Data Privacy Concepts and Techniques This course explores data privacy through the lens of Artificial Intelligence, linking core principles to cutting-edge practice. After...
Mission-Ready Machine Learning Explore machine learning (ML) through hands-on projects grounded in real-world systems and data. This fully experiential course emphasizes...
Comms Resilience: Avoid Detection, Resist Attack, Survive Attrition The purpose of resilient communications is to ensure the flow of data regardless of adversarial actions or environmental conditions. Three...
Cybersecurity for Leaders This comprehensive course is designed to teach how business and risk management expertise can be applied to cybersecurity oversight...
Introduction to 5G / FutureG Use Cases and Capabilities The 5G / FutureG Use Cases and Capabilities course provides a fundamental understanding of 5G networks, use cases, and capabilities, as well...
5G / FutureG Radio Access Network Essentials The 5G / FutureG Radio Access Network Essentials course provides a fundamental understanding of 5G RAN interfaces, waveforms, link budgets...
5G /FutureG Core Network Fundamentals The 5G / FutureG Core Network Fundamentals course provides a fundamental understanding of 5G Core components, interfaces and architecture of...
Agentic AI Foundations This course introduces the emerging paradigm of agentic artificial intelligence — AI systems capable of autonomous decision‑making, dynamic...
Digital Forensics Techniques for Embedded Systems Take a systematic approach. In Digital Forensics Techniques for Embedded Systems, you will explore the forensic investigation of the...
Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...