Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Pathway Bioinformatics is a subfield of Bioinformatics that is concerned with computationally deriving functional insights from genomic data through analysis of molecular networks. This course will present principles and techniques from Pathway Bioinformatics, and will apply these methodologies to the search for drug targets for SARS-CoV-2. The course will begin by discussing motivations for Pathway Bioinformatics, and by presenting an overview of metabolism and of metabolic pathways. Next it will discuss machine representation of pathway data, and methods for pathway visualization. The course will describe how the metabolic pathways of an organism can be inferred from genome data, and how pathways can be used to interpret high-throughput data such as transcriptomics data. It will show how to predict the essential genes of an organism via reachability analysis, and then present a metabolic analysis of human metabolism when interacting with SARS-CoV-2 to predict SARS-CoV-2 drug targets.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
Detecting Dangerous Shell Commands in Rust — Building a Safety Layer
Learn to detect dangerous shell commands in Rust and build a safety layer to prevent malicious activity
Dev.to · hiyoyo
Up next
Cryptography
Coursera
Watch →