] | None | English | information-technology | data-management | ||||||
48 | Python Project for Data Engineering | IBM | Beginner | 3,3 | 4,7 | This mini-course is intended to apply foundational Python skills by implementing different techniques to collect and work with data. Assume the role of a Data Engineer and extract data from multiple file formats, transform it into specific datatypes, and then load it into a single source for analysis. Continue with the course and test your knowledge by implementing webscraping and extracting data with APIs all with the help of multiple hands-on labs. After completing this course you will have acquired the confidence to begin collecting large datasets from multiple sources and transform them into one primary source, or begin web scraping to gain valuable business insights all with the use of Python. \n\nPRE-REQUISITE: **Python for Data Science, AI and Development** course from IBM is a pre-requisite for this project course. Please ensure that before taking this course you have either completed the Python for Data Science, AI and Development course from IBM or have equivalent proficiency in working with Python and data.\n\nNOTE: This course is not intended to teach you Python and does not have too much instructional content. It is intended for you to apply prior Python knowledge. | Extract, Transform, Load; Big Data; Python Programming; Databases; Data Warehousing; Web Scraping; Information Engineering; Electronics; SQL; Computer Engineering | Data Engineering Foundations | 3 | Data engineering is one of the fastest-growing tech occupations, where the demand for skilled data engineers far outweighs the supply. The goal of data engineering is to make quality data available for fact-finding and data-driven decision making. This Specialization from IBM will help anyone interested in pursuing a career in data engineering by teaching fundamental skills to get started in this field. No prior data engineering experience is required to succeed in this Specialization.\n\nThe Specialization consists of 5 self-paced online courses covering skills required for data engineering, including the data engineering ecosystem and lifecycle, Python, SQL, and Relational Databases. You will learn these data engineering prerequisites through engaging videos and hands-on practice using real tools and real-world databases. You'll develop your understanding of data engineering, gain skills that can be applied directly to a data career, and build the foundation of your data engineering career.\n\nUpon successfully completing these courses, you will have the practical knowledge and experience to delve deeper into data engineering and work on more advanced data engineering projects. | [2.2, 4.2] | None | English | information-technology | data-management | ||||||
49 | Introduction to Relational Databases (RDBMS) | IBM | Advanced | 9,6 | 4,6 | Are you ready to dive into the world of data engineering? You’ll need a solid understanding of how data is stored, processed, and accessed. You’ll need to identify the different types of database that are appropriate for the kind of data you are working with and what processing the data requires.\n\nIn this course, you will learn the essential concepts behind relational databases and Relational Database Management Systems (RDBMS). You’ll study relational data models and discover how they are created and what benefits they bring, and how you can apply them to your own data. You’ll be introduced to several industry standard relational databases, including IBM DB2, MySQL, and PostgreSQL.\n\nThis course incorporates hands-on, practical exercises to help you demonstrate your learning. You will work with real databases and explore real-world datasets. You will create database instances and populate them with tables. \n\nNo prior knowledge of databases or programming is required.\n\nAnyone can audit this course at no-charge. If you choose to take this course and earn the Coursera course certificate, you can also earn an IBM digital badge upon successful completion of the course. | Databases; Relational Database Management System; Relational Database; Ibm Db2; Client Server Model; Topology; Table (Database); Database Management Systems; Data Redundancy; Index | Data Engineering Foundations | 4 | Data engineering is one of the fastest-growing tech occupations, where the demand for skilled data engineers far outweighs the supply. The goal of data engineering is to make quality data available for fact-finding and data-driven decision making. This Specialization from IBM will help anyone interested in pursuing a career in data engineering by teaching fundamental skills to get started in this field. No prior data engineering experience is required to succeed in this Specialization.\n\nThe Specialization consists of 5 self-paced online courses covering skills required for data engineering, including the data engineering ecosystem and lifecycle, Python, SQL, and Relational Databases. You will learn these data engineering prerequisites through engaging videos and hands-on practice using real tools and real-world databases. You'll develop your understanding of data engineering, gain skills that can be applied directly to a data career, and build the foundation of your data engineering career.\n\nUpon successfully completing these courses, you will have the practical knowledge and experience to delve deeper into data engineering and work on more advanced data engineering projects. | [5.7, 12.3] | None | English | information-technology | data-management | ||||||
50 | Preparing for the Google Cloud Professional Data Engineer Exam 日本語版 | Google Cloud | Advanced | 7,3 | 5 | コースより抜粋:「最善の試験対策は職務に必要なスキルを身に付けることである」\n\nこのコースでは、トップダウン アプローチを使ってすでに身に着けている知識とスキルを把握し、情報とスキルが不十分な分野を特定します。本コースを受講することにより、独自の対策計画を立てることができます。わかっていることとわからないことを明確にし、この職務を担当する際に必要なスキルの習得と向上にお役立てください。\n\nこのコースでは、試験ガイドの概要に沿って、受講者が特定の分野とそれに関連するコンセプトを十分に理解しているか、またはさらなる学習が必要かを判断できるように、「判断基準」となるコンセプトを提示します。また、ケース分析、技術的に注意すべきポイントの特定、提案ソリューションの開発などの認知スキルを含む主要な職務スキルについて学び、実践する機会も用意されています。これらは職務スキルであると同時に試験スキルでもあります。アクティビティ トラッキング チャレンジラボでは基礎能力のテストも行います。試験問題と同じような例題と解答も多数用意されており、コースの最後には採点式ではない模擬試験問題と、受験を想定した採点式の模擬試験問題に取り組みます。 | Telephone Number; Download; Routing; Peering; Google Cloud Dataproc; Javascript; Ibm Websphere Application Server; Little B (Programming Language); Subroutine; Syntax | Data Engineering with Google Cloud 日本語版 | 6 | Google Cloud 認定資格を取得したユーザーのうち 87% が、クラウド関連のスキルについて一層自信がついたと感じています。このプログラムでは、キャリアアップに必要なスキルを身に付け、業界で一目置かれる Google Cloud Associate Cloud Engineer 認定資格の取得に向けたトレーニングを受けることができます。\n\nGoogle Cloud 認定資格の取得までのステップ:\n\n1. Coursera の Cloud Engineering with Google Cloud プロフェッショナル認定資格取得向けプログラムを修了する\n\n2. Google Cloud Associate Cloud Engineer 認定試験に関するその他の推奨リソースを確認する\n\n3. Associate Cloud Engineer の試験ガイドを確認する\n\n4. Associate Cloud Engineer 認定試験の質問例に回答する\n\n5. Google Cloud 認定資格取得のための登録を行う(リモートまたはテストセンターでの受験)\n\n応用学習プロジェクト\n\nこのプロフェッショナル認定資格取得に向けたプログラムには、Qwiklabs プラットフォームを使用したハンズオンラボが組み込まれています。\n\nこうしたハンズオン コンポーネントにより、学んだスキルを実際に使ってみることができます。プロジェクトでは、Google Cloud Platform のプロダクトを Qwiklabs 内で使用できるようになっています。モジュール全体で説明されている概念を使用して、実践的な経験を積むことができます。\n\n最新情報: 認定資格取得プログラムの修了チャレンジ(Coursera および Google Cloud による提供) | [4.3, 9.1] | English | Japanese | information-technology | cloud-computing | ||||||
51 | Google Cloud Platform Fundamentals: Core Infrastructure | Google Cloud | Beginner | 13,5 | 4,7 | This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, and BigQuery. You learn about important resource and policy management tools, such as the Google Cloud Resource Manager hierarchy and Google Cloud Identity and Access Management. Hands-on labs give you foundational skills for working with GCP.\n\nNote:\n•Google services are currently unavailable in China. | Cloud Computing; Google Cloud Platform; Cloud Platforms; Cloud Storage; Google App Engine; Bigquery; Google Storage; Cloud Infrastructure; Big Data; Leadership and Management | Developing Applications with Google Cloud Platform | 1 | In this specialization, application developers learn how to design, develop, and deploy applications that seamlessly integrate managed services from the Google Cloud Platform (GCP). Through a combination of presentations, demos, and hands-on labs, participants learn how to use GCP services and pre-trained machine learning APIs to build secure, scalable, and intelligent cloud-native applications. Learners can choose to complete labs in their favorite language: Node.js, Java, or Python.\n\nThis class is intended for application developers who want to build cloud-native applications or redesign existing applications that will run on Google Cloud Platform.\n\nThis course teaches participants the following skills:\n\n• Use best practices for application development.\n\n• Choose the appropriate data storage option for application data.\n\n• Implement federated identity management.\n\n• Develop loosely coupled application components or microservices.\n\n• Integrate application components and data sources.\n\n• Debug, trace, and monitor applications.\n\n• Perform repeatable deployments with containers and deployment services.\n\n• Choose the appropriate application runtime environment; use Google Kubernetes Engine as a runtime environment and later switch to a no-ops solution with Google App Engine flexible environment. | [8.2, 16.3] | Spanish; Japanese; French; German; Russian | English | information-technology | cloud-computing | ||||||
52 | Google Cloud Platform Fundamentals: Core Infrastructure 日本語版 | Google Cloud | Advanced | 14,4 | 4,5 | このコースでは、Google Cloud Platform(GCP)の操作に必要な重要な概念と用語について説明していきます。Google Cloud Platform で使用できる Google App Engine、Google Compute Engine、Google Kubernetes Engine、Google Cloud Storage、Google Cloud SQL、BigQuery などのさまざまなコンピューティング サービスとストレージ サービスについて説明し、それぞれを比較します。さらに、Google Cloud Resource Manager のリソース階層や Google Cloud Identity and Access Management といった、リソースとポリシーを管理するための重要なツールについても説明します。ハンズオンラボでは、GCP を操作するための基本的なスキルを習得します。\n\n注:\n• 現在、Google のサービスは中国では利用できません。 | Google Cloud Platform; Cloud Computing; Cloud Platforms; Recursively Enumerable Set; Application Programming Interfaces; Kubernetes; Business Solutions; Cloud API; IBM Cloud; Google App Engine | Developing Applications with Google Cloud Platform 日本語版 | 1 | この専門講座では、アプリケーション開発の方々に設計、開発、デプロイなどGoogle Cloudのエコシステムでシームレスなコンポーネントの統合を学んでいただけます。デモ、プレゼンテーション、ハンズオンの演習を行うことで、GCPサービスやトレーニング前の機械学習API がカバーされています。\n\nこのクラスはアプリケーション開発者がクラウドベースのアプリケーション作成、またはGCPで稼働中の既存アプリケーションの再設計をおこなう方に適しています。\n\n学習項目は以下のとおりです。\n\n• アプリケーション開発のベストプラクティス\n\n• アプリケーションデータのための適切なデータストレージを選択\n\n• 連合アイデンティティ管理\n\n• アプリケーションのコンポーネントとマイクロサービスが組み合わされたアプリケーションの開発\n\n• コンポーネントとデータソースの統合\n\n• アプリケーションのデバッグ、追跡、モニター\n\n• コンテナーと導入サービスで繰り返しデプロイを行なう。\n\n• 適切なランタイム環境を選ぶ:Google Container Engineをランタイム環境として使用し、その後、Google App Engineで「No-ops」ソリューションに変更する。 | [9.1, 17.2] | English | Japanese | information-technology | cloud-computing | ||||||
53 | Big Data Emerging Technologies | Yonsei University | Intermediate | 9,1 | 4,7 | Every time you use Google to search something, every time you use Facebook, Twitter, Instagram or any other SNS (Social Network Service), and every time you buy from a recommended list of products on Amazon.com you are using a big data system. In addition, big data technology supports your smartphone, smartwatch, Alexa, Siri, and automobile (if it is a newer model) every day. The top companies in the world are currently using big data technology, and every company is in need of advanced big data technology support. Simply put, big data technology is not an option for your company, it is a necessity for survival and growth. So now is the right time to learn what big data is and how to use it in advantage of your company. This 6 module course first focuses on the world’s industry market share rankings of big data hardware, software, and professional services, and then covers the world’s top big data product line and service types of the major big data companies. Then the lectures focused on how big data analysis is possible based on the world’s most popular three big data technologies Hadoop, Spark, and Storm. The last part focuses on providing experience on one of the most famous and widely used big data statistical analysis systems in the world, the IBM SPSS Statistics. This course was designed to prepare you to be more successful in businesses strategic planning in the upcoming big data era. Welcome to the amazing Big Data world! | Big Data; Apache Hadoop; Relational Database Management System; Data Analysis; Metadata; Data Clustering Algorithms; Streams; Analytics; Extract, Transform, Load; Mapreduce | Emerging Technologies: From Smartphones to IoT to Big Data | 1 | This Specialization is intended for researchers and business experts seeking state-of-the-art knowledge in advanced science and technology. The 4 courses cover details on Big Data (Hadoop, Spark, Storm), Smartphones, Smart Watches, Android, iOS, CPU/GPU/SoC, Mobile Communications (1G to 5G), Sensors, IoT, Wi-Fi, Bluetooth, LP-WAN, Cloud Computing, AR (Augmented Reality), Skype, YouTube, H.264/MPEG-4 AVC, MPEG-DASH, CDN, and Video Streaming Services. The Specialization includes projects on Big Data using IBM SPSS Statistics, AR applications, Cloud Computing using AWS (Amazon Web Service) EC2 (Elastic Compute Cloud), and Smartphone applications to analyze mobile communication, Wi-Fi, and Bluetooth networks. The course contents are for expert level research, design, development, industrial strategic planning, business, administration, and management. | [2.4, 12.8] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | data-management | ||||||
