Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

Udemy
Master the fundamental principles of construction claims. What you'll learn: Construction ClaimsDefinition of a ClaimProcess of Making A ClaimClaim IdentificationExtensions of TimeClaims for Additional PaymentLiquidated / Delay DamagesImportance of Record Keeping This is an introductory course aimed at helping students better understand the basics of construction claims. This course also provides students with a solid foundation on which to build their knowledge of more advanced topics in the field of construction claims.This course is recommended for anyone working with construction claims and especially those working for construction contractors and tasked with managing the contract or claim process. For example, Quantity Surveyors, Engineers, Project Managers, Contract Administrators, etc.To achieve these learning objectives this course will cover the following topics:· Students will be provided with a general introduction and background to construction claims.· The definition of a claim and the purpose and role of claims in the context of construction contracts.· The process of making a claim under typical construction contracts.· The events that typically cause construction claims.· The types of relief and compensation that both parties to a construction contract may claim for.· The requirement to prove entitlement to the relief and compensation claimed.Please Note: This is an entry-level course designed to teach students the basic aspects of construction claims. Professionals that have not had significant exposure to construction claims will greatly benefit from this course. This course is not recommended for professionals that have significant experience in construction claims.

YouTube
Explore the complex interplay between disinformation campaigns and attribution claims in cybersecurity through this 37-minute conference talk by Mark Kuhr at Shmoocon 2017. Delve into the challenges of accurately attributing cyber attacks amidst deliberate misinformation efforts, and gain insights into the evolving landscape of digital warfare and intelligence operations. Learn how security professionals navigate the murky waters of online deception to uncover the true sources of cyber threats.

SymfonyCasts
NoteThere are several options for MoR service, we’re using Lemon Squeezy in this course, but you can use what we teach here in Paddle, Polar, or any other service you like. We have no preference, we just happened to pick Lemon Squeezy for this course. Do you have an amazing product that you want to sell to your customers? Are you looking for a payment processor to be a Merchant of Record to handle tax compliance so that you can focus on more revenue? Lemon Squeezy to the rescue! Start selling your digital products fast and easy. In this tutorial, we'll build a full checkout system for our awesome product and learn all about the next topics: Manage your store in the Lemon Squeezy dashboard Use Lemon Squeezy storefront to sell products Charge a one-time fee with single payments Use API to talk to Lemon Squeezy and sell products directly from your website Use the Lemon.js script to stream the checkout workflow via overlay Prefill customer's info and add custom data Automatic invoice email on successful order Link Lemon Squeezy customers to the users in our DB Use webhooks to sync data in our database Handling the order_created webhook event Live webhook handling with Ngrok Test webhooks by simulating their sending with fake data Finally, bonus - users' card credentials are never sent to our servers, but directly to Lemon Squeezy. That means we do not save sensitive card credentials on our servers. Yay!

Udemy
Finibi Mortgage CEO, Joe Correa, teaches you how to become a mortgage loan processor What you'll learn: You will be able to understand how mortgage processing worksYou will be able to start working as a mortgage loan processorYou will be able to prepare and submit a loan package to underwriting for approvalYou will learn how to review specific documents including a 1003 and disclosuresYou will learn how to become a contract processor as well as a salaried processorYou will understand how to prepare a loan package for auditingYou will be able to complete compliance checks and know exactly what needs to be in each fileYou will learn how to view and make changes on Calyx PointYou will learn how to submit a loan on a lenders website Starting a new career as a mortgage loan processor is a smart and profitable decision that can have a significant effect on your financial future. Mortgage loan processors are in high demand!In this modern course, you'll learn all of the skills necessary to become a successful mortgage loan processor and be able to use these skills in you're day-to-day working life. From how to prepare a loan package to submitting a file to underwriting and getting an "approved with conditions" status, these lectures are designed for any one who is interested in starting a career in real estate but that would prefer not be in sales. With real world examples demonstrating exactly how to execute each step of the mortgage process, you'll find out exactly what to do (and what not to do) to prepare a file to the level where it can be approved and be compliant with all federal and state regulations.Main benefits of this course and of being a mortgage loan processor are:- Make a great starting and future income Most starting processors make $40,000 - $60,000 per year. Senior and experienced loan processors make $60,000 - $100,000+- Have the flexibility of getting paid in the form of a salary or as an independent contractor (Work from home on your computer and phone if you are an independent contractor)- Learn what it takes to close a home loan- Start a career that is in high demand where you can quickly increase your incomeIf you already know the basics of being a loan processor and want refresh your memory or are just starting out and want to learn more in depth, this is the course for you. Ensuring the success of each and every loan is very different if you have the knowledge necessary to solve problems and have back up plans if problems arise. You need to know the steps you will need to take to prepare, submit, and close a loan. This takes experience and the right skills which is what this course will provide you with.The first section of this course will take you through two hugely important elements of loan processing: how the entire loan process works and what you'll need to do on each and every loan file. You will learn how to do quality control checks to make sure you are compliant with all laws and how to be ready for an audit. In the second section of this course, you will learn what you need to do to start a career as a loan processor and what it entails.At the end of it all, you'll have the tools needed to make better, and more successful decisions in your loan processor role. A course diploma will be available to you when all sections have been completed at 100% which you can save or print. For instructions on downloading your course diploma you can go to: https://support.udemy.com/hc/en-us/articles/229603868-Certificate-of-CompletionYour instructorJoseph Correa is the founder and CEO of Finibi Mortgage, a licensed mortgage brokerage business based out of Orlando, Florida. Having closed hundreds of mortgage loans and processed many of them, he has the necessary processing knowledge to help you become a success. In the past, he has also owned a correspondent lender business and invested in real estate.

AWS Skill Builder
AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Flagging Suspicious Healthcare Claims In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Flagging Suspicious Healthcare Claims - Services Used Flagging Suspicious Healthcare Claims AWS Lambda, Amazon API Gateway, Amazon CloudFront, Amazon DynamoDB, Amazon S3, Amazon SageMaker

Udemy
Learn and practice how to transform raw healthcare claims data into valuable knowledge and actionable insights! What you'll learn: In this course, you will learn and practice, how to transform raw healthcare claims data into valuable knowledge and actionable insights. The most commonly available and widely used type of data in healthcare is claims data. Claims data is sometimes also called billing data, insurance data or administrative data. The reason why claims data is the most large scale, reliable and complete type of big data in healthcare is rather straightforward. It has to do with reimbursement, that is, the payment of health care goods and services depends on claims data. Healthcare providers may not always find the time to fill in all required paperwork in healthcare, but they will always do that part of their administration on which their income depends. Thus, in many cases, analyzing healthcare claims data is a much more pragmatic alternative for extracting valuable insights.Claims data allows for the analysis of many non-biological elements pertaining to the organization of health care, such as patient referral patterns, patient registration, waiting times, therapy adherence, health care financing, patient pathways, fraud detection and budget monitoring. Claims data also allows for some inferences about biological facts, but these are limited when compared to medical records. By following this course, students will gain a solid theoretical understanding of the purpose of healthcare claims data. Moreover, a significant portion of this course is dedicated to the application of data science and health information technology (Healthcare IT) to obtain meaningful insights from raw healthcare claims data.This course is for professionals that (want to) work in health care organizations (providers and payers) that need to generate actionable insights out of the large volume of claims data generated by these organizations. In other words, people that need to apply data science and data mining techniques to healthcare claims data.Examples of such people are: financial controllers and planners, quality of care managers, medical coding specialists, medical billing specialists, healthcare or public health researchers, certified electronic health records specialist, health information technology or health informatics personnel, medical personnel tasked with policy, personnel at procurement departments and fraud investigators. Finally, this course will also be very useful for data scientists and consultants that lack domain knowledge about the organization of healthcare, but somehow got pulled into a healthcare claims data project. The instructor of this course is Dennis Arrindell, MSc., MBA. Dennis has a bachelor’s degree in Public Health, a master’s degree in Health Economics and a Master’s degree in Business Administration. Upon completion of this course, students will be able to contribute significantly towards making healthcare organizations (providers and payers) more data driven. What this course is NOT about:- Although we will be applying some important statistics and machine learning concepts, this course is NOT about statistics or machine learning as a topic on itself. - Although we will be using multiple software tools and programming languages for the practical parts of this course, this course is NOT about any of these tools (Excel, SQL, Python, Celonis for process mining) as topics on themselves.

