Edukatico will keep you updated from time to time. (You can stop this at any time.)
Choose filter settings here or enter a search term above.
Dieser Online-Kurs erläutert die Grundlagen der strategischen Vorausschau, unter anderem anhand der Szenariotechnik.
This online course explores the ethical considerations regarding the privacy and control of consumer information and big data.
This module is the second of three modules that compose the full course. In this part, students are invited to follow the Pilgrim Dante, who emerges with Virgil onto the Isle of...
Dieser Online-Kurs gibt eine Einführung in die agile Entwicklung.
Dieser Online-Kurs enthält grammatische Strukturen in wissenschaftssprachlichen Texten auf dem Sprachniveau C1.
In this online course, participants will learn how to evaluate deductive arguments for validity. In particular, they will learn new ways of representing the information that is...
This online course explores innovations in CAD and digital manufacturing. The course will also explain the key concepts behind the Autodesk tool.
Dieser Kurs richtet sich an Sie, wenn Sie eine grundlegende Einführung in die Logogestaltung suchen.
This online course series gives an introduction to North Indian Classical Music.
Lernen Sie, wie man mit Amazon Alexa eigene Skills für den Echo, den Echo Dot und kompatible Geräte programmiert.
This course discusses the principles of care management.
This online course gives an introduction to Virtual Reality (VR) and 360 video production.
In this course the following topics are discussed: cardiovascular pharmacology, cardiovascular diseases, disorders of the endocard and hypertension.
This course teaches about the TCP/IP stack, IP addressing, DNS, and other protocols that underlie the Web technologies in use.
Füllen Sie für den täglichen Führungs-Balanceakt Ihren Arbeitsmethodik-Werkzeugkoffer, um Ihre Zeit, Aufgaben, Informationen und Ihre Mitarbeiter effektiv und effizient zu managen.
This is an online lecture about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for...
We use cookies, primarily to offer a great user experience and to further improve our website.
You can change your individual cookie settings here: