Search Results (46)

View
Selected filters:
  • Security
Advanced Computer Security
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
04/20/2018
Algorithim Design and Analysis
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and Welcome to Advanced computer Security Module. This module provides a study of high-level computer security issues in computer networks and advanced methods of data encryption. It focuses on advanced aspects of computer security, such as encryption, security practices, system security, security for authentication on the Web and password management techniques. Finally this module, students should be able to create secure network architectures adapted to the investment level and required security. Take responsibility for installation, configuration and network security maintenance.

The module aims to give IT infrastructure management skills, where the role of computer security is critical to ensure the integrity of data and the normal operation of the various systems: computer networks, servers and personal computers in the organization. The course will also explore various Information Security controls, how to handle various risk assessment in an organization and finally creating a security policy in organization.

Today, we note that the information is considered the key business of an organization / company due to its usefulness and importance, however, the issue of the company’s Information Security is a priority task for managers, because they recognize the value it has and therefore organizations must make sure that it is managed effectively. For this reason, this module is important because you will learn the methods and tools for computer security that can ensure the confidentiality of information in organizations and also learn how to protect their information and systems in a network environment.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
02/22/2018
Attacks on American Soil: Pearl Harbor and September 11
Conditions of Use:
No Strings Attached
Rating

This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.

Subject:
U.S. History
World History
Material Type:
Primary Source
Provider:
Digital Public Library of America
Provider Set:
Primary Source Sets
Author:
Albert Robertson
Date Added:
01/20/2016
Chinese Foreign Policy, Fall 2005
Conditions of Use:
Remix and Share
Rating

This lecture course provides students with a comprehensive introduction to the international relations of the People's Republic of China. China's foreign relations during the Cold War as well as contemporary diplomatic, security and economic issues will be examined to identify and explain China's foreign policy goals and their implementation since 1949. Throughout, this course will investigate the sources of conflict and cooperation in China's behavior, assessing competing explanations for key events and policies. Readings will be drawn from political science, history, and international relations theory.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Fravel, M
Date Added:
01/01/2005
Comparative Grand Strategy and Military Doctrine, Fall 2004
Conditions of Use:
Remix and Share
Rating

A comparative study of the grand strategies and military doctrines of the great powers in Europe (Britain, France, Germany, and Russia) from the late nineteenth to the mid-twentieth century. Examines strategic developments in the years preceding and during World Wars I and II. What factors have exerted the greatest influence on national strategies? How may the quality of a grand strategy be judged? Exploration of comparative case study methodology also plays a central role. What consequences seem to follow from grand strategies of different types? Open to undergraduates with permission of instructor.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Posen, Barry
Date Added:
01/01/2004
Comparative Security and Sustainability, Fall 2004
Conditions of Use:
Remix and Share
Rating

This course focuses on the complexities associated with security and sustainability of states in international relations. Covering aspects of theory, methods and empirical analysis, the course is in three parts, and each consists of seminar sessions focusing on specific topics.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2004
Computing and Society
Conditions of Use:
No Strings Attached
Rating

The primary goal of the course is to develop computer professionals able to explore the implications of what computing professionals create as part of their work and how this impacts society at large. It will help the learner to understand the development, application and consequences of computing technology in relation to society.

In this course, you will learn about the history of computing; principles, concepts and terminology of computing, software uses, application and development; role of computing professionals; current computing technologies and their use in everyday life, examination of variety of computing perspectives such as access to information, privacy, computer security, virtual society, transformation of work and workplace; social, ethical and legal issues and their implications to computing in our daily lives as a society; professional aspects of computing.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
William Korir
Date Added:
08/06/2018
Data Privacy Project: Curriculum
Conditions of Use:
No Strings Attached
Rating

Welcome to the curriculum page for the Data Privacy Project. We are pleased to share a set of learning tools that was created with and for library professionals. The curriculum contains a facilitator’s guide, presentation slides, and handouts, and permits remix and reuse under a Share Alike 4.0 Creative Commons license.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Data Privacy Project: Overview
Conditions of Use:
No Strings Attached
Rating