Coursera
Unlock the future of insurance by diving into AI-driven claims solutions and transformative risk management strategies. In a recent IBM study, 77% of insurance executives admitted that they need to adopt GenAI quickly, but customers and insurers don’t exactly see eye-to-eye on how this technology should be utilized. Between legacy systems, siloed data, and rising customer expectations, there’s a lot to untangle. That’s where this course comes in. We’ll take you through the essentials of GenAI and how it’s revolutionizing claims processing, underwriting, and customer experience. You’ll explore real-world case studies, test-drive practical GenAI tools, and discover how to design customer-centric, GenAI-powered insurance products and services that make a difference. This course is designed for insurance professionals, data analysts, and business leaders seeking to harness the power of Generative AI to transform key industry functions. Whether you're involved in claims processing, risk management, or underwriting, you'll gain valuable insights into how GenAI can drive innovation and efficiency. The content is tailored to support forward-thinking professionals ready to enhance service delivery and develop customer-centric insurance solutions using emerging technologies. To get the most out of this course, learners should have a basic understanding of the insurance industry and its operational frameworks. Familiarity with digital tools and commonly used software in insurance processes is recommended. While a foundational knowledge of artificial intelligence concepts is helpful, the course is designed to be accessible to those who are motivated to explore new technologies and adapt to the rapidly evolving digital landscape. By the end of this course, learners will be able to define how GenAI and prompt engineering function and how they apply to the insurance sector. They will analyze how GenAI enhances risk assessment, streamlines underwriting processes, and supports strategic decision-making. Learners will also apply GenAI to create personalized insurance products and develop automated solutions for key business functions such as decision support, cost management, and claims resolution.

YouTube
Explore the inner workings of Apple's Secure Enclave Processor (SEP) in this 48-minute Black Hat conference talk. Delve into the hardware design, boot process, and architecture of SEPOS, the operating system running on the SEP. Learn about the mailbox mechanism facilitating data exchange between iOS kernel and SEP, and how SEPOS handles and relays this information to its services and applications. Evaluate the SEP's attack surface and discover potential vulnerabilities uncovered by the presenters' research. Gain insights into this crucial security component, introduced with the iPhone 5S, designed to protect sensitive data like fingerprint information and cryptographic keys from potential attackers.

YouTube
Explore the groundbreaking research on quantum supremacy and the benchmarking of the Sycamore processor in this 29-minute conference talk presented by Research Scientist Kevin Satzinger at the APS March Meeting 2020. Delve into the development of a high-fidelity processor with 53 programmable superconducting qubits, capable of running quantum algorithms in an exponentially large computational space. Learn about the Sycamore processor's rectangular lattice architecture, featuring tunable couplers that allow each qubit to interact with four neighbors. Discover the key systems engineering advances that enable high-fidelity single- and two-qubit operations during realistic computations across the entire processor. Examine the cross-entropy benchmarking method used to evaluate system performance and understand how the largest system benchmarks demonstrate quantum supremacy through circuits intractable for classical hardware. Gain insights into the digital error model and its implications for quantum error correction. Explore topics such as experimental quantum computing, scalable design, hardware packaging and electronics, calibration techniques, and the challenges of classical competition in quantum computing.

