About This Course:

This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Describe Strengths and Weaknesses of Data Encryption Standard (DES)Describe Strengths and Weaknesses of Advanced Encryption Standard (AES)Describe Public Key CryptographyDescribe Asymmetric Key AlgorithmsDefine Hash FunctionsDescribe Public Key SignaturesDescribe the Benefits of the Different Types of AuthenticationDefine access controlApply four types of access control (Discretionary, Mandatory, Role Based, and Unix/Linux File Access Control)Describe the use of the SetUID permission in Unix/LinuxAnalyze an access control scenario using an Access Control MatrixDifferentiate between ACL and CapabilitiesDescribe the use of a Reference MonitorDescribe the Security Mechanisms built into Chromium OSGive Examples of Covert Channels including both Timing Channels and Storage ChannelsDescribe the Purpose of an Operating System (OS)Differentiate between Type 1 and Type 2 HypervisorsDescribe Containers and their PurposeDescribe Sandbox Computation

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About this course

Want to study for an MBA but unsure of the basic data analysis still required? This online course prepares you for studying in an MBA program and in business generally.

Data analysis appears throughout any rigorous MBA program and in today’s business environment understanding the fundamentals of collecting, presenting, describing and making inferences from data sets is essential for success.

The goal of this course is to teach you fundamental data analysis skills so you are prepared for your MBA study and able to focus your efforts on core MBA curriculum, rather than continually playing catch-up with the underlying statistical knowledge needed.

We also hope that learning these data analysis skills will equip you with the ability to understand, to a greater degree, the data you encounter in your working lives and in the world around you – an essential life-skill in today’s data driven environment

This course assumes no prior knowledge of data analysis. Concepts are explained as clearly as possible and regular activities give you the opportunity to practice your skills and improve your confidence.

What you’ll learn

  • Presenting and summarising your data
  • Decision making under uncertainty
  • Data-based decision making
  • Modelling for decision making

Syllabus

Topic 1 – Presenting and summarising your data
Topic 2 – Decision making under uncertainty
Topic 3 – Data-based decision making
Topic 4 – Modelling for decision making

Meet your instructors

David Lefevre

David is the Director of the EdTech Lab at Imperial College Business School. He is also the course leader on the Business School’s Pre-study module in Maths. David holds an MSc in Computing Science and a PhD in the field of instructional systems from Imperial College London and, perhaps most importantly, a BSc in Mathematics from the University of East Anglia (UEA). David and his EdTech Lab team launched the Global Online MBA program in 2015 and have received awards along the way including a Gold award at the IMS Learning Impact awards in 2010 and an Effective Practice Award at the Sloan-C Blended Learning Conference in 2011.

Catarina Sismeiro

Dr. Catarina Sismeiro is an Associate Professor at Imperial College Business School where she teaches on the Full-Time and Executive MBA programs. Catarina’s research has been published in The Journal of Marketing Research, Management Science, and The International Journal of Research in Marketing and has won several awards. Previously she was an Assistant Professor at Marshall Business School, University of Southern California. She holds a PhD in Management from the Anderson School, UCLA, and a Licenciatura in Management from Faculdade de Economia do Porto (Portugal).

About MIT horizon

MIT Horizon is an expansive content library built to help you explore emerging technologies. Through easy-to-understand lessons, you’ll be guided through the complexities of the latest technologies and simplified expert-level concepts. Designed for both technical and non-technical learners, you can examine bite-size content that can lead to maximum career outcomes.

For a limited time, gain access to the complete MIT Horizon library.

Register today for exclusive entry.

About this course

In this course, part of the Algorithms and Data Structures MicroMasters program, you will learn basic algorithmic techniques and ideas for computational problems, which arise in practical applications such as sorting and searching, divide and conquer, greedy algorithms and dynamic programming.

This course will cover theories, including:

  • how to sort data and how it helps for searching;
  • how to break a large problem into pieces and solve them recursively;
  • when it makes sense to proceed greedily;
  • how dynamic programming is used in genomic studies.

You will practice solving computational problems, designing new algorithms, and implementing solutions efficiently (so that they run in less than a second).

What you’ll learn

  • Essential algorithmic techniques – greedy algorithms, divide and conquer, binary search, sorting, dynamic programming
  • Best practices of implementing algorithms efficiently
  • Ways of testing and debugging programs

Prerequisites

  • Basic knowledge of at least one programming language: loops, arrays, stacks, recursion.
  • Basic knowledge of mathematics: proof by induction, proof by contradiction.

