Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...
Cyber Warfare/Electronic Warfare Convergence This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic...
Secure Software Development Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities...
Protecting Your Organization from Insider Threats In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While...
Advanced Problem Solving Certificate The Advanced Problem Solving Certificate will teach you how to solve problems that can threaten not only productivity and profit, but can...
Enterprise Security Operations for Effective Cyber Defense This course will give students a baseline knowledge of enterprise security operations. Content will explore models and architectures of...
Secure Programming in C and C++ Frequently exploited software vulnerabilities are often caused by avoidable software defects. In this course, you will examine multiple...
Fundamentals of Cyber Systems Test and Evaluation Primer Learn the foundational techniques and theories of how to apply test and evaluation (T&E) to the cyber domain. The Fundamentals of Cyber...
Digital Forensics and Weapons Systems Primer In Digital Forensics and Weapons Systems Primer you will explore the forensic investigation of the combination of traditional workstations...
Artificial Intelligence to Solve Modern Challenges Artificial intelligence (AI) and machine learning (ML) can be integrated across organizations to improve services, provide better...