YouTube
Explore the development and proposal of a Remote Processor subsystem for the Zephyr RTOS in this informative conference talk. Dive into the evolving landscape of IoT and Edge AI, focusing on the increasing demand for collaborative systems with heterogeneous multicore processors, DSPs, and hardware accelerators. Learn how the Remote Processor Framework enables different platforms and architectures to control remote processors without duplicating hardware-specific abstractions. Understand the limitations of current firmware loading and resource allocation methods, and discover how a dedicated remote processor subsystem in Zephyr RTOS can streamline the process of loading firmware and starting multiple cores in heterogeneous multicore processors. Gain insights into the potential applications and benefits of this framework, including reduced startup times and expanded possibilities for Zephyr usage in distributed and heterogeneous computing within embedded systems.

YouTube
Explore a hands-on ethical hacking demonstration focused on exploiting vulnerabilities in a payment processor system. Join NahamSec and special guest Rhynorater as they guide you through the process of identifying and exploiting security flaws. Practice your skills using the provided lab environment and gain valuable insights into web application security. Discover techniques used by ethical hackers and bug bounty hunters to uncover critical vulnerabilities. Learn how to approach and analyze payment systems from a security perspective, enhancing your understanding of cybersecurity in financial technologies. Gain practical knowledge applicable to bug bounty hunting and ethical hacking careers.

YouTube
Explore the physics of laptop safety and injury prevention in this 22-minute conference talk from BSides Detroit 2018. Learn about the potential dangers of dropping laptops, understanding pressure and force, and practical strategies for protecting yourself and your devices. Discover innovative safety measures like crumple zones, airbag helmets, and neck lanyards. Gain valuable insights into preventative risk management techniques for both personal and automotive safety.

Udemy
Learn the basics of construction claims and delay analysis. Learn the claims procedure in Fidic contracts (1st and 2nd) What you'll learn: Understand the construction claims mechanismCauses of construction claimsClaims procedure (FIDIC 1st Edition, 1999)Claims procedure (FIDIC 2nd Edition, 2017)Construction delaysCore knowledge for construction delay analysis techniques. Welcome to the most comprehensive Construction Claims Management Foundations course! Here, you will learn the core knowledge about construction claims management. So, * if you are a beginner just started to learn about construction claims, or * a relatively experienced construction professional searching for a reference tool for construction claims,then, this course is the perfect match for you. What will you learn after completing this course?You will learn:* The construction claims mechanism* Causes of construction claims* Claims procedure (FIDIC 1st Edition, 1999)* Claims procedure (FIDIC 2nd Edition, 2017)* Types of construction delays* Core knowledge of delay analysis techniquesThis course also includes 2 WORKSHOPS which will help you to clearly understand what you have learned in the course! After completing this course, you will get your COURSECOMPLETION CERTIFICATE from casePM! PLUS: If you are a PMP certified project professional, then you will earn 2 PDUs after completing this course! If you are a Project Manager or aiming to become a Project Manager, then the information you will learn in this course will help you confidently manage the claims process of your construction project. Or, if you want to start a new career as a claims specialist, this course is the best starting point for you. After completing this course, you can go further by attending more advanced classes and by gaining practical experience in your projects. (But please note that this course is not for experienced claims management staff having advanced knowledge of claims.)

YouTube
Explore the differences between roles, claims, and policies in ASP.NET Core authentication and authorization in this 23-minute video tutorial. Gain a comprehensive understanding of these key concepts through practical explanations and demonstrations. Learn how to set up and implement each approach, with a focus on their unique characteristics and use cases. Access the accompanying GitHub project for hands-on practice, and dive deeper into the topic with provided links to official Microsoft documentation and relevant Stack Overflow discussions. Perfect for developers looking to enhance their ASP.NET Core security knowledge and implement robust authorization strategies in their applications.

