239 Results
-
Introduction to Malware
, Cybersecurity
5 Business Credits
Malicious software, better known as malware, has become a central element in not just cybersecurity but daily life. It has played a role in everything from our politics to our economy, to our personal lives.
-
Introduction to Management
, Management
3 Business Credits
This course is designed for current and soon-to-be managers seeking to understand the foundations of effective management.
-
Introduction to Negotiations
, Human Resource Management
3 Business Credits
We all negotiate every day. And even though negotiations are an integral part of our lives, techniques for managing these situations are not instinctive; they must be learned.
-
Introduction to Online Learning
, Learning
5 HR Credits
Learners who are engaging in online coursework have high expectations for their learning experience. And many institutions try to develop online coursework as a way to reduce cost and control the content of the training, but without regard for the co
-
Introduction to Small Business Management
, Small Business Management
3 Business Credits
Introduction to Small Business Management is designed for prospective and current small business owners, entrepreneurs, and managers who want to understand the basics of running a successful small business.
-
Issues Facing Women in Business
, Women in Business
3 HR Credits
This general awareness course will assess the representation of women in various domains, including sports, politics, education, STEM fields, pink-collar jobs, and managerial positions.
-
IT Access Control and Identity Management Scenarios
, Cybersecurity
5 Business Credits
Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security
-
IT Application Development for Cloud Computing
, Cybersecurity
5 Business Credits
This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications.
-
IT Application, Data, and Host Security Scenarios
, Cybersecurity
5 Business Credits
When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security.
-
IT Asset Security
, Cybersecurity
5 Business Credits
Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded.
-
IT Cloud Data Security
, Cybersecurity
5 Business Credits
This course is comprised of two modules. The first addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers.
-
IT Cloud Infrastructure and Platform Security
, Cybersecurity
5 Business Credits
This course is comprised of two modules. The first addresses many of the challenges for both cloud consumers and cloud service providers in securing the infrastructure and platforms used in cloud computing.