Online courses directory (10358)
15.082J/6.855J/ESD.78J is a graduate subject in the theory and practice of network flows and its extensions. Network flow problems form a subclass of linear programming problems with applications to transportation, logistics, manufacturing, computer science, project management, and finance, as well as a number of other domains. This subject will survey some of the applications of network flows and focus on key special cases of network flow problems including the following: the shortest path problem, the maximum flow problem, the minimum cost flow problem, and the multi-commodity flow problem. We will also consider other extensions of network flow problems.
This course provides a deep understanding of engineering systems at a level intended for research on complex engineering systems. It provides a review and extension of what is known about system architecture and complexity from a theoretical point of view while examining the origins of and recent developments in the field. The class considers how and where the theory has been applied, and uses key analytical methods proposed. Students examine the level of observational (qualitative and quantitative) understanding necessary for successful use of the theoretical framework for a specific engineering system. Case studies apply the theory and principles to engineering systems.
The summary for this course comes from the [course web site at Georgia Tech](http://www.cc.gatech.edu/fac/traynor/cs6262/s14/index.html). Note that watching this course on Udacity does not count for Georgia Tech credit unless you are enrolled in the [Georgia Tech OMSCS](http://omscs.gatech.edu/) program. This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas. Topics covered include network security, authentication, security protocol design and analysis, security modeling, trusted computing, key management, program safety, intrusion detection, DDOS detection and mitigation, architecture/operating systems security, security policy, group systems, biometrics, web security, and other emerging topics. Most of the course readings will come from seminal papers in the field. Links to these papers will be provided on the course pages. In addition, links to critical reference materials will also be provided.
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.
The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.
You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.
You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.
This course is a part of the RITx Cybersecurity MicroMasters Program.
In this free online course Network Server Security - Protecting the Server and Client Computers you will be introduced to practices and procedures for securing your computer network. <br /><br />The course begins by introducing you to firewalls in a computer system and/or network. You will learn about the Open Systems Interconnection (OSI) model and its seven layers. The course then teaches you about the different types of firewalls. You will learn about different network access methods and technologies to help secure them. You will also be introduced to traps for hackers and isolating computers from the network with VLANs. You will learn about different protocols for securing communications within and outside the network.<br /><br />Next, you will be introduced to different malicious software that can attack your computer/network. You will learn about malware, viruses, worms and more. The course teaches you about protecting your computer/network from malicious software, and what you can do to protect your email from spam and malicious intent. You will learn about Internet Explorer’s security features and how they can help protect your system.<br /><br />This course will be of great interest to those who wish to further their knowledge of network and server security.<br />
Networked Life will explore recent scientific efforts to explain social, economic and technological structures -- and the way these structures interact -- on many different scales, from the behavior of individuals or small groups to that of complex networks such as the Internet and the global economy.
This seminar is a space for collaborative inquiry into the relationships between social movements and the media. We'll review these relationships through the lens of social movement theory, and function as a workshop to develop student projects. Seminar participants will work together to explore frameworks, methods, and tools for understanding networked social movements in the digital media ecology. We will engage with social movement studies as a body of theoretical and empirical work, and learn about key concepts including: resource mobilization; political process; framing; New Social Movements; collective identity; tactical media; protest cycles; movement structure; and more. We'll explore methods of social movement investigation, examine new data sources and tools for movement analysis, and grapple with recent innovations in social movement theory and research. Assignments include short blog posts, a book review, co-facilitation of a seminar discussion, and a final research project focused on social movement media practices in comparative perspective.
This seminar is a space for collaborative inquiry into the relationships between social movements and the media. We'll review these relationships through the lens of social movement theory, and function as a workshop to develop student projects. Seminar participants will work together to explore frameworks, methods, and tools for understanding networked social movements in the digital media ecology. We will engage with social movement studies as a body of theoretical and empirical work, and learn about key concepts including: resource mobilization; political process; framing; New Social Movements; collective identity; tactical media; protest cycles; movement structure; and more. We'll explore methods of social movement investigation, examine new data sources and tools for movement analysis, and grapple with recent innovations in social movement theory and research. Assignments include short blog posts, a book review, co-facilitation of a seminar discussion, and a final research project focused on social movement media practices in comparative perspective.
