Free Online

University of Colorado System Courses

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.

Show filters

Level

Duration

Subject

Language

Clinical Data Science

Clinical Data Science

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeAre you interested in how to use data generated by doctors, nurses, and the healthcare system to improve the care of future patients? If so, you may be a future clinical data scientist!This specialization provides learners with hands on experience in use of electronic health records and informatics tools to perform clinical data science. This series of six courses is designed to augment learner’s existing skills in statistics and programming to provide examples of specific challenges, tools, and appropriate interpretations of clinical data.By completing this specialization you will know how to: 1) understand electronic health record data types and structures, 2) deploy basic informatics methodologies on clinical data, 3) provide appropriate clinical and scientific interpretation of applied analyses, and 4) anticipate barriers in implementing informatics tools into complex clinical settings. You will demonstrate your mastery of these skills by completing practical application projects using real clinical data.This specialization is supported by our industry partnership with Google Cloud. Thanks to this support, all learners will have access to a fully hosted online data science computational environment for free! Please note that you must have access to a Google account (i.e., gmail account) to access the clinical data and computational environment.

Coursera
30 weeks long, 2 hours a week
view all
Toledo: Deciphering Secrets of Medieval Spain

Toledo: Deciphering Secrets of Medieval Spain

5

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course evaluates the medieval history of Toledo from the era of the Visigoth Kingdom (6th-8th centuries) through its Islamic period (8th to 11th centuries) and into its reintegration into Christian Spain (after 1085 c.e.) In particular, we take note of the cultural and religious transformations that characterized the city with a special effort to understand how many peoples and religions came to settle and live amongst one another. We will virtually-tour the Islamic and Christian structures of the Museo de Santa Cruz, Iglesia de San Román, Sinagoga del Tránsito, Mezquita de Bab al-Mardum, Archivo Municipal de Toledo, and the Archivo Historico de la Nobleza.We examine the Visigoths transition from Christian Arianism to Catholicism and the harsh treatment of the Jewish population. We explore Islamic governance and development of the medieval city of three faiths, with a special interest in its cultural achievements. We will study King Alfonso “The Wise” (1252-1284)’s efforts to characterize himself as the “king of three religions” via his legal codices, the creation of the Cantigas de Santa María, and his intellectual endeavor known as the Toledo School of Translators. We evaluate the robust Jewish and converso noble families of the city and appreciate their intellectual, religious, and economic contributions to Castilian life. We will bear witness to the rise of anti-Jewish blood purity statutes, the creation of the Inquisition, and the expulsion of the Jews. We also briefly introduce and study Spanish manuscripts from the municipal and cathedral archives to make new scholarly breakthroughs relating to the Jewish, Christian, and Muslim interrelations.No knowledge of Spanish is needed to participate in the course or in our transcription efforts.

Coursera
6 weeks long, 37 hours worth of material
past
view all
Software Design Threats and Mitigations

Software Design Threats and Mitigations

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe design step in developing software has some unique characteristics.First of all, it’s the only step where drawing pictures of things is the norm.Why is that?What do pictures do that other representations cannot do?Pictures have varying levels of detail; pictures have context.Pictures…paint a picture.Why are these things important?In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

Coursera
8 weeks long, 19 hours worth of material
ongoing
view all
Newborn Capstone

Newborn Capstone

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeCongratulations! You progressed your way through all four of the Newborn Baby Care courses, each with their own focal points on the many dimensions of maintaining newborn health in the first month of life. Now we arrive at a crucial part of your learning –the Newborn Baby Care Capstone- Case Studies, which is your opportunity to take what you have learned and synthesize, integrate, and apply what you know to a series of case studies. Interacting with these real-life scenarios will help you retain the specialization content and be ready to put it into practice in your own care-providing environment.Together we will experience key moments of the courses, this time through the lens of case studies. We will begin with addressing jaundice and performing screenings and assessments covered in Course 1. From there we will consider case studies for both heart and lung health representing Course 2. Then we will enter new territory, the first doctor’s visit once baby has gone home. Here you will bring together elements from Courses 3 and 4, assessing baby and also main care providers. No matter what capacity you do or will provide newborn baby care, the experience of this final capstone course will positively impact your understanding and ability to put that understanding into practice. The newborns, families, and other care providers you engage with will benefit greatly from your efforts.A newborn baby is an amazing beautiful life filled with hope.There is so much that goes into making sure that babies are born healthy, and so much more to think about after they are born.Whether you are in the health care field, or even a parent, this course is the perfect educational opportunity for you to keep newborn babies healthy in the days and weeks after they are born!