54 | Smart Device & Mobile Emerging Technologies | Yonsei University | Beginner | 5,8 | 4,7 | Every day you use your smartphone. Your smartphone wakes you up, it is the first thing you use in the morning, and the last thing you check (e.g., alarm setting) before you sleep. In addition, you use it all day. A typical cellphone user touches their mobile phone 2,617 times a day (Dscout report based on 2017) and people spend over 4 hours a day on their mobile phones (Hackernoon report) on average. Smartphones and smart watches are very useful and will become even more useful due to their smaller sizes, lighter weights, versatile functionalities, advanced mobile communications & wireless networking (e.g., Wi-Fi & Bluetooth) technologies. In this course, the start-of-the-art smartphone and smart watch technology and components in addition to the global market trends and future forecasts are introduced. Since everybody uses smartphones and smart watches, knowing the details about the most globally used electronic device will definitely help you in all aspects of new product and app design & development, as well as business planning. In addition, the core technology and components of the world’s most popular smartphones (i.e., the Samsung Galaxy Note8 and Apple iPhone X) and smart watches (i.e., Samsung Gear S3 and the Apple Watch Series 3) are introduced along with details of the iOS and Android smartphone OSs (Operating Systems) and mobile communications 1G to 5G (for details on Wi-Fi and Bluetooth, please take my course “IoT Wireless & Cloud Emerging Technology”). This course ends with projects that teach how to analyze the components of smartphones and check the mobile network. Consequently, this course will prepare you to be more successful in businesses strategic planning in the upcoming smart device era. I cordially welcome you in to the amazing internal dynamics of the smart device world! | Smart Device; Wireless; iOS Development; Data Transmission; Smartphones; Handover; Mimo; Multi-Core Processor; Wi-Fi; Internet Of Things | Emerging Technologies: From Smartphones to IoT to Big Data | 2 | This Specialization is intended for researchers and business experts seeking state-of-the-art knowledge in advanced science and technology. The 4 courses cover details on Big Data (Hadoop, Spark, Storm), Smartphones, Smart Watches, Android, iOS, CPU/GPU/SoC, Mobile Communications (1G to 5G), Sensors, IoT, Wi-Fi, Bluetooth, LP-WAN, Cloud Computing, AR (Augmented Reality), Skype, YouTube, H.264/MPEG-4 AVC, MPEG-DASH, CDN, and Video Streaming Services. The Specialization includes projects on Big Data using IBM SPSS Statistics, AR applications, Cloud Computing using AWS (Amazon Web Service) EC2 (Elastic Compute Cloud), and Smartphone applications to analyze mobile communication, Wi-Fi, and Bluetooth networks. The course contents are for expert level research, design, development, industrial strategic planning, business, administration, and management. | [1.2, 8.8] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
55 | IoT (Internet of Things) Wireless & Cloud Computing Emerging Technologies | Yonsei University | Beginner | 9,9 | 4,6 | IoT (Internet of Things) devices are already abundant, but new products that include IoT modules are now a common trend. Also, almost everything is already connected to a Cloud, and much more will be in the future. Naturally, as this trend continues, in the near future almost all devices and appliances will include IoT modules which will use sensor data collection and control/management based on Clouds. Since we will live in an IoT world supported by Clouds, knowledge of the core technologies and platforms of IoT and Clouds will enable you with the tools to become a true leader in the future product and business world. In this course, the start-of-the-art IoT and wireless networks and Cloud technologies are introduced (for details on 1G to 5G mobile communications and smartphone and smart device technology, please take my course “Smart Device & Mobile Emerging Technologies”). This course ends with projects that teach how to analyze Bluetooth and W-Fi wireless networks and setup and use an EC2 (Elastic Compute Cloud) Virtual Computer in AWS (Amazon Web Service), which is the most powerful and popular Cloud technology in the world. Comparing to the human body, IoT is the neural network and the Cloud is the brain. Thus, I cordially welcome you into the brain and neural network of the future intelligence world! | Internet; Wireless; Bluetooth; Wi-Fi; Wireless Networking; Emerging Technologies; Communication; Mobile Cloud Computing; Internet Of Things; Cloud Computing | Emerging Technologies: From Smartphones to IoT to Big Data | 3 | This Specialization is intended for researchers and business experts seeking state-of-the-art knowledge in advanced science and technology. The 4 courses cover details on Big Data (Hadoop, Spark, Storm), Smartphones, Smart Watches, Android, iOS, CPU/GPU/SoC, Mobile Communications (1G to 5G), Sensors, IoT, Wi-Fi, Bluetooth, LP-WAN, Cloud Computing, AR (Augmented Reality), Skype, YouTube, H.264/MPEG-4 AVC, MPEG-DASH, CDN, and Video Streaming Services. The Specialization includes projects on Big Data using IBM SPSS Statistics, AR applications, Cloud Computing using AWS (Amazon Web Service) EC2 (Elastic Compute Cloud), and Smartphone applications to analyze mobile communication, Wi-Fi, and Bluetooth networks. The course contents are for expert level research, design, development, industrial strategic planning, business, administration, and management. | [2.5, 15.1] | Arabic; French; Portuguese; Italian; Vietnamese; Korean; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
56 | AR (Augmented Reality) & Video Streaming Services Emerging Technologies | Yonsei University | Advanced | 6,4 | 4,7 | Welcome to the course “Augmented Reality & Video Service Emerging Technologies.” The level of AR (Augmented Reality) and advanced video & multimedia technology included in a product is what determines the level of value and luxury. The objective of this course is to teach all important technologies that are used in state-of-the-art AR, Skype, and YouTube video and multimedia products and services. This includes the advanced video and real-time multimedia delivery mechanisms based on H.264/MPEG-4 AVC, MPEG-DASH, CDN, and mobile CDN. If you have knowledge of these core technologies, you can understand the operations that are used in every advanced video and multimedia system in the World. As the future World of business and products are driven to be more and more video and multimedia oriented, having knowledge of these core technologies will enable you to lead your company to become the true World leader in AR and video multimedia technology products, services, and business. Thus, I cordially welcome you into the beautiful and powerful World of advanced AR and video multimedia! | Augmented Reality; Video Conferencing; Digital Distribution; Hypertext Transfer Protocol; Feature Extraction; Voice Over Ip; Application Layer; Smartphones; Audio Codecs; Codecs | Emerging Technologies: From Smartphones to IoT to Big Data | 4 | This Specialization is intended for researchers and business experts seeking state-of-the-art knowledge in advanced science and technology. The 4 courses cover details on Big Data (Hadoop, Spark, Storm), Smartphones, Smart Watches, Android, iOS, CPU/GPU/SoC, Mobile Communications (1G to 5G), Sensors, IoT, Wi-Fi, Bluetooth, LP-WAN, Cloud Computing, AR (Augmented Reality), Skype, YouTube, H.264/MPEG-4 AVC, MPEG-DASH, CDN, and Video Streaming Services. The Specialization includes projects on Big Data using IBM SPSS Statistics, AR applications, Cloud Computing using AWS (Amazon Web Service) EC2 (Elastic Compute Cloud), and Smartphone applications to analyze mobile communication, Wi-Fi, and Bluetooth networks. The course contents are for expert level research, design, development, industrial strategic planning, business, administration, and management. | [1.5, 8.9] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
57 | Exploring and Preparing your Data with BigQuery | Google Cloud | Beginner | 9,3 | 4,6 | Welcome to the Coursera specialization, From Data to Insights with Google Cloud Platform brought to you by the Google Cloud team. I’m Evan Jones (a data enthusiast) and I’m going to be your guide.\n\nThis first course in this specialization is Exploring and Preparing your Data with BigQuery. Here we will see what the common challenges faced by data analysts are and how to solve them with the big data tools on Google Cloud Platform. You’ll pick up some SQL along the way and become very familiar with using BigQuery and Cloud Dataprep to analyze and transform your datasets.\n\nThis course should take about one week to complete, 5-7 total hours of work. By the end of this course, you’ll be able to query and draw insight from millions of records in our BigQuery public datasets. You’ll learn how to assess the quality of your datasets and develop an automated data cleansing pipeline that will output to BigQuery. Lastly, you’ll get to practice writing and troubleshooting SQL on a real Google Analytics e-commerce dataset to drive marketing insights.\n\n>>> By enrolling in this specialization you agree to the Qwiklabs Terms of Service as set out in the FAQ and located at: https://qwiklabs.com/terms_of_service <<< | Bigquery; SQL; Cloud Computing; Google Cloud Platform; Cloud Platforms; Data Analysis; Analysis; Dataflow; Big Data; Exploratory Data Analysis | From Data to Insights with Google Cloud Platform | 1 | Want to know how to query and process petabytes of data in seconds? Curious about data analysis that scales automatically as your data grows? Welcome to the Data Insights course!\n\nThis four-course accelerated online specialization teaches course participants how to derive insights through data analysis and visualization using the Google Cloud Platform. The courses feature interactive scenarios and hands-on labs where participants explore, mine, load, visualize, and extract insights from diverse Google BigQuery datasets. The courses also cover data loading, querying, schema modeling, optimizing performance, query pricing, and data visualization.\n\nThis specialization is intended for the following participants:\n\n● Data Analysts, Business Analysts, Business Intelligence professionals\n\n● Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform\n\nTo get the most out of this specialization, we recommend participants have some proficiency with ANSI SQL.\n\n>>> By enrolling in this specialization you agree to the Qwiklabs Terms of Service as set out in the FAQ and located at: https://qwiklabs.com/terms_of_service <<< | [5.6, 11.5] | Japanese | English | information-technology | data-management | ||||||
58 | Exploring and Preparing your Data with BigQuery 日本語版 | Google Cloud | Advanced | 8,8 | 4,8 | Google Cloud チームが提供する Coursera 専門講座、「From Data to Insights with Google Cloud Platform」へようこそ。データ エンスージアストの Evan Jones です。このコースのガイドを務めます。\n \n 本専門講座のこの最初のコースは、「Exploring and Preparing your Data with BigQuery」です。ここでは、データ アナリストが共通して直面する課題と、その課題を Google Cloud Platform のビッグデータ ツールを使用して解決する方法を取り上げます。その過程で SQL を学習しながら、BigQuery と Cloud Dataprep を使用してデータセットを分析し、変換する方法について理解を深めます。\n \n このコースは完了までに約 1 週間、合計 5~7 時間の作業時間を必要とします。修了すると、BigQuery 一般公開データセット内の何百万ものレコードに対してクエリを行い、分析情報を引き出せるようになります。データセットの品質を評価し、BigQuery に出力される自動データ クレンジング パイプラインを開発する方法を学習します。さらに、実際の Google アナリティクスの e コマース データセットで、マーケティング分析情報を得るための SQL の作成とトラブルシューティングの演習を行います。\n \n >>> この専門講座に登録すると、よくある質問に記載されているとおり Qwiklabs の利用規約に同意したことになります。詳細については、https://qwiklabs.com/terms_of_service をご覧ください。<<< | SQL; Peering; Encryption; Data Structures; String (Computer Science); Telephone Number; Authorization; Ptc Creo Elements/View; SQL Forms; Hooking | From Data to Insights with Google Cloud Platform 日本語版 | 1 | ぺタバイトのデータを数秒でクエリ・処理する方法を学びたい、またはデータ分析においてデータ量が増加しても自動でスケーラブルにする方法を学習したい方には、このコースが最適です。 ここでは、Google BigQuery データセットからデータマイニング、ビジュアル化、ローディング、などインタラクティブなシナリオと演習を行います。また、スキーマモデル、価格設定のクエリ、データのビジュアル化もカバーされています。\n\nこの専門講座は次のスキルがある方に適しています。\n\nデータアナリスト、ビジネスアナリスト、ビジネスインテリジェンスを専門としている方。\n\nGCPでスケーラブルなデータソリューションを構築するためにデータアナリストと連携するクラウドデータエンジニア。\n\n本コースを最大限に活用していただくには、ANSI SQLの経験が必要です。\n\n>>> この専門講座にご参加いただくには次のリンクをクリックして、サービス規約をお読みください: https://qwiklabs.com/terms_of_service <<< | [5.5, 10.0] | English | Japanese | information-technology | data-management | ||||||
59 | Creating New BigQuery Datasets and Visualizing Insights 日本語版 | Google Cloud | Advanced | 8,9 | 4 | これは、Data to Insights 専門講座の 2 番目のコースです。ここでは、新しい外部データセットを BigQuery に取り込み、Google データポータルで可視化する方法について説明します。また、複数テーブルの JOIN と UNION など、中級者向けの SQL の概念についても説明します。JOIN や UNION を使用すると、複数のデータソースのデータを分析できます。\n \n 注: すでに SQL に関する知識をお持ちの方も、BigQuery に固有の要素(クエリ キャッシュやテーブル ワイルドカードの処理など)について学ぶことができます。\n \n >>> この専門講座に登録すると、よくある質問に記載されているとおり Qwiklabs の利用規約に同意したことになります。詳細については、https://qwiklabs.com/terms_of_service をご覧ください。<<< | Rendering (Computer Graphics); Https; Data Structures; Gigabyte; Semigroup Action; Streams; String (Computer Science); Provisioning; Switches; Uniform Resource Locator | From Data to Insights with Google Cloud Platform 日本語版 | 2 | ぺタバイトのデータを数秒でクエリ・処理する方法を学びたい、またはデータ分析においてデータ量が増加しても自動でスケーラブルにする方法を学習したい方には、このコースが最適です。 ここでは、Google BigQuery データセットからデータマイニング、ビジュアル化、ローディング、などインタラクティブなシナリオと演習を行います。また、スキーマモデル、価格設定のクエリ、データのビジュアル化もカバーされています。\n\nこの専門講座は次のスキルがある方に適しています。\n\nデータアナリスト、ビジネスアナリスト、ビジネスインテリジェンスを専門としている方。\n\nGCPでスケーラブルなデータソリューションを構築するためにデータアナリストと連携するクラウドデータエンジニア。\n\n本コースを最大限に活用していただくには、ANSI SQLの経験が必要です。\n\n>>> この専門講座にご参加いただくには次のリンクをクリックして、サービス規約をお読みください: https://qwiklabs.com/terms_of_service <<< | [5.9, 10.4] | English | Japanese | information-technology | data-management | ||||||
60 | Achieving Advanced Insights with BigQuery 日本語版 | Google Cloud | Advanced | 8,1 | Not Calibrated | この専門講座の 3 番目のコースは、「Achieving Advanced Insights with BigQuery」です。ここでは、高度なファンクションと、複雑なクエリを管理可能なステップに分割する方法を学びながら、SQL に関する知識を深めます。\n \n BigQuery の内部アーキテクチャ(列ベースのシャーディング ストレージ)についてや、ARRAY と STRUCT を使用した、ネストされたフィールドと繰り返しフィールドなどの高度な SQL トピックについて説明します。最後に、クエリのパフォーマンスを最適化する方法と、承認済みビューを使用してデータを保護する方法について説明します。\n \n >>> この専門講座に登録すると、よくある質問に記載されているとおり Qwiklabs の利用規約に同意したことになります。詳細については、https://qwiklabs.com/terms_of_service をご覧ください。<<< | Stack (Abstract Data Type); Seeks; Provisioning; Upload; Data Centers; Megabyte; Append; Iteration; Essence; Here Document | From Data to Insights with Google Cloud Platform 日本語版 | 3 | ぺタバイトのデータを数秒でクエリ・処理する方法を学びたい、またはデータ分析においてデータ量が増加しても自動でスケーラブルにする方法を学習したい方には、このコースが最適です。 ここでは、Google BigQuery データセットからデータマイニング、ビジュアル化、ローディング、などインタラクティブなシナリオと演習を行います。また、スキーマモデル、価格設定のクエリ、データのビジュアル化もカバーされています。\n\nこの専門講座は次のスキルがある方に適しています。\n\nデータアナリスト、ビジネスアナリスト、ビジネスインテリジェンスを専門としている方。\n\nGCPでスケーラブルなデータソリューションを構築するためにデータアナリストと連携するクラウドデータエンジニア。\n\n本コースを最大限に活用していただくには、ANSI SQLの経験が必要です。\n\n>>> この専門講座にご参加いただくには次のリンクをクリックして、サービス規約をお読みください: https://qwiklabs.com/terms_of_service <<< | [5.0, 10.0] | English | Japanese | information-technology | data-management | ||||||
