Course

Course

Cyan

Subject: Selected Sample FREE eLEARNING COURSES With Certification for MCIT Library Consortium

S.No.

Document Title

Authors

New Link

Abstract

1

Enterprise Blockchain for the Internet of Things

David Fragale; Nancy Ranxing Li

https://ieeexplore.ieee.org/courses/details/EDP553

The convergence, opportunities, use cases and challenges of Blockchain and Internet of Things (IoT) are highlighted in this course. First a general understanding of the opportunities and challenges associated with the convergence of Blockchain technology and IoT are covered. Then emerging use cases, projects, and technologies that apply Blockchain and leverage IoT's mutual advantages are explained. The course finishes with an outlook on the future of Blockchain and IoT.

2

Enterprise Blockchain for Grid Modernization

Dr. Claudio Lima

https://ieeexplore.ieee.org/courses/details/EDP551

Blockchain for Grid Modernization and Energy provides an overview of the benefits of Blockchain for grid management, an explanation on how Blockchain for energy works, some key drivers of adoption for energy and the Open Blockchain Energy (OBE) framework for Blockchain adoption to manage modern energy grid networks more efficiently. Finally we highlight the transactive energy model where grids are managed at a more granular level enabling higher efficiencies and better localized utilization of energy networks.

3

Enterprise Blockchain Overview

Steve Derezinski

https://ieeexplore.ieee.org/courses/details/EDP550

This course module introduces Blockchain for Enterprise with an emphasis on where and how Blockchain will impact corporations. Included is a short review of cryptocurrencies followed by an in-depth review on Blockchain's underlying technological advantages and where best to deploy in industry. A review of smart contracts is included along with the types of blockchain models: public, private and hybrid. The course also highlights the major cloud company offerings on Blockchain for the learner's own project exploration with a familiar service provider.

4

Grid Modernization: Smart Distribution Systems

John D. McDonald

https://ieeexplore.ieee.org/courses/details/EDP545

The second module focuses on distribution: visibility and data for a self-Healing grid and addresses the standards and communication protocols that support a strong grid in which intelligent electronic devices, or IEDs, are integrated with the ICT foundation for visibility into distribution system functions. This section delves into the principles and practices of cybersecurity, including customers' data privacy. Module 2 takes a deep dive into six holistic solutions for efficiency, reliability, and resiliency and the flexible data communication architecture that enables them to meet utility challenges.

5

Applications Scenarios of Edge Computing

Jie Cao; Weisong Shi

https://ieeexplore.ieee.org/courses/details/EDP540

This course introduces the application scenarios of edge computing. Three real-world applications including smart home, public service, and the autonomous vehicle will be covered in this course along with the discussion of the benefits and challenges by employing Edge computing. This course will be instructional for practitioners in their designing and developing of their Edge computing applications.

6

Overview of Edge Computing

Mahadev Satyanarayanan; Weisong Shi

https://ieeexplore.ieee.org/courses/details/EDP539

This course module will help you to learn why Edge Computing is a new and important development in the computing landscape. The lecture is organized in three parts. The first part defines Edge Computing and lists the different ways in which it can deliver value. The second part presents experimental evidence that low latency, one of the key attributes of Edge Computing, can substantially improve user experience. The third part describes how Edge Computing enables two new classes of applications: wearable cognitive assistance, and scalable real-time video analytics.

7

Designing Security Solutions for Edge, Cloud, and IoT

Kewei Sha; Weisong Shi

https://ieeexplore.ieee.org/courses/details/EDP542

This course not only analyzes the new challenges in edge computing, but also presents two novel edge-based security solutions for IoT applications. First, EdgeSec designs a novel security service that is deployed at the Edge layer to enhance the security of IoT systems. Second, the secure and efficient smart data collection framework enables secure data readings from smart grid devices based on a two-phase authentication protocol.

8

Legal and Implementation Issues of Enterprise Artificial Intelligence

Catelijne Muller; Virginia Dignum

https://ieeexplore.ieee.org/courses/details/EDP527

Self-driving cars, drones, and companion robots are already introduced into society. With this in mind, what are the most pressing legal issues for companies to be thinking about today and in the near future? This course will outline the top issues of compliance, risk, and opportunity AI/AS can bring, and how an organization can establish the infrastructure to strategically address these emerging technologies.

