Course
CyanSubject: Selected Sample FREE eLEARNING COURSES With Certification for MCIT Library Consortium
S.No.
Document Title
Authors
New Link
Abstract
1
Enterprise Blockchain for the Internet of Things
David Fragale; Nancy Ranxing Li
https://ieeexplore.ieee.org/courses/details/EDP553
The convergence, opportunities, use cases and challenges of Blockchain and Internet of Things (IoT) are highlighted in this course. First a general understanding of the opportunities and challenges associated with the convergence of Blockchain technology and IoT are covered. Then emerging use cases, projects, and technologies that apply Blockchain and leverage IoT's mutual advantages are explained. The course finishes with an outlook on the future of Blockchain and IoT.
2
Enterprise Blockchain for Grid Modernization
Dr. Claudio Lima
https://ieeexplore.ieee.org/courses/details/EDP551
Blockchain for Grid Modernization and Energy provides an overview of the benefits of Blockchain for grid management, an explanation on how Blockchain for energy works, some key drivers of adoption for energy and the Open Blockchain Energy (OBE) framework for Blockchain adoption to manage modern energy grid networks more efficiently. Finally we highlight the transactive energy model where grids are managed at a more granular level enabling higher efficiencies and better localized utilization of energy networks.
3
Enterprise Blockchain Overview
Steve Derezinski
https://ieeexplore.ieee.org/courses/details/EDP550
This course module introduces Blockchain for Enterprise with an emphasis on where and how Blockchain will impact corporations. Included is a short review of cryptocurrencies followed by an in-depth review on Blockchain's underlying technological advantages and where best to deploy in industry. A review of smart contracts is included along with the types of blockchain models: public, private and hybrid. The course also highlights the major cloud company offerings on Blockchain for the learner's own project exploration with a familiar service provider.
4
Grid Modernization: Smart Distribution Systems
John D. McDonald
https://ieeexplore.ieee.org/courses/details/EDP545
The second module focuses on distribution: visibility and data for a self-Healing grid and addresses the standards and communication protocols that support a strong grid in which intelligent electronic devices, or IEDs, are integrated with the ICT foundation for visibility into distribution system functions. This section delves into the principles and practices of cybersecurity, including customers' data privacy. Module 2 takes a deep dive into six holistic solutions for efficiency, reliability, and resiliency and the flexible data communication architecture that enables them to meet utility challenges.
5
Applications Scenarios of Edge Computing
Jie Cao; Weisong Shi
https://ieeexplore.ieee.org/courses/details/EDP540
This course introduces the application scenarios of edge computing. Three real-world applications including smart home, public service, and the autonomous vehicle will be covered in this course along with the discussion of the benefits and challenges by employing Edge computing. This course will be instructional for practitioners in their designing and developing of their Edge computing applications.
6
Overview of Edge Computing
Mahadev Satyanarayanan; Weisong Shi
https://ieeexplore.ieee.org/courses/details/EDP539
This course module will help you to learn why Edge Computing is a new and important development in the computing landscape. The lecture is organized in three parts. The first part defines Edge Computing and lists the different ways in which it can deliver value. The second part presents experimental evidence that low latency, one of the key attributes of Edge Computing, can substantially improve user experience. The third part describes how Edge Computing enables two new classes of applications: wearable cognitive assistance, and scalable real-time video analytics.
7
Designing Security Solutions for Edge, Cloud, and IoT
Kewei Sha; Weisong Shi
https://ieeexplore.ieee.org/courses/details/EDP542
This course not only analyzes the new challenges in edge computing, but also presents two novel edge-based security solutions for IoT applications. First, EdgeSec designs a novel security service that is deployed at the Edge layer to enhance the security of IoT systems. Second, the secure and efficient smart data collection framework enables secure data readings from smart grid devices based on a two-phase authentication protocol.
8
Legal and Implementation Issues of Enterprise Artificial Intelligence
Catelijne Muller; Virginia Dignum
https://ieeexplore.ieee.org/courses/details/EDP527
Self-driving cars, drones, and companion robots are already introduced into society. With this in mind, what are the most pressing legal issues for companies to be thinking about today and in the near future? This course will outline the top issues of compliance, risk, and opportunity AI/AS can bring, and how an organization can establish the infrastructure to strategically address these emerging technologies.