How does the Web work? Under the hood of HTTP there's a whole stack of networking protocols. Explore the underpinnings of the net with tools like `traceroute`, `tcpdump`, and `nc`.
Learn a better way to meet people, grow your business, and increase your revenue.... with less stress!
An introductory computer networking course focusing on how the Internet works and the principles of designing networks and network protocols.
An introductory computer networking course focusing on how the Internet works and the principles of designing networks and network protocols.
Networks are ubiquitous in our modern society. The World Wide Web that links us to and enables information flows with the rest of the world is the most visible example. It is, however, only one of many networks within which we are situated. Our social life is organized around networks of friends and colleagues. These networks determine our information, influence our opinions, and shape our political attitudes. They also link us, often through important but weak ties, to everybody else in the United States and in the world. Economic and financial markets also look much more like networks than anonymous marketplaces. Firms interact with the same suppliers and customers and use Web-like supply chains. Financial linkages, both among banks and between consumers, companies and banks, also form a network over which funds flow and risks are shared. Systemic risk in financial markets often results from the counterparty risks created within this financial network. Food chains, interacting biological systems and the spread and containment of epidemics are some of the other natural and social phenomena that exhibit a marked networked structure.
This course will introduce the tools for the study of networks. It will show how certain common principles permeate the functioning of these diverse networks and how the same issues related to robustness, fragility, and interlinkages arise in several different types of networks.
The course focuses on the problem of supervised learning within the framework of Statistical Learning Theory. It starts with a review of classical statistical techniques, including Regularization Theory in RKHS for multivariate function approximation from sparse data. Next, VC theory is discussed in detail and used to justify classification and regression techniques such as Regularization Networks and Support Vector Machines. Selected topics such as boosting, feature selection and multiclass classification will complete the theory part of the course. During the course we will examine applications of several learning techniques in areas such as computer vision, computer graphics, database search and time-series analysis and prediction. We will briefly discuss implications of learning theories for how the brain may learn from experience, focusing on the neurobiology of object recognition. We plan to emphasize hands-on applications and exercises, paralleling the rapidly increasing practical uses of the techniques described in the subject.
This course serves as an introduction to the basic principles that govern all aspects of our networked lives. We will learn about companies like Google and technologies like the Internet in a way that requires no mathematics beyond basic algebra.
Networks are a ubiquitous way to represent complex systems, including those in the social and economic sciences. The goal of the course is to equip students with conceptual tools that can help them understand complex systems that emerge in both nature and social systems. This is a course intended for a general audience and will discuss applications of networks and complexity to diverse systems, including epidemic spreading, social networks and the evolution of economic development.
The course invites you to examine the interconnectedness of modern life through an exploration of fundamental questions about how our social, economic, and technological worlds are connected. Students will explore game theory, the structure of the Internet, social contagion, the spread of social power and popularity, and information cascades.
This MOOC is based on an interdisciplinary Cornell University course entitled Networks, taught by professors David Easley, Jon Kleinberg, and Éva Tardos. That course was also the basis for the book, Networks, Crowds, and Markets: Reasoning About a Highly Connected World. This course is designed at the introductory undergraduate level without formal prerequisites.
A course driven by 20 practical questions about wireless, web, and the Internet, about how products from companies like Apple, Google, Facebook, Netflix, Amazon, Ericsson, HP, Skype and AT&T work. In this offering, we will cover 7 of the 20 questions, and you will have the opportunity to personalize your own learning experience by choosing which of the versions suits you best.
This course highlights the interplay between cellular and molecular storage mechanisms and the cognitive neuroscience of memory, with an emphasis on human and animal models of hippocampal mechanisms and function. Class sessions include lectures and discussion of papers.
Surveys general principles and specific examples of motor control in biological systems. Emphasizes the neural mechanisms underlying different aspects of movement and movement planning. Covers sensory reception, reflex arcs, spinal cord organization, pattern generators, muscle function, locomotion, eye movement, and cognitive aspects of motor control. Functions of central motor structures including cerebellum, basal ganglia, and cerebral cortex considered. Cortical plasticity, motor learning and computational approaches to motor control, and motor disorders are discussed.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.