61 | Applying Machine Learning to your Data with GCP 日本語版 | Google Cloud | Advanced | 8,8 | 4 | ペタバイト規模のデータに対して数秒でクエリを実行して処理する方法や、データの増大に合わせて自動的にスケーリングされるデータ分析に関心がある場合は、ぜひ Data Insights コースを受講してください。\n\n この 1 週間のオンライン速習コースに参加すると、Google Cloud Platform を使用したデータ分析と可視化によって分析情報を得る方法を学習できます。本コースにはインタラクティブなシナリオとハンズオンラボが用意されており、参加者は Google BigQuery のさまざまなデータセットを使用して、分析情報の探索、マイニング、読み込み、可視化、抽出を行うことができます。本コースでは、データの読み込み、クエリの実行、スキーマのモデル化、パフォーマンスの最適化、クエリの料金、データの可視化を扱います。\n\n 前提条件\n\n 本コースを最大限に活用するには、この専門講座で以下のコースを事前に完了する必要があります。\n\n• Exploring and Preparing your Data\n• Storing and Visualizing your Data\n• Architecture and Performance\n\n >>> この専門講座に登録すると、よくある質問に記載されているとおり Qwiklabs の利用規約に同意したことになります。詳しくは、https://qwiklabs.com/terms_of_service をご覧ください。 <<< | Categorization; Byte; Telephone Number; Coins; Data Centers; Provisioning; Data Clustering Algorithms; System F; Hindley Milner Type System; Source Code | From Data to Insights with Google Cloud Platform 日本語版 | 4 | ぺタバイトのデータを数秒でクエリ・処理する方法を学びたい、またはデータ分析においてデータ量が増加しても自動でスケーラブルにする方法を学習したい方には、このコースが最適です。 ここでは、Google BigQuery データセットからデータマイニング、ビジュアル化、ローディング、などインタラクティブなシナリオと演習を行います。また、スキーマモデル、価格設定のクエリ、データのビジュアル化もカバーされています。\n\nこの専門講座は次のスキルがある方に適しています。\n\nデータアナリスト、ビジネスアナリスト、ビジネスインテリジェンスを専門としている方。\n\nGCPでスケーラブルなデータソリューションを構築するためにデータアナリストと連携するクラウドデータエンジニア。\n\n本コースを最大限に活用していただくには、ANSI SQLの経験が必要です。\n\n>>> この専門講座にご参加いただくには次のリンクをクリックして、サービス規約をお読みください: https://qwiklabs.com/terms_of_service <<< | [6.1, 10.1] | English; Spanish; French; Portuguese; Russian | Japanese | information-technology | data-management | ||||||
62 | Gmail | Google Cloud | Beginner | 2,7 | 4,9 | Gmail is Google’s cloud based email service that allows you to access your messages from any computer or device with just a web browser.\n\nIn this course, you’ll learn how to compose, send and reply to messages. You will also explore some of the common actions that can be applied to a Gmail message, and learn how to organize your mail using Gmail labels.\n\nYou will explore some common Gmail settings and features. For example, you will learn how to manage your own personal contacts and groups, customize your Gmail Inbox to suit your way of working, and create your own email signatures and templates.\n\nGoogle is famous for search. Gmail also includes powerful search and filtering. You will explore Gmail’s advanced search and learn how to filter messages automatically. | Email; I-Message; Keyboard Shortcut; File Shortcut; Signature; Pop-Up Notification; Message; Data Science; Interfaces; User Experience | Getting started with Google Workspace | 1 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [1.5, 3.5] | None | English | information-technology | cloud-computing | ||||||
63 | Google Calendar | Google Cloud | Beginner | 1,9 | 4,8 | With Google Calendar, you can quickly schedule meetings and events and get reminders about upcoming activities, so you always know what’s next. Google Calendar is designed for teams, so it’s easy to share your schedule with others and create multiple calendars that you and your team can use together.\n\nIn this course, you’ll learn how to create and manage Google Calendar events.You will learn how to update an existing event, delete and restore events, and search your calendar.\n\nYou will understand when to apply different event types such as reminders, tasks, and appointment slots.\n\nYou will explore the Google Calendar settings that are available for you to customize Google Calendar to suit your way of working.\n\nDuring the course you will learn how to create additional calendars, share your calendars with others, and access other calendars in your organization. | Video Conferencing; Interfaces; Workspace; Schedule; Matching; Collaboration; Enabling; Java Annotation; E-Nable; Documents | Getting started with Google Workspace | 2 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [1.0, 2.6] | None | English | information-technology | cloud-computing | ||||||
64 | Google Drive | Google Cloud | Beginner | 2,1 | 4,9 | Google Drive is Google’s cloud-based file storage service. Google Drive lets you keep all your work in one place, view different file formats without the need for additional software, and access your files from any device.\n\nIn this course, you will learn how to navigate your Google Drive. You will learn how to upload files and folders and how to work across file types. You will also learn how you can easily view, arrange, organize, modify, and remove files in Google Drive. \n\nGoogle Drive includes shared drives. You can use shared drives to store, search, and access files with a team. You will learn how to create a new shared drive, add and manage members, and manage the shared drive content. \n\nGoogle Workspace is synonymous with collaboration and sharing. You will explore the sharing options available to you in Google Drive, and you will learn about the various collaborator roles and permissions that can be assigned.\n\nYou’ll also explore ways to ensure consistency and save time with templates.\n\nGoogle Drive has several tools and options available. This course discusses some of these options, including how to work offline, use Drive File Stream, and install apps from the Google Workspace Marketplace. | Download; Upload; Interfaces; Workspace; Relative Change And Difference; Organizing (Management); Saving; Documents; Entry Point; Enabling | Getting started with Google Workspace | 3 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [1.1, 2.6] | None | English | information-technology | cloud-computing | ||||||
65 | Google Docs | Google Cloud | Intermediate | 2 | 4,8 | With Google Docs, your documents are stored in the cloud, and you can access them from any computer or device. You create and edit documents right in your web browser; no special software is required. Even better, multiple people can work at the same time, you can see people’s changes as they make them, and every change is saved automatically.\n\nIn this course, you will learn how to open Google Docs, create and format a new document, and apply a template to a new document.\n\nYou will learn how to enhance your documents using a table of contents, headers and footers, tables, drawings, images, and more.\n\nYou will learn how to share your documents with others. We will discuss your sharing options and examine collaborator roles and permissions. You will learn how to manage versions of your documents.\n\nGoogle Docs allows you to work in real time with others on the same document. You will learn how to create and manage comments and action items in your documents.\n\nWe will review a few of the Google Docs tools. You will understand how to set your preferences to suit your own work style and explore how to use tools such as Google Explore to add value to your content. | Download; Cloud Computing; Workspace; Documents; Editing; Added Value; Translation; Preference; Saving; Doxing | Getting started with Google Workspace | 4 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [0.9, 2.4] | None | English | information-technology | cloud-computing | ||||||
66 | Google Sheets | Google Cloud | Beginner | 2,3 | 4,9 | In this course we will introduce you to Google Sheets, Google’s cloud-based spreadsheet software, included with Google Workspace.\n\nWith Google Sheets, you can create and edit spreadsheets directly in your web browser—no special software is required. \n\nMultiple people can work simultaneously, you can see people’s changes as they make them, and every change is saved automatically.\n\nYou will learn how to open Google Sheets, create a blank spreadsheet, and create a spreadsheet from a template. You will add, import, sort, filter and format your data using Google Sheets and learn how to work across different file types.\n\nFormulas and functions allow you to make quick calculations and better use your data. We will look at creating a basic formula, using functions, and referencing data. You will also learn how to add a chart to your spreadsheet.\n\nGoogle Sheets spreadsheets are easy to share. We will look at the different ways you can share with others. We will also discuss how to track changes and manage versions of your Google Sheets spreadsheets.\n\nGoogle Workspace makes it easy to collaborate with your team, clients, and others wherever they are. We will look at some of the collaboration options available to you in Google Sheets. Examples include commenting, action items, and notifications. | Reference Data; Line Wrap And Word Wrap; Freezing; Spreadsheet; Workspace; Rowing; Euler'S Totient Function; Sorting; Utility; Ordered Pair | Getting started with Google Workspace | 5 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [0.9, 3.3] | None | English | information-technology | cloud-computing | ||||||
67 | Google Slides | Google Cloud | Advanced | 2,1 | 4,8 | With Google Slides, you can create and present professional presentations for sales, projects, training modules, and much more. \n\nGoogle Slides presentations are stored safely in the cloud. You build presentations right in your web browser—no special software is required. Even better, multiple people can work on your slides at the same time, you can see people’s changes as they make them, and every change is automatically saved.\n\nYou will learn how to open Google Slides, create a blank presentation, and create a presentation from a template. You will explore themes, layout options, and how to add and format content, and speaker notes in your presentations.\n\nYou will learn how to enhance your slides by adding tables, images, charts, and more. You will also learn how to use slide transitions and object animations in your presentation for visual effects.\n\nWe will discuss how to organize slides and explore some of the options, including duplicating and ordering your slides, importing existing slides, copying slides, and hiding slides.\n\nYou will learn how to share your presentation with others and will also learn about collaborator permissions, tracking changes, and version management.\n\nGoogle Slides offers many features that make team collaboration easy. You will learn how to collaborate with your team using comments and action items. \n\nPresenting your slides is the ultimate goal so you will learn how to present your slides to others and explore the presentation tools available. | Download; Shape Table; Presentation; Ascii Art; Workspace; Editing; Organizing (Management); Collaboration; Process; Student's t-Distribution | Getting started with Google Workspace | 6 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [1.0, 2.9] | None | English | information-technology | cloud-computing | ||||||
68 | Google Meet and Google Chat | Google Cloud | Beginner | 1,7 | 4,9 | In this course we will introduce you to Google Meet and Google Chat, Google’s video conference and chat software included with Google Workspace. \n\nYou will learn how to create and manage video conference meetings using Google Meet. You will also explore how to use Google Chat for simple one-to-one and small group conversations, and how Chat rooms are used in Google Chat to better collaborate with others.\n\nYou will step into the Google Meet environment so that you become familiar with the different ways you can open Google Meet and add people to a video conference. We will also look at how to join a meeting from different sources such as a calendar event or meeting link.\n\nYou will learn how Google Meet can help you better communicate, exchange ideas, and share resources with your team wherever they are. \n\nWe will also discuss how to customize the Google Meet environment to fit your needs. We will talk about managing participants and how to effectively use chat messages during a video conference. We will explore the different ways to share resources, such as via calendar invites or attachments.\n\nWith Google Chat, you can use direct messaging to have a private conversation with a colleague or a small group of people. You will learn more about Google Chat’s unique features and how Google Chat can enhance your organization's ability to communicate and collaborate. \n\nDirect messages to a person or small group may be appropriate for impromptu conversations, but a chat room may be better suited for long-term conversations, particularly with a group that changes, or a large project team. You will explore the use of chat rooms in Google Chat.\n\nWe will look at some of the ways you can use Google Chat to effectively collaborate with others. We will look at how you can upload and share files with others from Google Chat. | Download; Streams; Upload; Workspace; Professional Development; Project Team; Virtual Team; Collaboration; Term (Time); Message | Getting started with Google Workspace | 7 | This training equips students with the skills they need to become productive with Google Workspace. By the end of this Specialization, the student will be proficient in the use of the core Google Workspace applications: Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Meet and Google Chat.\n\nThey will learn how to manage mail and schedules effectively; create, manage and share content in Google Drive, and become more productive through the use of the collaboration features that are an integral and defining part of Google Workspace.\n\nIt is recommended that students engage with this content using a Chromebook, Windows, or Mac OS computer with Google Chrome installed, plus a managed Google Workspace account. | [0.6, 2.4] | None | English | information-technology | cloud-computing | ||||||