9
Human Emotion in Devices and Technology
Ruth Aylett
https://ieeexplore.ieee.org/courses/details/EDP526
The field of Affective Computing that encompasses the nature of how human emotions respond to devices and technology is a seminal issue to study in regards to the ethical implications of AI/AS. Where users may not understand that robots/AI are infused with affective sensors or technology, they could be manipulated or tricked in ways unintended by well-meaning manufacturers or designers. If we are to live with robots in our near future, we must become more emotionally intelligent before trying to imbue ethical instructions for our silicon companions. In this course we will review the concept of affective computing. We will then examine its most relevant ethical issues and how to deal with them.
10
Transparency and Accountability for Robots and Artificial Intelligence Systems
Alan Winfield; Raja Chatila
https://ieeexplore.ieee.org/courses/details/EDP525
As Autonomous and Intelligent Systems are spreading across several industry and service sectors, the public, the users, the designers, policy makers and lawmakers need to understand who is responsible for the behavior and the decisions made by such systems. This course explains the basic concepts of transparency and accountability and how these can be translated, and applied, in the context of Autonomous and Intelligent Systems.
11
Ensuring Data Protection and Data Safety
John C. Havens; Bastiaan van Loenen; Lorenzo Dalla Corte
https://ieeexplore.ieee.org/courses/details/EDP500
The creation of the GDPR (General Data Protection Regulation) legislation in the EU means that every European organization has to account for the safe and proper handling of citizen's personal data or risk a fine of up to 4% on their gross annual revenue. This legislation has global implications as every major organization has data of EU citizens or that flows through EU servers. This legislation provides a massive opportunity to increase ethical considerations in the creation of AI/S and technology in general where organizations can go beyond compliance and reframe innovation to provably align their products and services with end user values.
12
What Is the Internet of Things: An Introduction
Thiemo Voigt; Christian Rohner
https://ieeexplore.ieee.org/courses/details/EDP486
This module provides an overview of the Internet of Things technology. The emergence of the paradigm is explored and a range of application areas and challenges are discussed. In particular, we explain the broader implications of networked small devices, and the types of services they can provide. Some implications in the area of personal and information security challenges associated with deployment of Internet of Things and broad adoption of Internet connected small devices and sensor networks are also explored.
13
Social Internet of Things: Reference Architecture and Use Cases
Luigi Atzori
https://ieeexplore.ieee.org/courses/details/EDP477
In this course a reference architecture for the social internet of things paradigm is presented. It is a cloud-based solution which implements the rules for: management of the objects' friendships, discovery of potential providers of services in the social network, and evaluation of the objects' trustworthiness. Relevant APIs (Application Programming Interfaces) will be presented so that third parties can develop applications on top of it. Additionally, some use-cases are reviewed and details are provided for one example to show the usage of the reference architecture. Topics covered include: A reference architecture overview, Major architecture components, Architecture APIs and Review of sample use-cases.
14
Mobile Device Security
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP458
As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected.
15
Web Server & Web Application Security
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP453
Web server and Web application security is the protection of information assets that can be accessed from a Web server or application. Security is important for any organization that has a physical or virtual Web server connected to the Internet. This course will examine the history of web servers and web applications, with a focus on two of the main web servers as well as evaluate different web applications for flaws.
16
Cryptography Fundamentals
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP455
When storing and transmitting data, it's important to secure your data in such a way that only those for whom it is intended can read/process it. Cryptography is a method to ensure this security. This course will explore areas of cryptography. Topics covered will include symmetric and asymmetric encryption, as well as hashing and steganography. Finally the course will examine the language of cryptography and where it plays a major role.
17
System Fundamentals for Cyber Security
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP454
This course will examine basic technologies for Cyber Security. This course provides a fundamental overvew paritcularly helpful for an introductory look at Cyber Security. Topics covered will include: a review of common operating systems and their various features and drawbacks. Networking concepts, devices and components to operational networks will also discussed.
18
Cloud Security
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP471
Cloud computing is causing a transformational shift that touches almost every part of the technology landscape. This video course presents a picture of threat vectors in cloud services, and the unique architectural considerations for securing assets as they move through cloud providers. The security challenges that result from the loss of control over information assets in the cloud, and how a more complex regulatory environment augments those challenges are also discussed.
19
Data Security in the Cloud
Sean Oriyano
https://ieeexplore.ieee.org/courses/details/EDP472
The move to Cloud services introduces many new and complex issues related to data security. This video course addresses the threats to data security as they relate to the Cloud, and offers a review of the technologies that work together to create a robust Data Loss Prevention (DLP) architecture. Core concepts such as Encryption and Key Management are discussed, as well as strategies for the development of an enterprise-wide DLP policy