9

Human Emotion in Devices and Technology

Ruth Aylett

https://ieeexplore.ieee.org/courses/details/EDP526

The field of Affective Computing that encompasses the nature of how human emotions respond to devices and technology is a seminal issue to study in regards to the ethical implications of AI/AS. Where users may not understand that robots/AI are infused with affective sensors or technology, they could be manipulated or tricked in ways unintended by well-meaning manufacturers or designers. If we are to live with robots in our near future, we must become more emotionally intelligent before trying to imbue ethical instructions for our silicon companions. In this course we will review the concept of affective computing. We will then examine its most relevant ethical issues and how to deal with them.

10

Transparency and Accountability for Robots and Artificial Intelligence Systems

Alan Winfield; Raja Chatila

https://ieeexplore.ieee.org/courses/details/EDP525

As Autonomous and Intelligent Systems are spreading across several industry and service sectors, the public, the users, the designers, policy makers and lawmakers need to understand who is responsible for the behavior and the decisions made by such systems. This course explains the basic concepts of transparency and accountability and how these can be translated, and applied, in the context of Autonomous and Intelligent Systems.

11

Ensuring Data Protection and Data Safety

John C. Havens; Bastiaan van Loenen; Lorenzo Dalla Corte

https://ieeexplore.ieee.org/courses/details/EDP500

The creation of the GDPR (General Data Protection Regulation) legislation in the EU means that every European organization has to account for the safe and proper handling of citizen's personal data or risk a fine of up to 4% on their gross annual revenue. This legislation has global implications as every major organization has data of EU citizens or that flows through EU servers. This legislation provides a massive opportunity to increase ethical considerations in the creation of AI/S and technology in general where organizations can go beyond compliance and reframe innovation to provably align their products and services with end user values.

12

What Is the Internet of Things: An Introduction

Thiemo Voigt; Christian Rohner

https://ieeexplore.ieee.org/courses/details/EDP486

This module provides an overview of the Internet of Things technology. The emergence of the paradigm is explored and a range of application areas and challenges are discussed. In particular, we explain the broader implications of networked small devices, and the types of services they can provide. Some implications in the area of personal and information security challenges associated with deployment of Internet of Things and broad adoption of Internet connected small devices and sensor networks are also explored.

13

Social Internet of Things: Reference Architecture and Use Cases

Luigi Atzori

https://ieeexplore.ieee.org/courses/details/EDP477

In this course a reference architecture for the social internet of things paradigm is presented. It is a cloud-based solution which implements the rules for: management of the objects' friendships, discovery of potential providers of services in the social network, and evaluation of the objects' trustworthiness. Relevant APIs (Application Programming Interfaces) will be presented so that third parties can develop applications on top of it. Additionally, some use-cases are reviewed and details are provided for one example to show the usage of the reference architecture. Topics covered include: A reference architecture overview, Major architecture components, Architecture APIs and Review of sample use-cases.

14

Mobile Device Security

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP458

As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected.

15

Web Server & Web Application Security

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP453

Web server and Web application security is the protection of information assets that can be accessed from a Web server or application. Security is important for any organization that has a physical or virtual Web server connected to the Internet. This course will examine the history of web servers and web applications, with a focus on two of the main web servers as well as evaluate different web applications for flaws.

16

Cryptography Fundamentals

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP455

When storing and transmitting data, it's important to secure your data in such a way that only those for whom it is intended can read/process it. Cryptography is a method to ensure this security. This course will explore areas of cryptography. Topics covered will include symmetric and asymmetric encryption, as well as hashing and steganography. Finally the course will examine the language of cryptography and where it plays a major role.

17

System Fundamentals for Cyber Security

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP454

This course will examine basic technologies for Cyber Security. This course provides a fundamental overvew paritcularly helpful for an introductory look at Cyber Security. Topics covered will include: a review of common operating systems and their various features and drawbacks. Networking concepts, devices and components to operational networks will also discussed.

18

Cloud Security

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP471

Cloud computing is causing a transformational shift that touches almost every part of the technology landscape. This video course presents a picture of threat vectors in cloud services, and the unique architectural considerations for securing assets as they move through cloud providers. The security challenges that result from the loss of control over information assets in the cloud, and how a more complex regulatory environment augments those challenges are also discussed.

19

Data Security in the Cloud

Sean Oriyano

https://ieeexplore.ieee.org/courses/details/EDP472

The move to Cloud services introduces many new and complex issues related to data security. This video course addresses the threats to data security as they relate to the Cloud, and offers a review of the technologies that work together to create a robust Data Loss Prevention (DLP) architecture. Core concepts such as Encryption and Key Management are discussed, as well as strategies for the development of an enterprise-wide DLP policy


Report Page