loader image
Skip to main content

Available courses

Sandbox

test bbb course

5 Lessons
Updated: Dec 2024
1 Enrolled

Master the Toolkit of AI and Machine Learning. Mathematics for Machine Learning and Data Science is a beginner-friendly Specialization where you’ll learn the fundamental mathematics toolkit of machine learning: calculus, linear algebra, statistics, and probability.

4 Lessons
Updated: Dec 2024
6 Enrolled
Sandbox

This is an introductory course that covers Earth materials and the processes that develop and modify the composition, structure, and topography of the earth.

1 Lessons
Updated: Jun 2024
8 Enrolled
5 Lessons
Updated: Jun 2024
8 Enrolled
Network Security

The class is tailored for work in support of DOT&E, on the fundamental concepts needed to integrate cybersecurity considerations into the operational testing of acquisition programs. This training session will provide an overview and history of relevant DOT&E Procedures, cybersecurity concepts and definitions, operational testing, oversight activities and examine persistent myths and misunderstandings surrounding operational testing with cybersecurity. Objectives: - Introduction provides a brief course overview and history of the relevant DOT&E Procedures. - Cybersecurity Concepts and Definitions reviews key cybersecurity concepts and terminology. - Operational Testing with Cybersecurity explores descriptors, concepts, and test methods that inform test strategy and design. - Oversight Activities with Cybersecurity reviews cyber aspects of oversight—meetings, document reviews, test observations, reports. - For the Record examines persistent myths and misunderstandings surrounding operational testing with cybersecurity.

7 Lessons
Updated: Jun 2024
13 Enrolled

This presentation discusses a methodology to use knowledge of cyber attacks and defender responses from operational assessments to gain insights into the defensive posture and to inform a strategy for improvement. The concept is to use the attack thread as the instrument to probe and measure the detection capability of the cyber defenses. The data enable a logistic regression approach to provide a quantitative basis for the analysis and recommendations.

5 Lessons
Updated: Jun 2024
11 Enrolled

This presentation discusses a methodology to use knowledge of cyber attacks and defender responses from operational assessments to gain insights into the defensive posture and to inform a strategy for improvement. The concept is to use the attack thread as the instrument to probe and measure the detection capability of the cyber defenses. The data enable a logistic regression approach to provide a quantitative basis for the analysis and recommendations.

5 Lessons
Updated: Jun 2024
10 Enrolled
Network Security - ECC Approved

The course provides hands on laboratory exploration of adversarial cyber threats to DOD networks and weapon systems. No previous experience in cybersecurity is necessary. Students will learn and execute (in the lab environment) basic offensive cyber techniques, develop system requirements to defeat the threats, implement countermeasures and assess countermeasures effectiveness. Two days are spent on enterprise network attacks and security countermeasures and one day is spent working with an unmanned aerial system simulator which is representative of currently fielded DOD unmanned weapon systems. The inclusion of offensive techniques training for DoD weapon systems differentiates this workshop from similar training provided in the commercial sector. Critical Behaviors: Upon completion of this workshop the student will in their work environment, be able to: 1. Write system cybersecurity performance requirements from the perspective of defeating adversarial attacks. 2. Provide subject matter expertise at system design reviews regarding architectures and designs that are necessary to defeat cyber attacks on a system. 3. Assume a leadership role in developing and executing cooperative and adversarial cybersecurity test and evaluation plans and procedures. 4. Identify exploitable weaknesses in operating systems and software code using COTS tools across multiple computing platforms and devices. 5. Train program office personnel on cyber attack vectors including removable media, insider threats, social engineering, network and wireless access points.

5 Lessons
Updated: Jun 2024
12 Enrolled
Network Security - ECC Approved

The workshop introduces several methods to help guide the implementation of the core cybersecurity principles across the DoD acquisition lifecycle. The workshop will reinforce the importance of balancing People, Process, and Technology, which are critical to designing and maintaining cyber resilient systems. Participants will be introduced to foundational knowledge of cybersecurity as it relates to the DoD Acquisition Lifecycle. Students will learn how cybersecurity principles apply to their career fields. The case studies in the workshop will allow participants to explore cybersecurity integration and risk management issues similar to the ones that they will likely face in their workplaces. The workshop is tailorable to the specific customer needs.

5 Lessons
Updated: Jun 2024
9 Enrolled
Network Security - ECC Approved

The JDN is comprised of multiple interconnected data networks across all the warfighting domains that link command and control systems across the United States Armed Forces. It provides near real-time, fused operational information to facilitate situational awareness (across the air, land, maritime, special, intelligence, space, and cyber domains) and enhances decision-making. The purpose of this module is to familiarize the user with some of the terminology and concepts of JDN operations. This module describes the mission, background, data management, and data sources of JDN operations and focuses on the relationship between the CTP and the COP. This module covers the roles and responsibilities of the JDN Operations Officer (JDNO).

5 Lessons
Updated: Jun 2024
9 Enrolled

Design, production, communication and promotion are all part of art management, in which the art manager is the central player.Management can be seen as a craft, a skill that can be learned and honed through practice and experience.

9 Lessons
Updated: Dec 2024
3 Enrolled
Management - ECC Approved

ACE Military Guide 'Cyber Security' University Facilty in Project Mangement Cyber Security deptIs it Networking or really SecurityOver series of engangement conversations beyond what JST saysthis is what they are actually learning, syslabus and prograamExample: CyberSecity MOS Joint Cyber Anaysis course JCAC beyonf ACE_Assign based on specific Majors, not just electivesResults of training service memeber are able to qualify for Certifications_Transfer credit for Certification in Cyber SecurityACE recomnend and what Faculty in Academic dept became bridge ofwaht military teaches and faculty understand

7 Lessons
Updated: Jul 2024
5 Enrolled
Management - ECC Approved

Learn the skills Product Managers use every day. Vision, strategy, & advanced metrics for Product Managers

5 Lessons
Updated: Jun 2024
15 Enrolled

This is the introductory course for Python for Beginners.  Please start here if you have no experience coding in Python.  This course is self-paced; you can proceed through the course, but need to complete each unit before moving on to the next unit.

10 Lessons
Updated: Jun 2024
Computer Science - ECC Approved

This course introduces the concepts and understanding of the field of computer security and how it relates to other areas of information technology.

1 Lessons
Updated: Oct 2024
9 Enrolled

  We all belong to many groups; you’re a member of your sociology class, and you’re a member of your family; you may belong to a political party, sports team, or the crowd watching a sporting event; you’re a citizen of your country, and you’re a part of a generation. You may have a somewhat different role in each group and feel differently in each. Groups vary in their sizes and formalities, as well as in the levels of attachment between group members, among other things. Within a large group, smaller groups may exist, and each group may behave differently. At a rock concert, for example, some may enjoy singing along, others prefer to sit and observe, while still others may join in a mosh pit or try crowd surfing. Why do we feel and act differently in different types of social situations? Why might people of a single group exhibit different behaviors in the same situation? Why might people acting similarly not feel connected to others exhibiting the same behavior? These are some of the many questions sociologists ask as they study people and societies.    

5 Lessons
Updated: Jun 2024
12 Enrolled