About This Course:

Every business has a story. Accounting tells the financial story of a business. How much profit does the company make? Can the company afford to grow or pay its employees more? What are its assets and liabilities? Is the company in good credit or an investment risk? These types of questions can be answered through the use and understanding of the stories that financial statements tell.

In this course, you will explore standard business activities and follow them through to the financial statement phase to determine how those activities then contribute to the company’s profits. After taking this class, you should be able to:

  • Record and present financial information by applying the appropriate framework and guidelines of accounting for business transactions including:
    • Creating various financial statements based on various forms of financial data.
    • Analyzing financial data to inform decision-making using a given framework.
    • Explaining financial information to stakeholders to support business practices.
  • Determine asset accounts and their disclosure in the financial statements by:
    • Applying valuation methods to value account inventory
    • Determining account values
    • Developing financial statements
  • Determine liability and equity accounts and their disclosure in the financial statements by:
    • Identifying types of liabilities
    • Distinguishing between current and long-term liabilities
    • Evaluating financial impacts of long-term debt
    • Explaining the difference between retained earnings and owners’ equity
What You’ll Learn:
  • Record financial transactions according to industry standards
  • Prepare financial statements aligned with industry practices
  • Analyze the results of transactions and statements
  • Report financial information to appropriate stakeholders

Meet Your Instructors:

pearson advance :: Zuzana Buzzell

Zuzana Buzzell

Dr. Zuzana Buzzell oversees multiple programs within the graduate and undergraduate business portfolio at Southern New Hampshire University including accounting, economics and project management. She has 15 years of experience developing, training and teaching multiple successful accounting, finance and economics programs in traditional, hybrid and online settings for academic institutions, government agencies and the private sector. She also held various leadership positions in one of the largest financial service companies in the U.S. Dr. Buzzell earned her PhD in International Business with concentration in Finance in 2013, her master’s in finance in 2004 and an MBA in 2001.
pearson advance :: Mona Stephens

Mona Stephens

Mona Stephens has been teaching accounting courses, both online and campus, for more than 20 years. At Southern New Hampshire University, she is an online accounting faculty lead. She also serves as a subject matter expert for the university in all areas of accounting, based on her experience and knowledge in both educational and corporate accounting environments. Of Stephens’ 25 years of professional accounting experience, 18 of those were as the finance and accounting administrator for a regional government office. She is also Certified Public Accountant (CPA) and has MS degrees in both accounting and data analytics.

About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge to create eye-catching, appropriate business presentations, and apply proper techniques in their business communications, all while working in diverse environments. This program also examines the various types of business presentations in the work environment and allows learners to apply their knowledge to create a stunning presentation.

Professional Business Presentations, will dive into the world of presenting information both in written and verbal form using presentation templates or creating from scratch. This course discusses how to effectively create high-quality presentations with proper formatting, design elements (color scheme, layout, etc.), and organization. The learner will identify the appropriate presentation format and software for their audience. Learners will have the opportunity to utilize the skills gained to create an engaging PowerPoint presentation. Learners will also use their skills to create a professional handout with infographics and record a video presentation, graded by staff, as part of their final project in the course.

What You’ll Learn:

By the end of this course learners will be able to:

 Evaluate the organizational steps of a presentation

 Examine various supporting materials for presentations

 Evaluate and discuss various presentation software

 Examine design principles for presentations

 Discuss storytelling for presentations

 Develop a presentation

  • Present via video a polished presentation

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge to create appropriate business messages and apply proper business writing techniques in their written business communications, all while working in diverse environments. This program also examines the various types of business presentations in the work environment and allows learners to apply their knowledge to create and present their work.

Business Writing Techniques will expand on the different communication styles of business writers. We will discuss business writers’ best practices by providing real-world scenarios and applications such as proofreading and rewriting. Learners will examine how to use the 6 C’s to enhance their business messages. Learners will also discuss the proper etiquette of business writing and examine the use of emoji in business communications.

