Explore thousands of online courses from MIT, Harvard, Princeton and more — free and paid, self-paced or instructor-led.
7,148 courses available
7,148 results — page 255 of 298

O.P. Jindal Global University
Welcome to the course Ethics in Public Policy! This course will help you learn about the role that ethical, moral, and cultural principles play when lawmakers and public officials formulate and execute public policy. This course draws upon classical writings in political theory and contemporary cases on ethical dilemmas in public policymaking. It will enable you to debate various ethics themes such as justice, equality, fairness, individual liberty, free enterprise, charity, human rights, and

University of Michigan
Explore unique case studies in engineering ethics. In this four-week course, youâll examine different historical case studies and understand how they led to classic engineering failures. Though each case is unique and has a distinct context, they all share common themes; a backstory, a disastrous event, a post-event with ramifications, and outcomes. For each case, youâll watch and hear video lectures and explore foundational literature. Youâll also have the opportunity to discuss the case in d
University of Illinois Urbana-Champaign
In this course, you will acquire a deep understanding of the importance and role of ethics within and beyond the organization as well as realize the benefits and challenges of a diverse culture and various â and changing â global perspectives. The professional business skills related to ethics, culture, and global perspectives gained through this course will help you to succeed working in any organization.

The University of Notre Dame
This course explores the ethical implications of data analytics. It connects old ideas â privacy, surveillance, power, justice, accountability, corporate responsibility, stakeholder theory â with new technologies and cases, such as the use of machine learning to predict crime. The course will prepare you to evaluate strategic arguments about the ethics of data analytics and to relate data analytics to ethical concepts so that you approach newer, ambiguous capabilities of technology and artific

University of Colorado Boulder
Computing systems and technologies fundamentally impact the lives of most people in the world, including how we communicate, get information, socialize, and receive healthcare. This course is the second of a three course sequence that examines ethical issues in the design and implementation of computing systems and technologies, and reflects upon the broad implication of computing on our society. It covers algorithmic bias in machine learning methods, professional ethics, and issues in the t

University of Colorado Boulder
Computing applications involving large amounts of data â the domain of data science â impact the lives of most people in the U.S. and the world. These impacts include recommendations made to us by internet-based systems, information that is available about us online, techniques that are used for security and surveillance, data that is used in health care, and many more. In many cases, they are affected by techniques in artificial intelligence and machine learning. This course examines some of

IBM
Kali Linux is the go-to operating system for penetration testers, ethical hackers, and security professionals. This course blends cybersecurity knowledge with practical applications to give you the job-ready skills you need to use Kali Linux effectively in just 5 weeks! Ethical hackersâalso known as âwhite hatâ hackersâtest systems and networks to uncover vulnerabilities. They often use Kali Linux to conduct network monitoring, penetration testing, and security auditing, as it provides hundred

LearnKartS
Modern cyberattacks target systems, networks, cloud infrastructure, and connected devices â and organizations need professionals who understand how these attacks really work. This course lays the groundwork for system and network security by examining real-world threat-attack techniques, malware behavior, and other network evasion tactics common to most modern breaches. You will learn about the mechanics of password attacks, authentication vulnerabilities, privilege escalation principles, ma

LearnKartS
Ready to advance your career in ethical hacking? The Ethical Hacking Practice Project & Questions course makes you an expert in Cyber Security with a project and practice questions. Ideal for both beginners and IT security professionals alike, this hacking course enables you to master real-world challenges. You will have the chance to work with tools commonly used in industry, and practice on various projects that involve penetration testing, detection of vulnerabilities, and a complete unders

EDUCBA
By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies. This course equips learners with practical skills to understand real-world cyber threats while mastering tools such as John the Ripper, EvilGrade, and Driftnet. Particip

EDUCBA
Learners will be able to explain and demonstrate Metasploit commands, analyze and apply exploits and payloads, evaluate SQL injection techniques, differentiate and apply cryptographic methods, analyze hash vulnerabilities, and demonstrate secure database management practices. This course provides a complete, hands-on journey into ethical hacking and penetration testing using Kali Linux. Beginning with Metasploit fundamentals, you will master msfconsole, explore exploits, and generate payloads t

EDUCBA
By completing this course, learners will be able to define the fundamentals of ethical hacking, configure secure lab environments, analyze operating system structures, perform reconnaissance techniques, and apply powerful tools such as Nmap and ZenMap for penetration testing. The course equips participants with practical skills to identify vulnerabilities, gather intelligence ethically, and evaluate system security in real-world scenarios. Designed for beginners and aspiring security profession

EDUCBA
By the end of this course, learners will be able to perform advanced reconnaissance using Nmap and DNS tools, evaluate social engineering and phishing techniques, differentiate between malware types, and simulate backdoor exploitation with persistence strategies. The course emphasizes hands-on application in Kali Linux, enabling students to develop practical penetration testing skills. Participants will benefit from structured, module-wise learning that covers both technical and human-centric a

