Updating search results...

Search Resources

16 Results

View
Selected filters:
  • security
Chinese Foreign Policy, Fall 2005
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture course provides students with a comprehensive introduction to the international relations of the People's Republic of China. China's foreign relations during the Cold War as well as contemporary diplomatic, security and economic issues will be examined to identify and explain China's foreign policy goals and their implementation since 1949. Throughout, this course will investigate the sources of conflict and cooperation in China's behavior, assessing competing explanations for key events and policies. Readings will be drawn from political science, history, and international relations theory.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Fravel, M
Date Added:
01/01/2005
Comparative Grand Strategy and Military Doctrine, Fall 2004
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A comparative study of the grand strategies and military doctrines of the great powers in Europe (Britain, France, Germany, and Russia) from the late nineteenth to the mid-twentieth century. Examines strategic developments in the years preceding and during World Wars I and II. What factors have exerted the greatest influence on national strategies? How may the quality of a grand strategy be judged? Exploration of comparative case study methodology also plays a central role. What consequences seem to follow from grand strategies of different types? Open to undergraduates with permission of instructor.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Posen, Barry
Date Added:
01/01/2004
Comparative Security and Sustainability, Fall 2004
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course focuses on the complexities associated with security and sustainability of states in international relations. Covering aspects of theory, methods and empirical analysis, the course is in three parts, and each consists of seminar sessions focusing on specific topics.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2004
Cybersecurity Instructor’s Assessment and Skills Guide
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This guide was put together to provide resources, tools, and assignment suggestions for assessing student’s understanding of cybersecurity content. More importantly, to create a resource that has all this information in one place. The guide is broken up into assignment suggestions and appendices. It begins with suggested assignments for some cybersecurity courses. Assignments begins with a description of the assignment along with expected outcomes. Below this information is the assignment instructions or reference to a provided worksheet. Each assignment will list if there is a rubric or worksheet associated with it.

Subject:
Computer Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Rubric
Author:
Lakisha Ferebee
Date Added:
05/24/2021
Database, Internet, and Systems Integration Technologies, Fall 2013
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to components and middleware. Introduction to design and implementation of multi-tier architectures, benchmarks, and performance. Data networking protocols and technologies. Students complete project that covers requirements/design, data model, database implementation, web site, and system architecture. This course is an intensive review of information technology. It covers topics in software development methods, data modeling and databases, application development, Web standards and development, system integration, security, and data communications. Most of the homework sets lead the class through a project in which a database and Web application are designed and constructed, using good software process and addressing security, network and other issues. The project, which is done in two-person teams, provides hands-on experience to complement the lectures and readings. Recitations discuss readings and provide more detailed information on the software tools used. The course goal is to cover the key concepts in the major areas of information technology, to enable students to successfully understand, work with and manage IT efforts as part of supply chain, transportation or civil engineering projects.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Kocur, George
Date Added:
01/01/2013
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Finance Theory II, Spring 2003
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Continuation of Finance Theory I, concentrating on corporate financial management. Topics: Capital investment decisions, security issues, dividend policy, optimal capital structure, hedging and risk management, futures markets and real options analysis. The objective of this course is to learn the financial tools needed to make good business decisions. The course presents the basic insights of corporate finance theory, but emphasizes the application of theory to real business decisions. Each session involves class discussion, some centered on lectures and others around business cases.

Subject:
Business and Finance
Finance
Management
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Jenter, Dirk
Date Added:
01/01/2003
Globalization, Migration, and International Relations, Spring 2006
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries -- with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2006
Great Power Military Intervention, Fall 2013
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course examines systematically, and comparatively, great and middle power military interventions, and candidate military interventions, into civil wars from the 1990s to the present. These civil wars did not easily fit into the traditional category of vital interest. These interventions may therefore tell us something about broad trends in international politics including the nature of unipolarity, the erosion of sovereignty, the security implications of globalization, and the nature of modern western military power.

