Customize your search:

E.g., 2017-08-18
E.g., 2017-08-18
E.g., 2017-08-18
Self Paced

Basic concepts of operating systems and system programming. Utility programs, subsystems, multiple-program systems. Processes, interprocess communication, and synchronization. Memory allocation, segmentation, paging. Loading and linking, libraries. Resource allocation, scheduling, performance evaluation. File systems, storage devices, I/O systems. Protection, security, and privacy.

No votes yet
Aug 14th 2017

Making predictions is not enough! Effective data scientists know how to explain and interpret their results, and communicate findings accurately to stakeholders to inform business decisions. Visualization is the field of research in computer science that studies effective communication of quantitative results by linking perception, cognition, and algorithms to exploit the enormous bandwidth of the human visual cortex. In this course you will learn to recognize, design, and use effective visualizations.

Average: 7.7 (6 votes)
Aug 14th 2017

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

Average: 5 (5 votes)

Mar 20th 2017

This three-week free online course explores practical cyber security including privacy online, payment safety and security at home. In the modern world, information security has an influence on all of us: at home, at work, online and in life in general. Like many inventions that have gone before, the internet and the web, the cloud and the Internet of Things (IoT) bring with them many advantages, but also open up new possibilities for criminal activity.

Average: 3.7 (3 votes)
Jan 17th 2017

Learn how to think through the ethics surrounding privacy, data sharing, and algorithmic decision-making. As patients, we care about the privacy of our medical record; but as patients, we also wish to benefit from the analysis of data in medical records. As citizens, we want a fair trial before being punished for a crime; but as citizens, we want to stop terrorists before they attack us. As decision-makers, we value the advice we get from data-driven algorithms; but as decision-makers, we also worry about unintended bias. Many data scientists learn the tools of the trade and get down to work right away, without appreciating the possible consequences of their work.

Average: 6 (2 votes)
Apr 13th 2016

El contenido de este curso consiste en una introducción al mundo del Big Data orientada a conocer cómo extraer valores escondidos de los datos manejados en cualquier negocio. Se explicarán técnicas de minería de datos aplicadas en el Big Data. También se considerarán aspectos de seguridad y privacidad.

Average: 8 (1 vote)

Feb 22nd 2016

Understand the competing tensions of laws related to privacy and national security, and the impending consequences of this battle for our networked world.

Average: 8.5 (2 votes)
Jan 18th 2016

In this 2 week workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms. Everyone knows the odd feeling of discomfort when having added someone you actually don't know very well to yours friends' list or to the wrong category within your contacts. The participants will learn in this openHPI course that privacy is still a concern also for users who do not actively use the Internet.

No votes yet
May 21st 2015

Dans notre société hyper informatisée, la protection des données est devenue un sujet central. Ce cours présente les règles applicables en matière de protection des données et de la vie privée sur internet.

No votes yet
Jan 20th 2015

Learn how police and intelligence agencies can access your data, and how the law (might) protect you! Hackers, attorneys, and concerned citizens are all welcome.

Average: 10 (2 votes)
Self Paced

Explore the privacy issues of an interconnected world.

Average: 5.5 (2 votes)

Feb 17th 2014

El curso pretende alcanzar los siguientes objetivos:
- Realizar una aproximación general al concepto, la historia y los tipos de redes sociales que existen.
- Aproximación jurídica al concepto de red social y las complejidades que la normativa actual plantea ante los retos de los usuarios en las redes sociales.
- Familiarizar al usuario acerca del concepto de privacidad y como manejar la misma en las principales redes sociales.
- Familiarizar al usuario con el concepto de propiedad intelectual, así como con los márgenes y límites a su ejercicio.

Average: 3 (2 votes)