Data Privacy Concepts and Techniques This course explores data privacy through the lens of Artificial Intelligence, linking core principles to cutting-edge practice. After...
Mission-Ready Machine Learning Explore machine learning (ML) through hands-on projects grounded in real-world systems and data. This fully experiential course emphasizes...
Introduction to 5G / FutureG Use Cases and Capabilities The 5G / FutureG Use Cases and Capabilities course provides a fundamental understanding of 5G networks, use cases, and capabilities, as well...
5G / FutureG Radio Access Network Essentials The 5G / FutureG Radio Access Network Essentials course provides a fundamental understanding of 5G RAN interfaces, waveforms, link budgets...
5G /FutureG Core Network Fundamentals The 5G / FutureG Core Network Fundamentals course provides a fundamental understanding of 5G Core components, interfaces and architecture of...
Secure Software Development Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities...
Protecting Your Organization from Insider Threats In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While...
Fundamentals of Cyber Systems Test and Evaluation Primer Learn the foundational techniques and theories of how to apply test and evaluation (T&E) to the cyber domain. The Fundamentals of Cyber...
Introduction To Autonomous Unmanned Systems With the rapidly increasing interest and use of unmanned systems in defense, there is also an increasing interest in making these systems...
DevSecOps and Agile Defense Acquisition DevSecOps is a critical component in modern software engineering. Through DevSecOps principles and practices, an organization can deliver...