Subject:
Communications & Media
Journalism
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Peterson, Roger
Posen, Barry
Date Added:
01/01/2013
Information Technology Essentials, Spring 2005
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Subject covers technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. Special emphasis on networks and distributed computing, including the web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications and business process redesign, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools. Primarily for Sloan master's students.

Subject:
Applied Science
Information Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Malone, Thomas
Date Added:
01/01/2005
Introduction to Housing, Community and Economic Development, Fall 2003
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Explores how public policy and private markets affect housing, economic development, and the local economy; provides an overview of techniques and specified programs policies and strategies that are (and have been) directed at neighborhood development; gives students an opportunity to reflect on their personal sense of the housing and community development process; emphasizes the institutional context within which public and private actions are undertaken.

Subject:
Economics
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Keyes, Langley C.
Date Added:
01/01/2003
Introduction to Technology and Policy, Fall 2006
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Frameworks and Models for Technology and Policy students explore perspectives in the policy process -- agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises for Technology and Policy students include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership. This course explores perspectives in the policy process - agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership.

Subject:
Engineering
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Weigel, Annalisa
Date Added:
01/01/2006
Medical Computing, Spring 2003
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The focus of the course is on medical science and practice in the age of automation and the genome, both present and future. It includes an analysis of the computational needs of clinical medicine, a review systems and approaches that have been used to support those needs, and an examination of new technologies.

Subject:
Applied Science
Computer Science
Health Sciences
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Ohno-Machado, Lucila
Date Added:
01/01/2003
Nuclear Weapons in International Politics: Past, Present and Future, Spring 2009
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

" This course will expose students to tools and methods of analysis for use in assessing the challenges and dangers associated with nuclear weapons in international politics. The first two weeks of the course will look at the technology and design of nuclear weapons and their means of production. The next five weeks will look at the role they played in the Cold War, the organizations that managed them, the technologies that were developed to deliver them, and the methods used to analyze nuclear force structures and model nuclear exchanges. The last six weeks of the course will look at theories and cases of nuclear decision making beyond the original five weapon states, and will look particularly at why states pursue or forego nuclear weapons, the role that individuals and institutions play, and the potential for both new sources of proliferation and new consequences."

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Cote, Owen
Walsh, James
Date Added:
01/01/2009
Operating Systems
Unrestricted Use
CC BY
Rating
0.0 stars

The course presents an overview of the history and structure of modern operating systems, analyzing in detail each of the major components of an operating system, and exploring more advanced topics in the field, such as security concerns. Upon successful completion of this course, the student will be able to: explain what an operating system does and how it is used; identify the various components of a computer system and how they interact with an operating system; describe the differences between a 32-bit and 64-bit operating system; explain the different types of operating systems and the major ones in use today; discuss the importance and use of threads and processes in an operating system; describe concurrency; explain the difference between a thread and a process; discuss context switching and how it is used in an operating system; describe synchronization; explain a race condition; discuss interprocess communication; describe how semaphores can be used in an operating system; discuss three of the classic synchronization problems; explain the alternatives to semaphores; discuss CPU scheduling and its relevance to operating systems; explain the general goals of CPU scheduling; describe the differences between pre-emptive and non-preemptive scheduling; discuss four CPU scheduling algorithms; explain what deadlock is in relation to operating systems; discuss deadlock prevention, avoidance, and their differences; describe deadlock detection and recovery; explain the memory hierarchy; discuss how the operating system interacts with memory; describe how virtual memory works; discuss three algorithms for dynamic memory allocation; explain methods of memory access; describe paging and page replacement algorithms; describe a file system and its purpose; discuss various file allocation methods; explain disk allocation and associated algorithms; discuss types of security threats; describe the various types of malware; explain basic security techniques; explain basic networking principles; discuss protocols and how they are used; explain reference models, particularly TCP/IP and OSI. (Computer Science 401)

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
10/24/2019
Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational.

Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure.

The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

Subject:
Engineering
Material Type:
Textbook
Provider:
New Prairie Press
Author:
Candice Carter
Hans C. Mumm
Julie J.C.H. Ryan
Randall K. Nichols
Wayne D. Lonstein
Date Added:
09/14/2018