Online courses directory (10358)

Sort by: Name, Rating, Price
Start time: Any, Upcoming, Recent started, New, Always Open
Price: Any, Free, Paid
Starts : 2017-04-19
No votes
edX Free Closed [?] English Error occured ! We are notified and will try and resolve this as soon as possible.
WARNING! [2] count(): Parameter must be an array or an object that implements Countable . Line 151 in file /home/gelembjuk/domains/myeducationpath.com/tmp/templates_c/0fb24f4aaee6a6f9372371e569cf0910415dbe41_0.file.course_thumbnail_half.htm.php. Continue execution. 2756990; index.php; 216.73.216.189; GET; url=courses/&pricetype=free&start=2240&pricetype=free&start=2240; ; Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com); ; Executon time: 1Error occured ! We are notified and will try and resolve this as soon as possible.
WARNING! [2] count(): Parameter must be an array or an object that implements Countable . Line 151 in file /home/gelembjuk/domains/myeducationpath.com/tmp/templates_c/0fb24f4aaee6a6f9372371e569cf0910415dbe41_0.file.course_thumbnail_half.htm.php. Continue execution. 2756990; index.php; 216.73.216.189; GET; url=courses/&pricetype=free&start=2240&pricetype=free&start=2240; ; Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com); ; Executon time: 1 Business Evaluation Nutrition

Our daily lives, economic vitality, and national security all revolve around technology. Our dependence on technology means we need a stable, safe, and resilient cyberspace. However, computers and networks are being misused at a growing rate both by cybercriminals and by our own employees. In this computer science course, you will learn the fundamentals of cybersecurity and basic threats. You will also learn to build a comprehensive security plan that integrates people, processes, and technology, and how to begin protecting yourself and your information.

You will be exposed to areas of personal and physical security, best practices for using our computers and mobile devices, and how we protect our privacy and secure our devices and networks against attacks.

We will examine cybersecurity standards, laws, and ethical issues, the impact of cyber terrorism, how governments use technology and computer systems to defend and attack adversaries, and the effect this has on privacy and individual liberties. We will also explore why IT administrators and cybersecurity professionals need to demonstrate adherence to ethical principles.

Finally, we will look at the important areas of data breach planning and business continuity, both of which are critical to the long-term viability of an organization.

This course will also focus on the types of careers within the cyber security field and how you can enhance your career through professional certifications.

No prior knowledge or skills are required except for basic computer literacy.

Starts : 2014-05-06
No votes
edX Free Closed [?] English Business Digital governance Evaluation How to Succeed Nutrition

EECS149.1x introduces students to the design and analysis of cyber-physical systems --- computational systems that are integrated with physical processes. Applications of such systems include medical devices and systems, consumer electronics, toys and games, assisted living, traffic control and safety, automotive systems, process control, energy management and conservation, environmental control, aircraft control systems, communications systems, instrumentation, critical infrastructure control (electric power, water resources, and communications systems for example), robotics and distributed robotics (telepresence, telemedicine), defense systems, manufacturing, and smart structures.

A major theme of the course is on the interplay of practical design with formal models of systems, including both software components and physical dynamics. A major emphasis will be on building high confidence systems with real-time and concurrent behaviors. Students will apply concepts learned in lectures to programming a robotic controller in a specially-designed virtual laboratory environment with built-in automatic grading and feedback mechanisms.

This edX course is an online adaptation of the UC Berkeley undergraduate course EECS 149, covering a subset of topics that are especially relevant for the lab component of that class.

No votes
Udacity Free Closed [?] CMS Nutrition

This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.

Starts : 2011-09-01
16 votes
MIT OpenCourseWare (OCW) Free Military Science & Protective Services Infor Information control Information Theory Kadenze Nutrition

This course focuses on cyberspace and its implications for private and public, sub-national, national, and international actors and entities.

Starts : 2011-09-01
No votes
MIT OpenCourseWare (OCW) Free Closed [?] Infor Information environments Information Theory Kadenze Nutrition

This course focuses on cyberspace and its implications for private and public, sub-national, national, and international actors and entities.

No votes
Coursera Free Closed [?] English BabsonX Beams Beginner Book distribution Differential+Equations Evaluation

Learn about the ten domains of cybersecurity through the lens of subject area experts from companies such as Coca Cola, SAP, and Macy's.

Starts : 2017-11-28
No votes
edX Free Closed [?] English Business Evaluation Nutrition

This capstone includes the evaluation of the competencies and performance tasks, which define a successful cybersecurity defense.  

This capstone is part of the RITx Cybersecurity MicroMasters Program that is specifically designed to teach cybersecurity techniques and tools needed to effectively defend systems and networks of a corporate environment or enterprise.

