
New York University (NYU) Courses
New York University is a private, nonsectarian American research university based in New York City. NYU's main campus is located at Greenwich Village in Lower Manhattan

New York University is a private, nonsectarian American research university based in New York City. NYU's main campus is located at Greenwich Village in Lower Manhattan
In Creative Coding, students learn to design and create media using object-oriented programming as a medium for design, art, and games. With a strong focus on creating interactive experiences for the web, the course moves past the sequential problem solving found in typical beginner programming and coding courses, so that designers and creatives can apply programming concepts to work in a variety of media, such as 2D graphics, animation, image and video processing. By the end of this course, students will be able to read and write javascript for creative and design applications. Whether you are a graphic designer, UX/UI designer, web designer, or accessibility designer, this course will arm you with fundamental coding skills using javascript and other languages as a method of expression.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes. Cyber Security SafeguardsThis module provides an introduction to security modeling, foundational frameworks, and basic safeguard approaches.Understanding Authentication ProtocolsThis module introduces important protocols and techniques associated with advanced authentication processes. Introducing Conventional CryptographyThis module introduces the foundations of conventional cryptography along with its practical application in Kerberos.Overview of Public Key Cryptographic MethodsThis module introduces the basics of public key cryptography including an overview of SSL and CA applications.
Knowledge of media law is crucial for creative and design professionals. This course explores a comprehensive range of topics and models, such as privacy and art, the Digital Millennium Copyright Act, Open Source public license, Creative Commons, Digital Rights Management, as well as working definitions of Fair Use and the practical limits of sampling/mixing in different idioms and economic sectors.
This is the 7th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.Information Security - Introduction to Information SecurityInformation Security - Authentication and Access ControlInformation Security - Advanced TopicsNetwork Security - Introduction to Network SecurityNetwork Security - ProtocolsNetwork Security - Advanced TopicsPenetration Testing - Discovering VulnerabilitiesPenetration Testing - ExploitationPenetration Testing - Post ExploitationThese topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.This is a self-paced course that begins the development of ethical hacking skills. The curriculum provides an introduction to penetration testing topics. Among the topics covered are an introduction to Penetration Testing Methodologies, Recognisance, and Enumeration for Penetration Testers, Scanning, and Vulnerability Enumeration. The class starts with an overview of penetration testing and the phases of a penetration test. The 1st phase is Scoping. In the scoping stage, the students learn to outline the test's logistics, expectations, legal implications, objectives, and goals.The next phase of the penetration tests is reconnaissance. Reconnaissance or Open Source Intelligence (OSINT) gathering is an essential first step in penetration testing. A penetration tester works on gathering as much intelligence on the target organization and the potential system targets for exploitation.Students will gain hands-on experience scanning for targets and vulnerabilities. The class concludes with threat modeling and vulnerability identification. During the threat modeling and vulnerability identification phase, the tester identifies targets and maps the attack vectors. Any information gathered during the Reconnaissance phase is used to inform the attack method during the penetration test.Industry Certification PreparationThis program covers much of the material that is assessed on the CompTIA’s Security+ certification exam. Upon program completion, verified track learners will receive a 36% discount code for the CompTIA Security+ exam.
Open justice is a growing movement to use new technologies, including big data, digital platforms, blockchain and more, to improve our legal system by making the workings of our legal institutions easier to understand, scrutinize and, we hope, improve. Thanks to new tools the opportunity to make improvements has never been greater. This course is designed to help the public entrepreneur – passionate individuals like you. Whether you are a lawyer, a judge, a technologist or just a concerned citizen – the course will help you to use new technologies to take action to increase efficiency, improve equity, fight corruption and enhance legitimacy in the third branch of government.Instead of long lectures, this online course consists of ten short modules which will serve as brief introductions to different aspects of open justice. These ‘mini-lectures’ of ten minutes each are combined with interviews with leading practitioners from around the world who are collecting the data, conducting the analysis, creating the apps, and building the movement that helps us all to better know and assert our rights.We wish to acknowledge the Commission of the Mexican Federal Electoral Court as the founder of this MOOC.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course aims at providing an introductory and broad overview of the field of ML with the focus on applications on Finance. Supervised Machine Learning methods are used in the capstone project to predict bank closures. Simultaneously, while this course can be taken as a separate course, it serves as a preview of topics that are covered in more details in subsequent modules of the specialization Machine Learning and Reinforcement Learning in Finance.The goalof Guided Tour of Machine Learning in Finance is to get a sense of what Machine Learning is, what it is for and in how many different financial problems it can be applied to.The course is designed for three categories of students:Practitioners working at financial institutions such as banks, asset management firms or hedge fundsIndividuals interested in applications of ML for personal day tradingCurrent full-time students pursuing a degree in Finance, Statistics, Computer Science, Mathematics, Physics, Engineering or other related disciplines who want to learn about practical applications of ML in FinanceExperience with Python (including numpy, pandas, and IPython/Jupyter notebooks), linear algebra, basic probability theory and basic calculus is necessary to complete assignments in this course.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.