What You’ll Learn:

By the end of this course learners will be able to:

 Identify Parts of a business letter

 Examine the 6 C’s for business messages

 Evaluate Direct Vs. Indirect messages

 Examine the use of emojis in the business setting

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

The Business and Professional Communications for Success program will provide learners with the essential knowledge of effective business communications to aid in their company’s success. Learners will create appropriate business messages through business letters and messaging and apply proper business communications techniques and business writing techniques. Learners will examine the basics of business communication while working in diverse business environments with diverse team members. This program also examines the various types of business presentations in the work environment. It allows learners to apply their knowledge to create and present their work for internal and external communication.

Learners will engage with the fundamentals of business communication. Learners will discover different communication styles and how to address them in a business setting. Learners will also assess their listening styles and emotional intelligence and how both can affect their communication skills.

What You’ll Learn:

  • By the end of this course learners will be able to:
  • Define communication
  • Examine the communication principles
  • Identify the Communication Model
  • Identify ways to effectively listen
  • Identify their communication style
  • Examine Emotional Intelligence and its use in communication

Meet Your Instructor:

Debora Sepich - Pearson Advance

Debora Sepich

EdD MBA at Doane University
Debora Sepich is an entrepreneur turned educator who has spent the last 15 years blurring the lines between the world of work and the halls of education. Debora is the Director of Graduate Business and Technology Programs at Doane University. Prior to working at Doane University, she founded Dolphin Software, an environmental health and safety software company focused on supporting pharmaceutical companies, hospitals and other highly regulated industries focus on protecting people, the planet while also making sustainable profits. Debora is delighted to be marrying her years of applied business experience with online education.

About This Course:

Develop the skills necessary to create structured database environments using a relational database management system (RDBMS), such as MySQL, that incorporates basic processing functionality and allows for data management, data manipulation and data analysis. Learn about types of data and types of databases to store data, as well as design for scalability. You’ll also learn to prepare digital data storage using the relational model, including resolving integrity constraints, and proper assignments of primary and foreign keys. In addition, you’ll construct and analyze queries to address data requirements.

What You’ll Learn:

Understanding what SQL isHow to use SQL statements such as:SelectFromWhereHavingGroup byOrder byMaxMinCountCount distinctJoinsImport/exportReading schemasCreating database schemasImporting/exporting dataTroubleshooting queriesModifying tables and data structuresAnalyzing SQL outputs

Meet Your Instructors:

Scott Overmyer

Associate Dean of Information Technology at Southern New Hampshire University Dr. Overmyer started his career in the software field in 1983 with TRW, Inc. as a user interface designer and requirements engineer on the Space Defense Operations Center project in Colorado's Cheyenne Mountain NORAD Complex. After completing several government projects with TRW, he was appointed manager of TRW's Research and Technology Center in Virginia. He earned a Ph.D. in Information Technology (Information and Software Systems Engineering), while appointed as Research Instructor in George Mason University's Center of Excellence in Command, Control, Communications and Intelligence. Dr. Overmyer has nearly 10 years of industrial experience, followed by nearly 30 years of academic experience. During his academic career, he has been awarded 2 summer faculty fellowships at NASA's Johnson Space Center and has been a PI or co-PI on several National Science Foundation research grants. While an Associate Professor at Drexel University, he was also the Founding Director of the Pennsylvania Governor's School for Information Technology, a 5-week summer residential program for talented high school students. Internationally, he served at Subject Coordinator for both Software Engineering and Information Systems while at Massey University in NZ, and a (founding) Professor of Computer Science at Nazarbayev University in Astana, Kazakhstan, as well as Acting Chair of the Physics Department there. He is currently an Associate Dean for Information Technology for Southern New Hampshire University, and works remotely from his farm in South Dakota. On Dr. Overmyer’s free time, he enjoys researching artificial intelligence for automatic student assessment, online poker, and wine making.