69 | Crash Course on Python | Beginner | 19,7 | 4,7 | This course is designed to teach you the foundations in order to write simple programs in Python using the most common structures. No previous exposure to programming is needed. By the end of this course, you'll understand the benefits of programming in IT roles; be able to write simple programs using Python; figure out how the building blocks of programming fit together; and combine all of this knowledge to solve a complex programming problem. \n\nWe'll start off by diving into the basics of writing a computer program. Along the way, you’ll get hands-on experience with programming concepts through interactive exercises and real-world examples. You’ll quickly start to see how computers can perform a multitude of tasks — you just have to write code that tells them what to do. | Python Programming; Computer Programming; Syntax; Python Syntax And Semantics; Semantics; Problem Solving; Data Structures; Programming Style; List Comprehension; Computer Program | Google IT Automation with Python | 1 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [9.7, 26.4] | Portuguese; Arabic; French; Russian; Spanish; Italian; Vietnamese; German | English | information-technology | support-and-operations | |||||||
70 | Using Python to Interact with the Operating System | Intermediate | 24,8 | 4,6 | By the end of this course, you’ll be able to manipulate files and processes on your computer’s operating system. You’ll also have learned about regular expressions -- a very powerful tool for processing text files -- and you’ll get practice using the Linux command line on a virtual machine. And, this might feel like a stretch right now, but you’ll also write a program that processes a bunch of errors in an actual log file and then generates a summary file. That’s a super useful skill for IT Specialists to know.\n\nWe’ll kick off by exploring how to execute Python locally, and organize and use code across different Python files. We'll then learn how to read and write different types of files, and use subprocesses and input streams. We'll also dive into Bash scripting and regular expressions -- both very powerful tools for anyone working with systems. We'll even touch on automatic testing, which allow us to automate how we check if our code is correct. To finish, we’ll put all this together by using the tools that we’ve acquired to process data and generate automatic reports.\n\nWe’ll also explain how to set up your own developer environment in your machine. This is a key step in being able to write and deploy powerful automation tools. | Python Programming; Bash (Unix Shell); Unix; Unix Shells; Computer Programming; Regular Expression; Test Automation; Unit Testing; Operating Systems; Command-Line Interface | Google IT Automation with Python | 2 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [13.9, 32.5] | Arabic; French; Russian; Spanish; Portuguese; Italian; Vietnamese; German | English | information-technology | support-and-operations | |||||||
71 | Introduction to Git and GitHub | Intermediate | 11,2 | 4,8 | In this course, you’ll learn how to keep track of the different versions of your code and configuration files using a popular version control system (VCS) called Git. We'll also go through how to setup an account with a service called GitHub so that you can create your very own remote repositories to store your code and configuration. \n\nThroughout this course, you'll learn about Git's core functionality so you can understand how and why it’s used in organizations. We’ll look into both basic and more advanced features, like branches and merging. We'll demonstrate how having a working knowledge of a VCS like Git can be a lifesaver in emergency situations or when debugging. And then we'll explore how to use a VCS to work with others through remote repositories, like the ones provided by GitHub.\n\nBy the end of this course, you'll be able to store your code's history in Git and collaborate with others in GitHub, where you’ll also start creating your own portfolio! \n\nIn order to follow along and complete the assessments, you’ll need a computer where you can install Git or ask your administrator to install it for you. | Github; Software; Git (Software); Version Control; Version Control Systems; Collaboration; Code Review; Software Versioning; Computer Programming; Python Programming | Google IT Automation with Python | 3 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [6.4, 14.8] | Russian; Spanish; Arabic; French; Portuguese; Italian; Vietnamese; German | English | information-technology | cloud-computing | |||||||
72 | Troubleshooting and Debugging Techniques | Intermediate | 10,3 | 4,6 | In this course, we'll give you the tools to quickly identify and solve real-world problems that you might come across in your IT role. We'll look at a bunch of different strategies and approaches for tackling the most common pitfalls of your code and IT infrastructure. You'll learn strategies for approaching almost any technical problem and then see how those apply to solving different real-world scenarios. \n\nWe picked examples that include general system issues, issues with software that someone else wrote, and issues with programs that we wrote. We'll talk about problems that can affect any operating system, and we'll also look at challenges specific to certain platforms and scripting languages.\n\nWe strongly recommend that you’ve taken the prior courses in this program, or already have knowledge of Python and Linux so that you can follow along with our troubleshooting examples. | Debugging; Debug Code; Troubleshooting; Python Programming; Computer Programming; Leadership and Management; Time Management; Problem Solving; Printf Format String; Software | Google IT Automation with Python | 4 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [4.4, 14.2] | Arabic; French; Portuguese; Russian; Spanish; Italian; Vietnamese; German | English | information-technology | cloud-computing | |||||||
73 | Configuration Management and the Cloud | Intermediate | 8,4 | 4,7 | In this course, you’ll learn how to apply automation to manage fleets of computers. You’ll understand how to automate the process for deploying new computers, keeping those machines updated, managing large-scale changes, and a lot more. We'll discuss managing both physical machines running in our offices and virtual machines running in the Cloud.\n\nWe'll start by looking into an automation technique called configuration management, which lets you manage the configuration of our computers at scale. Specifically, you'll learn how to use Puppet, the current industry standard for configuration management. We'll look at some simple examples, and then see how we can apply the same concepts to more complex cases. You’ll be a Puppet-master in no time!\n\nLater on, you'll expand your automation skills by understanding how to use the Cloud to help scale your infrastructure. You'll check out some best practices for handling hundreds of virtual machines running in the Cloud and troubleshooting them when things don't go according to plan. | Cloud Computing; Cloud Platforms; Google Cloud Platform; Puppet (software); Leadership and Management; Configuration Management; Software; Virtual Machine; Software Configuration Management; Test Automation | Google IT Automation with Python | 5 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [4.0, 11.2] | Arabic; French; Russian; Spanish; Portuguese; Italian; Vietnamese; German | English | information-technology | cloud-computing | |||||||
74 | Automating Real-World Tasks with Python | Intermediate | 7,9 | 4,7 | In the final course, we'll tie together the concepts that you’ve learned up until now. You'll tackle real-world scenarios in Qwiklabs that will challenge you to use multiple skills at once.\n\nFirst, we'll take a closer look at how to use external Python modules to extend your code's capabilities, and spend some time learning how to use documentation to learn a new module. For example, we'll use the Python Image Library (PIL) to create and modify images. We'll show you some simple examples of how to perform common tasks in the course material, but it will be up to you to explore the module documentation to figure out how to solve specific problems.\n\nNext, we'll show you how to communicate with the world outside of your code! You'll use data serialization to turn in-memory objects into messages that can be sent to other programs. Your program will send messages across the network to Application Programming Interfaces (APIs) offered by other programs. For those times when your code needs to talk to a person instead of a program, you'll also learn to send email messages.\n\nAt the end of this course, you’ll be able to take a description of a problem and use your skills to create a solution -- just like you would on the job. In your final capstone project, you'll be given a description of what your customer needs, and it will be up to you to create a program to do it! | Python Programming; Computer Programming; Build Automation; Test Automation; Cloud Computing; Web; Github; Python Libraries; Email; Software | Google IT Automation with Python | 6 | This beginner-level, six-course certificate, developed by Google, is designed to provide IT professionals with in-demand skills -- including Python, Git, and IT automation -- that can help you advance your career.\n\nKnowing how to write code to solve problems and automate solutions is a crucial skill for anybody in IT. Python, in particular, is now the most in-demand programming language by employers.\n\nThis program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You'll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at scale by using configuration management and the Cloud.\n\nThis certificate can be completed in about 6 months and is designed to prepare you for a variety of roles in IT, like more advanced IT Support Specialist or Junior Systems Administrator positions. Upon completion, you can share your information with potential employers, like Walmart, Sprint, Hulu, Bank of America, Google (of course!), and more.\n\nWe recommend that you have Python installed on your machine. For some courses, you’ll need a computer where you can install Git or ask your administrator to install it for you.\n\nIf you’d like to learn the fundamentals of IT support, check out the beginner level Google IT Support Professional Certificate.\n\nCheck out all Google Career Certificates here. | [4.0, 9.9] | Arabic; French; Telugu; Uzbek; Portuguese; Italian; Vietnamese; German; Russian; Burmese; Spanish | English | information-technology | cloud-computing | |||||||
75 | Technical Support Fundamentals | Beginner | 17,6 | 4,8 | This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. In this course, you’ll be introduced to the world of Information Technology, or IT. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service. This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this certificate program.\n\nBy the end of this course, you’ll be able to:\n● understand how the binary system works\n● assemble a computer from scratch\n● choose and install an operating system on a computer\n● understand what the Internet is, how it works, and the impact it has in the modern world\n● learn how applications are created and how they work under the hood of a computer\n● utilize common problem-solving methodologies and soft skills in an Information Technology setting | Software; Customer Support; Technical Support; PC Hardware; Software Installation; Binary Code; Internet; Networking Hardware; Troubleshooting; Computer Networking | Google IT Support | 1 | Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job. There are 340,500 U.S. job openings in IT and a $50,800 average entry-level salary in IT support.¹\n\nOver 5 courses, learn in-demand skills that prepare you for an entry-level job. At under 10 hours per week, you can complete the certificate in less than 6 months. Upon completion, you can directly apply for jobs with Google and over 130 U.S. employers, including Walmart, Best Buy, and Astreya.\n\nSince the IT Support Certificate launched in 2018, 82% of graduates have reported a positive career outcome like a new job, promotion, or raise within 6 months.²\n\nThis program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.\n\nThis program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.\n\nIf you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.\n\nCheck out all Google Career Certificates here. Now $39 (save $10)!\n\n¹Burning Glass: Labor Insight (Last 12 Months: 2/1/20 - 1/31/21)\n\n²Coursera Learner Outcome Survey, all time for Google IT Support Certificate. Data is collected via on-platform surveys or email and is cumulative from 1/18 - 1/21. | [11.0, 21.3] | Arabic; French; Spanish; Portuguese; Italian; Vietnamese; German; Russian | English | information-technology | support-and-operations | |||||||