In order to qualify for the MicroMasters Credential you will need to successfully earn a Verified Certificate in each of the four RITx Cybersecurity courses as well as pass this final capstone.

The capstone will test knowledge and skills across all 4 courses in the Cybersecurity MicroMasters Program. It will include hands-on lab exercises that build on the assessments in the previous four courses.

Starts : 2015-09-24
No votes
Coursera Free Closed [?] English BabsonX Evaluation Nutrition USMx

This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them.

No votes
Canvas.net Free HumanitiesandScience Nutrition

75%-91% of hackers target human behavior, not networks and technologies. Geared for California's K-12 public education employees, this course will teach you how they do it and what you can do to protect your schools and your families.

Starts : 2017-07-25
No votes
edX Free Closed [?] English Business Evaluation Nutrition

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Starts : 2017-07-25
No votes
edX Free Closed [?] English Business Evaluation Nutrition

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Starts : 2017-10-30
No votes
edX Free Closed [?] English Business Demand+and+market+equilibrium Evaluation Nutrition

In this course, you will focus on the pathways to cybersecurity career success. You will determine your own incoming skills, talent, and deep interests to apply toward a meaningful and informed exploration of 32 Digital Pathways of Cybersecurity.

You will complete a self-assessment comprised of elements needed to determine essential next steps on your career path.

Starts : 2017-07-12
No votes
edX Free Closed [?] English Business Demand+and+market+equilibrium Evaluation Nutrition

The Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company’s employees as well as its customers depend upon.

This course delves into the role that the CISO plays in cybersecurity operations.

Throughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals' point of view? How do we keep information secure?

Coursework will fully explore the CISO’s view from the top, as well as the position’s toolkit, which includes policy, procedures and practices, technologies, awareness training, and audit. It will also dive into the approaches taken in private industry, government, academia, and the military.

Starts : 2016-02-22
No votes
edX Free Closed [?] English Business Circuits Evaluation Nutrition

Once heralded as the ultimate vehicle for open communication and self-expression, the internet is rapidly becoming a globally networked surveillance device. Serious threats to national security, combined with the seemingly endless capacity of digital processing and storage, have led to levels of data capture and 24/7 monitoring of individuals’ activity that were unimaginable even a decade ago.
 
With resistance to such practices rising, this course will equip you to take an active part in the debate. You will gain a broad understanding of the competing tensions of the laws related to national security and personal and commercial privacy in the post-Snowden online environment. You will also grasp the looming consequences of this battle for peace, sovereignty, human rights and the internet itself.

Starts : 2015-07-01
No votes
Coursera Free Closed [?] Computer Sciences BabsonX Beginner Evaluation Nutrition

本课程的目的有二:其一,学知识,向大家传授关于C程序设计语言的基本知识;其二,练技能,培养使用C语言编写计算机程序解决实际问题的能力。通过本课程的训练,我们希望大家能够理解“结构化程序设计的基本思想”,掌握“C程序设计的基本技巧”,养成“良好的编程习惯和编程风格”,编写出“真正具有生命力的计算机程序”。 完成本课程,表明同学们已经掌握了“C程序设计的基本技能”,并具有“合乎规范的编程习惯”。

Starts : 2009-09-01
17 votes
MIT OpenCourseWare (OCW) Free Business Infor Information control Information Theory Nutrition

D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.

Starts : 2009-09-01
No votes
MIT OpenCourseWare (OCW) Free Infor Information control Information Theory Nutrition

D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.

Starts : 2009-09-01
12 votes
MIT OpenCourseWare (OCW) Free Closed [?] Business Infor Information control Information Theory K-8 Courses Nutrition

D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.

Starts : 2010-02-01
8 votes
MIT OpenCourseWare (OCW) Free Closed [?] Business Infor Information control Information Theory Nutrition

D-Lab: Design addresses problems faced by undeserved communities with a focus on design, experimentation, and prototyping processes. Particular attention is placed on constraints faced when designing for developing countries. Multidisciplinary teams work on semester-long projects in collaboration with community partners, field practitioners, and experts in relevant fields. Topics covered include design for affordability, design for manufacture, sustainability, and strategies for working effectively with community partners and customers. Students may continue projects begun in EC.701J D-Lab I: Development.

Starts : 2010-02-01
No votes
MIT OpenCourseWare (OCW) Free Infor Information control Information Theory Nutrition

D-Lab: Design addresses problems faced by undeserved communities with a focus on design, experimentation, and prototyping processes. Particular attention is placed on constraints faced when designing for developing countries. Multidisciplinary teams work on semester-long projects in collaboration with community partners, field practitioners, and experts in relevant fields. Topics covered include design for affordability, design for manufacture, sustainability, and strategies for working effectively with community partners and customers. Students may continue projects begun in EC.701J D-Lab I: Development.

Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.