YouTube
Explore how generative AI revolutionizes healthcare claims processing and fraud detection in this 16-minute conference talk from Conf42 KN 2025. Learn about the current challenges plaguing healthcare claims processing and discover how generative AI transforms traditional workflows through a comprehensive five-layer AI architecture. Dive deep into each architectural layer to understand implementation strategies, then examine advanced fraud detection techniques powered by generative AI technologies. Address critical challenges in scaling AI solutions across healthcare systems while ensuring compliance with healthcare regulations and maintaining patient privacy. Gain insights into the future landscape of AI-driven healthcare claims processing and understand practical considerations for implementing these technologies in real-world healthcare environments.

Pluralsight
Claims-based identity provides a consistent way for applications to handle identity whether they’re accessed locally, via the Internet, across company boundaries, or in other ways. Claims-based identity is becoming the standard approach to working with identity. This course provides an introduction to the concepts of claims-based identity using Microsoft technologies as concrete examples. The goal is to provide a big-picture overview, explaining what this approach offers, how it works, and why you would use it.

YouTube
Explore the cutting-edge world of trapped ion quantum processors in this comprehensive lecture by Markus Hennrich from Stockholm University, Sweden. Delve into the fundamental principles, technological advancements, and potential applications of this promising quantum computing architecture. Gain insights into the challenges and opportunities in developing scalable trapped ion systems, and understand their role in the broader landscape of quantum information processing. Learn about recent experimental breakthroughs, quantum error correction techniques, and the future prospects of trapped ion platforms in realizing practical quantum computers.

Udemy
Learn all about Contracts, Delays & Claims along with practical Delay Analysis using Primavera P6 software What you'll learn: Basic understanding of contracts, delays and claimsHow to identify and record cause of the claimHow to categorize and analyze delaysIn-depth understanding of delay analysis techniquesImplementation of delay analysis techniques using Oracle Primavera P6 softwarePreparation of cost claimUnderstanding of claim settlement and dispute resolution Welcome toContracts, Delays & Claims with Primavera P6online training course. This course is brought to you byCEM Solutions, who are providing construction engineering and management services worldwide for about 7 years. The creators of this course are well versed with contracts, claims and Primavera P6, and beside their vast experience in large scale projects, they have spent about 1 year in research, just to bring an ultimate solution of claims for you. You will see a lot of interesting concepts, best practices and real project samples in this course, which will help you a lot in developing new concepts and skills.This course is an ultimate solution for the people who want to learn about contracts, delay analysis and claim management procedures, and this course also covers an advance training of delay analysis on Primavera P6 software. Whether you are an owner, consultant or a contractor, this course will teach you everything you need to know.On successful completion of this course, you can start your own consultancy of claim management services, or you can implement this knowledge on the projects you are working on. Beside this, you will also earn 2.5 PDUs. So, what re you waiting for? Enroll now and start learning today.

YouTube
Learn about the Cloud Processor Accessibility Compliance Tool (CPACT) in this 20-minute presentation from the Open Compute Project. Discover how this specialized tool addresses accessibility compliance requirements for cloud processors, exploring its technical specifications, implementation strategies, and role in ensuring cloud computing infrastructure meets accessibility standards. Examine the tool's features for evaluating processor accessibility compliance, understand its integration within cloud environments, and gain insights into how CPACT supports organizations in meeting regulatory requirements while maintaining optimal cloud processor performance.

YouTube
Delve into the inner workings of the AMD Platform Security Processor (PSP) in this comprehensive 49-minute conference talk. Explore the security subsystem introduced in 2013 that is essential for system startup and offers runtime services to the main processor. Gain insights into the PSP's undocumented, proprietary firmware, including its filesystem structure and the challenges of reverse-engineering such a deeply embedded system. Examine the PSP's role in system security, its full access to system memory space, and its potential impact on trust in AMD CPUs. Learn about the efforts to investigate the PSP's functionality and security implications, and consider strategies for regaining trust in AMD processors despite the PSP's sensitive nature. Analyze the broader context of trusted computing bases in industrial systems, infrastructure, and consumer electronics, and evaluate the effectiveness of the AMD Secure Processor as a trusted execution environment for critical operations.