76 | The Bits and Bytes of Computer Networking | Beginner | 20,2 | 4,7 | This course is designed to provide a full overview of computer networking. We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting. \n\nBy the end of this course, you’ll be able to:\n● describe computer networks in terms of a five-layer model\n● understand all of the standard protocols involved with TCP/IP communications\n● grasp powerful network troubleshooting tools and techniques\n● learn network services like DNS and DHCP that help make computer networks run\n● understand cloud computing, everything as a service, and cloud storage | Computer Networking; Modeling; Ipv6 Address; Network Model; Domain Name System; Network Layer; Ipv4; Cloud Computing; Wireless; Wireless Networking | Google IT Support | 2 | Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job. There are 340,500 U.S. job openings in IT and a $50,800 average entry-level salary in IT support.¹\n\nOver 5 courses, learn in-demand skills that prepare you for an entry-level job. At under 10 hours per week, you can complete the certificate in less than 6 months. Upon completion, you can directly apply for jobs with Google and over 130 U.S. employers, including Walmart, Best Buy, and Astreya.\n\nSince the IT Support Certificate launched in 2018, 82% of graduates have reported a positive career outcome like a new job, promotion, or raise within 6 months.²\n\nThis program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.\n\nThis program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.\n\nIf you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.\n\nCheck out all Google Career Certificates here. Now $39 (save $10)!\n\n¹Burning Glass: Labor Insight (Last 12 Months: 2/1/20 - 1/31/21)\n\n²Coursera Learner Outcome Survey, all time for Google IT Support Certificate. Data is collected via on-platform surveys or email and is cumulative from 1/18 - 1/21. | [11.6, 25.4] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | networking | |||||||
77 | Operating Systems and You: Becoming a Power User | Beginner | 21,6 | 4,6 | In this course -- through a combination of video lectures, demonstrations, and hands-on practice -- you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware. \n\nBy the end of this course you’ll be able to:\n● navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter\n● set up users, groups, and permissions for account access\n● install, configure, and remove software on the Windows and Linux operating systems\n● configure disk partitions and filesystems\n● understand how system processes work and how to manage them\n● work with system logs and remote connection tools\n● utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role | File System; Powershell; Operating Systems; Linux File Systems; Command-Line Interface; File System Permissions; Leadership and Management; Process; Interfaces; Java Annotation | Google IT Support | 3 | Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job. There are 340,500 U.S. job openings in IT and a $50,800 average entry-level salary in IT support.¹\n\nOver 5 courses, learn in-demand skills that prepare you for an entry-level job. At under 10 hours per week, you can complete the certificate in less than 6 months. Upon completion, you can directly apply for jobs with Google and over 130 U.S. employers, including Walmart, Best Buy, and Astreya.\n\nSince the IT Support Certificate launched in 2018, 82% of graduates have reported a positive career outcome like a new job, promotion, or raise within 6 months.²\n\nThis program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.\n\nThis program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.\n\nIf you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.\n\nCheck out all Google Career Certificates here. Now $39 (save $10)!\n\n¹Burning Glass: Labor Insight (Last 12 Months: 2/1/20 - 1/31/21)\n\n²Coursera Learner Outcome Survey, all time for Google IT Support Certificate. Data is collected via on-platform surveys or email and is cumulative from 1/18 - 1/21. | [11.1, 27.4] | Arabic; French; Portuguese; Spanish; Italian; Vietnamese; German; Russian | English | information-technology | support-and-operations | |||||||
78 | System Administration and IT Infrastructure Services | Beginner | 16,1 | 4,7 | This course will transition you from working on a single computer to an entire fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources. You'll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.\n\nBy the end of this course you’ll be able to:\n● utilize best practices for choosing hardware, vendors, and services for your organization\n● understand how the most common infrastructure services that keep an organization\nrunning work, and how to manage infrastructure servers\n● understand how to make the most of the cloud for your organization\n● manage an organization’s computers and users using the directory services, Active\nDirectory, and OpenLDAP\n● choose and manage the tools that your organization will use\n● backup your organization’s data and know how to recover your IT infrastructure in the case of\na disaster\n● utilize systems administration knowledge to plan and improve processes for IT environments | Backup; Directory Services; Lightweight Directory Access Protocol; Cloud Computing; Directory Access Protocol; Lightweight; Infrastructure As A Service; Planning; Server Systems; Network Service | Google IT Support | 4 | Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job. There are 340,500 U.S. job openings in IT and a $50,800 average entry-level salary in IT support.¹\n\nOver 5 courses, learn in-demand skills that prepare you for an entry-level job. At under 10 hours per week, you can complete the certificate in less than 6 months. Upon completion, you can directly apply for jobs with Google and over 130 U.S. employers, including Walmart, Best Buy, and Astreya.\n\nSince the IT Support Certificate launched in 2018, 82% of graduates have reported a positive career outcome like a new job, promotion, or raise within 6 months.²\n\nThis program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.\n\nThis program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.\n\nIf you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.\n\nCheck out all Google Career Certificates here. Now $39 (save $10)!\n\n¹Burning Glass: Labor Insight (Last 12 Months: 2/1/20 - 1/31/21)\n\n²Coursera Learner Outcome Survey, all time for Google IT Support Certificate. Data is collected via on-platform surveys or email and is cumulative from 1/18 - 1/21. | [8.0, 20.7] | Arabic; Russian; Spanish; French; Portuguese; Italian; Vietnamese; German | English | information-technology | support-and-operations | |||||||
79 | IT Security: Defense against the digital dark arts | Beginner | 15,2 | 4,7 | This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.\n\nAt the end of this course, you’ll understand:\n● how various encryption algorithms and techniques work as well as their benefits and limitations.\n● various authentication systems and types.\n● the difference between authentication and authorization.\n● how to evaluate potential risks and recommend ways to reduce risk.\n● best practices for securing a network.\n● how to help others to grasp security concepts and protect themselves. | Wireless; Wireless Security; Cryptography; Encryption; Information Security; Authentication; Network Monitoring; Security; Network Security; System Security | Google IT Support | 5 | Prepare for a career in the high-growth field of IT, no experience or degree required. Get professional training designed by Google and get on the fast-track to a competitively paid job. There are 340,500 U.S. job openings in IT and a $50,800 average entry-level salary in IT support.¹\n\nOver 5 courses, learn in-demand skills that prepare you for an entry-level job. At under 10 hours per week, you can complete the certificate in less than 6 months. Upon completion, you can directly apply for jobs with Google and over 130 U.S. employers, including Walmart, Best Buy, and Astreya.\n\nSince the IT Support Certificate launched in 2018, 82% of graduates have reported a positive career outcome like a new job, promotion, or raise within 6 months.²\n\nThis program also prepares you for the CompTIA A+ exams, the industry standard certification for IT—you’ll earn a dual credential when you complete both.\n\nThis program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.\n\nIf you’re interested in building on your IT foundations, check out the Google IT Automation with Python Professional Certificate.\n\nCheck out all Google Career Certificates here. Now $39 (save $10)!\n\n¹Burning Glass: Labor Insight (Last 12 Months: 2/1/20 - 1/31/21)\n\n²Coursera Learner Outcome Survey, all time for Google IT Support Certificate. Data is collected via on-platform surveys or email and is cumulative from 1/18 - 1/21. | [7.5, 19.9] | Arabic; French; Spanish; Portuguese; Italian; Vietnamese; German; Russian | English | information-technology | security | |||||||
80 | Grundlagen des technischen Supports | Beginner | 15,6 | Not Calibrated | Dieser Kurs ist der erste in einer Reihe, die Sie auf den Berufseinstieg als IT-Supportspezialist vorbereiten. In diesem Kurs erfahren Sie mehr über die Informationstechnologie – die IT. Dabei beschäftigen Sie sich mit den unterschiedlichen Bereichen der Informationstechnologie, u. a. Computerhardware, Internet, Computersoftware, Fehlersuche und Kundendienst. Wir sehen uns an, wie ein Vorstellungsgespräch in der Technologiebranche verlaufen könnte und geben Ihnen Tipps, wie Sie sich am besten darauf vorbereiten. Dieser Kurs beschäftigt sich mit einer großen Anzahl von Themen im Bereich IT und gibt Ihnen somit eine Übersicht über das, was in diesem Zertifikatsprogramm auf Sie zukommen wird.\n\nNachdem Sie diesen Kurs abgeschlossen haben, sind Sie in der Lage, die folgenden Aufgaben auszuführen:\n● Sie verstehen, wie das binäre System funktioniert.\n● Sie können einen Computer von Grund auf zusammenbauen.\n● Sie können ein Betriebssystem auswählen und auf einem Computer installieren.\n● Sie verstehen, wie das Internet funktioniert und welche Auswirkungen es auf die Welt von heute hat.\n● Sie lernen, wie Anwendungen und Apps entwickelt werden und wie sie auf einem Computer funktionieren.\n● Sie wenden gängige Vorgehensweisen zur Fehlerbehebung an und haben soziale Kompetenzen im Bereich der Informationstechnologie erworben. | Customer Service; Abstraction; Technical Support; Verstehen; Computer Architecture; Build Operate Transfer; Booting; Software; Internet; Man | Google IT Support (Deutsch) | 1 | In diesem aus 5 Einzelkursen bestehenden Zertifizierungsprogramm lernen Sie auf Basis eines innovativen, von Google entwickelten Lehrplans alles, was Sie für den Start Ihrer Karriere im IT-Support brauchen. 80 % der Teilnehmenden bestätigen, dass diese Zertifizierung ihren beruflichen Werdegang nachhaltig beeinflusst hat, entweder in Form eines neuen Jobs, einer Gehaltserhöhung oder des Beginns einer ganz neuen Karriere. Dieses Programm ist Teil der Initiative „Grow with Google“, mit der Google Menschen helfen möchte, sich neue wirtschaftliche Chancen zu erarbeiten. Weitere Informationen finden Sie hier.\n\nNach Abschluss der Kurse und einer erfolgreichen Zertifizierung können Teilnehmende mit US-amerikanischer Arbeitserlaubnis ihre Informationen direkt mit Google und potenziellen Arbeitgebern wie Hulu, Infosys, Intel, Walmart usw. teilen.\n\nTeilnehmende werden auch optimal auf die CompTIA A+ Prüfungen (den Zertifizierungs-standard für die IT-Branche) vorbereitet. Wenn Sie beide Prüfungen ablegen, verfügen Sie über eine duale Zertifizierung. Das Programm besteht aus Videovorträgen, kurzen Wissenstests und praktischen Übungen aus den Bereichen Fehlerbehebung, Kundenservice, Netzwerktechnik, Betriebssysteme, Systemverwaltung und Sicherheit und deckt so alle für einen Einstieg in die IT-Branche wichtigen Bereiche ab. | [8.5, 19.6] | Arabic; French; English; Spanish; Portuguese; Chinese; Italian; Vietnamese; Korean; Russian; Turkish | German | information-technology | support-and-operations | |||||||
81 | Die Bits und Bytes von Computernetzwerken | Advanced | 17 | Not Calibrated | Dieser Kurs soll Ihnen einen umfassenden Überblick über das Thema Computernetzwerke bieten. Sie werden die Grundlagen moderner Netzwerktechnologien und -protokolle kennenlernen, einen Überblick über die Cloud erhalten und mehr über praktische Anwendungsfälle und die Behebung von Netzwerkproblemen erfahren. Abschließend werden wir uns ansehen, wie diese Informationen in einem Bewerbungsgespräch auftauchen könnten, und geben Ihnen einige Tipps, wie Sie Netzwerkprobleme im Handumdrehen beheben.\n\nNach diesem Kurs…\n● können Sie Computernetzwerke hinsichtlich des Fünf-Schichten-Modells beschreiben.\n● kennen Sie alle Standardprotokolle, die an der TCP/IP-Kommunikation beteiligt sind.\n● kennen Sie leistungsstarke Tools und Methoden zur Behebung von Netzwerkproblemen.\n● kennen Sie Netzwerkdienste wie DNS und DHCP, die für den Betrieb von Netzwerken erforderlich sind\n● wissen Sie, wie Cloud-Computing, Everything as a Service und Cloud-Speicher funktionieren. | Virtual Private Networks; Porting; Computer Networking; Dynamic Host Configuration Protocol; Network Layer; Domain Name System; Cabling; Network Model; Wireless; Application Layer | Google IT Support (Deutsch) | 2 | In diesem aus 5 Einzelkursen bestehenden Zertifizierungsprogramm lernen Sie auf Basis eines innovativen, von Google entwickelten Lehrplans alles, was Sie für den Start Ihrer Karriere im IT-Support brauchen. 80 % der Teilnehmenden bestätigen, dass diese Zertifizierung ihren beruflichen Werdegang nachhaltig beeinflusst hat, entweder in Form eines neuen Jobs, einer Gehaltserhöhung oder des Beginns einer ganz neuen Karriere. Dieses Programm ist Teil der Initiative „Grow with Google“, mit der Google Menschen helfen möchte, sich neue wirtschaftliche Chancen zu erarbeiten. Weitere Informationen finden Sie hier.\n\nNach Abschluss der Kurse und einer erfolgreichen Zertifizierung können Teilnehmende mit US-amerikanischer Arbeitserlaubnis ihre Informationen direkt mit Google und potenziellen Arbeitgebern wie Hulu, Infosys, Intel, Walmart usw. teilen.\n\nTeilnehmende werden auch optimal auf die CompTIA A+ Prüfungen (den Zertifizierungs-standard für die IT-Branche) vorbereitet. Wenn Sie beide Prüfungen ablegen, verfügen Sie über eine duale Zertifizierung. Das Programm besteht aus Videovorträgen, kurzen Wissenstests und praktischen Übungen aus den Bereichen Fehlerbehebung, Kundenservice, Netzwerktechnik, Betriebssysteme, Systemverwaltung und Sicherheit und deckt so alle für einen Einstieg in die IT-Branche wichtigen Bereiche ab. | [9.4, 21.3] | Arabic; French; Spanish; Portuguese; Italian; Vietnamese; Russian; English | German | information-technology | networking | |||||||