This is a self-paced course that provides an Introduction to NetworkingCourse topics include:Overview of computer networkingApplication layerTransport layerNetwork layerLink layerOverview of network securityCourse Outline:Week 1 - Overview of computer networking Week 2 - Application layerWeek 3 - Transport layerWeek 4 - Network layerWeek 5 - Link layerWeek 6 - Overview of network securityWeek 7 - Exam
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course gives you access to an exploration of physiological systems from the perspective of overall health and wellness. In particular, a focus on yoga, meditation and mindfulness as a therapeutic intervention in chronic illness and long term treatment. This course is intended for yoga practitioners and teachers, as well as college students and medical practitioners looking for a deeper understanding of the physiological benefits of yoga. The value of taking this course is to understand the impact that yoga can have on reducing stress, and aiding in healing or preventing physiological pathologies. Throughout this course, we will learn about different physiological systems and highlight yoga practices that can influence different systems and reduce pathology. Reading material will include analysis of scientific studies that have successfully utilized yoga practice as a tool for treatment of various illnesses such as: hypertension, stress, diabetes, insomnia, chronic pain and PTSD. In order to understanding these conditions, lectures will provide a complete understanding of the correlating physiological system. The weekly course assignment will include physiology lectures,a weekly yoga practice, suggested readings,and optional discussions for a total of 3-5 hours per week. The course will provide a tremendous amount of information andhands on experience for those interested in alternative health perspectives and a more in depth scientific understanding of this ancient healing method.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis specialization provides learners with the necessary knowledge and practical skills to develop a strong foundation in information visualization and to design and develop advanced applications for visual data analysis.The specialization is characterized by two main complementary features: (1) providing a strong understanding of visual perception and the theory of visual encoding to design and evaluate innovative visualization methods; (2) providing the necessary skills to develop advanced web-based applications for visual data analysis.The specialization is organized around four courses that cover fundamentals, applied perception, advanced visualization method and interactive visualization.The specialization is meant to prepare students to work on complex data science projects that require the development of interactive visual interfaces for data analysis. The courses can also be taken individually to improve relevant skills in visualization. For instance, the course on applied perception provides unique skills to evaluate and design innovative visualization in all sorts of scenarios.
This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.Information Security - Introduction to Information SecurityInformation Security - Authentication and Access ControlInformation Security - Advanced TopicsNetwork Security - Introduction to Network SecurityNetwork Security - ProtocolsNetwork Security - Advanced TopicsPenetration Testing - Discovering VulnerabilitiesPenetration Testing - ExploitationPenetration Testing - Post ExploitationThese topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.This is a self-paced course that provides a continuation of information security and cybersecurity topics. Among the topics covered are Introduction to Cryptography, Authentication, Access Control, and Containerization. Students learn about both symmetric and asymmetric encryption and their uses. We also take a look at one-way hashing and how it differs from encryption. We drill into ways that encryption is used in PKI and Digital Certificates. Next, we tackle authentication. Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem verifies that a given artifact was produced by a particular person or a specific place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Next, we move on to different access control mechanisms. We then drill into the implementation details of access control in several other operating systems. We follow up with a deep dive into compatibility based access control mechanisms. Finally, we look at access control in virtual machines (VM), virtualization, and containerization. We look into how the operating system achieves access control, and whether these methods are sufficient.Industry Certification PreparationThis program covers much of the material that is assessed on the CompTIA’s Security+ certification exam. Upon program completion, verified track learners will receive a 36% discount code for the CompTIA Security+ exam.
This course provides details on how card payments are processed, including differences between older ‘magnetic stripe’ transactions and newer EMV (or ‘chip’) based transactions. Using this as a base, the course outlines specifically how payment solutions are being implemented around the world on smartphones and mobile devices, the differences between mobile acceptance and mobile issuance, and how other types of payment methods and payment processes may be implemented on these devices. This includes discussions of tokenization and token service providers, their relationship to financial institutions and merchants, as well as card transactions using card readers, contactless payments, and the rise of mobile apps, mobile wallets, and the ledger systems that are often used to manage these processes. Topics of mobile security, security standards, cryptography, protection of sensitive data, potential data breaches, malware, and key management are touched upon at a high level, but primary focus is provided to the mobile payments eco-system and implementations.
This is the 3rd course in the intermediate, undergraduate-level offering that makes up the larger Programming and Data Structures MicroBachelors program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.Introduction to Programming in C++Advanced Programming in C++Introduction to Data StructuresAdvanced Data StructuresThese topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.This is a self-paced course that continues in the development of C++ programming skills. Among the topics covered is the development of more advanced command-line programs that utilize Pointers, Dynamic Storage, Recursion, Searching, Sorting to solve problems. Students learn how to use and program these data structures through the lectures and the labs. C++ programming material is presented over eight weeks of interactive lectures with quizzes to assess your understanding of the material Students will experience hands-on practice writing C++ programs through fourteen lab challenges.Students will not only learn to use data structures to organize, manage, and storage in formats that enable efficient access and modification. A data structure is a collection of data values, the relationships among them, and the functions or operations that can be applied to the data.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course aims at introducing the fundamental concepts of Reinforcement Learning (RL), and develop use cases for applications of RL for option valuation, trading, and asset management. By the end of this course, students will be able to- Use reinforcement learning to solve classical problems of Finance such as portfolio optimization, optimal trading, and option pricing and risk management.- Practice on valuable examples such as famous Q-learning using financial problems.- Apply their knowledge acquired in the course to a simple model for market dynamics that is obtained using reinforcement learning as the course project.Prerequisites are the courses "Guided Tour of Machine Learning in Finance" and "Fundamentals of Machine Learning in Finance". Students are expected to know the lognormal process and how it can be simulated. Knowledge of option pricing is not assumed but desirable.
Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreePerformance Studies: An Introduction explores the wide world of performance--from theatre, dance, and music to ritual, play, political campaigns, social media, and the performances of everyday life. Performance studies also ranges across cultures--Asia, Africa, the Caribbean, Europe, the Americas. And it spans historical periods from the art of the paleolithic caves to YouTube and the avantgarde. This course is devised by Richard Schechner, one of the pioneers of performance studies, in dialogue with more than a dozen expert scholars and artists. Performance Studies: An Introduction puts students in dialogue with the most important ideas, approaches, theories, and questions of this dynamic, new academic field.Learning ObjectivesBy the end of this course, you should be able to:Articulate and analyze the major concepts of performance studiesIdentify and analyze performances within the “broad spectrum of performance”--from everyday life and social media to performance art and global spectacles such as the OlympicsComprehend key terms of performance studies, including is/as performance, restored behavior, ritual, play, make-belief/make-believe, performance in everyday life, the performative, and intercultural performanceProduce collaborative work that demonstrates teamwork in applying ideas learned in the courseCompare, analyze, and interpret performances of their own and other culturesArticulate how the major concepts of the course relate to their own experiences and worldviewsAnalyze and criticize in a constructive way the work of classmatesThe lessons present Schechner’s concept of performance studies along with online assignments. In the assignments, students apply what they are learning by composing short responses to materials, writing in their NYU Classes Forums, and by reviewing other students’ forum posts each week.Students choose either to work in groups of 3 to 5 on a term-long project maintaining a project portfolio in NYU Classes or to write a research paper. During the term, each group will lead an in-class 25-minute discussion of their project-in-progress. During the last face-to-face class, each group will present their project.The weekly content is: What is Performance?What is Performance Studies?Performance ProcessesFrom Not Performing to PerformingRitualPlayPerforming in the PaleolithicRamlila of RamnagarThe Performing BrainPerformativityConstructing Social RolesSocial MediaIntercultural, Transcultural, GlobalGroup Projects & Wrap UpCourse RequirementsEach student is required to complete the week’s online lesson prior to the class session, attend and participate in the class sessions, complete the weekly assignments, participate and present the group project or submit a final paper.Required ReadingsSee weekly online lessons.Required Viewings (Videos)See weekly online lessons.Written workEach student will either participate in a group project or write a research paper due at the end of the term, submitted electronically. Your professor will confer online and/or face-to-face during office hours to help students develop their writing and their projects. If you do a group project your professor may ask you to do some writing in relationship to your project.Academic IntegrityThe policy on plagiarism and academic honesty is posted on Classes. Read this document carefully, and be guided by it.CopyrightKeep in mind the material you find in the online lessons is subject to copyright. You may not reproduce, reuse, or distribute it without permission outside of your work in this course. For more information on copyright and how it applies to course materials, see the Copyright Basics research guide.