The goal of our trainings is to learn the building blocks of privacy protection and digital security. Our teachings focus on activities patrons do every day at the library so that library staff can develop capacity.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Database, Internet, and Systems Integration Technologies, Fall 2013
Conditions of Use:
Remix and Share
Rating

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to components and middleware. Introduction to design and implementation of multi-tier architectures, benchmarks, and performance. Data networking protocols and technologies. Students complete project that covers requirements/design, data model, database implementation, web site, and system architecture. This course is an intensive review of information technology. It covers topics in software development methods, data modeling and databases, application development, Web standards and development, system integration, security, and data communications. Most of the homework sets lead the class through a project in which a database and Web application are designed and constructed, using good software process and addressing security, network and other issues. The project, which is done in two-person teams, provides hands-on experience to complement the lectures and readings. Recitations discuss readings and provide more detailed information on the software tools used. The course goal is to cover the key concepts in the major areas of information technology, to enable students to successfully understand, work with and manage IT efforts as part of supply chain, transportation or civil engineering projects.

Subject:
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Kocur, George
Date Added:
01/01/2013
Database Management Systems
Conditions of Use:
Remix and Share
Rating

A more formal approach to Relational Database Management Systems, compared the way they were covered during Web Applications. Database systems are discussed from the physical layer of B-trees and file servers to the abstract layer of relational design. Also includes alternative and generic approaches to database design and database management system including relational, object-relational, and object-oriented systems, SQL standards, algebraic query languages, integrity constraints, triggers, functional dependencies, and normal forms. Other topics include tuning database transactions, security from the application perspective, and data warehousing.

Material Type:
Assessment
Full Course
Homework/Assignment
Lecture
Reading
Provider:
ArsDigita University
Provider Set:
ArsDigita University
Author:
Ravi Jasuja
Date Added:
02/16/2011
Defense Politics, Spring 2006
Conditions of Use:
Remix and Share
Rating

This course focuses on the institutional relationships that affect the raising, maintenance and use of military forces in the United States. It is about civil/military, government/industry, military/science and military service/military service relations. It examines how politicians, defense contractors, and military officers determine the military might of the United States and analyzes the military strategies of the nation and the bureaucratic strategies of the armed services, contractors, and defense scientists. It offers a combination of military sociology, organizational politics, and the political economy of defense.

Subject:
Sociology
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Sapolsky, Harvey
Date Added:
01/01/2006
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Conditions of Use:
No Strings Attached
Rating

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Finance Theory II, Spring 2003
Conditions of Use:
Remix and Share
Rating

Continuation of Finance Theory I, concentrating on corporate financial management. Topics: Capital investment decisions, security issues, dividend policy, optimal capital structure, hedging and risk management, futures markets and real options analysis. The objective of this course is to learn the financial tools needed to make good business decisions. The course presents the basic insights of corporate finance theory, but emphasizes the application of theory to real business decisions. Each session involves class discussion, some centered on lectures and others around business cases.

Subject:
Business and Communication
Finance
Management
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Jenter, Dirk
Date Added:
01/01/2003
Globalization, Migration, and International Relations, Spring 2006
Conditions of Use:
Remix and Share
Rating

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries -- with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2006
Great Power Military Intervention, Fall 2013
Conditions of Use:
Remix and Share
Rating

This course examines systematically, and comparatively, great and middle power military interventions, and candidate military interventions, into civil wars from the 1990s to the present. These civil wars did not easily fit into the traditional category of vital interest. These interventions may therefore tell us something about broad trends in international politics including the nature of unipolarity, the erosion of sovereignty, the security implications of globalization, and the nature of modern western military power.

Subject:
Journalism
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Peterson, Roger
Posen, Barry
Date Added:
01/01/2013
Growing Up Digital-Provided by Baltimore County Public Schools
Conditions of Use:
Remix and Share
Rating

This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.

