This course introduces mediation and moderation analysis using R, covering interaction effects, path analysis, SEM, and causal mediation. Gain the skills to test mechanisms, explore context, and interpret complex social relationships.
What does it really mean to “observe” a star? This course trains you to think like an observational astronomer, moving from intuition to first-principles reasoning about starlight and stellar matter. You will build a coherent picture of stellar physics by following real observational clues and turning data into explanations.
Take your JavaScript skills to next level
Take your C# skills to next level
Take your Python skills to next level
This course is designed for anyone curious about AI, whether you are a student, professional, entrepreneur, or enthusiast. Our goal is to tell the complete story of AI, from its beginnings to today, in a clear, engaging, and comprehensive manner.

C++17 was standardised in December 2017, giving us - developers - a wealth of new features to write better code. This course describes all significant changes in the language and the Standard Library. Thanks to many practical examples you can quickly apply the knowledge.
This course gives a brief, but rigorous, treatment of statistical inference intended for practicing Data Scientists.
"Secure Android Design & Development" is an effort to provide a compiled guideline that collects cybersecurity principles, threat modeling, the Android security model, compilers, and tools together to make it possible to design and develop more securely from the HAL layer to the application layer.
This course brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this course will lay the foundation for you to begin your journey learning data science.
Go beyond abstractions and master the core technical realities of modern cybersecurity. Deconstruct advanced network evasion and EDR bypass techniques, dissect sophisticated post-exploitation and cloud attack vectors, and analyze cryptographic failures and malware at their roots.