82 | Betriebssysteme und Sie: Power User werden | Beginner | 18,4 | Not Calibrated | In diesem Kurs lernen Sie – durch eine Kombination aus Videovorträgen, Demonstrationen und praktischen Übungen – die Hauptkomponenten eines Betriebssystems kennen und erfahren, wie wichtige Aufgaben wie beispielsweise das Verwalten von Software und Benutzern sowie das Konfigurieren von Hardware funktionieren. Zum Abschluss zeigen wir Ihnen anhand eines Beispiels, wie diese Inhalte in einem Bewerbungsgespräch auftauchen könnten.\n\nNach diesem Kurs…\n● können Sie mithilfe der grafischen Benutzeroberfläche und der Eingabeaufforderung durch Windows- und Linux-Dateisysteme navigieren.\n● können Sie Nutzer, Gruppen und Berechtigungen für Kontozugriffe konfigurieren.\n● können Sie Software unter Windows und Linux installieren, konfigurieren und deinstallieren.\n● können Sie Laufwerkpartitionen und Dateisysteme konfigurieren\n● wissen Sie, wie Systemprozesse funktionieren und wie sie verwaltet werden.\n● wissen Sie, wie der Umgang mit Systemlogs und Remote-Verbindungstools funktioniert.\n● können Sie Ihr Wissen zum Thema Betriebssysteme anwenden, um als IT-Supportspezialist häufige Probleme zu beheben. | Verstehen; I-Deas; Central Processing Unit; Divergence (Computer Science); Rubygems; Utility; Resource; File System Permissions; Library (Computing); Superuser | Google IT Support (Deutsch) | 3 | In diesem aus 5 Einzelkursen bestehenden Zertifizierungsprogramm lernen Sie auf Basis eines innovativen, von Google entwickelten Lehrplans alles, was Sie für den Start Ihrer Karriere im IT-Support brauchen. 80 % der Teilnehmenden bestätigen, dass diese Zertifizierung ihren beruflichen Werdegang nachhaltig beeinflusst hat, entweder in Form eines neuen Jobs, einer Gehaltserhöhung oder des Beginns einer ganz neuen Karriere. Dieses Programm ist Teil der Initiative „Grow with Google“, mit der Google Menschen helfen möchte, sich neue wirtschaftliche Chancen zu erarbeiten. Weitere Informationen finden Sie hier.\n\nNach Abschluss der Kurse und einer erfolgreichen Zertifizierung können Teilnehmende mit US-amerikanischer Arbeitserlaubnis ihre Informationen direkt mit Google und potenziellen Arbeitgebern wie Hulu, Infosys, Intel, Walmart usw. teilen.\n\nTeilnehmende werden auch optimal auf die CompTIA A+ Prüfungen (den Zertifizierungs-standard für die IT-Branche) vorbereitet. Wenn Sie beide Prüfungen ablegen, verfügen Sie über eine duale Zertifizierung. Das Programm besteht aus Videovorträgen, kurzen Wissenstests und praktischen Übungen aus den Bereichen Fehlerbehebung, Kundenservice, Netzwerktechnik, Betriebssysteme, Systemverwaltung und Sicherheit und deckt so alle für einen Einstieg in die IT-Branche wichtigen Bereiche ab. | [10.0, 23.1] | Arabic; French; Spanish; Portuguese; Italian; Vietnamese; Russian; English | German | information-technology | support-and-operations | |||||||
83 | Systemverwaltung und IT-Infrastrukturdienste | Beginner | 18,4 | Not Calibrated | In diesem Kurs erfahren Sie, wie Sie eine ganze Flotte von Rechnern verwalten können. Als Systemadministrator sorgen Sie dafür, dass die Computersysteme in Anwendungsumgebungen mit mehreren Nutzern zuverlässig funktionieren. In diesem Kurs lernen Sie die Infrastrukturdienste kennen, die alle Unternehmen, egal ob groß oder klein, für den Betrieb benötigen. Wir werden dabei näher auf das Thema Cloud eingehen, damit Sie verstehen, wie der typische Aufbau von Cloud-Infrastruktur aussieht und wie sich Cloud-Ressourcen verwalten lassen. Außerdem erfahren Sie, wie Sie Server konfigurieren und branchenübliche Tools zur Verwaltung von Computern, Nutzerdaten und der Produktivität von Endnutzern verwenden können. Zum Schluss lernen Sie, wie Sie die IT-Infrastruktur Ihres Unternehmens im Notfall wiederherstellen können.\n \nAm Ende dieses Kurses können Sie:\n● anhand von Best Practices passende Hardware, Anbieter und Dienste für Ihr Unternehmen finden\n● nachvollziehen, wie die gängigsten Infrastrukturdienste funktionieren, die ein Unternehmen\nam Laufen halten, und Infrastrukturserver verwalten\n● nachvollziehen, wie Sie die Cloud für Ihr Unternehmen optimal nutzen können\n● die Computer und Nutzer Ihres Unternehmens mit den Verzeichnisdiensten Active\nDirectory und OpenLDAP verwalten\n● Tools für Ihr Unternehmen auswählen und verwalten\n● die Daten Ihres Unternehmens sichern und Ihre IT-Infrastruktur im Notfall\nwiederherstellen\n● Ihre Kenntnisse als Systemadministrator nutzen, um IT-Prozesse zu planen und zu verbessern | Backup; Directory Services; Provisioning; Maintenance; Network Service; Off-Site Data Protection; Recovery Testing; Handle System; Data Recovery; Troubleshooting | Google IT Support (Deutsch) | 4 | In diesem aus 5 Einzelkursen bestehenden Zertifizierungsprogramm lernen Sie auf Basis eines innovativen, von Google entwickelten Lehrplans alles, was Sie für den Start Ihrer Karriere im IT-Support brauchen. 80 % der Teilnehmenden bestätigen, dass diese Zertifizierung ihren beruflichen Werdegang nachhaltig beeinflusst hat, entweder in Form eines neuen Jobs, einer Gehaltserhöhung oder des Beginns einer ganz neuen Karriere. Dieses Programm ist Teil der Initiative „Grow with Google“, mit der Google Menschen helfen möchte, sich neue wirtschaftliche Chancen zu erarbeiten. Weitere Informationen finden Sie hier.\n\nNach Abschluss der Kurse und einer erfolgreichen Zertifizierung können Teilnehmende mit US-amerikanischer Arbeitserlaubnis ihre Informationen direkt mit Google und potenziellen Arbeitgebern wie Hulu, Infosys, Intel, Walmart usw. teilen.\n\nTeilnehmende werden auch optimal auf die CompTIA A+ Prüfungen (den Zertifizierungs-standard für die IT-Branche) vorbereitet. Wenn Sie beide Prüfungen ablegen, verfügen Sie über eine duale Zertifizierung. Das Programm besteht aus Videovorträgen, kurzen Wissenstests und praktischen Übungen aus den Bereichen Fehlerbehebung, Kundenservice, Netzwerktechnik, Betriebssysteme, Systemverwaltung und Sicherheit und deckt so alle für einen Einstieg in die IT-Branche wichtigen Bereiche ab. | [10.0, 23.1] | English; Russian; Spanish; Vietnamese; Portuguese; Italian; French; Arabic | German | information-technology | support-and-operations | |||||||
84 | IT-Sicherheit: Grundlagen für eine solide | Beginner | 18,4 | Not Calibrated | In diesem Kurs behandeln wir eine Reihe von Konzepten, Tools und Best Practices rund um das Thema IT-Sicherheit. Sie erfahren mehr über verschiedene Formen von Bedrohungen und Angriffen und erhalten Hintergrundinformationen zu Verschlüsselungsalgorithmen und deren Funktionsweisen. Anschließend gehen wir näher auf drei besonders wichtige Konzepte der IT-Sicherheit ein: Authentifizierung, Autorisierung und Konten. Wir behandeln außerdem einige Lösungen zur Netzwerksicherheit, von Firewalls bis hin zur WLAN-Verschlüsselung. Schließlich untersuchen wir das Sicherheitsmodell von Chrome OS im Rahmen einer Fallstudie. Abschließend werden alle diese Elemente zu einer mehrschichtigen, detaillierten Sicherheitsarchitektur kombiniert. Sie erhalten auch Empfehlungen dazu, wie Sie dafür sorgen können, dass Sicherheit in Ihrem Unternehmen oder Team zum A und O wird.\n \nAm Ende dieses Kurses wissen Sie:\n● wie verschiedene Verschlüsselungsalgorithmen und ‑methoden funktionieren, welche Vorteile sie bieten und welche Einschränkungen sie haben\n● welche verschiedenen Authentifizierungssysteme und ‑typen es gibt\n● was der Unterschied zwischen Authentifizierung und Autorisierung ist\n● wie Sie potenzielle Risiken einstufen und wie Sie sie am besten vermeiden können\n● was die Best Practices der Netzwerksicherheit sind\n● wie Sie anderen Personen diese Sicherheitskonzepte näherbringen können, damit sie sich besser schützen können | Art; Encryption; Reverse Proxy; Antivirus Software; Symmetric-Key Algorithm; Disk Encryption; Authentication; Security; Patch (Computing); Malware | Google IT Support (Deutsch) | 5 | In diesem aus 5 Einzelkursen bestehenden Zertifizierungsprogramm lernen Sie auf Basis eines innovativen, von Google entwickelten Lehrplans alles, was Sie für den Start Ihrer Karriere im IT-Support brauchen. 80 % der Teilnehmenden bestätigen, dass diese Zertifizierung ihren beruflichen Werdegang nachhaltig beeinflusst hat, entweder in Form eines neuen Jobs, einer Gehaltserhöhung oder des Beginns einer ganz neuen Karriere. Dieses Programm ist Teil der Initiative „Grow with Google“, mit der Google Menschen helfen möchte, sich neue wirtschaftliche Chancen zu erarbeiten. Weitere Informationen finden Sie hier.\n\nNach Abschluss der Kurse und einer erfolgreichen Zertifizierung können Teilnehmende mit US-amerikanischer Arbeitserlaubnis ihre Informationen direkt mit Google und potenziellen Arbeitgebern wie Hulu, Infosys, Intel, Walmart usw. teilen.\n\nTeilnehmende werden auch optimal auf die CompTIA A+ Prüfungen (den Zertifizierungs-standard für die IT-Branche) vorbereitet. Wenn Sie beide Prüfungen ablegen, verfügen Sie über eine duale Zertifizierung. Das Programm besteht aus Videovorträgen, kurzen Wissenstests und praktischen Übungen aus den Bereichen Fehlerbehebung, Kundenservice, Netzwerktechnik, Betriebssysteme, Systemverwaltung und Sicherheit und deckt so alle für einen Einstieg in die IT-Branche wichtigen Bereiche ab. | [10.0, 23.1] | English; Russian; Vietnamese; Portuguese; Italian; French; Arabic; Spanish | German | information-technology | security | |||||||
85 | أساسيات الدعم الفني | Beginner | 18,4 | Not Calibrated | هذه الدورة هي أول دورة في سلسلة دورات تهدف إلى إعدادك لدور إخصائي دعم تقنية المعلومات على مستوى المبتدئين. سنأخذك في هذه الدورة إلى عالم تقنية المعلومات (IT) لتتعرف عليه. فإنك ستتعرف على الجوانب المختلفة لتقنية المعلومات، مثل أجهزة الكمبيوتر والإنترنت وبرامج الكمبيوتر واستكشاف الأخطاء وإصلاحها وخدمة العملاء. تغطي هذه الدورة مجموعة متنوعة من موضوعات مجال تقنية المعلومات والتي تم تصميمها لتزويدك بنظرة عامة عما سيأتي في برنامج الشهادة هذا.\n\nفي نهاية هذه الدورة، ستكون قد تمكنت من:\n● فهم كيفية عمل النظام الثنائي\n● تجميع جهاز كمبيوتر من الصفر\n● اختيار نظام التشغيل وتثبيته على جهاز كمبيوتر\n● فهم طبيعة شبكة الإنترنت وكيفية عملها وكيف أثرت في عالمنا الحديث\n● التعرف على كيفية إنشاء تطبيقات وكيفية عملها في داخل الكمبيوتر\n● الاستفادة من المنهجيات الشائعة لحل المشكلات والمهارات الشخصية اللازمة لإعداد تقنية المعلومات | Booting; Internet Privacy; Operating Systems; Software; Internet; Troubleshooting; Writing; File Shortcut; Customer Service; Computer Architecture | Google شهادة تقنية المعلومات من | 1 | في برنامج الشهادة المكون من 5 دورات تدريبية، ستستعد لوظيفة في مستوى المبتدئين في دعم تكنولوجيا المعلومات من خلال منهج مبتكر طورته شركة Google. فقد أفاد 80% من متعلمي شهادة أخصائي دعم تكنولوجيا المعلومات من Google في الولايات المتحدة عن تأثير وظيفي في غضون 6 أشهر، مثل العثور على وظيفة جديدة أو الحصول على علاوة أو بدء عمل تجاري جديد. البرنامج عبارة عن جزء من برنامج "النمو مع Google"، وهي مبادرة من شركة Google للمساعدة في خلق فرص اقتصادية للجميع. تعرّف على المزيد.\n\nعند إتمام الشهادة، يمكن للمتعلمين المؤهلين للعمل في الولايات المتحدة مشاركة معلوماتهم مباشرةً مع شركة Google، وكذلك أرباب العمل مثل Hulu وInfosys وIntel وWalmart وغيرهم الكثير.\n\nيُعدك هذا البرنامج أيضًا لاختبارات CompTIA A+، وهي شهادة معيار الصناعة لتكنولوجيا المعلومات - ستحصل على اعتماد مزدوج عند إتمام كليهما. من خلال مزيج من محاضرات الفيديو والاختبارات والتدريب العملي في المختبرات، ستتعرّف على مهارات استكشاف الأخطاء وإصلاحها وخدمة العملاء وعمليات الشبكة وأنظمة التشغيل وإدارة النظام والأمان - وهي مهارات تكنولوجيا المعلومات الأساسية المطلوبة لدور المبتدئين. وستتلقى معلومات من موظفي Google الذين كانت أسسهم في دعم تكنولوجيا المعلومات بمثابة منصات انطلاق لحياتهم المهنية. يمكنك إتمام هذا البرنامج في غضون 3 إلى 6 أشهر، عن طريق تخصيص حوالي 5 ساعات في الأسبوع.\n\nهذا البرنامج معتمد من ACE® - عند إتمامه، يمكنك كسب ما يصل إلى 12 درجة جامعية، أي ما يعادل 4 دورات دراسية على مستوى درجة الزمالة. | [10.0, 23.1] | Portuguese; Spanish; English | Arabic | information-technology | support-and-operations | |||||||
86 | أساسيات شبكات الكمبيوتر | Beginner | 18,4 | Not Calibrated | تم تصميم هذه الدورة لتقديم نظرة عامة كاملة عن شبكات الكمبيوتر. سوف نتناول كل شيء بدءًا من أساسيات تقنيات وبروتوكولات الشبكات الحديثة إلى نظرة عامة على تقنية السحابة الحاسوبية إلى التطبيقات العملية وكيفية استكشاف أخطاء الشبكة وإصلاحها. \n\nمع حلول نهاية هذه الدورة، ستكون قد تمكنت من:\n● وصف شبكات الكمبيوتر من حيث نموذج الطبقات الخمس\n● فهم جميع البروتوكولات القياسية المتضمنة في اتصالات TCP/IP\n● التمكن من استيعاب الأدوات والتقنيات الفعالة لاستكشاف أخطاء الشبكة وإصلاحها\n● تعلم خدمات الشبكات، مثل DNS وDHCP التي تساعد في تشغيل شبكات الكمبيوتر\n● فهم الحوسبة السحابية، وكل شيء يتم تقديمه كخدمة، والتخزين السحابي | Virtual Private Networks; Subnetwork; Network Layer; Computer Networking; Domain Name System; Network Model; Cabling; Multilayer Switch; Porting; Dynamic Host Configuration Protocol | Google شهادة تقنية المعلومات من | 2 | في برنامج الشهادة المكون من 5 دورات تدريبية، ستستعد لوظيفة في مستوى المبتدئين في دعم تكنولوجيا المعلومات من خلال منهج مبتكر طورته شركة Google. فقد أفاد 80% من متعلمي شهادة أخصائي دعم تكنولوجيا المعلومات من Google في الولايات المتحدة عن تأثير وظيفي في غضون 6 أشهر، مثل العثور على وظيفة جديدة أو الحصول على علاوة أو بدء عمل تجاري جديد. البرنامج عبارة عن جزء من برنامج "النمو مع Google"، وهي مبادرة من شركة Google للمساعدة في خلق فرص اقتصادية للجميع. تعرّف على المزيد.\n\nعند إتمام الشهادة، يمكن للمتعلمين المؤهلين للعمل في الولايات المتحدة مشاركة معلوماتهم مباشرةً مع شركة Google، وكذلك أرباب العمل مثل Hulu وInfosys وIntel وWalmart وغيرهم الكثير.\n\nيُعدك هذا البرنامج أيضًا لاختبارات CompTIA A+، وهي شهادة معيار الصناعة لتكنولوجيا المعلومات - ستحصل على اعتماد مزدوج عند إتمام كليهما. من خلال مزيج من محاضرات الفيديو والاختبارات والتدريب العملي في المختبرات، ستتعرّف على مهارات استكشاف الأخطاء وإصلاحها وخدمة العملاء وعمليات الشبكة وأنظمة التشغيل وإدارة النظام والأمان - وهي مهارات تكنولوجيا المعلومات الأساسية المطلوبة لدور المبتدئين. وستتلقى معلومات من موظفي Google الذين كانت أسسهم في دعم تكنولوجيا المعلومات بمثابة منصات انطلاق لحياتهم المهنية. يمكنك إتمام هذا البرنامج في غضون 3 إلى 6 أشهر، عن طريق تخصيص حوالي 5 ساعات في الأسبوع.\n\nهذا البرنامج معتمد من ACE® - عند إتمامه، يمكنك كسب ما يصل إلى 12 درجة جامعية، أي ما يعادل 4 دورات دراسية على مستوى درجة الزمالة. | [10.0, 23.1] | Portuguese; Spanish; English | Arabic | information-technology | networking | |||||||