 

Who can take this course?

All

Meet Your Instructors

Alexander S. Kulikov

Visiting Professor
UC San Diego

Michael Levin

Chief Data Scientist
Yandex.Market

Daniel Kane

Assistant Professor,
Computer Science and Engineering & Dept. of Mathematics
UC San Diego

Pavel Pevzner

Ronald R. Taylor Professor of Computer Science
The University of California, San Diego

Neil Rhodes

Lecturer
UC San Diego

About MIT horizon

MIT Horizon is an expansive content library built to help you explore emerging technologies. Through easy-to-understand lessons, you’ll be guided through the complexities of the latest technologies and simplified expert-level concepts. Designed for both technical and non-technical learners, you can examine bite-size content that can lead to maximum career outcomes.

For a limited time, gain access to the complete MIT Horizon library.

Register today for exclusive entry.

About this course

An effective process for conceiving, developing and launching new products or services is critical to becoming competitive in most industries. This course includes key concepts like new product development strategy, types of product development strategies and steps.

This course involves

(a) Organizational integration of the work of functional specialists, industrial designers, and other key participants within the firm.

(b) Reducing the time-to-market while meeting cost and quality targets.

(c) Managing cross-functional projects and inherent technological risks while keeping a focus on changing customer requirements.

These challenges are examined in relation to the business level strategy of the firm, its competitive challenges, the technology life cycle and the product life cycle. We will also focus on the potential for firms to build markets and create demand for new products.

What you’ll learn

  • Understand the entire product development process from the product idea to eventual launch with an appropriate business model.
  • Learn how emerging market firms gain competitive advantage through design and development of locally relevant products.

View the course Welcome video from instructor Ganesh N Prabhu.

 

 

Meet your instructor

Ganesh N Prabhu - Pearson Advance

Ganesh N Prabhu

Ganesh N Prabhu is a Professor of Strategy at the Indian Institute of Management Bangalore, where he teaches Strategy, Qualitative Research and New Product Development. He also conducts executive programmes on New Product Development, Business Strategy, Business Acumen, Strategy Consulting and Design Thinking for senior managers. He was an invited member on the inaugural India Design Council and is a top writer on Quora. Ganesh is a Fellow (PhD) from the Indian Institute of Management Ahmedabad and holds a Post Graduate Diploma in Management from the Institute of Rural Management Anand. His research focuses on entrepreneurship and has been published in the Academy of Management Review and Research Policy.

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

About This Course:

In the course, we will examine the concept of IoT. We will look at the ‘things’ that make up the Internet of Things, including how those components are connected together, how they communicate, and how they value add to the data generated. We will also examine cybersecurity and privacy issues, and highlight how IoT can optimize processes and improve efficiencies in your business.

What You’ll Learn:

  • Gain a deep appreciation of the IoT
  • Understand what constitutes an IoT design solution
  • Start to grow the seeds of IoT ideas within your field and area of expertise

Meet Your Instructors:

Iain Murray AM

Iain is an academic in the School of Electrical Engineering, Computing and Mathematical Sciences at Curtin University, specialising in networking, embedded systems and assistive technology. He received his B.Eng(Hons) and Ph.D. in Computer Systems Engineering from Curtin in 1998, and 2008, respectively. He is a Curtin Academy Fellow and was appointed a Member of the Order of Australia for his contributions to education in 2016.

Siavash Khaksar

Siavash is an academic in the School of Electrical Engineering, Computing and Mathematical Sciences at Curtin University. He received his B.Sci in Electrical and Electronics Engineering from Azad University, Science and Research branch in Fars in 2012, his M.Eng in Electrical Engineering with a focus on Embedded Systems from Curtin University in 2015, and is currently undertaking post-graduate research focusing on assistive technology and use of motion sensors and machine learning to help children with cerebral palsy. He specialises in embedded systems and digital hardware-software codesign.

About MIT Horizon:

MIT Horizon is an expansive content library built to help you explore emerging technologies. Through easy-to-understand lessons, you’ll be guided through the complexities of the latest technologies and simplified expert-level concepts. Designed for both technical and non-technical learners, you can examine bite-size content that can lead to maximum career outcomes.

