About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge to create eye-catching, appropriate business presentations, and apply proper techniques in their business communications, all while working in diverse environments. This program also examines the various types of business presentations in the work environment and allows learners to apply their knowledge to create a stunning presentation.

Professional Business Presentations, will dive into the world of presenting information both in written and verbal form using presentation templates or creating from scratch. This course discusses how to effectively create high-quality presentations with proper formatting, design elements (color scheme, layout, etc.), and organization. The learner will identify the appropriate presentation format and software for their audience. Learners will have the opportunity to utilize the skills gained to create an engaging PowerPoint presentation. Learners will also use their skills to create a professional handout with infographics and record a video presentation, graded by staff, as part of their final project in the course.

What You’ll Learn:

By the end of this course learners will be able to:

 Evaluate the organizational steps of a presentation

 Examine various supporting materials for presentations

 Evaluate and discuss various presentation software

 Examine design principles for presentations

 Discuss storytelling for presentations

 Develop a presentation

  • Present via video a polished presentation

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Discover credentials utilizing hash dumpsPerform pass-the-hash attacksDocument results of the penetration testUtilize currently exploited systems to gain access to others.Configure exploitation tools to pivot through a target environment

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Apply methodology to penetration tests to ensure they are consistent, reproducible, rigorous, and under quality control.Analyze the results from automated testing tools to validate findings, determine their business impact, and eliminate false positives.Discover key application flaws.Use programming to create testing and exploitation scripts during a penetration test.Discover and exploit SQL Injection flaws to determine true risk to the victim organization.Create configurations and test payloads within other web attacks.Fuzz potential inputs for injection attacks.Explain the impact of exploitation of application flaws.Analyze traffic between the client and server application using tools.Discover and exploit Cross-Site Request Forgery (CSRF) attacks.

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Explain what information is collected and analyzed through network security monitoring, and why monitoring is importantDefine network security monitoringSummarize the policies used in network security monitoringDefine an Intrusion Detection System/Intrusion Prevention System, and provide a real-world analogy for an IDSDefine the base rate fallacy and summarize an exampleSummarize the options for deploying an IDSDescribe common strategies attackers use to evade an IDSList potential indicators of a security attackDefine honeypots and honeynets and list their benefits to organizationsSummarize the goals of a firewallList and define four types of firewallsSummarize an example of a filtering ruleExplain the primary function of NATSummarize the advantages and disadvantages of proxy gatewaysExplain the process for setting up firewalls using IPTables and Netfilter in LinuxList the steps in an incoming packet’s journey through a Linux firewallSummarize the challenges that led to the development of IPv6 and explain how IPv6 addresses those challengesList the differences in IPv4 and IPv6 services and headersDifferentiate between IPv4 and IPv6 address formatsList and define IPv6 address typesList the differences between IPv4 and IPv6 address provisioningList the differences between DHCPv4 and DHCPv6Summarize dual-stack techniques for IPv4 and IPv6 devicesIdentify security threats common to IPv4 and IPv6, as well as threats exclusive to IPv6Describe how reconnaissance methods will change under IPv6List tools that can be use to compromise IPv6 networksDescribe the security considerations needed in dual-stack host environments

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Define and apply a substitution cipherDefine cryptanalysisExplain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.Describe at least two strategies for breaking an encryption schemeIdentify the differences between public key encryption, symmetric key encryption, and hashingList and summarize the characteristics of good ciphersDescribe the vulnerabilities of stream ciphersDefine AES and explain why it is recommended over 3DESDefine cipher block chainingList the steps in creating an RSA public/private key pairExplain why RSA is secureDefine message integrity and explain how it is ensuredDefine IPSec and list its servicesDefine authentication header and ESPExplain the primary goal of IKE and describe its sub-protocolsSummarize the five steps of IPSec OperationSummarize the history of SSLExplain how closure alerts can prevent a truncation attackIdentify the protocols that make up the SSL architectureDescribe how SSL/TLS provides protected channelsState the differences between IPSec and SSL VPN connectionsExplain why it’s important to consider Layer 2 securityDefine common Layer 2 attacksIdentify tools used in Layer 2 attacksDescribe countermeasures to Layer 2 attacks and security best practices to prevent attacksExplain the differences between the 2.4GHz and 5GHz spectrumsProvide definitions of basic wireless termsExplain how 802.11ac differs from earlier 802.11 standardsIdentify and define the types of 802.11 framesList and define the states of 802.11 sessionsList the steps in establishing an 802.11 sessionSummarize the existing wireless security protocols and state which protocols should not be usedSummarize WPA, WPA Enterprise, and generalized WiFi attacks

