Search result for Regulatory and ethical considerations Online Courses & Certifications
Get Course Alerts by Email
Nmap: Network Security Scanning Basics & Advanced Techniques
by Jason Wood- 4.4
4 hours on-demand video
Become a pro at using Nmap to discover computers, services, and vulnerabilities on networks! You will become an expert using the most powerful and flexible network scanner available. ethical hacker, Nmap is an incredibly powerful tool that you can use to troubleshoot network issues, find unknown network services, and vulnerabilities. Performance and tuning considerations...
$16.99
AI Workflow: Feature Engineering and Bias Detection
by Mark J Grover , Ray Lopez, Ph.D.- 4.5
Approx. 12 hours to complete
Employ the tools that help address class and class imbalance issues Explain the ethical considerations regarding bias in data Employ dimension reduction techniques for both EDA and transformations stages Use topic modeling and visualization to explore text data Employ outlier detection algorithms as a quality assurance tool and a modeling tool...
Teaching with Physical Computing, Course 2: Practical application and classroom strategies for PBL
by Robert Leeman , Dr John Woollard , Gareth Edgell , Oli Howson- 0.0
12 Weeks
This course guides teachers through Project-Based Learning (PBL) pedagogy, practical application and supporting educational theoretical principles. The second course in our program for Computer Science teachers, Teaching with Physical Computing, guides you through the practical application of Project-Based Learning (PBL) theory using a range of tools and techniques. Contexts and themes for PBL Ethical considerations...
$49
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both....
Project Execution: Running the Project
by Google Career CertificatesTop Instructor- 4.8
Approx. 23 hours to complete
This course will delve into the execution and closing phases of the project life cycle. - Identify what aspects of a project to track and compare different tracking methods. Ethical and inclusive leadership A framework for ethical decision-making Test your knowledge: Managing team development and dynamics Facilitating inclusive and accessible meetings The closing process for clients and stakeholders...
Recruiting, Hiring, and Onboarding Employees
by Amy Simon , Stacy Doepner-Hove- 4.7
Approx. 20 hours to complete
Finding and hiring the right people is often cited as the number one concern of businesses today. It seems we are all competing for the best and brightest workers. 2 Creating and Presenting the Offer Package 4 Recruitment and Selection Summary Legal Considerations in the Selection Process Selection Methods and Tests...
Forecasting, Budgeting, Territories, Evaluation and Legal/Ethical Issues
by Emily C. Tanner, Ph.D. , Suzanne C. Bal , Michael F. Walsh, Ph.D.- 4.4
Approx. 12 hours to complete
In the fourth part of the Sales Operations/Management Specialization, students will explore the purpose and methods for forecasting and budgeting in a management role. Next, we will learn how to develop territories and evaluate sales performance. Finally, we will explore the legal and ethical issues facing sales managers. Legal and Ethical Issues...
Related searches
Data Management for Clinical Research
by Stephany Duda, PhD , Paul Harris, PhD- 4.7
Approx. 17 hours to complete
This course presents critical concepts and practical methods to support planning, collection, storage, and dissemination of data in clinical research. Understanding and implementing solid data management principles is critical for any scientific domain. Data Standards: Basic Concepts and Overview IRB, HIPAA, and FISMA GCP and 21 CFR Part 11 Post-Study Activities and Other Considerations...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. Information and security This video introduces the core information security services and tools provided by cryptography. 1 and 1. More about producers and products Professional and ethical considerations...
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
is and what factors have enabled the IIoT * What platforms are, and also market information on Software and Services * What the top application areas are (examples include manufacturing and oil & gas) * About networking and wireless communication protocols used in IIoT deployments Segment 5 - Business Considerations...