![Advanced Recommender Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/0a/b77546bd3d4b14b8d12c20692aadbe/Advanced-Recommender-Systems.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Advanced Recommender Systems
Available now
![Approximation Algorithms](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/36/3f01b6f4af4dd8956ba0fd575be49c/Approximation-Algorithms.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Approximation Algorithms
Available now
![Architecting Smart IoT Devices](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/8a/50c06d209c464691ffd36fde9e58e7/Architecting-Smart-IoT-Devices.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Architecting Smart IoT Devices
Available now
![Automated Reasoning: satisfiability](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/6c/abe6beb8c1409eb13013d9577afe6a/Automated-Reasoning_-satisfiability.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Automated Reasoning: satisfiability
Available now
![Automated Reasoning: Symbolic Model Checking](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/75/9c3c706cd14d439ea7b35cccc95a26/Automated-Reasoning_-Symbolic-Model-Checking.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Automated Reasoning: Symbolic Model Checking
Available now
![Basic Recommender Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/20/52853bda2c49d0be9e73010af76c31/Basic-Recommender-Systems.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Basic Recommender Systems
Available now
![Becoming a Cybersecurity Consultant](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ee/66a99a45c54ef597cc7571e5e80c7b/Becoming-a-Cybersecurity-Consultant.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Becoming a Cybersecurity Consultant
Available now
![Blockchain 360: A State of the Art for Professionals](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/90/b2bd2886eb46a58e1e3ba4cb6ca144/Blockchain-360_-A-State-of-the-Art-for-Professionals.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Blockchain 360: A State of the Art for Professionals
Available now
![Blockchain for the decision maker](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e2/8152ec93cb40589a06b6792c950b75/Blockchain-for-the-Decision-Maker.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Blockchain for the decision maker
Available now
![Business Implications of AI: A Nano-course](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d9/76cd01cd0c42e48de1caa17daf64d3/Web-of-Data.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Business Implications of AI: A Nano-course
Available now
![Business Implications of AI: Full course](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/5d/ff35ce5e9b41c59cb351bad69b0a80/business-implications-of-AI---Copy.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Business Implications of AI: Full course
Available now
![Capstone Value Creation through Innovation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b1/457832b49d4088aa3b47e3ede8eb34/Advanced-Recommender-Systems-3-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Capstone Value Creation through Innovation
Available now
![Capstone: Autonomous Runway Detection for IoT](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/86/90099ca1bc4978915663b201cb2cfd/Advanced-Recommender-Systems-7-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Capstone: Autonomous Runway Detection for IoT
Available now
![Cybersecurity Awareness and Innovation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b7/0ffa6deb80422288b6459b6e502ed1/Advanced-Recommender-Systems-10-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Cybersecurity Awareness and Innovation
Available now
![Data Science for Business Innovation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/dd/0dee5467b842d29ec82b426a0b0cbd/web-3963945_1920.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Data Science for Business Innovation
Available now
![Development of Real-Time Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/9d/f9e127465045f98f6ae2fd11695500/Advanced-Recommender-Systems-12-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Development of Real-Time Systems
Available now
![Embedded Hardware and Operating Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/87/7929e54d8846ecbb35731d46a54cb9/Advanced-Recommender-Systems-15-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Embedded Hardware and Operating Systems
Available now
![Foundations of mining non-structured medical data](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/68/8b87b21c604ac38471a776e36a046b/Advanced-Recommender-Systems-18-.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Foundations of mining non-structured medical data
Available now
![Geometric Algorithms](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/94/3b31fb4eae42f3be061d23f0b73725/Geometric-Algorithms.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Geometric Algorithms
Available now
![I/O-efficient algorithms](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/68/24f33fb4694d99a718d1c1c4654786/I_O-efficient-algorithms.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
I/O-efficient algorithms
Available now
![Impact from digital transformation: A Nano course](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b5/c4a3b981344c33a8ebf592934b1d7d/Impact-from-digital-transformation_-A-Nano-course.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Impact from digital transformation: A Nano course
Available now
![Impact from Digital Transformation: Full course](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e0/ed44cc2b1f461c8de374bd1eec8418/Impact-from-Digital-Transformation_-Full-course.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Impact from Digital Transformation: Full course
Available now
![Innovation & Entrepreneurship - From Basics to Open Innovation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b0/96b594a8b8496eae11e440ef9f0cd4/Innovation-Entrepreneurship---From-Basics-to-Open-Innovation.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Innovation & Entrepreneurship - From Basics to Open Innovation
Available now
