Updating search results...

Search Resources

7 Results

View
Selected filters:
  • cyber-security
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Ethical Hacking
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum.
This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking.
Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath.
All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Provider:
Middlesex Community College
Date Added:
05/13/2019
Future Internet Opportunities teaching materials
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This course on "Future Internet Opportunities" consists of 10 modules, which are related to the subject from technical, social and business perspectives.

Each module is available at introductory, basic and advanced levels.

The material is developed as part of an Erasmus+ Strategic Partnership, and available for everyone to use, exploit and modify. The materials consist of a wide variety of materials: From Powerpoint slides, to interactive materials with videos and quizzes, assignments, and peer learning activities.

Subject:
Applied Science
Computer Science
Education
Engineering
Higher Education
Material Type:
Full Course
Teaching/Learning Strategy
Author:
Andreas Timm-Giel
Henry Scott
Iraklis Agiovlatisis
Jan Frick
Jose A Lazaro
Jose Gutierrez Lopes
Josep Sole Pareta
Lukasz Zabludowski
Marite Kirikova
Nga Phuong Tran
Raphael Elsner
Sukru M. Kuran
Thomas Laudal
Tuna Tugcu
Jens Myrup Pedersen
Date Added:
10/24/2017
International Relations Theory in the Cyber Age
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course examines cyber dynamics and processes in international relations from different theoretical perspectives. It considers alternative theoretical and empirical frameworks consistent with characteristic features of cyberspace and emergent transformations at all levels of international interaction. Theories examined include realism and neorealism, institutionalism and liberalism, constructivism, and systems theory and lateral pressure. The course also highlights relevant features and proposes customized international relations theory for the cyber age.
Students taking the graduate version are expected to pursue the subject in greater depth through reading and individual research.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
09/01/2015
NOVA Cybersecurity Lab Lesson Plan
Unrestricted Use
CC BY
Rating
0.0 stars

"Students explore how to keep their digital lives safe, spot cyber scams, and learn the basics of coding in this media-rich lesson plan from NOVA Labs. The lesson begins with students watching the Cybersecurity 101 video and discussing the online safety measures that they currently take. Next, students makes predictions about online safety best practices, complete the Level 1 challenges of the NOVA Cybersecurity Lab, and compare the best practices from the game with their predictions. Students reconvene for direct instruction on the best practices and key computer science terms and then finish the Cybersecurity Lab game. Finally, students complete the video quizzes with short-response discussion questions and can work on the Cybersecurity stories as homework reading assignments."

Subject:
Applied Science
Information Science
Material Type:
Activity/Lab
Provider:
PBS LearningMedia
Author:
Nova Labs
PBS
Date Added:
02/08/2023
Smart Grids: Modeling
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The smart grid of the future is a complex electrical power system. Its study, design, and management requires the integration of knowledge from various disciplines including sustainability, technology and mathematics.

Smart grids show a level of complexity and heterogeneity that often cannot be covered by analytical methods. Therefore, modeling and simulation are of great importance.

In this course, you will apply modeling tools to study and analyze the performance of your self-designed intelligent electrical power grid. By modeling smart grids, you will explore the integration of renewable energy sources into a grid, its dynamics, control and cyber security.

Subject:
Applied Science
Engineering
Information Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Author:
D. Gusain
I. Diab
P. Palensky
Date Added:
09/04/2020
System Safety
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course introduces the concepts of system safety and how to analyze and design safer systems. Topics include the causes of accidents in general, and recent major accidents in particular; hazard analysis, safety-driven design techniques; design of human-automation interaction; integrating safety into the system engineering process; and managing and operating safety-critical systems.

Subject:
Applied Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Leveson, Nancy
Date Added:
02/01/2016