Subject:
Education
Material Type:
Activity/Lab
Diagram/Illustration
Student Guide
Author:
MSDE Admin
andrew robertson
Date Added:
07/11/2018
Hidden in Plain Sight
Conditions of Use:
Read the Fine Print
Rating

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Computer Science
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
An Implementation of Steganography
Conditions of Use:
Read the Fine Print
Rating

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Computer Science
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
Information Technology Essentials, Spring 2005
Conditions of Use:
Remix and Share
Rating

Subject covers technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. Special emphasis on networks and distributed computing, including the web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications and business process redesign, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools. Primarily for Sloan master's students.

Subject:
Information Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Malone, Thomas
Date Added:
01/01/2005
Inquiry Based Project: Privacy v. Security
Conditions of Use:
Remix and Share
Rating

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Author:
Molly Miner
Date Added:
12/17/2018
Introduction to Computer Security
Conditions of Use:
No Strings Attached
Rating

Introduction to computer security module provides an essential study of computer security issues and methods in networked systems. It focuses on all the processes and mechanisms by which computer based devices, information as well as services are protected from unauthorized users.

Finishing this module, students will have fundamental concepts of computer security and be able to design and develop authentication systems and security systems. Students will be able to learn different types Attacks, threats, vulnerabilities and Prevention Mechanisms in computer. They will be able to understand different types of malicious software and software security.

This module is important because students learn the methods and tools in computer security and they also learn how to secure operations in a networked environment

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
02/10/2018
Introduction to Housing, Community and Economic Development, Fall 2003
Conditions of Use:
Remix and Share
Rating

Explores how public policy and private markets affect housing, economic development, and the local economy; provides an overview of techniques and specified programs policies and strategies that are (and have been) directed at neighborhood development; gives students an opportunity to reflect on their personal sense of the housing and community development process; emphasizes the institutional context within which public and private actions are undertaken.

Subject:
Economics
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Keyes, Langley C.
Date Added:
01/01/2003
Introduction to Technology and Policy, Fall 2006
Conditions of Use:
Remix and Share
Rating

Frameworks and Models for Technology and Policy students explore perspectives in the policy process -- agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises for Technology and Policy students include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership. This course explores perspectives in the policy process - agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership.

Subject:
Engineering
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Weigel, Annalisa
Date Added:
01/01/2006
Living in an era of global terror
Conditions of Use:
Remix and Share
Rating

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/21/2017
Living in an era of global terror
Conditions of Use:
Remix and Share
Rating

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/22/2017
Medical Computing, Spring 2003
Conditions of Use:
Remix and Share
Rating

The focus of the course is on medical science and practice in the age of automation and the genome, both present and future. It includes an analysis of the computational needs of clinical medicine, a review systems and approaches that have been used to support those needs, and an examination of new technologies.

Subject:
Computer Science
Health, Medicine and Nursing
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Ohno-Machado, Lucila
Date Added:
01/01/2003
NSA Surveillance: A Debate
Conditions of Use:
No Strings Attached
Rating

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
Nuclear Weapons in International Politics: Past, Present and Future, Spring 2009
Conditions of Use:
Remix and Share
Rating

" This course will expose students to tools and methods of analysis for use in assessing the challenges and dangers associated with nuclear weapons in international politics. The first two weeks of the course will look at the technology and design of nuclear weapons and their means of production. The next five weeks will look at the role they played in the Cold War, the organizations that managed them, the technologies that were developed to deliver them, and the methods used to analyze nuclear force structures and model nuclear exchanges. The last six weeks of the course will look at theories and cases of nuclear decision making beyond the original five weapon states, and will look particularly at why states pursue or forego nuclear weapons, the role that individuals and institutions play, and the potential for both new sources of proliferation and new consequences."

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Cote, Owen
Walsh, James
Date Added:
01/01/2009
Operating Systems
Conditions of Use:
Read the Fine Print
Rating

