Free Online Computer Science Courses

Computer science courses teach essential skills in coding, algorithms, and software development. Whether you're a beginner or an expert, a computer science course can deepen your understanding of computing fundamentals. Gain practical skills for a rewarding career in tech.

863 Computer Science Courses

Applied Cryptography

University of Colorado System

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four...

Applied Software Engineering Fundamentals

IBM

If you want to enter the exciting world of software development, this Software Engineering Foundations Specialization is for you. No prior degrees or knowledge of...

Apply basic testing for your Django web application

Coursera Project Network

In this 2-hour long project-based course, you will learn how Django's rich testing framework work, and how to use it to test your web apps. You will create a simple...

Applying Data Structures to Manipulate Cleansed UN Data

Coursera Project Network

In this 1-hour long project-based course, you will discover optimal situations to use fundamental data structures such as Arrays, Stacks, Queues, Hashtables, LinkedLists,...

Approximation Algorithms

EIT Digital

Many real-world algorithmic problems cannot be solved efficiently using traditional algorithmic tools, for example because the problems are NP-hard. The goal of...

AR for web using JavaScript

Meta

This course prepares you for a career using AR in the education sector. You will learn how web AR is used in learning, and you'll have lots of hands-on practice...

AR games using Vuforia SDK

Meta

Are you ready for more fun with Unity? In this course, you will be introduced to the Vuforia SDK that works with Unity. You will also learn more about plane tracking...

Architecting with Google Kubernetes Engine: Foundations 한국어

Google Cloud

Architecting with Google Kubernetes Engine: Foundations' 과정에서는 Google Cloud의 레이아웃 및 원리를 살펴본 후 소프트웨어 컨테이너를...

Architecting with Google Kubernetes Engine: Production

Google Cloud

In this course, "Architecting with Google Kubernetes Engine: Production," you'll learn about Kubernetes and Google Kubernetes Engine (GKE) security; logging...

Architecting with Google Kubernetes Engine: Workloads

Google Cloud

In this course, "Architecting with Google Kubernetes Engine: Workloads," you learn about performing Kubernetes operations; creating and managing deployments;...

Arm Cortex-M Architecture and Software Development

Arm

This Specialization is designed to help anyone involved in developing software for Arm Cortex-M processors. Over four courses you will develop your knowledge of...

Artificial Intelligence and legal issues

Politecnico di Milano

The purpose of the course is to help students understand the legal implications related to the design and use of artificial intelligence systems, providing an overview...

Artificial Intelligence Data Fairness and Bias

LearnQuest

In this course, we will explore fundamental issues of fairness and bias in machine learning. As predictive models begin making important decisions, from college...

Artificial Intelligence: An Overview

Politecnico di Milano

The course will provide a non-technical overview of the artificial intelligence field. Initially, a discussion on the birth of AI is provided, remarking the seminal...

Artificial Intelligence: an Overview

Politecnico di Milano

This Specialization is intended for beginners seeking to enter the artificial intelligence world. Through five courses, you will cover artificial intelligence technical...

ASP.NET for Experienced Developers

Board Infinity

Welcome to the Building React and ASP.NET MVC 5 Applications specialization! This series of courses is designed to help you develop the skills you need to build...

Assets, Threats, and Vulnerabilities

Google

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity...

Asymmetric Cryptography and Key Management

University of Colorado System

Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private...