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 4th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Describe how “social engineering” can be used to compromise securityDefine the CIA triadIdentify and plan to manage risks in common situationsDefine a threat tree and threat matrix and explain how they are usedDefine an attack tree, explain how boolean and continuous node values are used in attack trees, and demonstrate how an attack tree can be used to determine vulnerabilitiesExplain why it is important for network engineers to understand cyber attack strategies.List and summarize the stages of network attack methodologyIdentify the information an attacker might collect during network reconnaissanceDescribe at least two “low tech” ways of performing reconnaissance on a targetPerform a WHOIS query and extract the IP address of a DNS serverList at least three publicly available tools used for gathering information on targetsDefine port scanning and describe the process used to determine whether a port is openDefine a proxy serverDefine IP spoofing, ingress filtering, and session hijackingDefine a Denial of Service attack and explain the difference between a DoS and DDoS attackState the relationship between DoS attacks and geopolitical eventsList at least two vulnerability attacks used in DoS attacksDefine SYN flooding and explain how it can be protected againstDescribe what happens during a standard DDoS attackExplain how DNS poisoning can be used in phishing attacksDescribe how URLs can be obfuscated to make a phishing attack more likely to succeedList at least two tools used to assess vulnerabilities in networksSummarize the typical goals of post-exploitation activityDescribe the strategies attackers use to maintain access to a compromised systemDefine trojans, viruses, worms, and blended threatsList the typical objectives of trojan creatorsDefine rootkitsGive examples of common uses of NetcatDefine wrappersSummarize common data exfiltration methodsSummarize how attackers can remove evidence of system compromise in Windows and Unix systems

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 3rd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Define Same-Origin PolicyDescribe SQL Injection and Common defensesDescribe Cross Site Request Forgery (XSRF) and Common DefensesDescribe Cross Site Scripting (XSS) and Common DefensesDiscuss different definitions of PrivacyDefine anonymityDefine contextual integrityDescribe Differential PrivacyDescribe Mix NetworksDescribe how Tor Provides AnonymityDefine Digital CertificatesDescribe the Trusted Platform Module (TPM)Describe DNS AmplificationDistinguish between Watermarking and SteganographyDescribe How Bit-Coin Prevents an Attacker from Faking a ChainDescribe Why Minors Validate TransactionsDescribe Why BitCoin Mining Consumes So Much Power and Some AlternativesDescribe Threats to the BitCoin EcoSystem

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 2nd course in the introductory, undergraduate-level offering that makes up the larger Introduction to Databases MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

  1. Introduction to Databases
  2. Advanced Database Queries
  3. Advanced Database Administration

These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.

This course is a continuation of the basic concepts, organization, and implementation models taught in the Introduction to Databases course, with an emphasis on the relational model. Among the topics covered are the development of advanced queries that utilize aggregation, subqueries and built-in functions. Aggregation queries are used to pull back summary data to help understand the detailed instances in the database. Subqueries help to break large into smaller testable component parts. Functions are used to format and perform calculations on the data returned in the query. Database development and administration skills are required in most Information Technology, Software Engineering, Cybersecurity, and Computer Science jobs. The course utilizes the open-source relational database MySQL. MySQL and it’s open-source fork MariaDB are used in millions of web apps to persist the application data and provide query processing. Applied labs expand on the lectures to provide students with hands-on experience with a relational database management system (DBMS) and structured query language (SQL).

If you successfully complete all the courses within the program, with a passing grade of 70% or better via the verified (paid) track, you’ll not only receive a certificate highlighting your achievement, but also have the option to collect real college credit (included in the price!) that you can count towards a pursuit of a bachelor’s degree.

Industry Certification Preparation
This program covers much of the material that is assessed on the MySQL8.0 Database Developer Oracle Certified Professional exam. The exam is not included in the cost of the program.

What You’ll Learn:

  1. Develop queries in SQL to aggregate data stored in a database.
  2. Develop queries in SQL that utilize subqueries.
  3. Choose the proper datatype for storing a piece of information in a database
  4. Develop queries in SQL that utilize built-in functions.
  5. Design a database that is efficient for storing data and provides correct results in queries

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 1st course in the introductory, undergraduate-level offering that makes up the larger Introduction to Databases MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

  1. Introduction to Databases
  2. Advanced Database Queries
  3. Advanced Database Administration

These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.

This course is an introduction to the basic concepts, organization, and implementation models of databases, with an emphasis on the relational model. Among the topics covered are the development of simple queries that retrieve and mutate the data in a database. Data Manipulation Language (DML) is a subset of SQL that is used by database developers to create, maintain, and query facts in the database. Students gain a thorough understanding of the DML syntax and the options available when retrieving facts back from the database. Database development and administration skills are required in most Information Technology, Software Engineering, Cybersecurity, and Computer Science jobs. The course utilizes the open-source relational database MySQL. MySQL and it’s open-source fork MariaDB are used in millions of web apps to persist the application data and provide query processing. The applied SQL labs expand on the classroom lectures to provide students with hands-on experience with a relational database management system (RDBMS) and structured query language (SQL).

If you successfully complete all the courses within the program, with a passing grade of 70% or better via the verified (paid) track, you’ll not only receive a certificate highlighting your achievement, but also have the option to collect real college credit (included in the price!) that you can count towards a pursuit of a bachelor’s degree.

Industry Certification Preparation
This program covers much of the material that is assessed on the MySQL8.0 Database Developer Oracle Certified Professional exam. The exam is not included in the cost of the program.

What You’ll Learn:

  1. Use tools to issue queries to a database
  2. Develop queries in SQL to create data stored in a database.
  3. Develop queries in SQL to read data stored in a database.
  4. Develop queries in SQL to update data stored in a database.
  5. Develop queries in SQL to delete data stored in a database.

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 3rd course in the introductory, undergraduate-level offering that makes up the larger Introduction to Databases MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

  1. Introduction to Databases
  2. Advanced Database Queries
  3. Advanced Database Administration

These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.

This course is a continuation of the basic concepts, organization, and implementation models taught in the Introduction to Databases and Advanced Database Queries courses. Among the topics covered are the development of objects in the database such as databases, tables, indexes, views, stored procedures and functions. Data Definition Language (DDL) is a subset of SQL that is used by database administrators to create and maintain these objects in the database. Students gain a thorough understanding of the DDL syntax and the use cases for each object type. Database development and administration skills are required in most Information Technology, Software Engineering, Cybersecurity, and Computer Science jobs. The course utilizes the open-source relational database MySQL. MySQL and it’s open-source fork MariaDB are used in millions of web apps to persist the application data and provide query processing. Applied labs expand on the lectures to provide students with hands-on experience with a relational database management system (DBMS) and structured query language (SQL).

If you successfully complete all the courses within the program, with a passing grade of 70% or better via the verified (paid) track, you’ll not only receive a certificate highlighting your achievement, but also have the option to collect real college credit (included in the price!) that you can count towards a pursuit of a bachelor’s degree.

Industry Certification Preparation
This program covers much of the material that is assessed on the MySQL8.0 Database Developer Oracle Certified Professional exam. The exam is not included in the cost of the program.

What You’ll Learn:

  1. Develop queries in SQL to create databases, tables and indexes
  2. Develop queries in SQL that create views.
  3. Develop queries in SQL that create stored procedures
  4. Understand concurrent database processing through the use of transactions and locking.
  5. Develop queries in SQL that create functions

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year