Updating search results...

Search Resources

63 Results

View
Selected filters:
  • security
Chinese Foreign Policy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture course provides students with a comprehensive introduction to the international relations of the People’s Republic of China. China’s foreign relations during the Cold War as well as contemporary diplomatic, security and economic issues will be examined to identify and explain China’s foreign policy goals and their implementation since 1949. Throughout, this course will investigate the sources of conflict and cooperation in China’s behavior, assessing competing explanations for key events and policies. Readings will be drawn from political science, history, and international relations theory.

Subject:
Political Science
Social Science
Sociology
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Fravel, M.
Date Added:
09/01/2005
Chinese Foreign Policy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course explores the leading theoretical and methodological approaches to studying China’s interaction with the international system since 1949. Readings include books and articles that integrate the study of China’s foreign policy with the field of international relations.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Fravel, M.
Date Added:
09/01/2013
CoSN Cybersecurity Staffing Resource for K-12
Unrestricted Use
CC BY
Rating
0.0 stars

Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and requires the creation of a culture of cybersecurity within each K-12 organization. This paper identifies and addresses staffing cybersecurity across the K-12 organization, including identifying several strategies for staffing cybersecurity within the school system. These strategies include developing focused cybersecurity positions; incorporating cybersecurity duties and responsibilities in all existing K-12 technology positions, leveraging cross-district collaboration and/or managed services to augment cybersecurity staffing; and expanding the expectation that cybersecurity is a responsibility of all members of the K-12 education community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
CoSN
Date Added:
10/05/2022
Comparative Grand Strategy and Military Doctrine
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course will conduct a comparative study of the grand strategies of the great powers (Britain, France, Germany and Russia) competing for mastery of Europe from the late nineteenth to the mid-twentieth century. Grand strategy is the collection of political and military means and ends with which a state attempts to achieve security. We will examine strategic developments in the years preceding World Wars I and II, and how those developments played themselves out in these wars. The following questions will guide the inquiry: What is grand strategy and what are its critical aspects? What recurring factors have exerted the greatest influence on the strategies of the states selected for study? How may the quality of a grand strategy be judged? What consequences seem to follow from grand strategies of different types? A second theme of the course is methodological. We will pay close attention to how comparative historical case studies are conducted.

Subject:
Arts and Humanities
History
Political Science
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Posen, Barry
Date Added:
09/01/2004
Comparative Security and Sustainability
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course focuses on the complexities associated with security and sustainability of states in international relations. Covering aspects of theory, methods and empirical analysis, the course is in three parts, and each consists of seminar sessions focusing on specific topics.

Subject:
Atmospheric Science
Physical Science
Political Science
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
09/01/2004
Computer Network Security
Unrestricted Use
CC BY
Rating
0.0 stars

This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Middlesex Community College
Author:
Ryan Fried
Date Added:
05/13/2019
Computer Systems Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Syllabus
Textbook
Author:
Ryan Tolboom
Date Added:
03/01/2023
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Database, Internet, and Systems Integration Technologies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course addresses information technology fundamentals, including project management and software processes, data modeling, UML, relational databases and SQL. Topics covered include internet technologies, such as XML, web services, and service-oriented architectures. This course provides an introduction to security and presents the fundamentals of telecommunications and includes a project that involves requirements / design, data model, database implementation, website, security and data network. No prior programming experience required.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Kocur, George
Date Added:
09/01/2013
Dementia, Big Data and Open Science
Unrestricted Use
Public Domain
Rating
0.0 stars

Although there is clear potential to improve science and innovation systems through big data and open science, barriers still remain with respect to data sharing efforts. How can the available massive and diverse data collections be used and shared more efficiently to boost global research and innovation and improve care? What actions are needed to facilitate open access to research data generated with public funding?

The OECD is bringing together policy makers, funding agencies and researchers to tackle the issue of open access to data, focused around developing good practice and principles on data governance. Four case studies highlight best practice and identify barriers to progress.

Following an OECD-hosted consultation with the Ontario Brain Institute (OBI), the United Kingdom Medical Research Council (MRC), and the US Alzheimer’s Association, two concrete examples of global data sharing have been created. The first, focused on providing a wealth of open-source biomedical data for the community (deep data), builds upon GAAIN, the Global Alzheimer’s Association Interactive Network, and links eleven international partners through a federated network of data resources. The capability of this network is being extended significantly through connections with the French National Alzheimer’s Database (BNA), the European Medicines Informatics Framework (EMIF), and the Canadian based Longitudinal Online Research and Imaging System (LORIS). The second focused on linking big data approaches at the population level (broad data), is a complementary collaboration between the Canadian Consortium on Neurodegeneration in Ageing and the Dementias Platform UK to share and analyse large-scale complex population-wide datasets from up to 2 million individuals, including imaging, genomics and health data.

As a result, these collaborations will enable the aggregation of an unprecedented volume of individual and population-level data, offering an open science solution to help research to more efficiently tackle Alzheimer’s disease and related disorders.

Subject:
Biology
Life Science
Material Type:
Reading
Author:
OECD
Date Added:
07/16/2021
Distributed Computer Systems Engineering
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course covers abstractions and implementation techniques for the design of distributed systems. Topics include: server design, network programming, naming, storage systems, security, and fault tolerance. The assigned readings for the course are from current literature. This course is worth 6 Engineering Design Points.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Morris, Robert
Date Added:
02/01/2006
Downtown Management Organizations
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course focuses on the origins, functions, and implications of downtown management organizations (DMOs), such as business improvement districts, in a variety of national contexts including the United States, Canada, South Africa, and the United Kingdom. It critically examines how a range of urban theories provide a rationale for the establishment and design of DMOs; the evolution and transnational transfer of DMO policy; and the spatial and political externalities associated with the local proliferation of DMOs. Particular emphasis is given to the role of DMOs in securing public space.

Subject:
Social Science
Sociology
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Hoyt, Lorlene
Date Added:
09/01/2006
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Field Seminar: International Relations Theory
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This seminar provides an overview of the field of international relations. Each week, a different approach to explaining international relations will be examined. By surveying major concepts and theories in the field, the seminar will also assist graduate students in preparing for the comprehensive examination and further study in the department’s more specialized offerings in international relations.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Fravel, M.
Date Added:
09/01/2011
Globalization, Migration, and International Relations
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries – with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Business and Communication
Economics
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
02/01/2006
Globalization, Migration, and International Relations
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries – with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Economics
Political Science
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
02/01/2006
Growing Up Digital-Provided by Baltimore County Public Schools
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.

Subject:
Education
Material Type:
Activity/Lab
Diagram/Illustration
Student Guide
Date Added:
07/10/2018
Hidden in Plain Sight
Read the Fine Print
Educational Use
Rating
0.0 stars

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
Identity Theft: Preventing, Detecting, and Responding
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Attribution: SANS Security Awareness In today's digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and knowing how to protect yourself are essential elements in safeguarding your online digital life. 

Subject:
Economics
Material Type:
Reading
Author:
Aujalee Moore
Date Added:
05/20/2024