Ben Tasker

Technical Program Facilitator – Data Science and Data Analytics at Southern New Hampshire University Ben Tasker owns his own consulting business, where he enjoys solving complex data science problems with innovative solutions for clients ranging from Fortune 500 companies, small businesses and even the White House. He believes any company can reach the next phase of machine learning, artificial intelligence or even basic data analytics and enthusiastically provides that expertise to his clients. He applies this knowledge daily as a technical program facilitator at Southern New Hampshire University, where he creates cutting edge data science programs. Ben also holds a clinical Professorship at the College System of New Hampshire, where he teaches data science topics at both the undergraduate and graduate level. Before he ventured into consulting and education, he was the manager of analytics and data warehousing for the Community College System of NH, where he managed 12 data scientists and helped developed an algorithm that kept students enrolled in college, flagging the students at the highest risk of failure. This flag allowed the colleges to deploy resources for each of those students, ultimately helping them complete college. He also earned a MS in Data Analytics and Data Science from the University of New Hampshire. In his free time, Ben can be found at his local Crossfit Gym, doing box jumps, hang power cleans and kettle bell swings

About This Course:

This course helps prepare you for positions that require the analysis of large data sets, providing the statistics foundation you’ll need for data analysis.

You’ll learn how to model real-world applications using statistical methods. You’ll also gain skills to set up those applications in statistical frameworks, solve the statistical problems using technology and apply those results to answer real business questions. By leveraging the pandas and matplotlib python libraries, you’ll gain exposure to tools used in data analysis, visualization, and data science.

What You’ll Learn:

Collect and classify dataSummarize data using visual and numeric techniquesQuantify answers to questions about estimating parameters using hypothesis test and confidence interval techniquesQuantify answers to questions about correlation between variables using linear regression techniques

Meet Your Instructors:

Ben Tasker

Technical Program Facilitator – Data Science and Data Analytics at Southern New Hampshire University Ben Tasker owns his own consulting business, where he enjoys solving complex data science problems with innovative solutions for clients ranging from Fortune 500 companies, small businesses and even the White House. He believes any company can reach the next phase of machine learning, artificial intelligence or even basic data analytics and enthusiastically provides that expertise to his clients. He applies this knowledge daily as a technical program facilitator at Southern New Hampshire University, where he creates cutting edge data science programs. Ben also holds a clinical Professorship at the College System of New Hampshire, where he teaches data science topics at both the undergraduate and graduate level. Before he ventured into consulting and education, he was the manager of analytics and data warehousing for the Community College System of NH, where he managed 12 data scientists and helped developed an algorithm that kept students enrolled in college, flagging the students at the highest risk of failure. This flag allowed the colleges to deploy resources for each of those students, ultimately helping them complete college. He also earned a MS in Data Analytics and Data Science from the University of New Hampshire. In his free time, Ben can be found at his local Crossfit Gym, doing box jumps, hang power cleans and kettle bell swings

David Sze

Technical Program Facilitator – Mathematics at Southern New Hampshire University David Sze has been teaching statistics and mathematics courses, both online and on campus, for more than 15 years. His current position includes developing, teaching and overseeing statistics and mathematics courses at Southern New Hampshire University. **** Before entering university fields, he worked in the software and telecommunications industries for more than 20 years. He held positions as a director of technology and software consulting and testing and as a technical analyst specializing in applied stochastic techniques. David Sze has a Ph. D. in Mathematics (Probability) and an M. S. in Statistics.

About This Course:

The Python programming language is extremely powerful and commonly used to automate time-intensive activities/tasks for users. This makes Python a good skill to have for any job that requires automation to replace data in a file, rename multiple file names, update Excel spreadsheets or mine data from web pages. Python can be used as a steppingstone to enter some of the most exciting industries including data science, artificial intelligence, machine learning, software or full-stack development.

What You’ll Learn:

Translate requirements to solve problems computationallyWrite scripts using syntax and conventions in accordance with industry standard best practicesDevelop a fully functional program using industry-relevant tools

Meet Your Instructors:

Gwen Britton

Associate Vice President, SNHU Global Campus STEM & Business Programs at Southern New Hampshire University
Dr. Gwen Britton has over 25 years in both private industry and academia within the science, technology, engineering and math (STEM) space. She has worked in varying positions spanning a gamut of content areas including software engineering, systems administration, network administration, data analysis, database administration and design, web development engineering, cyber-defense, mathematics and computer science.
Britton is passionate about expanding and growing STEM opportunities and access for individuals who otherwise would not have an opportunity to pursue a career in the STEM area. She has helped grow opportunities for non-traditional adult students from under-represented populations by spear heading virtual experiential learning opportunities and competitions in areas such as technology certification preparation, data analysis, internet of things and capture the flag. She has also helped organize and participate in events focused on under-represented K-12 student populations to engage and interest future STEM students in the field through events such as FIRST Robotics, the Hour of Code, Girls in Technology Day and the Science of Soccer.

