Online courses directory (10358)
Our daily lives, economic vitality, and national security all revolve around technology. Our dependence on technology means we need a stable, safe, and resilient cyberspace. However, computers and networks are being misused at a growing rate both by cybercriminals and by our own employees. In this computer science course, you will learn the fundamentals of cybersecurity and basic threats. You will also learn to build a comprehensive security plan that integrates people, processes, and technology, and how to begin protecting yourself and your information.
You will be exposed to areas of personal and physical security, best practices for using our computers and mobile devices, and how we protect our privacy and secure our devices and networks against attacks.
We will examine cybersecurity standards, laws, and ethical issues, the impact of cyber terrorism, how governments use technology and computer systems to defend and attack adversaries, and the effect this has on privacy and individual liberties. We will also explore why IT administrators and cybersecurity professionals need to demonstrate adherence to ethical principles.
Finally, we will look at the important areas of data breach planning and business continuity, both of which are critical to the long-term viability of an organization.
This course will also focus on the types of careers within the cyber security field and how you can enhance your career through professional certifications.
No prior knowledge or skills are required except for basic computer literacy.
EECS149.1x introduces students to the design and analysis of cyber-physical systems --- computational systems that are integrated with physical processes. Applications of such systems include medical devices and systems, consumer electronics, toys and games, assisted living, traffic control and safety, automotive systems, process control, energy management and conservation, environmental control, aircraft control systems, communications systems, instrumentation, critical infrastructure control (electric power, water resources, and communications systems for example), robotics and distributed robotics (telepresence, telemedicine), defense systems, manufacturing, and smart structures.
A major theme of the course is on the interplay of practical design with formal models of systems, including both software components and physical dynamics. A major emphasis will be on building high confidence systems with real-time and concurrent behaviors. Students will apply concepts learned in lectures to programming a robotic controller in a specially-designed virtual laboratory environment with built-in automatic grading and feedback mechanisms.
This edX course is an online adaptation of the UC Berkeley undergraduate course EECS 149, covering a subset of topics that are especially relevant for the lab component of that class.
This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.
This course focuses on cyberspace and its implications for private and public, sub-national, national, and international actors and entities.
This course focuses on cyberspace and its implications for private and public, sub-national, national, and international actors and entities.
Learn about the ten domains of cybersecurity through the lens of subject area experts from companies such as Coca Cola, SAP, and Macy's.
This capstone includes the evaluation of the competencies and performance tasks, which define a successful cybersecurity defense.
This capstone is part of the RITx Cybersecurity MicroMasters Program that is specifically designed to teach cybersecurity techniques and tools needed to effectively defend systems and networks of a corporate environment or enterprise.
In order to qualify for the MicroMasters Credential you will need to successfully earn a Verified Certificate in each of the four RITx Cybersecurity courses as well as pass this final capstone.
The capstone will test knowledge and skills across all 4 courses in the Cybersecurity MicroMasters Program. It will include hands-on lab exercises that build on the assessments in the previous four courses.
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them.
75%-91% of hackers target human behavior, not networks and technologies. Geared for California's K-12 public education employees, this course will teach you how they do it and what you can do to protect your schools and your families.
In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.
You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.
In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.
The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.
First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.
Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.
Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.
Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
In this course, you will focus on the pathways to cybersecurity career success. You will determine your own incoming skills, talent, and deep interests to apply toward a meaningful and informed exploration of 32 Digital Pathways of Cybersecurity.
You will complete a self-assessment comprised of elements needed to determine essential next steps on your career path.
The Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company’s employees as well as its customers depend upon.
This course delves into the role that the CISO plays in cybersecurity operations.
Throughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals' point of view? How do we keep information secure?
Coursework will fully explore the CISO’s view from the top, as well as the position’s toolkit, which includes policy, procedures and practices, technologies, awareness training, and audit. It will also dive into the approaches taken in private industry, government, academia, and the military.
Once heralded as the ultimate vehicle for open communication and self-expression, the internet is rapidly becoming a globally networked surveillance device. Serious threats to national security, combined with the seemingly endless capacity of digital processing and storage, have led to levels of data capture and 24/7 monitoring of individuals’ activity that were unimaginable even a decade ago.
With resistance to such practices rising, this course will equip you to take an active part in the debate. You will gain a broad understanding of the competing tensions of the laws related to national security and personal and commercial privacy in the post-Snowden online environment. You will also grasp the looming consequences of this battle for peace, sovereignty, human rights and the internet itself.
D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.
D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.
D-Lab Development addresses issues of technological improvements at the micro level for developing countries—in particular, how the quality of life of low-income households can be improved by adaptation of low cost and sustainable technologies. Discussion of development issues as well as project implementation challenges are addressed through lectures, case studies, guest speakers and laboratory exercises. Students form project teams to partner with mostly local level organizations in developing countries, and formulate plans for an IAP site visit. (Previous field sites include Ghana, Brazil, Honduras and India.) Project team meetings focus on developing specific projects and include cultural, social, political, environmental and economic overviews of the countries and localities to be visited as well as an introduction to the local languages.
D-Lab: Design addresses problems faced by undeserved communities with a focus on design, experimentation, and prototyping processes. Particular attention is placed on constraints faced when designing for developing countries. Multidisciplinary teams work on semester-long projects in collaboration with community partners, field practitioners, and experts in relevant fields. Topics covered include design for affordability, design for manufacture, sustainability, and strategies for working effectively with community partners and customers. Students may continue projects begun in EC.701J D-Lab I: Development.
D-Lab: Design addresses problems faced by undeserved communities with a focus on design, experimentation, and prototyping processes. Particular attention is placed on constraints faced when designing for developing countries. Multidisciplinary teams work on semester-long projects in collaboration with community partners, field practitioners, and experts in relevant fields. Topics covered include design for affordability, design for manufacture, sustainability, and strategies for working effectively with community partners and customers. Students may continue projects begun in EC.701J D-Lab I: Development.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.