Embedded Security Tools and Techniques: Hands-on Assessment Exercises Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile...
Modeling and Simulation of Phased-Array Antennas Phased array antennas are key, yet complicated sub-systems in modern radar, electronic warfare, and communications systems. Computer...
Cyber Warfare/Electronic Warfare Convergence This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic...
Process Safety Management - Mechanical Integrity Many employers who are required to comply with OSHA’s 1910.119 Process Safety Management (PSM) standard are not fully aware of what...
Advanced Process Safety Management - PSM II Many employers who are required to comply with OSHA’s 1910.119 Process Safety Management standard have received basic training in OSHA’s...
Developing Metrics that Matter to Motivate Performance Creating goals and metrics is only effective when you involve different levels of the organization, communicate those goals clearly, have...
Secure Software Development Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities...
Open Systems Architecting: Introduction to Open Systems Architecting Solutions for Decision Makers Many of today’s military acquisitions are complex systems that depend on the latest advances in embedded computing, networking, and...
Introduction to User Experience Design Design is an essential part of providing a great user experience (UX), offering the user what they need in the most efficient and satisfying...
Leading for Organizational Excellence Are you ready to elevate your leadership skills and drive organizational excellence? Join us for a transformative course where you'll delve...