Cybersecurity for Leaders This comprehensive course is designed to teach how business and risk management expertise can be applied to cybersecurity oversight...
Comms Resilience: Avoid Detection, Resist Attack, Survive Attrition The purpose of resilient communications is to ensure the flow of data regardless of adversarial actions or environmental conditions. Three...
Introduction to 5G / FutureG Use Cases and Capabilities The 5G / FutureG Use Cases and Capabilities course provides a fundamental understanding of 5G networks, use cases, and capabilities, as well...
5G / FutureG Radio Access Network Essentials The 5G / FutureG Radio Access Network Essentials course provides a fundamental understanding of 5G RAN interfaces, waveforms, link budgets...
5G /FutureG Core Network Fundamentals The 5G / FutureG Core Network Fundamentals course provides a fundamental understanding of 5G Core components, interfaces and architecture of...
Digital Forensics Techniques for Embedded Systems Take a systematic approach. In Digital Forensics Techniques for Embedded Systems, you will explore the forensic investigation of the...
Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...
Practical Data Science and Machine Learning for Engineers With the growing importance of data and data processing across all industries, it is critical for modern engineers to be nimble data...
Cyber Warfare/Electronic Warfare Convergence This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic...
Secure Software Development Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities...