Online courses directory (19947)
An intensive introduction to African American political thought that focuses on major ideological trends and political p
ESLP is a student designed, student developed, and student facilitated program offered through UCLA's Institute
Professor Courtenay Raia lectures on science and religion as historical phenomena that have evolved over time. Examines
Introduction to Oceanography is a class that provides a general introduction to geological, physical, chemical, and biol
This course covers the emergence of modern France. Topics include the social, economic, and political transformation of
This is an introductory course in Greek history tracing the development of Greek civilization as manifested in political
This capstone includes the evaluation of the competencies and performance tasks, which define a successful cybersecurity defense.
This capstone is part of the RITx Cybersecurity MicroMasters Program that is specifically designed to teach cybersecurity techniques and tools needed to effectively defend systems and networks of a corporate environment or enterprise.
In order to qualify for the MicroMasters Credential you will need to successfully earn a Verified Certificate in each of the four RITx Cybersecurity courses as well as pass this final capstone.
The capstone will test knowledge and skills across all 4 courses in the Cybersecurity MicroMasters Program. It will include hands-on lab exercises that build on the assessments in the previous four courses.
Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
If you are seeking CME credit, you must register with Charlotte Area Healthcare Education Center: CLICK HERE to register for CME
This medical course includes six modules which cover various areas of medical genomics including:
- Introduction to Genomics
- Variation
- Microbiome
- Pharmacogenomics
- in vitro (IVF) and Fetal medicine
- Oncology
Each module defines common terms, shows examples of data, and how healthcare is changing due to genomic insights. Each module also contains ethical, legal, and social implications of genomics in medical treatment. All modules contain five multiple choice questions to assess learning gains.
Interspersed in each module are multiple interviews with practicing healthcare workers who have first hand experience with medical genomics and how the standards of care are changing. This continuing medical education course contains information that satisfies the American Board of Medical Specialties six core competencies: Practice-based learning and improvement; Patient care and procedural skills; Systems-based practice; Medical knowledge; Interpersonal and communication skills; and Professionalism.
Course eligible for CME credit:
2.0 AMA PRA Category 1 Credits™
- This activity has been planned and implemented in accordance with the accreditation requirements and policies of the Accreditation Council for Continuing Medical Education (ACCME) through the joint providership of Carolinas HealthCare System/Charlotte AHEC and Davidson College . Carolinas HealthCare System/Charlotte AHEC is accredited by the ACCME to provide continuing medical education for physicians.
- Carolinas HealthCare System/Charlotte AHEC designates this Enduring Material for a maximum of 2 AMA PRA Category 1 Credit(s)™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.
This course has been created in joint partnership with the Charlotte AHEC.

Courses offered via edX.org are not eligible for academic credit from Davidson College. A passing score in a DavidsonX course(s) will only be eligible for a verified certificate generated by edX.org.
This course offers a broad survey of modern European history, from the end of the Thirty Years' War to the afte
This course is an introduction to copyright law and American law in general. Topics covered include: structure of federa
German 59: Holocaust in Film and Literature is a course that provides insight into the History of Holocaust and its pres
Linear Algebra: Foundations to Frontiers (LAFF) is packed full of challenging, rewarding material that is essential for mathematicians, engineers, scientists, and anyone working with large datasets. Students appreciate our unique approach to teaching linear algebra because:
- It’s visual.
- It connects hand calculations, mathematical abstractions, and computer programming.
- It illustrates the development of mathematical theory.
- It’s applicable.
In this course, you will learn all the standard topics that are taught in typical undergraduate linear algebra courses all over the world, but using our unique method, you'll also get more! LAFF was developed following the syllabus of an introductory linear algebra course at The University of Texas at Austin taught by Professor Robert van de Geijn, an expert on high performance linear algebra libraries. Through short videos, exercises, visualizations, and programming assignments, you will study Vector and Matrix Operations, Linear Transformations, Solving Systems of Equations, Vector Spaces, Linear Least-Squares, and Eigenvalues and Eigenvectors. In addition, you will get a glimpse of cutting edge research on the development of linear algebra libraries, which are used throughout computational science.
MATLAB licenses will be made available to the participants free of charge for the duration of the course.
We invite you to LAFF with us!
Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.
In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.
The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.
First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.
Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.
Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.
Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
How do you find the money necessary to effectively manage your business? How do you know if a business opportunity is worthwhile? When should you invest in a stock, bond or company? Do you fear the financial side of growing your organization?
This finance course will take the mystery out of financial analysis and help you make the right business decisions. In order to establish your company you need to secure funding. Once you have money, you need to determine the most efficient and effective use of your capital. You also need to have the knowledge to have professional and engaging conversations with finance professionals who control access to funding.
In this course, you will discover a variety of options for funding your business and how to successfully negotiate financial opportunities. You will learn how to value and evaluate ideas to determine the appropriate benefits and costs in order to screen them correctly. Finally, you will learn how to value a business and the securities you can use to potentially fund your organization.
This course is part of the Business Principles and Entrepreneurial Thought XSeries.
Lecture Series on Fundamentals of Environmental Pollution and Control by Prof. Jayanta Bhattacharya, Department of Minin
Lectures by Prof. Mukesh SharmarnDepartment of Civil EngineeringrnIIT Kanpur
The Center for European Studies- European Union Center is a member of the Weiser Center for Europe and Eurasia and the U
This course is designed for high-intermediate ESL students who need to develop better listening comprehension and oral s
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.