Cybersecurity for Leaders This comprehensive course is designed to teach how business and risk management expertise can be applied to cybersecurity oversight...
FlexStack: Python Data Modeling and Visualization 3 - Modeling and Machine Learning Harness the power of AI by implementing machine learning with the Scikit-learn library in Python during the third course of the FlexStack...
FlexStack: Python Data Modeling and Visualization 1 - Decision-Ready Data The first course in the FlexStack: Python Data Modeling and Visualization Certificate series introduces essential skills for performing data...
FlexStack: Python Data Modeling and Visualization 2 - Plot with Purpose The second course in the FlexStack: Python Data Modeling and Visualization Certificate focuses on teaching participants how to transform...
Comms Resilience: Avoid Detection, Resist Attack, Survive Attrition The purpose of resilient communications is to ensure the flow of data regardless of adversarial actions or environmental conditions. Three...
Introduction to 5G / FutureG Use Cases and Capabilities The 5G / FutureG Use Cases and Capabilities course provides a fundamental understanding of 5G networks, use cases, and capabilities, as well...
5G / FutureG Radio Access Network Essentials The 5G / FutureG Radio Access Network Essentials course provides a fundamental understanding of 5G RAN interfaces, waveforms, link budgets...
5G /FutureG Core Network Fundamentals The 5G / FutureG Core Network Fundamentals course provides a fundamental understanding of 5G Core components, interfaces and architecture of...
Digital Forensics Techniques for Embedded Systems Take a systematic approach. In Digital Forensics Techniques for Embedded Systems, you will explore the forensic investigation of the...
Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...