For a limited time, gain access to the complete MIT Horizon library.

Register today for exclusive entry.

About this course

The Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company and it’s employees as well as its customers depend upon.

This course delves into the role that the CISO plays in cybersecurity operations.

Throughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals’ point of view? How do we keep information secure?

Coursework will fully explore the CISO’s view from the top, as well as the position’s toolkit, which includes policy, procedures and practices, technologies, awareness training, and audit. It will also dive into the approaches taken in private industry, government, academia, and the military.

What you will learn

  • Identify the four domains of cybersecurity and the differences between their rules, regulations, and desired outcomes;
  • Explain the role of the CISO across all domains, and the differences between CISO roles among the domains;
  • Identify cybersecurity specific tools for their appropriate domains and situations.

Who can take this course

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

Meet your instructor

Barbara Endicott-Popovsky

Director, Center for Information Assurance and Cybersecurity at University of Washington
Barbara Endicott-Popovsky is the director of the Center for Information Assurance and Cybersecurity. She also teaches cybersecurity in several University of Washington programs. Endicott-Popovsky is a member of several national committees shaping cybersecurity education. She earned her doctoral degree from the Center for Secure and Dependable Systems in the Department of Computer Science at the University of Idaho.

About MIT horizon

MIT Horizon is an expansive content library built to help you explore emerging technologies. Through easy-to-understand lessons, you’ll be guided through the complexities of the latest technologies and simplified expert-level concepts. Designed for both technical and non-technical learners, you can examine bite-size content that can lead to maximum career outcomes.

For a limited time, gain access to the complete MIT Horizon library.

Register today for exclusive entry.

About This Course:

The Internet of Things (IoT) is expanding at a rapid rate, and it is becoming increasingly important for professionals to understand what it is, how it works, and how to harness its power to improve business. This introductory course will enable learners to leverage their business and/or technical knowledge across IoT-related functions in the workplace.

In the course, we will examine the concept of IoT. We will look at the ‘things’ that make up the Internet of Things, including how those components are connected together, how they communicate, and how they value add to the data generated. We will also examine cybersecurity and privacy issues, and highlight how IoT can optimize processes and improve efficiencies in your business.

What You’ll Learn:

  • Gain a deep appreciation of the IoT
  • Understand what constitutes an IoT design solution
  • Start to grow the seeds of IoT ideas within your field and area of expertise

Meet Your Instructors:

Iain Murray AM

Iain is an academic in the School of Electrical Engineering, Computing and Mathematical Sciences at Curtin University, specialising in networking, embedded systems and assistive technology. He received his B.Eng(Hons) and Ph.D. in Computer Systems Engineering from Curtin in 1998, and 2008, respectively. He is a Curtin Academy Fellow and was appointed a Member of the Order of Australia for his contributions to education in 2016.

Siavash Khaksar

Siavash is an academic in the School of Electrical Engineering, Computing and Mathematical Sciences at Curtin University. He received his B.Sci in Electrical and Electronics Engineering from Azad University, Science and Research branch in Fars in 2012, his M.Eng in Electrical Engineering with a focus on Embedded Systems from Curtin University in 2015, and is currently undertaking post-graduate research focusing on assistive technology and use of motion sensors and machine learning to help children with cerebral palsy. He specialises in embedded systems and digital hardware-software codesign.

About This Course:

Do you aspire to be an ideal people manager? The journey from being an individual contributor to a people manager requires significant personal development and growth. If you are a first time manager, you may have asked yourself:

  • Where did I go wrong in managing this particular employee?
  • How should I give feedback to my subordinates?
  • How do I handle potential assessments?
  • How should I motivate people who report to me?

The objective of this business and management course is to smoothen the transition for newly appointed people managers, motivate and guide people who are aspiring to become one and to think back and reflect for seasoned managers.

The course will provide learners with an enhanced understanding of the role of people management in organizational context.

What You’ll Learn:

  • Gain an overview of what it means to be an effective people manager
  • Have a deeper understanding of the different aspects of people management
  • Be able to appreciate the challenges faced by a first time manager
  • Reflect on your managerial experiences

Syllabus:

Week 1: Introduction to People Management

Difference between People Management and Human Resource Management; impact of individual and organizational factors on people management.