Coursera
5 weeks long, 16 hours worth of material
ongoing
view all
C++ Class Development

C++ Class Development

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course is the third course in the specialization about learning how to develop video games using the C++ programming language and the Unreal game engine on Windows or Mac. This course assumes you have the prerequisite knowledge from the previous two courses in the specialization. You should make sure you have that knowledge, either by taking those previous courses or from personal experience, before tackling this course. Throughout this course you'll continue building your foundational C++ and Unreal knowledge by exploring more C++ and Unreal topics.Module 1: Learn how abstraction helps us develop good software and design and implement console app classesModule 2: Explore how functions really work "under the covers"Module 3: Design and implement Unreal classes and include them in a game. Discover how strings work in both C++ and in an Unreal HUDModule4: Expand your understanding of pointers and add sound effects to an Unreal game

Coursera
4 weeks long, 18 hours worth of material
past
view all
C# Class Development

C# Class Development

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course is the third course in the specialization about learning how to develop video games using the C# programming language and the Unity game engine on Windows or Mac. Why use C# and Unity instead of some other language and game engine? Well, C# is a really good language for learning how to program and then programming professionally. Also, the Unity game engine is very popular with indie game developers; Unity games were downloaded 16,000,000,000 times in 2016! Finally, C# is one of the programming languages you can use in the Unity environment.This course assumes you have the prerequisite knowledge from the previous courses in the specialization. You should make sure you have that knowledge, either by taking those previous courses or from personal experience, before tackling this course. Throughout this course you'll continue building your foundational C# and Unity knowledge by exploring more C# and Unity topics.The material in this and the previous two courses is essentially our first programming course for Game Design and Development majors at UCCS.Module 1: Learn about abstraction and how we can use it to design and implement console application classesModule 2: Learn more about how methods and parameters workModule 3: Learn how we can use abstraction to design and implement Unity classesModule 4: Add text output (like score!) and sound effects to your Unity games“Unity” is a trademark or registered trademark of Unity Technologies or its affiliates in the U.S. and elsewhere.This course is an independent work and is not sponsored by, authorized by, or affiliated with Unity Technologies or its affiliates

Coursera
4 weeks long, 28 hours worth of material
past
view all
Windows Server Management and Security

Windows Server Management and Security

4.5

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeMicrosoft Windows has been at the forefront of enterprise computing for several decades.What most office workers see is the desktop side – such as Windows 7, 8 or 10.This course explores what it takes to design and build the server side of Windows in an enterprise environment.This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself.This course is the second course in the System Management and Security Specialization focusing on enterprise system management.The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world.Week 2 of the course will show you how Windows users interact with the system.At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2.Week 3 will explore authorization in a Windows environment.At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment.Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.

Coursera
5 weeks long, 12 hours worth of material
upcoming
view all
C# Programming for Unity Game Development

C# Programming for Unity Game Development

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis specialization is intended for beginning programmers who want to learn how to program Unity games using C#. The first course assumes no programming experience, and throughout the 5 courses in the specialization you'll learn how to program in C# and how to use that C# knowledge to program Unity games. The C# and Unity material in the first 4 courses in the specialization is slightly more comprehensive than the content in the first 2 game programming courses at UCCS.“Unity” is a trademark or registered trademark of Unity Technologies or its affiliates in the U.S. and elsewhere.The courses in this specialization are independent works and are not sponsored by, authorized by, or affiliated with Unity Technologies or its affiliates

Coursera
21 weeks long, 6 hours a week
view all
Burgos: Deciphering Secrets of Medieval Spain