87 | أنت وأنظمة التشغيل: كيف تصبح مستخدمًا محترفًا | Beginner | 18,4 | Not Calibrated | في هذه الدورة – من خلال مجموعة من محاضرات الفيديو والعروض التوضيحية والتدريب العملي – ستتعرف على المكونات الرئيسية لنظام التشغيل وكيفية أداء المهام بالغة الأهمية مثل إدارة البرامج والمستخدمين وتهيئة الأجهزة. \n\nبنهاية هذه الدورة، ستكون قادرًا على:\n●التنقل بين أنظمة ملفات Windows وLinux باستخدام واجهة مستخدم رسومية ومُفسِّر سطر أوامر\n●إعداد المستخدمين والمجموعات والأذونات للوصول إلى الحساب\n● تثبيت البرامج وتكوينها وإزالتها على أنظمة تشغيل Windows وLinux\n● تكوين أقسام القرص وأنظمة الملفات\n● فهم طريقة عمل عمليات النظام وكيفية إدارتها\n●العمل باستخدام سجلات النظام وأدوات الاتصال عن بُعد\n● الاستفادة من معرفة نظام التشغيل لاستكشاف المشكلات الشائعة في دور اختصاصي دعم تكنولوجيا المعلومات وإصلاحها | File System; Virtual Memory; Process State; Systems Monitoring; Divergence (Computer Science); Graphical User Interface; Maintenance, Repair, And Operations; Data Compression; Software Project Management; Command-Line Interface | Google شهادة تقنية المعلومات من | 3 | في برنامج الشهادة المكون من 5 دورات تدريبية، ستستعد لوظيفة في مستوى المبتدئين في دعم تكنولوجيا المعلومات من خلال منهج مبتكر طورته شركة Google. فقد أفاد 80% من متعلمي شهادة أخصائي دعم تكنولوجيا المعلومات من Google في الولايات المتحدة عن تأثير وظيفي في غضون 6 أشهر، مثل العثور على وظيفة جديدة أو الحصول على علاوة أو بدء عمل تجاري جديد. البرنامج عبارة عن جزء من برنامج "النمو مع Google"، وهي مبادرة من شركة Google للمساعدة في خلق فرص اقتصادية للجميع. تعرّف على المزيد.\n\nعند إتمام الشهادة، يمكن للمتعلمين المؤهلين للعمل في الولايات المتحدة مشاركة معلوماتهم مباشرةً مع شركة Google، وكذلك أرباب العمل مثل Hulu وInfosys وIntel وWalmart وغيرهم الكثير.\n\nيُعدك هذا البرنامج أيضًا لاختبارات CompTIA A+، وهي شهادة معيار الصناعة لتكنولوجيا المعلومات - ستحصل على اعتماد مزدوج عند إتمام كليهما. من خلال مزيج من محاضرات الفيديو والاختبارات والتدريب العملي في المختبرات، ستتعرّف على مهارات استكشاف الأخطاء وإصلاحها وخدمة العملاء وعمليات الشبكة وأنظمة التشغيل وإدارة النظام والأمان - وهي مهارات تكنولوجيا المعلومات الأساسية المطلوبة لدور المبتدئين. وستتلقى معلومات من موظفي Google الذين كانت أسسهم في دعم تكنولوجيا المعلومات بمثابة منصات انطلاق لحياتهم المهنية. يمكنك إتمام هذا البرنامج في غضون 3 إلى 6 أشهر، عن طريق تخصيص حوالي 5 ساعات في الأسبوع.\n\nهذا البرنامج معتمد من ACE® - عند إتمامه، يمكنك كسب ما يصل إلى 12 درجة جامعية، أي ما يعادل 4 دورات دراسية على مستوى درجة الزمالة. | [10.0, 23.1] | Portuguese; Spanish; English | Arabic | information-technology | support-and-operations | |||||||
88 | إدارة النظم وخدمات البنية التحتية لتكنولوجيا المعلومات | Beginner | 18,4 | Not Calibrated | ستنقلك هذه الدورة من العمل على جهاز كمبيوتر واحد إلى أسطول كامل. إدارة النظم هي مجال تكنولوجيا المعلومات المسؤول عن الحفاظ على وجود أنظمة أجهزة كمبيوتر موثوقة في بيئة متعددة المستخدمين. سوف تتعرف في هذه الدورة على خدمات البنية التحتية التي تحافظ على استمرارية عمل جميع المؤسسات، سواء الكبيرة أو الصغيرة. سوف نتعمق في السحابة حتى تفهم كل شيء، بدءًا من إعدادات البنية التحتية النموذجية للسحابة وصولًا إلى كيفية إدارة موارد السحابة. ستتعلم أيضًا كيفية إدارة الخوادم وتكوينها، وكيفية استخدام الأدوات المستخدمة في القطاع لإدارة أجهزة الكمبيوتر، ومعلومات المستخدم وإنتاجية المستخدم. أخيرًا، ستتعلم كيفية استعادة البنية التحتية لتكنولوجيا المعلومات الخاصة بمؤسستك في حالة حدوث كارثة.\n\nوبنهاية هذه الدورة ستكون قادرًا على:\n● الاستفادة من أفضل الممارسات لاختيار الأجهزة والموردين والخدمات لمؤسستك\n● فهم كيفية عمل خدمات البنية التحتية الأكثر شيوعًا التي تحافظ على استمرارية عمل\nالمؤسسات، وكيفية إدارة خوادم البنية التحتية\n● فهم كيفية تحقيق أقصى استفادة من السحابة لمؤسستك\n● إدارة أجهزة الكمبيوتر والمستخدمين لدى مؤسسة ما باستخدام خدمات الدليل وخدمة Active Directory وبرنامجOpenLDAP\n●اختيار الأدوات التي ستستخدمها مؤسستك وإدارتها\n● إنشاء نسخ احتياطية من بيانات مؤسستك ومعرفة كيفية استعادة البنية التحتية لتكنولوجيا المعلومات لديك في حالة حدوث كارثة\n● الاستفادة من المعرفة بإدارة النظم لتخطيط العمليات وتحسينها لبيئات تكنولوجيا المعلومات | Backup; Directory Services; Network Service; Recovery Testing; Data Recovery; Handle System; Off-Site Data Protection; Troubleshooting; Domain Name System; System V | Google شهادة تقنية المعلومات من | 4 | في برنامج الشهادة المكون من 5 دورات تدريبية، ستستعد لوظيفة في مستوى المبتدئين في دعم تكنولوجيا المعلومات من خلال منهج مبتكر طورته شركة Google. فقد أفاد 80% من متعلمي شهادة أخصائي دعم تكنولوجيا المعلومات من Google في الولايات المتحدة عن تأثير وظيفي في غضون 6 أشهر، مثل العثور على وظيفة جديدة أو الحصول على علاوة أو بدء عمل تجاري جديد. البرنامج عبارة عن جزء من برنامج "النمو مع Google"، وهي مبادرة من شركة Google للمساعدة في خلق فرص اقتصادية للجميع. تعرّف على المزيد.\n\nعند إتمام الشهادة، يمكن للمتعلمين المؤهلين للعمل في الولايات المتحدة مشاركة معلوماتهم مباشرةً مع شركة Google، وكذلك أرباب العمل مثل Hulu وInfosys وIntel وWalmart وغيرهم الكثير.\n\nيُعدك هذا البرنامج أيضًا لاختبارات CompTIA A+، وهي شهادة معيار الصناعة لتكنولوجيا المعلومات - ستحصل على اعتماد مزدوج عند إتمام كليهما. من خلال مزيج من محاضرات الفيديو والاختبارات والتدريب العملي في المختبرات، ستتعرّف على مهارات استكشاف الأخطاء وإصلاحها وخدمة العملاء وعمليات الشبكة وأنظمة التشغيل وإدارة النظام والأمان - وهي مهارات تكنولوجيا المعلومات الأساسية المطلوبة لدور المبتدئين. وستتلقى معلومات من موظفي Google الذين كانت أسسهم في دعم تكنولوجيا المعلومات بمثابة منصات انطلاق لحياتهم المهنية. يمكنك إتمام هذا البرنامج في غضون 3 إلى 6 أشهر، عن طريق تخصيص حوالي 5 ساعات في الأسبوع.\n\nهذا البرنامج معتمد من ACE® - عند إتمامه، يمكنك كسب ما يصل إلى 12 درجة جامعية، أي ما يعادل 4 دورات دراسية على مستوى درجة الزمالة. | [10.0, 23.1] | Spanish; English; Russian; Portuguese; French | Arabic | information-technology | support-and-operations | |||||||
89 | أمان تكنولوجيا المعلومات: الحماية من الهجمات الرقمية | Beginner | 18,4 | Not Calibrated | تغطي هذه الدورة مجموعة متنوعة من المفاهيم والأدوات وأفضل الممارسات المتعلقة بأمان تكنولوجيا المعلومات. وهي تتناول التهديدات والهجمات والأشكال العديدة التي قد تتخذها. سنقدم لك بعض المعلومات التمهيدية عن خوارزميات التشفير وكيفية استخدامها لتأمين البيانات. ثم نستعرض بالتفصيل ثلاثة من جوانب أمان المعلومات، وهي المصادقة والترخيص والمحاسبة. سنغطي أيضًا حلول أمان الشبكات المتنوعة التي تشمل جدران الحماية وخيارات تشفير الشبكات اللاسلكية Wifi. وتكتمل الدورة بتجميع كل هذه العناصر معًا في بنية أمنية عميقة ومتعددة الطبقات، يلي ذلك توصيات حول كيفية دمج ثقافة الأمان في مؤسستك أو لدى أعضاء فريقك.\n\nفي نهاية هذه الدورة، ستفهم ما يلي:\n● طريقة عمل خوارزميات وتقنيات التشفير المختلفة فضلًا عن مزاياها وعيوبها.\n● أنظمة وأنواع المصادقة المختلفة.\n● الفرق بين المصادقة والترخيص\n●كيفية تقييم المخاطر المحتملة والتوصية بالطرق التي من شأنها تقليل المخاطر.\n● أفضل الممارسات الخاصة بتأمين الشبكة.\n● كيفية مساعدة الآخرين في فهم مصطلحات الأمان وحماية أنفسهم. | Art; Reverse Proxy; Disk Encryption; Encryption; Symmetric-Key Algorithm; Antivirus Software; Malware; Authentication; Hashing; Patch (Computing) | Google شهادة تقنية المعلومات من | 5 | في برنامج الشهادة المكون من 5 دورات تدريبية، ستستعد لوظيفة في مستوى المبتدئين في دعم تكنولوجيا المعلومات من خلال منهج مبتكر طورته شركة Google. فقد أفاد 80% من متعلمي شهادة أخصائي دعم تكنولوجيا المعلومات من Google في الولايات المتحدة عن تأثير وظيفي في غضون 6 أشهر، مثل العثور على وظيفة جديدة أو الحصول على علاوة أو بدء عمل تجاري جديد. البرنامج عبارة عن جزء من برنامج "النمو مع Google"، وهي مبادرة من شركة Google للمساعدة في خلق فرص اقتصادية للجميع. تعرّف على المزيد.\n\nعند إتمام الشهادة، يمكن للمتعلمين المؤهلين للعمل في الولايات المتحدة مشاركة معلوماتهم مباشرةً مع شركة Google، وكذلك أرباب العمل مثل Hulu وInfosys وIntel وWalmart وغيرهم الكثير.\n\nيُعدك هذا البرنامج أيضًا لاختبارات CompTIA A+، وهي شهادة معيار الصناعة لتكنولوجيا المعلومات - ستحصل على اعتماد مزدوج عند إتمام كليهما. من خلال مزيج من محاضرات الفيديو والاختبارات والتدريب العملي في المختبرات، ستتعرّف على مهارات استكشاف الأخطاء وإصلاحها وخدمة العملاء وعمليات الشبكة وأنظمة التشغيل وإدارة النظام والأمان - وهي مهارات تكنولوجيا المعلومات الأساسية المطلوبة لدور المبتدئين. وستتلقى معلومات من موظفي Google الذين كانت أسسهم في دعم تكنولوجيا المعلومات بمثابة منصات انطلاق لحياتهم المهنية. يمكنك إتمام هذا البرنامج في غضون 3 إلى 6 أشهر، عن طريق تخصيص حوالي 5 ساعات في الأسبوع.\n\nهذا البرنامج معتمد من ACE® - عند إتمامه، يمكنك كسب ما يصل إلى 12 درجة جامعية، أي ما يعادل 4 دورات دراسية على مستوى درجة الزمالة. | [10.0, 23.1] | Portuguese; Spanish; English | Arabic | information-technology | security | |||||||
90 | Introduction to Cybersecurity Tools & Cyber Attacks | IBM | Advanced | 12,3 | 4,4 | This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.\n\nYou will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.\n\nFinally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.\n\nThis course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.\n\nThe completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/introduction-to-cybersecurity-tools-cyber-attacks | Security; Cyberattacks; Cryptography; Penetration Test; Cyber Security Standards; Leadership and Management; Cybercrime; Forensics; Cyber-Security Regulation; Digital Forensics | IBM Cybersecurity Analyst | 1 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [4.4, 17.2] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | cloud-computing | ||||||
91 | Cybersecurity Roles, Processes & Operating System Security | IBM | Beginner | 6,3 | 4,5 | This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:\n\n●\t Understand the key cybersecurity roles within an Organization. \n●\t List key cybersecurity processes and an example of each process.\n●\t Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.\n●\t Understand the concept of Virtualization as it relates to cybersecurity \n\nFinally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.\n\nThis course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.\n\nThe completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security | Security; Cloud Computing; Operating Systems; System Security; Operating System Security; Cyber-Security Regulation; Process; Cloud Computing Security; Virtual Machine; Hypervisor | IBM Cybersecurity Analyst | 2 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [2.9, 8.6] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
92 | Cybersecurity Compliance Framework & System Administration | IBM | Beginner | 7,7 | 4,6 | This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization.\n\n You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.\n\nYou will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity incidents against an organization.\n\nFinally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company. \n\nThis course is intended for anyone who wants to gain a basic understanding of Security Frameworks, Compliance, endpoint management, encryption or cryptography or as the third course in a series of courses to gain the skill as a Jr Cybersecurity analyst. | Cryptography; Security; Encryption; Security Compliance; Hashing; Cyber Security Standards; Signature; Digital Signature; Leadership and Management; Server Administrator | IBM Cybersecurity Analyst | 3 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [2.6, 10.8] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
93 | Network Security & Database Vulnerabilities | IBM | Advanced | 8,8 | 4,6 | This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.\n\nIn addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. \n\nYou will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals.\n\nThis course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. | Security; Network Security; Databases; SQL; Sql Injection; Database Security; Code Injection; Internet Protocol Suite; Network Address; Data Security | IBM Cybersecurity Analyst | 4 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [3.3, 12.2] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
94 | Penetration Testing, Incident Response and Forensics | IBM | Beginner | 7,8 | 4,6 | This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. \n\nYou will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Furthermore, you will learn the phases of an incident response, important documentation to collect, and the components of an incident response policy and team. Finally, you will learn key steps in the forensic process and important data to collect. \n\nThis course also gives you a first look at scripting and the importance to a system analyst.\n\nThis course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the fifth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.\n\nThe completion of this course also makes you eligible to earn the Penetration Testing, Incident Response and Forensics IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/penetration-testing-incident-response-and-forensics.\n\n\nIn this course you will learn to:\n•\tDescribe penetration testing tools and the benefits to an organization\n•\tDescribe a deep dive into incident response techniques and tools\n•\tDescribe digital forensics and digital evidence.\n•\tDiscuss the power of scripting. | Penetration Test; Forensics; Python Programming; Computer Programming; Digital Forensics; Computer Security Incident Management; Scripting Language; Language; Leadership and Management; Incident Management | IBM Cybersecurity Analyst | 5 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [3.6, 10.8] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