Week 2: Getting Work Done Through Others

Challenges of getting work done; significance of prioritization and assigning work to team members.

Week 3: Assessment and Evaluation

Concept of performance management and role of a manager in the different stages of the performance management process.

Week 4: Building Peer Networks

Understanding the importance of peer networks in an organization; being able to influence those on whom you have no authority.

Week 5: Essentials of Communication

Concept of the communication process with reflection on various barriers to effective communication and ways to overcome.

Week 6: Managing Self

Reflection on what does it mean to be a people manager; building a personal development plan for oneself.

Meet Your Instructor:

Vasanthi Srinivasan

Vasanthi Srinivasan is a Professor in the Organizational Behaviour and Human Resource Management Area. Her research interests are in the field of HRM. She has been extensively involved in designing and delivering Leadership Development Programs for Indian and international companies. Her prior experience in offering the MOOC course - Introduction to People Management motivates her to effectively harness technology for learning impact.

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

About This Course:

While big data infiltrates all walks of life, most firms have not changed sufficiently to meet the challenges that come with it. In this course, you will learn how to develop a big data strategy, transform your business model and your organization.

This course will enable professionals to take their organization and their own career to the next level, regardless of their background and position.

Professionals will learn how to be in charge of big data instead of being subject to it. In particular, they will become familiar with tools to:

  • assess their current situation regarding potential big data-induced changes of a disruptive nature,
  • identify their options for successfully integrating big data in their strategy, business model and organization, or if not possible, how to exit quickly with as little loss as possible, and
  • strengthen their own position and that of their organization in our digitalized knowledge economy

The course will build on the concepts of product life cycles, the business model canvas, organizational theory and digitalized management jobs (such as Chief Digital Officer or Chief Informatics Officer) to help you find the best way to deal with and benefit from big data induced changes.

During the course, your most pressing questions will be answered in our feedback videos with the lecturer. In the assignments of the course, you will choose a sector and a stakeholder. For this, you will develop your own strategy and business model. This will help you identify the appropriate organizational structure and potential contributions and positions for yourself.
 

What You’ll Learn:

  • Identify the stakeholders and characteristics of your sector in the era of big data
  • Identify potential big data induced changes in strategy, business model, organization and job descriptions
  • Substantially change existing strategy, business model, organization or adopt new ones as required
  • Find and develop strategically important tasks for yourself in your organization

 

Syllabus:

Week 1:

1. Challenges and Opportunities of big data

1.1 Big data in the digitalized knowledge economy

1.2 Are firms ready for big data?

1.3 The machine learning revolution

Week 2:

2. Stakeholders and Sectors

2.1 Stakeholders: Private or public goals

2.2 Sectors: Disruptive or incremental changes induced by big data

2.3 Assignment Part A

Week 3:

3. Big data upending strategy and innovation

3.1 Conventional wisdom on strategy and innovation

3.2 Wisdom considering the disruptive power of big data

3.3 Assignment Part B

Week 4:

4. Transforming building blocks of the business model canvas

4.1 What does big data mean for the different building blocks of the business model canvas?

4.2 Examples

4.3 Assignment Part C

Week 5:

5. Transforming the organization: CIO, CDO or CEO in the lead?

5.1 What does big data mean for the organization of your company?

5.2 Who leads the way?

5.3 Examples

5.4 Assignment Part D

Week 6:

6. Wrapping up

6.1 Ready for big data

6.2 Feedback

Meet Your Instructors:

Marijn Janssen

Marijn Janssen is full professor in ICT & governance and chair of the Information and Communication Technology section of the Technology, Policy and Management Faculty of TU Delft. His research interests are in the field of orchestration, governance, shared services, intermediaries, open data and infrastructures within constellations of public and private organizations. Marijn was recently designated as the top researcher in the area of eGovernance, and has been recognized as such several times in the last decade.
Claudia Werker

Claudia Werker

Claudia Werker is an associate professor in Economics of Technology and Innovation at the Department Technology, Policy and Management at Delft University of Technology. She is also visiting professor at the Research Area Technology, Innovation, Marketing and Entrepreneurship (TIME) at RWTH Aachen University. She has been teaching Bachelor, Master and PhD students in the field of Economics of Innovation and Technology. Claudia Werker received her PhD-degree in Economics (Dr. rer. pol.) from Freiberg University of Technology, Germany (summa cum laude). Starting with her PhD thesis she has been studying the creation and dissemination of innovation and knowledge in innovation systems. Currently, her recent research focuses on management of technology and innovation, the economic effects of big data and design for values.

Scott Cunningham

Scott Cunningham joined the faculty in 2004. Prior to joining TU Delft, he worked in the computer and software industry, creating analytical models for commercial clients. His work on national innovation indicators helps inform policy for the governments of the U.S., the U.K. and Malaysia. Scott Cunningham is interested in operations research and decision sciences approaches for policy making. In particular, he is interested in probabilistic models of social exchange. Other interests include building multi-actor systems theory through the economic sociology and innovation policy literatures. A recent publication is Tech Mining (with Alan Porter), a book on assessing new technology developments.

About this course

If you want to be the technology specialist who can procure and gain insight into cutting edge systems to help save lives and cut disaster losses, this Professional Certificate provides the foundational knowledge you need.

It is designed for recreational hobbyists, certified remote pilots, commercial operators, and public safety and government users.

This course covers unmanned aerial systems (UAS) to include drones and autonomous aerial vehicles, sensors, communications, ground control, navigation and other payloads that rely on complex algorithms that can be applied for protecting and saving lives and property.

In this edX Professional Certificate, you will learn the importance of autonomous systems and drone technologies that bring speed, efficiency and affordable solutions to disaster response and management. Topics include the use of drones by emergency managers, first responders, and search and rescue personnel responding to natural and manmade disasters.

No previous knowledge of drones or flight experience is required. Join as you start your drone journey.

Taught by highly experienced instructors and practitioners in military and civil UAS operations, practical applications, systems design, and emergency management planning, this course will provide the novice, subject-matter expert analyst, planner and operational associate with the technical understanding for infusing drone solutions into emergency management and planning.

Additionally, those who have a curiosity or general interest in drones, be it casual or in-depth, will benefit from this course to gain insight into emergency management, homeland security, and intelligence applications

What you’ll learn

  • Classification of disaster types according to hazard origin – natural, such as storms and flooding, earthquakes, tsunamis, volcanic eruption, flooding, wildfires, drought, epidemics; human-induced, such as criminal, terrorist, active shooter and accidental such as oil spills, train derailment; and humanitarian disasters such as famine and refugee/migration crises.
  • Tasks and applications – forecasting, command and control, disaster relief operations, structural analysis, rescue and recovery, and logistics.
  • Customer sets – governments (local, state, and national levels), NGOs, private contractors, defense, information technology, transportation, aeronautical, engineering and construction, agriculture, entrepreneurs, etc.
  • Examination of drone technologies used in emergency preparedness and response including platforms and missions, power, propulsion, payloads, emergency response communication system that use Unmanned Aerial Vehicles (UAVs); satellite communication (SATCOM) datalinks; and remote sensing.
  • How to develop technology implementation solutions based on a crisis scenario.
  • Critical infrastructure applications such as monitoring dams, highways, floods, food and agriculture, finance, national parks and monuments etc.
  • Future technology implications such as artificial intelligence, algorithms, 5-G technology, accelerated integration of multiple data sources, counter-UAS capabilities, weaponized hobbyist drones, and docking stations and tethers.

Syllabus

Week 1: Introduction to hazards, disasters and drone applications

Week 2: Global natural disasters and drone applications I

Week 3: Global natural disasters and drone applications II

Week 4: Man-made disasters and drone applications I

Week 5: Man-made disasters and drone applications II

Week 6: Future drone applications

Meet your instructor

Brian Powers, M.A.

Brian Powers is an associate professor and chair of the Intelligence Management Program at UMGC. Prior to joining UMGC, he served for 26 years in the United States Air Force as an intelligence officer serving in various operational and staff assignments at the Pentagon in the Air Staff, Joint Staff, and Undersecretary of Defense for Intelligence (USD(I); and three overseas Combatant Commands in the Europe, Middle East and Pacific regions. He has also worked 13 years in the private sector as an intelligence planner in strategy and policy at the National Geospatial-Intelligence Agency and Defense Intelligence Agency, and as a program director and educator. He holds a master’s degree in Business and Organizational Security from Webster University, a master’s degree in National Security Affairs from the U.S. Naval Postgraduate School, a master’s degree in International Relations from Creighton University.