Burgos: Deciphering Secrets of Medieval Spain

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis advanced course focuses on two primary goals: (1) appraising how Jews, Christians, and Muslims shaped the history of medieval Spain and (2) mastering the craft of Spanish paleography, the skill of identifying Spanish handwriting in the 11th- through 15th-century manuscripts. Through the lens of the medieval history of Burgos, we dedicate 75% percent of our efforts to developing pragmatic expertise in the interpretation of Carolingian/French/Gothic handwriting. Specifically, the course explores how the royal Castilian city of Burgos influenced, and was influenced by, Jews, Christians, and Muslims. We closely evaluate the Spanish Christian Reconquest, the Plague and the 14th-century Castilian civil war, anti-Jewish pogroms, the emergence of elite conversos (Jewish converts to Christianity), and the role of the king and Roman Catholic Church in the creation of Catholic Spain. Through onsite interviews in archives and museums in Burgos, we experience the medieval city, artifacts, and manuscripts. While we teach using Spanish manuscripts, very little or no knowledge of the Spanish language is necessary to complete the course.Using an intensive array of paleography practices, exams, independent projects, and collaborative efforts, you will garner exceptional skills that you can apply to interpreting any medieval European handwriting. To demonstrate your mastery of paleography you will (1) create a 14th-15th-century alphabet, numeral, and abbreviation guide using manuscript images, and (2) transcribe one selection from a medieval manuscript.

Coursera
5 weeks long, 45 hours worth of material
ongoing
view all
Packet Switching Networks and Algorithms

Packet Switching Networks and Algorithms

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this course, we deal with the general issues regarding packet switching networks. We discuss packet networks from two perspectives. One perspective involves external view of the network, and is concerned with services that the network provides to the transport layer that operates above it at the end systems. The second perspective is concerned with the internal operation of a network, including approaches directing information across the network, addressing and routing procedures, as well as congestion control inside the network.

Coursera
5 weeks long, 18 hours worth of material
ongoing
view all
Cryptographic Hash and Integrity Protection

Cryptographic Hash and Integrity Protection

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.This course is a part of the Applied Cryptography specialization.

Coursera
4 weeks long, 8-9 hours worth of material
ongoing
view all
Classical Cryptosystems and Core Concepts

Classical Cryptosystems and Core Concepts

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Introduction to Applied Cryptography.Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market.Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity Course 1, Classical Cryptosystems, introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.

Coursera
3 weeks long, 12 hours worth of material
ongoing
view all
Fundamentals of Network Communication

Fundamentals of Network Communication

5

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this course, we trace the evolution of networks and identify the key concepts and functions that form the basis for layered architecture. We introduce examples of protocols and services that are familiar to the students, and we explain how these services are supported by networks. Further, we explain fundamental concepts in digital communication, and focus on error control techniques that include parity check, polynomial code, and Internet checksum. Students will be required to have some previous programming experience in C-programming (C++/Java), some fundamental knowledge of computer organization and IT architecture and a background in computer science is a plus.

Coursera
5 weeks long, 15 hours worth of material
ongoing
view all
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction.I look forward to working with you in the coming lessons.Best wishes and good luck!Course 1: Homeland Security & Cybersecurity ConnectionCourse 2: Cybersecurity Policy for Water and Electricity InfrastructuresCourse 3: Cybersecurity Policy for Aviation and Internet InfrastructuresCourse 4: Homeland Security & Cybersecurity Future

Coursera
4 weeks long, 11 hours worth of material
past
view all
Cryptography and Information Theory

Cryptography and Information Theory

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeWelcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.This course is a part of the Applied Cryptography specialization.Cryptography OverviewThis module defines the technical terms in cryptography and introduce Alice, Bob, and Eve. To study the attacker Eve's perspective, we will describe Kerckhoff's Principle ("the attacker knows the system"), which defines the scope of the attacker knowledge (what is secret vs. what the attacker can know). We will also describe Security by Obscurity, which contrasts Kerckhoff's Principle. Information EntropyThis module studies information entropy to quantify randomness. Information entropy can be used to measure the strength of the key or the secret information that determines the security of a cryptosystem against an attacker who does not know the random key. Brute-Force Attack and CryptanalysisThis module studies the attacker view whose objective is to learn the key and break the cryptographic protection using the key. First, we will define brute force attack and describe how to quantify the attacker effort for brute force attack. Next, we will contrast cryptanalysis and brute force attack. Lastly, we will discuss about perfect secrecy, which is immune to cryptanalysis and is a strong notion of security derived from information theory. Computational Security and Side-Channel AttackThis module studies cryptography from the practical point of view. We will first define computational security, which relies on the fact that real world attackers are computationally limited unlike information theoretic security, e.g., one-time pad. We will then survey side channel attacks and unintentional information leakage from the physical implementations of cryptosystems.

Coursera
4 weeks long, 7-8 hours worth of material
ongoing
view all
Load more

Level

Duration

Language