Curtis George

Technical Program Facilitator for Computer Science at Southern New Hampshire University
Curtis George brings over 20 years of experience as a senior engineer working on various projects, from embedded systems for military aircraft to enterprise software for NASA/NOAA. Before working for SNHU, George worked as a senior software engineer for the NOAA Comprehensive Large Array-data Stewardship System (CLASS) project. He worked as a senior application engineer with NASA to create software for satellites for predicting hazardous weather patterns (GOES-R and JPSS), developed a roleplaying game to acclimate international students to American campuses and even created an award-winning Spanish verb conjugation mobile application. George started his career in the Navy on a special operations boat where he earned a Navy and Marine Corps Achievement medal, National Defense Service medal, Navy Expeditionary medal and a Meritorious Unit Commendation medal. He has worked for SNHU as the technical program facilitator for computer science for over 5 years. George earned his Bachelor of Science degree in computer science from Chapman University and his Master of Science degree in computer science from Nova Southeastern University. He is currently a PhD candidate for computer science at Northcentral University, which he expects to finish in 2021.

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Discover credentials utilizing hash dumpsPerform pass-the-hash attacksDocument results of the penetration testUtilize currently exploited systems to gain access to others.Configure exploitation tools to pivot through a target environment

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Apply methodology to penetration tests to ensure they are consistent, reproducible, rigorous, and under quality control.Analyze the results from automated testing tools to validate findings, determine their business impact, and eliminate false positives.Discover key application flaws.Use programming to create testing and exploitation scripts during a penetration test.Discover and exploit SQL Injection flaws to determine true risk to the victim organization.Create configurations and test payloads within other web attacks.Fuzz potential inputs for injection attacks.Explain the impact of exploitation of application flaws.Analyze traffic between the client and server application using tools.Discover and exploit Cross-Site Request Forgery (CSRF) attacks.

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year

About This Course:

This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

What You’ll Learn:

Explain what information is collected and analyzed through network security monitoring, and why monitoring is importantDefine network security monitoringSummarize the policies used in network security monitoringDefine an Intrusion Detection System/Intrusion Prevention System, and provide a real-world analogy for an IDSDefine the base rate fallacy and summarize an exampleSummarize the options for deploying an IDSDescribe common strategies attackers use to evade an IDSList potential indicators of a security attackDefine honeypots and honeynets and list their benefits to organizationsSummarize the goals of a firewallList and define four types of firewallsSummarize an example of a filtering ruleExplain the primary function of NATSummarize the advantages and disadvantages of proxy gatewaysExplain the process for setting up firewalls using IPTables and Netfilter in LinuxList the steps in an incoming packet’s journey through a Linux firewallSummarize the challenges that led to the development of IPv6 and explain how IPv6 addresses those challengesList the differences in IPv4 and IPv6 services and headersDifferentiate between IPv4 and IPv6 address formatsList and define IPv6 address typesList the differences between IPv4 and IPv6 address provisioningList the differences between DHCPv4 and DHCPv6Summarize dual-stack techniques for IPv4 and IPv6 devicesIdentify security threats common to IPv4 and IPv6, as well as threats exclusive to IPv6Describe how reconnaissance methods will change under IPv6List tools that can be use to compromise IPv6 networksDescribe the security considerations needed in dual-stack host environments

Meet Your Instructor:

Aspen Olmsted

Adjunct Professor at New York University Tandon School of Engineering Aspen Olmsted is an adjunct faculty member in the New York University Tandon School of Engineering in the Computer Science and Engineering department. Aspen's fulltime job is as an assistant professor and Graduate program director at the College of Charleston. He obtained a Ph.D. in Computer Science and Engineering from The University of South Carolina. Before his academic career, he was CEO of Alliance Software Corporation. Alliance Software developed N-Tier enterprise applications for the performing arts and humanities market. Dr Olmsted’s research focus is on the development of algorithms and architectures for distributed enterprise solutions that can guarantee security and correctness while maintaining high-availability. In his Secure Data Engineering Lab, Aspen mentors over a dozen graduate and undergraduate students each year