![Innovation & Entrepreneurship - From Design Thinking to Funding](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/f9/d44a9570cd49369d1b761aa72d8b19/Innovation-Entrepreneurship---From-Design-Thinking-to-Funding.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Innovation & Entrepreneurship - From Design Thinking to Funding
Available now
![Introduction to Architecting Smart IoT Devices](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/3e/5d0f36a6664c07b49c1cbd6dd47059/Introduction-to-Architecting-Smart-IoT-Devices.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Introduction to Architecting Smart IoT Devices
Available now
![Marketing Strategy for Entrepreneurs](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/a4/824e80829511e69d711567410148f0/qrcode-wp-tech-ms.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Marketing Strategy for Entrepreneurs
Available now
![Mastering Digital Twins](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/04/b1a31959ae4716b59e2b0a9e38e233/Mastering-Digital-Twins.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Mastering Digital Twins
Available now
![Privacy & Standardisation Capstone](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/53/f9174b9833432e8ce786c504b78c00/Privacy-and-standardisation-capstone.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Privacy & Standardisation Capstone
Available now
![Privacy in Europe](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e9/1b5ffa6b10479aba6ee576fff976f7/Privacy-in-Europe.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Privacy in Europe
Available now
![Privacy in the USA](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/aa/b5a660b9ee4a02aa3efc0c6984af30/Privacy-in-USA.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Privacy in the USA
Available now
![Privacy in the Western World](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/9c/03caf281d347ab8982e315a8c4369d/Privacy-in-the-Western-World.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Privacy in the Western World
Available now
![Quantitative Formal Modeling and Worst-Case Performance Analysis](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/6c/e3764373c24c788cb2ff60f8d5e3ce/Quantitative-Formal-Modeling-and-Worst-Case-Performance-Analysis.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Quantitative Formal Modeling and Worst-Case Performance Analysis
Available now
![Quantitative Model Checking](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/e5/1ae6d4f2ec429c94898c127f56604c/Quantitative-Model-Checking.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Quantitative Model Checking
Available now
![Security and Privacy for Big Data - Part 1](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/55/9300db7a2d408d8c0f6d7e7679d3c0/Security-and-Privacy-for-Big-Data---Part-1.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security and Privacy for Big Data - Part 1
Available now
![Security and Privacy for Big Data - Part 2](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/d4/aaab706c8c4a3586d9673d863e113b/Security-and-Privacy-for-Big-Data---Part-2.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Security and Privacy for Big Data - Part 2
Available now
![Software Architecture for the Internet of Things](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/00/c53df0c91c40ad8ab1ad393b0f3577/Software-Architecture-for-the-Internet-of-Things.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Software Architecture for the Internet of Things
Available now
![Standardisation & Technology](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ae/514b506e5c11e885f2b59acd927a48/iStock-873501568.jpg?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Standardisation & Technology
Available now
![Sustainable Digital Innovation](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b7/fbc3d625c24a85b97b873f29481d2f/Sustainable-Digital-Innovation.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Sustainable Digital Innovation
Available now
![System Validation (2): Model process behaviour](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/04/2baecae45146728b32eda8dcc009cd/System-Validation-2-_-Model-process-behaviour.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
System Validation (2): Model process behaviour
Available now
![System Validation (3): Requirements by modal formulas](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/08/1edb18b6b944c499629c8ab101cb5f/System-Validation-3-_-Requirements-by-modal-formulas.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
System Validation (3): Requirements by modal formulas
Available now
![System Validation (4): Modelling Software, Protocols, and other behaviour](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/8d/9922d935464002a13b9273b6893f73/System-Validation-4-_-Modelling-Software-Protocols-and-other-behaviour.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
System Validation (4): Modelling Software, Protocols, and other behaviour
Available now
![System Validation: Automata and behavioural equivalences](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/27/1b27f61f164bd0a6da0aefd996fb14/System-Validation_-Automata-and-behavioural-equivalences.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
System Validation: Automata and behavioural equivalences
Available now
![The Impact of Technology](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/1f/828b1f1fb2499fb58b95ab7ff8f31c/The-Impact-of-Technology.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
The Impact of Technology
Available now
![Web Connectivity and Security in Embedded Systems](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/ef/48f31206034886840739c693decc68/Web-Connectivity-and-Security-in-Embedded-Systems.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Web Connectivity and Security in Embedded Systems
Available now
![Web of Data](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/18/b04fef55fd41be91e035bc36134c47/Web-of-Data.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
Web of Data
Available now
![디지털 전환에 따른 변화: 완전 강좌](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-course-photos.s3.amazonaws.com/b3/9b947fd70446f5b48df42a784791c8/Logo-Digital-Transformation.png?auto=format%2Ccompress&dpr=1&w=175&h=175&fit=fill&bg=FFF)
디지털 전환에 따른 변화: 완전 강좌
Available now