The course presents an overview of the history and structure of modern operating systems, analyzing in detail each of the major components of an operating system, and exploring more advanced topics in the field, such as security concerns. Upon successful completion of this course, the student will be able to: explain what an operating system does and how it is used; identify the various components of a computer system and how they interact with an operating system; describe the differences between a 32-bit and 64-bit operating system; explain the different types of operating systems and the major ones in use today; discuss the importance and use of threads and processes in an operating system; describe concurrency; explain the difference between a thread and a process; discuss context switching and how it is used in an operating system; describe synchronization; explain a race condition; discuss interprocess communication; describe how semaphores can be used in an operating system; discuss three of the classic synchronization problems; explain the alternatives to semaphores; discuss CPU scheduling and its relevance to operating systems; explain the general goals of CPU scheduling; describe the differences between pre-emptive and non-preemptive scheduling; discuss four CPU scheduling algorithms; explain what deadlock is in relation to operating systems; discuss deadlock prevention, avoidance, and their differences; describe deadlock detection and recovery; explain the memory hierarchy; discuss how the operating system interacts with memory; describe how virtual memory works; discuss three algorithms for dynamic memory allocation; explain methods of memory access; describe paging and page replacement algorithms; describe a file system and its purpose; discuss various file allocation methods; explain disk allocation and associated algorithms; discuss types of security threats; describe the various types of malware; explain basic security techniques; explain basic networking principles; discuss protocols and how they are used; explain reference models, particularly TCP/IP and OSI. (Computer Science 401)

Subject:
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Privacy and Security for Teens
Conditions of Use:
Remix and Share
Rating

How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)

Subject:
Information Science
Electronic Technology
Material Type:
Lesson Plan
Author:
Alyssa King
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditions of Use:
Remix and Share
Rating

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018
Reading and Analyzing Text in the Context of a Societal Issue: Privacy
Conditions of Use:
Remix and Share
Rating

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Author:
Cheryl Clark
Date Added:
01/26/2017
Reading and Analyzing Text in the Context of a Societal Issue: Privacy  - Remix
Conditions of Use:
Remix and Share
Rating

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Author:
Sammy Tanui
Date Added:
01/03/2018
Risk Assessment
Conditions of Use:
No Strings Attached
Rating

Risks vary from person to person. For example, a Visa card data breach impacts anyone who uses these cards, but a person who does not have a credit card will not need to worry about this. Patrons that use social media need to consider their privacy settings on those sites, as well as the terms of service of those companies. Journalists may need to protect who they contact, in addition to the content of their conversations. Depending on your risk, you’ll need different privacy "armor" that's appropriate for your particular situation.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
SKILLWIND -  the European training program & serious game in wind farms maintenance
Rating

SKILLWIND is a project funded by the Action "Strategic Partnerships" of the Erasmus+ Programme of the European Commission, specifically by the KA2: "Cooperation for innovation and the exchange of good practices" whose aim is to create a homogenous European training program in wind farms maintenance which includes a serious game to evaluate the knowledge acquired.

MAIN GOALS OF THE PROJECT:

• To standardise at European level the necessary skills to adequately qualify wind industry professionals, specially the capabilities of workers in operation and exploitation of wind farms.
• To develop an innovative training in the wind energy sector through the design and programming of a serious game, specifically aimed to solve the most critical aspects of the activities of maintenance, health and safety, thus creating a safe working environment.
• To promote the professional development of workers and the competitiveness of the industry.

PARTICIPATING ORGANIZATIONS:
The consortium is composed of five European partners with an extensive experience in the vocational training of this sector:
• AEE (Spanish Wind Energy Association): Spain
• SGS TECNOS (Multinational Company expert in vocational training): Spain
• ANEV (Italian Wind Energy Association): Italy
• BRUNEL UNIVERSITY LONDON (University): UK
• WindEurope: (European Association of Wind Energy) Belgium

Subject:
Engineering
Environmental Science
Electronic Technology
Material Type:
Case Study
Full Course
Game
Interactive
Module
Author:
Asociación Empresarial eólica
Associazione Nazionale Energia del Vento
Brunel University
SGS Tecnos
WIndEurope
Date Added:
12/26/2017
Security
Conditions of Use:
Remix and Share
Rating

This unit covers common security concerns and safeguards, including firewalls, encryption, virus protection software and patterns, and programming for security. Additional topics include security of wireless networks, and concerns, mitigations, and regulations related to healthcare applications.

Subject:
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Security and Nigerians’ Education in the Digital Future
Rating

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/14/2018
Security and Nigerians’ Education in the Digital Future
Rating

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/10/2018