IBM
Ready to put your ethical hacking skills to the test and power your cybersecurity career forward? This hands-on course is ideal for aspiring cybersecurity analysts, ethical hackers, and IT professionals who want to be able to demonstrate their real-world skills in offensive and defensive security to employers. During this course, youâll start on the Red Team, using industry-standard tools such as Kali Linux, Nmap, and Metasploit to conduct reconnaissance, exploitation, privilege escalation,

LearnKartS
Trusted by 17,000+ learners exploring ethical hacking fundamentals worldwide. Ethical Hacking Fundamentals is a hands-on beginner course that teaches how real-world attacks happen and how security professionals defend systems. Youâll begin with the basics of hacking, types of hackers, and the difference between ethical and illegal hacking. Next, you will understand cybersecurity terminologies, hacking stages, fundamentals of security, and penetration testing types. You will also see hands-on

University of Colorado Boulder
This course focuses on how to do it right. That is, it focuses on methodologies that we, as leaders, can use to figure out the right course of action. Some leadership ethical decisions are fairly straight forward; many donât offer clear solutions. This course is where we find the knowledge and techniques to help us through the ethical tough spots. Various approaches are examined. These include various theories that help to guide our ethical decision making. Also discussed are ethical awa
CertNexus
Creating and leading an ethical data-driven organization, when done successfully, is a cultural transformation for an organization. Navigating a cultural shift requires leadership buy in, resourcing, training, and support through creation of boards, policies, and governance. Beyond leadership and organization, it is imperative to engage employees through forums and incentive programs for continual involvement. A strong understanding of ethical organizational policies provides the foundation for
CertNexus
Leading a data-driven organization necessitates effective communication to create a culture of ethical practice. Communication to stakeholders will guide an organization's strategy and potentially impact the future of work for that organization or entity. It is not enough to talk about ethical practices, you need to to relate their value to stakeholders. Building out strategies that are inclusive and relatable can build public trust and loyalty, and knowing how to plan for a crisis will reduce t
Microsoft
Did you know that the global AI market size is projected to reach $997.77 billion by 2028? As AI technologies rapidly integrate into every sector, understanding their ethical and regulatory implications has never been more critical. This Short Course was created to help professionals in tech, law, and policy accomplish a thorough comprehension of the ethical and regulatory landscape surrounding Generative AI. By completing this course, you'll be able to confidently navigate and implement strat

EDUCBA
The course aims to provide a thorough understanding of the core principles and characteristics of decentralized applications (DApps). Participants will learn about the benefits and challenges of DApp development, including decentralization, immutability, and user empowerment. â Participants will acquire the necessary skills to develop front-end interfaces for DApps. They will learn modern web development technologies such as HTML, CSS, and JavaScript frameworks (e.g., React, Angular) to create

Universidad Austral
Este curso te dará ágil acceso a las estructuras de datos principales del lenguaje de programación Python en su versión 3.0. Una vez que termines este curso tendrás un conocimiento general de Python, que te permitirá realizar programas que trabajen con muchos datos tomados desde archivos de la computadora. Aquà podrás conocer cómo utilizar las estructuras de datos integradas en Python, como las listas, los diccionarios y las tuplas. Además entenderás cómo trabajar con archivos y el manejo de e

IE Business School
La fijación de precios es una de las decisiones de marketing más importantes pero menos comprendidas. Aprenda y practique conceptos y técnicas, y familiarÃcese con las últimas ideas sobre evaluación y formulación de estrategias de fijación de precios. Analice cómo las empresas intentan captar valor, además de beneficios, en los ingresos que obtienen. A lo largo de este curso, aprenderá conceptos clave de la estrategia de fijación de precios, como la psicologÃa de la fijación de precios, la dis

Universidad Austral
El curso te da las herramientas básicas para identificar los desafÃos estratégicos de una organización, evaluar la importancia de estos desafÃos, y armar el plan de prioridades de modo de hacer frente exitosamente a esos desafÃos. Dentro de todas las empresas que existen, el curso se focaliza en aquellas cuyo producto o servicio tiene algún grado de diferenciación con respecto a los competidores de la industria en la que se desenvuelve. El curso tiene un enfoque único, mezclando modelos conceptu

University of Maryland, College Park
Entrepreneur and investor Marc Andreessen coined the term product-market fit in 2007 when he said, âProduct-market fit means being in a good market with a product that can satisfy that market.â While there are ample articles that mention the term, detailed guidance on how to actually achieve product-market fit is scarce. Through our course we will explore an actionable model that defines product-market fit using five key components. From bottom to top, we will examine the layers of product-mark