95 | Cyber Threat Intelligence | IBM | Beginner | 9,6 | 4,7 | This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. \n\nYou will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms.\n\nThis course also gives you hands on access to cybersecurity tools important to a system analyst.\n\nThis course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.\n\nThe completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence.\n\nIn this course, you will learn to:\n\n•\tDescribe examples of network defensive tactics.\n•\tDiscuss data loss prevention and endpoint protection concepts and tools. \n•\tExplore a data loss prevention tool and learn how to classify data in your database environment. \n•\tDescribe security vulnerability scanning technologies and tools.\n•\tRecognize application security threats and common vulnerabilities.\n•\tIdentify the key concepts around threat intelligence.\n•\tExplore a SIEM product and review suspicious alerts and how to take action. | Threat; Security; Security Information And Event Management; Leadership and Management; Event Management; Penetration Test; Network Security; Software Security; Cryptography; Cross-Site Scripting | IBM Cybersecurity Analyst | 6 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [3.8, 13.6] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | security | ||||||
96 | Cybersecurity Capstone: Breach Response Case Studies | IBM | Beginner | 5,9 | 4,8 | This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. \n\nYou will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization.\nFinally, you will explore the costs of data breaches through research studies and well known breaches.\n\nThis course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course.\n\nThis course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.\n\nThe completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies .\n\nIn this course, you will learn to:\n\n●\tApply incident response methodologies.\n●\tResearch and describe a watering hole attack.\n●\tResearch and describe ransomware threats and the consequences to organization.\n●\tResearch and describe 3rd party breaches and how they affect an organization.\n●\tResearch and describe the effects of a phishing attack.\n●\tResearch and describe a point of sale attack and approximate cost of data breaches.\n●\tPerform a case study on a current cyber attack and breach. | Ransomware; Penetration Test; Network Security; Information Security; Data Breaches; Breach (Security Exploit); Case Study; Security; Exploit (Computer Security); Computer Security Incident Management | IBM Cybersecurity Analyst | 7 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [2.3, 8.2] | French; Portuguese; Russian; Spanish | English | information-technology | security | ||||||
97 | IBM Cybersecurity Analyst Assessment | IBM | Advanced | 4,8 | 4,4 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role. \n\nYou will be expected to pass a final assessment quiz for each of the seven (7) prior courses within the IBM Cybersecurity Analyst Professional Certificate.\n\nUpon successful completion of the quizzes, you will acquire the IBM Cybersecurity Analyst Professional Certificate. | Security; Cyber Security Standards; Information Security; Penetration Test; Network Security; Python Programming; Network Engineering; Web Application Security; Security Compliance; Computer Networking | IBM Cybersecurity Analyst | 8 | A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.\n\nCybersecurity is one of the most in-demand career fields.\n\n● According to CyberSeek, from June 2019 through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs.\n\n● The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers.\n\nThis program is suitable for learners entering the workforce and professionals switching careers. You should be comfortable working with computers, be willing to develop new technical skills, and enjoy collaborative problem solving and communicating solutions.\n\nBy the end of this program, you will have completed a real-world security breach hands-on project and applied concepts through industry tool virtual labs to provide you with the confidence to start a career in cybersecurity. | [1.6, 5.9] | None | English | information-technology | security | ||||||
98 | Introduction to Cloud Computing | IBM | Beginner | 9 | 4,7 | This course introduces you to the core concepts of cloud computing. You gain the foundational knowledge required for understanding cloud computing from a business perspective as also for becoming a cloud practitioner. You understand the definition and essential characteristics of cloud computing, its history, the business case for cloud computing, and emerging technology usecases enabled by cloud. We introduce you to some of the prominent service providers of our times (e.g. AWS, Google, IBM, Microsoft, etc.) the services they offer, and look at some case studies of cloud computing across industry verticals. \n\nYou learn about the various cloud service models (IaaS, PaaS, SaaS) and deployment models (Public, Private, Hybrid) and the key components of a cloud infrastructure (VMs, Networking, Storage - File, Block, Object, CDN). We also cover emergent cloud trends and practices including - Hybrid Multicloud, Microservices, Serverless, DevOps, Cloud Native and Application Modernization. And we go over the basics of cloud security, monitoring, and different job roles in the cloud industry. \n\nEven though this course does not require any prior cloud computing or programming experience, by the end of the course, you will have created your own account on IBM Cloud and gained some hands-on experience by provisioning a cloud service and working with it.\n\nThis course is suitable for a large variety of audiences - whether you are an executive / manager / student who wants to become familiar with cloud computing terminology and concepts, or someone who wants foundational grounding in cloud computing to start a career in this field or become a cloud practitioner - such as a cloud engineer, developer, analyst, etc.\n\nThe completion of this course also makes you eligible to earn the Cloud Computing Core IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/introduction-to-cloud-computing | Cloud Computing; Cloud Storage; Cloud Infrastructure; IBM Cloud; Security; Cloud Computing Security; Architecture; Cloud Computing Architecture; DevOps; Microservices | IBM Full Stack Cloud Developer | 1 | This Professional Certificate will equip you with all the key skills and technical know-how to kickstart your career as a Full-Stack Cloud Native Application Developer. Guided by experts at IBM, you will learn to build your own cloud-based applications and practice working with the technologies behind them. This program consists of 10 courses with ample instructional content as well as hands-on exercises and projects designed to hone your skills and help you build your portfolio.\n\nNo prior programming experience or Cloud background is required to start this program. You'll skill up with the tools and technologies that successful software developers use to build, deploy, test, run, and manage Full Stack Cloud Native applications, giving you the practical skills to begin a new career in a highly in-demand area.\n\nThe courses in this program will help you develop skill sets in a variety of technologies including: Cloud foundations, HTML, CSS, JavaScript, GitHub, Node.js, React, Cloud Native practices, DevOps, CI/CD, Containers, Docker, Kubernetes, OpenShift, Istio, Python programming, Databases, SQL, NoSQL, Django ORM, Bootstrap, Application Security, Microservices, Serverless computing, and more.\n\nAfter completing all the courses in the program, including the capstone project, you will have developed several applications using front-end and back-end technologies and deployed them on a cloud platform using Cloud Native methodologies. | [3.2, 12.4] | Spanish; French; Portuguese; Italian; Vietnamese; German; Russian; Arabic | English | information-technology | cloud-computing | ||||||
99 | Introduction to Cloud Development with HTML, CSS, JavaScript | IBM | Beginner | 9,5 | 4 | Want to take the first steps to become a Cloud Application Developer? This course will lead you through the languages and tools you will need to develop your own Cloud Apps.\n\nBeginning with an explanation of how internet servers and clients work together to deliver applications to users, this course then takes you through the context for application development in the Cloud, introducing front-end, back-end, and full-stack development.\n\nYou’ll then focus on the languages you need for front-end development, working with HTML, CSS, and JavaScript.\n\nFinally, you will discover tools that help you to store your projects and keep track of changes made to project files, such as Git and GitHub. | Html; CSS; Javascript; Web Development; Distributed Version Control; Front And Back Ends; Version Control; Cloud Computing; DevOps; IBM Cloud | IBM Full Stack Cloud Developer | 2 | This Professional Certificate will equip you with all the key skills and technical know-how to kickstart your career as a Full-Stack Cloud Native Application Developer. Guided by experts at IBM, you will learn to build your own cloud-based applications and practice working with the technologies behind them. This program consists of 10 courses with ample instructional content as well as hands-on exercises and projects designed to hone your skills and help you build your portfolio.\n\nNo prior programming experience or Cloud background is required to start this program. You'll skill up with the tools and technologies that successful software developers use to build, deploy, test, run, and manage Full Stack Cloud Native applications, giving you the practical skills to begin a new career in a highly in-demand area.\n\nThe courses in this program will help you develop skill sets in a variety of technologies including: Cloud foundations, HTML, CSS, JavaScript, GitHub, Node.js, React, Cloud Native practices, DevOps, CI/CD, Containers, Docker, Kubernetes, OpenShift, Istio, Python programming, Databases, SQL, NoSQL, Django ORM, Bootstrap, Application Security, Microservices, Serverless computing, and more.\n\nAfter completing all the courses in the program, including the capstone project, you will have developed several applications using front-end and back-end technologies and deployed them on a cloud platform using Cloud Native methodologies. | [5.7, 12.1] | None | English | information-technology | cloud-computing | ||||||
100 | Introduction to Containers w/ Docker, Kubernetes & OpenShift | IBM | Beginner | 10,3 | 4 | After completing this course, you will be able to build applications in a cloud native way using containerization tools and technologies, and deploy your applications in any public, private or hybrid cloud at incredible scale. This course introduces you to containers and explains how containers differ from virtual machines. It also covers the importance of containers in cloud computing, as well as the emerging ecosystem of related technologies such as Docker, Kubernetes, Red Hat OpenShift, and Istio.\n\nThroughout the course you will apply what you learn with hands-on labs. From getting started with Docker, to orchestration and scaling with Kubernetes, and simplifying deployments with OpenShift. The labs are performed using your web browser on IBM Cloud and Skills Network Labs environments, that are made available to you at no charge. in the project at the end of the course you will build a container image and deploy and scale it on Cloud using OpenShift. \n\nContainerization is likely the most significant invention in IT since the introduction of virtualization. Open source projects like Kubernetes and products like Red Hat OpenShift have become standards for people looking to deploy and manage containers at scale. Everyone from small startups to large multinational corporations is transitioning to these technologies, and they are looking for people who are skilled in these areas.\n\nThis course is of interest to anyone who wants to be a cloud practitioner - cloud developers, cloud architects, cloud system engineers, devops engineers, cloud networking specialists and many other roles. The material also serves the needs of those who perform the tasks of advising, consulting, building, moving and managing cloud solutions.\n\nThere are no hard requirements needed to be able to take this course other than basic computer literacy, and a foundation level understanding of Cloud Computing. | Openshift; Software; Docker (Software); Kubernetes; Microservices; Cloud Computing; Control Plane; Information Sensitivity; Software Engineering; DevOps | IBM Full Stack Cloud Developer | 5 | This Professional Certificate will equip you with all the key skills and technical know-how to kickstart your career as a Full-Stack Cloud Native Application Developer. Guided by experts at IBM, you will learn to build your own cloud-based applications and practice working with the technologies behind them. This program consists of 10 courses with ample instructional content as well as hands-on exercises and projects designed to hone your skills and help you build your portfolio.\n\nNo prior programming experience or Cloud background is required to start this program. You'll skill up with the tools and technologies that successful software developers use to build, deploy, test, run, and manage Full Stack Cloud Native applications, giving you the practical skills to begin a new career in a highly in-demand area.\n\nThe courses in this program will help you develop skill sets in a variety of technologies including: Cloud foundations, HTML, CSS, JavaScript, GitHub, Node.js, React, Cloud Native practices, DevOps, CI/CD, Containers, Docker, Kubernetes, OpenShift, Istio, Python programming, Databases, SQL, NoSQL, Django ORM, Bootstrap, Application Security, Microservices, Serverless computing, and more.\n\nAfter completing all the courses in the program, including the capstone project, you will have developed several applications using front-end and back-end technologies and deployed them on a cloud platform using Cloud Native methodologies. | [7.4, 12.4] | Arabic; French; Portuguese; Italian; Vietnamese; German; Russian; Spanish | English | information-technology | cloud-computing |