Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "apply and evaluate data mining methods"
University of Toronto
Skills you'll gain: Bioinformatics, Network Analysis, Research Reports, Molecular Biology, Molecular, Cellular, and Microbiology, Biology, Analysis, Data Analysis, Data Synthesis, Big Data, Statistical Methods, Data Visualization Software, Data Analysis Software, Data Mining, Experimentation, Scientific Visualization, Life Sciences, Interactive Data Visualization, Statistical Analysis, Databases
Skills you'll gain: Bash (Scripting Language), Unit Testing, Scripting, Unix Shell, Shell Script, Linux Commands, Test Driven Development (TDD), Unix Commands, Unix, Scripting Languages, Development Environment, Operating Systems, Command-Line Interface, File Management, OS Process Management, Automation, Debugging, Python Programming
University at Buffalo
Skills you'll gain: Electrical Substation, Electrical Power, Electric Power Systems, Electrical Systems, Environmental Regulations, Energy and Utilities, Basic Electrical Systems, Electrical Safety, Safety Training, Electrical Equipment, Occupational Safety and Health Administration (OSHA), Low Voltage, Hazard Communication (HazCom), Environment Health And Safety, Workforce Development, Economics, Construction, Project Design, Environment, Environmental Engineering
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, OpenAI, Large Language Modeling, Image Analysis
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments
University of Michigan
Skills you'll gain: Blockchain, Emerging Technologies, FinTech, Market Dynamics, Digital Assets, Cryptography, Technical Analysis, Business Solutions, Business Analysis, Payment Systems, Algorithms, Distributed Computing
Coursera Project Network
Skills you'll gain: Pandas (Python Package), NumPy, Data Analysis, Data Science, Python Programming, Data Structures, Data Manipulation, Computer Programming
Skills you'll gain: Responsive Web Design, Information Architecture, User Experience Design, Web Design, Design Reviews, Usability Testing, Wireframing, User Research, User Centered Design, User Interface (UI) Design, Mockups, Prototyping, Figma (Design Software)
Skills you'll gain: Email Marketing, Campaign Management, Marketing Automation, Personally Identifiable Information, Newsletters, Content Marketing, Digital Marketing, Copywriting, Marketing Strategy and Techniques, HubSpot CRM, Customer Data Management, Promotional Strategies, Key Performance Indicators (KPIs), Performance Analysis, Customer Retention
University of California San Diego
Skills you'll gain: Design Research, Interaction Design, User Experience Design, Statistical Analysis, Usability, Ideation, User Research, Graphic and Visual Design, User Interface (UI) Design, Experimentation, Prototyping, Human Centered Design, A/B Testing, Usability Testing, User Centered Design, Mockups, Human Computer Interaction, Human Factors, Collaborative Software, Telecommuting
- Status: Free
Nanjing University
Skills you'll gain: Data Processing, Data Mining, Data Structures, Data Presentation, Object Oriented Programming (OOP), Web Scraping, Data Analysis, Python Programming, Pandas (Python Package), NumPy, Data Visualization, Data Import/Export, Data Manipulation, Matplotlib, User Interface (UI) Design
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
In summary, here are 10 of our most popular apply and evaluate data mining methods courses
- Plant Bioinformatic Methods: University of Toronto
- Using Python to Interact with the Operating System: Google
- Energy Production, Distribution & Safety: University at Buffalo
- Generative AI: Prompt Engineering Basics: IBM
- Security Analyst Fundamentals: IBM
- Blockchain and Cryptocurrency Explained: University of Michigan
- Python for Data Analysis: Pandas & NumPy: Coursera Project Network
- Build Dynamic User Interfaces (UI) for Websites: Google
- Think Outside the Inbox: Email Marketing: Google
- Interaction Design: University of California San Diego