About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge to create eye-catching, appropriate business presentations, and apply proper techniques in their business communications, all while working in diverse environments. This program also examines the various types of business presentations in the work environment and allows learners to apply their knowledge to create a stunning presentation.

Professional Business Presentations, will dive into the world of presenting information both in written and verbal form using presentation templates or creating from scratch. This course discusses how to effectively create high-quality presentations with proper formatting, design elements (color scheme, layout, etc.), and organization. The learner will identify the appropriate presentation format and software for their audience. Learners will have the opportunity to utilize the skills gained to create an engaging PowerPoint presentation. Learners will also use their skills to create a professional handout with infographics and record a video presentation, graded by staff, as part of their final project in the course.

What You’ll Learn:

By the end of this course learners will be able to:

 Evaluate the organizational steps of a presentation

 Examine various supporting materials for presentations

 Evaluate and discuss various presentation software

 Examine design principles for presentations

 Discuss storytelling for presentations

 Develop a presentation

  • Present via video a polished presentation

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge to create appropriate business messages and apply proper business writing techniques in their written business communications, all while working in diverse environments. This program also examines the various types of business presentations in the work environment and allows learners to apply their knowledge to create and present their work.

Business Writing Techniques will expand on the different communication styles of business writers. We will discuss business writers’ best practices by providing real-world scenarios and applications such as proofreading and rewriting. Learners will examine how to use the 6 C’s to enhance their business messages. Learners will also discuss the proper etiquette of business writing and examine the use of emoji in business communications.

What You’ll Learn:

By the end of this course learners will be able to:

 Identify Parts of a business letter

 Examine the 6 C’s for business messages

 Evaluate Direct Vs. Indirect messages

 Examine the use of emojis in the business setting

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge of effective business communications to aid in their company’s success. Learners will create appropriate business messages through business letters and messaging and apply proper business communications techniques and business writing techniques. Learners will examine the basics of business communication while working in diverse business environments with diverse team members. This program also examines the various types of business presentations in the work environment. It allows learners to apply their knowledge to create and present their work for internal and external communication.

Learners will engage with the fundamentals of business communication. Learners will discover different communication styles and how to address them in a business setting. Learners will also assess their listening styles and emotional intelligence and how both can affect their communication skills.

What You’ll Learn:

  • By the end of this course learners will be able to:
  • Define communication
  • Examine the communication principles
  • Identify the Communication Model
  • Identify ways to effectively listen
  • Identify their communication style
  • Examine Emotional Intelligence and its use in communication

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Discover credentials utilizing hash dumpsPerform pass-the-hash attacksDocument results of the penetration testUtilize currently exploited systems to gain access to others.Configure exploitation tools to pivot through a target environment

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Apply methodology to penetration tests to ensure they are consistent, reproducible, rigorous, and under quality control.Analyze the results from automated testing tools to validate findings, determine their business impact, and eliminate false positives.Discover key application flaws.Use programming to create testing and exploitation scripts during a penetration test.Discover and exploit SQL Injection flaws to determine true risk to the victim organization.Create configurations and test payloads within other web attacks.Fuzz potential inputs for injection attacks.Explain the impact of exploitation of application flaws.Analyze traffic between the client and server application using tools.Discover and exploit Cross-Site Request Forgery (CSRF) attacks.

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Explain what information is collected and analyzed through network security monitoring, and why monitoring is importantDefine network security monitoringSummarize the policies used in network security monitoringDefine an Intrusion Detection System/Intrusion Prevention System, and provide a real-world analogy for an IDSDefine the base rate fallacy and summarize an exampleSummarize the options for deploying an IDSDescribe common strategies attackers use to evade an IDSList potential indicators of a security attackDefine honeypots and honeynets and list their benefits to organizationsSummarize the goals of a firewallList and define four types of firewallsSummarize an example of a filtering ruleExplain the primary function of NATSummarize the advantages and disadvantages of proxy gatewaysExplain the process for setting up firewalls using IPTables and Netfilter in LinuxList the steps in an incoming packet’s journey through a Linux firewallSummarize the challenges that led to the development of IPv6 and explain how IPv6 addresses those challengesList the differences in IPv4 and IPv6 services and headersDifferentiate between IPv4 and IPv6 address formatsList and define IPv6 address typesList the differences between IPv4 and IPv6 address provisioningList the differences between DHCPv4 and DHCPv6Summarize dual-stack techniques for IPv4 and IPv6 devicesIdentify security threats common to IPv4 and IPv6, as well as threats exclusive to IPv6Describe how reconnaissance methods will change under IPv6List tools that can be use to compromise IPv6 networksDescribe the security considerations needed in dual-stack host environments

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 5th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Define and apply a substitution cipherDefine cryptanalysisExplain at a high level the process by which a plaintext message is encrypted, transmitted, and decrypted.Describe at least two strategies for breaking an encryption schemeIdentify the differences between public key encryption, symmetric key encryption, and hashingList and summarize the characteristics of good ciphersDescribe the vulnerabilities of stream ciphersDefine AES and explain why it is recommended over 3DESDefine cipher block chainingList the steps in creating an RSA public/private key pairExplain why RSA is secureDefine message integrity and explain how it is ensuredDefine IPSec and list its servicesDefine authentication header and ESPExplain the primary goal of IKE and describe its sub-protocolsSummarize the five steps of IPSec OperationSummarize the history of SSLExplain how closure alerts can prevent a truncation attackIdentify the protocols that make up the SSL architectureDescribe how SSL/TLS provides protected channelsState the differences between IPSec and SSL VPN connectionsExplain why it’s important to consider Layer 2 securityDefine common Layer 2 attacksIdentify tools used in Layer 2 attacksDescribe countermeasures to Layer 2 attacks and security best practices to prevent attacksExplain the differences between the 2.4GHz and 5GHz spectrumsProvide definitions of basic wireless termsExplain how 802.11ac differs from earlier 802.11 standardsIdentify and define the types of 802.11 framesList and define the states of 802.11 sessionsList the steps in establishing an 802.11 sessionSummarize the existing wireless security protocols and state which protocols should not be usedSummarize WPA, WPA Enterprise, and generalized WiFi attacks

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 4th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Describe how “social engineering” can be used to compromise securityDefine the CIA triadIdentify and plan to manage risks in common situationsDefine a threat tree and threat matrix and explain how they are usedDefine an attack tree, explain how boolean and continuous node values are used in attack trees, and demonstrate how an attack tree can be used to determine vulnerabilitiesExplain why it is important for network engineers to understand cyber attack strategies.List and summarize the stages of network attack methodologyIdentify the information an attacker might collect during network reconnaissanceDescribe at least two “low tech” ways of performing reconnaissance on a targetPerform a WHOIS query and extract the IP address of a DNS serverList at least three publicly available tools used for gathering information on targetsDefine port scanning and describe the process used to determine whether a port is openDefine a proxy serverDefine IP spoofing, ingress filtering, and session hijackingDefine a Denial of Service attack and explain the difference between a DoS and DDoS attackState the relationship between DoS attacks and geopolitical eventsList at least two vulnerability attacks used in DoS attacksDefine SYN flooding and explain how it can be protected againstDescribe what happens during a standard DDoS attackExplain how DNS poisoning can be used in phishing attacksDescribe how URLs can be obfuscated to make a phishing attack more likely to succeedList at least two tools used to assess vulnerabilities in networksSummarize the typical goals of post-exploitation activityDescribe the strategies attackers use to maintain access to a compromised systemDefine trojans, viruses, worms, and blended threatsList the typical objectives of trojan creatorsDefine rootkitsGive examples of common uses of NetcatDefine wrappersSummarize common data exfiltration methodsSummarize how attackers can remove evidence of system compromise in Windows and Unix systems

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 3rd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Define Same-Origin PolicyDescribe SQL Injection and Common defensesDescribe Cross Site Request Forgery (XSRF) and Common DefensesDescribe Cross Site Scripting (XSS) and Common DefensesDiscuss different definitions of PrivacyDefine anonymityDefine contextual integrityDescribe Differential PrivacyDescribe Mix NetworksDescribe how Tor Provides AnonymityDefine Digital CertificatesDescribe the Trusted Platform Module (TPM)Describe DNS AmplificationDistinguish between Watermarking and SteganographyDescribe How Bit-Coin Prevents an Attacker from Faking a ChainDescribe Why Minors Validate TransactionsDescribe Why BitCoin Mining Consumes So Much Power and Some AlternativesDescribe Threats to the BitCoin EcoSystem

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Describe Strengths and Weaknesses of Data Encryption Standard (DES)Describe Strengths and Weaknesses of Advanced Encryption Standard (AES)Describe Public Key CryptographyDescribe Asymmetric Key AlgorithmsDefine Hash FunctionsDescribe Public Key SignaturesDescribe the Benefits of the Different Types of AuthenticationDefine access controlApply four types of access control (Discretionary, Mandatory, Role Based, and Unix/Linux File Access Control)Describe the use of the SetUID permission in Unix/LinuxAnalyze an access control scenario using an Access Control MatrixDifferentiate between ACL and CapabilitiesDescribe the use of a Reference MonitorDescribe the Security Mechanisms built into Chromium OSGive Examples of Covert Channels including both Timing Channels and Storage ChannelsDescribe the Purpose of an Operating System (OS)Differentiate between Type 1 and Type 2 HypervisorsDescribe Containers and their PurposeDescribe Sandbox Computation

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year