Edukatico will keep you updated from time to time. (You can stop this at any time.)
Choose filter settings here or enter a search term above.
This course introduces the design and implementation of Android applications for mobile devices. Students will build upon concepts from the prior course, including handling...
This online course program gives an overview of how to successfully manage construction projects. It includes topics such as general contracting, construction management,...
This course assists aspiring and active entrepreneurs in developing great ideas into great companies. With strong economies presenting rich opportunities for new venture...
This online course gives an introduction to quantum physics with emphasis on topics at the frontiers of research.
This online course provides an overview of the challenges posed by fire as well as the fire safety solutions that are available to meet those challenges.
This course series covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use...
This online course series teaches how to design, implement, and manage cloud computing systems.
This online course helps participants to learn how to navigate the barriers to creating, developing, and sustain innovative new businesses and programs within established...
This course focuses on how to design and build secure systems with a human-centric focus. It will look at basic principles of human-computer interaction, and apply these...
This online course explores the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and...
This series of online courses explores Scrum and the principles of Agile project management.
In this course participants will e.g. learn how to use survey weights to estimate descriptive statistics, like means and totals, and more complicated quantities like model...
This course will explore the foundations of software security. It will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL...
We use cookies, primarily to offer a great user experience and to further improve our website.
You can change your individual cookie settings here: