Online Courses

advertisement
Online Courses
Course
R
Programming
Date
Nov 3rdDec 1st
2014
+
Dec 1st –
Dec 28th
2014
+
6x2015
University
Johns
Hopkins
University
Link
https://w
ww.course
ra.org/cou
rse/rprog
Exploratory
Data Analysis
Nov 3rd –
Dec 1st
2014
+
Dec 1st –
Dec 28th
2014
+
6x2015
Johns
Hopkins
University
https://w
ww.course
ra.org/cou
rse/exdata
Reproducible
Research
Nov 3rdDec 1st
2014
+
Johns
Hopkins
University
https://w
ww.course
ra.org/cou
rse/repdat
Description
Compensation
In this course you will learn how to program in R and how to use
R for effective data analysis. You will learn how to install and
configure software necessary for a statistical programming
environment and describe generic programming language
concepts as they are implemented in a high-level statistical
language. The course covers practical issues in statistical
computing which includes programming in R, reading data into
R, accessing R packages, writing R functions, debugging, profiling
R code, and organizing and commenting R code. Topics in
statistical data analysis will provide working examples.
This course covers the essential exploratory techniques for
summarizing data. These techniques are typically applied before
formal modeling commences and can help inform the
development of more complex statistical models. Exploratory
techniques are also important for eliminating or sharpening
potential hypotheses about the world that can be addressed by
the data. We will cover in detail the plotting systems in R as well
as some of the basic principles of constructing data graphics. We
will also cover some of the common multivariate statistical
techniques used to visualize high-dimensional data.
This course focuses on the concepts and tools behind reporting
modern data analyses in a reproducible manner. Reproducible
research is the idea that data analyses, and more generally,
scientific claims, are published with their data and software
Examiner
Dec 1st –
Dec 28th
2014
+
6x2015
a
Statistical
Inference
Nov 3rdDec 1st
2014
+
Dec 1st –
Dec 28th
2014
+
6x2015
Johns
Hopkins
University
Regression
Models
Nov 3rdDec 1st
2014
+
Johns
Hopkins
University
code so that others may verify the findings and build upon
them. The need for reproducibility is increasing dramatically as
data analyses become more complex, involving larger datasets
and more sophisticated computations. Reproducibility allows for
people to focus on the actual content of a data analysis, rather
than on superficial details reported in a written summary. In
addition, reproducibility makes an analysis more useful to
others because the data and code that actually conducted the
analysis are available. This course will focus on literate statistical
analysis tools which allow one to publish data analyses in a
single document that allows others to easily execute the same
analysis to obtain the same results.
https://w Statistical inference is the process of drawing conclusions about
ww.course populations or scientific truths from data. There are many
ra.org/cou modes of performing inference including statistical modeling,
rse/statinf data oriented strategies and explicit use of designs and
erence
randomization in analyses. Furthermore, there are broad
theories (frequentists, Bayesian, likelihood, design based, …)
and numerous complexities (missing data, observed and
unobserved confounding, biases) for performing inference. A
practitioner can often be left in a debilitating maze of
techniques, philosophies and nuance. This course presents the
fundamentals of inference in a practical approach for getting
things done.
https://w Linear models, as their name implies, relates an outcome to a
ww.course set of predictors of interest using linear
ra.org/cou assumptions. Regression models, a subset of linear models, are
rse/regmo the most important statistical analysis tool in a data scientist’s
Dec 1st –
Dec 28th
2014
+
6x2015
Developing
Data Products
Practical
Machine
Learning
Cryptography
Nov 3rdDec 1st
2014
+
Dec 1st –
Dec 28th
2014
+
6x2015
Nov 3rdDec 1st
2014
+
Dec 1st –
Dec 28th
2014
+
6x2015
Nov 10th
– Dec
ds
Johns
Hopkins
University
Johns
Hopkins
University
toolkit. This course covers regression analysis, least squares and
inference using regression models. Special cases of the
regression model, ANOVA and ANCOVA will be covered as well.
Analysis of residuals and variability will be investigated. The
course will cover modern thinking on model selection and novel
uses of regression models including scatterplot smoothing.
https://w A data product is the production output from a statistical
ww.course analysis. Data products automate complex analysis tasks or use
ra.org/cou technology to expand the utility of a data informed model,
rse/devda algorithm or inference. This course covers the basics of creating
taprod
data products using Shiny, R packages, and interactive graphics.
The course will focus on the statistical fundamentals of creating
a data product that can be used to tell a story about data to a
mass audience.
https://w
ww.course
ra.org/cou
rse/predm
achlearn
One of the most common tasks performed by data scientists
and data analysts are prediction and machine learning. This
course will cover the basic components of building and applying
prediction functions with an emphasis on practical applications.
The course will provide basic grounding in concepts such as
training and tests sets, overfitting, and error rates. The course
will also introduce a range of model based and algorithmic
machine learning methods including regression, classification
trees, Naive Bayes, and random forests. The course will cover
the complete process of building prediction functions including
data collection, feature creation, algorithms, and evaluation.
University
https://w This course will introduce you to the foundations of modern
of Maryland ww.course cryptography, with an eye toward practical applications. We will
Getting and
Cleaning Data
Hardware
Security
20th
2014
+
Mar 9 th
– Apr 18
th 2015
Jan 5th –
Feb 2nd
2015
ra.org/cou
rse/crypto
graphy
Johns
Hopkins
University
https://w
ww.course
ra.org/cou
rse/getdat
a
learn the importance of carefully defining security; of relying on
a set of well-studied “hardness assumptions” (e.g., the hardness
of factoring large numbers); and of the possibility of proving
security of complicated constructions based on low-level
primitives.
Before you can work with data you have to get some. This
course will cover the basic ways that data can be obtained. The
course will cover obtaining data from the web, from APIs, from
databases and from colleagues in various formats. It will also
(5x 2015)
cover the basics of data cleaning and how to make data “tidy”.
Tidy data dramatically speed downstream data analysis tasks.
The course will also cover the components of a complete data
set including raw data, processing instructions, codebooks, and
processed data. The course will cover the basics needed for
collecting, cleaning, and sharing data.
th
Jan 5 – University
https://w Trust in digital system design
th
Feb 14
of Maryland ww.course - Vulnerability in combinational logic
2015
ra.org/cou - Vulnerability in sequential logic and finite state machine
rse/hardw - Hardware Trojan Horse
+
aresec
- Circuit obfuscation
Side-channel attacks
th
Apr 6 –
- Power analysis
May 16th
- Timing attacks
2015
- ElectroMagnetic analysis
Physical attacks
- Fault injection attack
- Smart card security
Programming
for Everybody
(Python)
Pattern
Discovery in
Data Mining
Cloud
Computing
Concepts
Feb 2nd –
Apr 13th
2015
(3 x
2015)
February
2015 –
Mar 31st
2015
February
– Apr
30th
University
of Michigan
University
of Illinois
(Coursera)
University
of Illinois
- Field Programmable Gate Array (FPGA) security
Emerging hardware security topics
- Trust Platform Modules (TPM)
- Physical Unclonable Functions (PUF)
- True Random Number Generators (TRNG)
- RFID tag
- Counterfeiting
- Intellectual property protection
https://w This course is specifically designed to be a first programming
ww.course course using the popular Python programming language. The
ra.org/cou pace of the course is designed to lead to mastery of each of the
rse/pytho topics in the class. We will use simple data analysis as the
nlearn
programming exercises through the course.
https://w
ww.course
ra.org/cou
rse/patter
ndiscovery
Learn the general concepts of data mining along with basic
methodologies and applications. Then dive into one subfield in
data mining: pattern discovery. Learn in-depth concepts,
methods and applications of pattern discovery in data mining.
We will also introduce methods for pattern-based classification
and some interesting applications of pattern discovery. This
course provides you the opportunity to learn skills and content
to practice and engage in scalable pattern discovery methods on
massive transactional data, discuss pattern evaluation
measures, and study methods for mining diverse kinds of
patterns, sequential patterns, and sub-graph patterns.
https://w Cloud computing systems today, whether open-source or used
ww.course inside companies, are built using a common set of core
ra.org/cou techniques, algorithms, and design philosophies—all centered
2015
Software
Security
Feb 23rd
– Apr 4th
2015
rse/cloudc
omputing
around distributed systems. Learn about such fundamental
distributed computing "concepts" for cloud computing.
Some of these concepts include:
• clouds, MapReduce, key-value stores
• classical precursors
• widely-used algorithms
• classical algorithms
• scalability
• trending areas
and more!
University
https://w - Low-level, memory-based attacks, including stack smashing,
of Maryland ww.course format string attacks, stale memory access attacks, and returnra.org/cou oriented Programming (ROP)
rse/softwa - Defenses against memory-based attacks, including stack
resec
canaries, non-executable data (aka W+X or DEP), address space
layout randomization (ASLR), memory-safety enforcement (e.g.,
SoftBound), control-flow Integrity (CFI)
- Web security, covering attacks like SQL injection, Cross-site
scripting (XSS), Cross-site request forgery (CSRF), and Session
hijacking, and defenses that have in common the idea of input
validation
- Secure design, covering ideas like threat modeling and security
design principles, including organizing ideas like favor simplicity,
trust with reluctance, and defend in depth; we present realworld examples of good and bad designs
- Automated code review with static analysis and symbolic
execution, presenting foundations and tradeoffs and using static
taint analysis and whitebox fuzz testing as detailed examples
Fog Networks
and the
Internet of
Things
Mar 2nd
– Apr
13th
2015
Princeton
University
https://w
ww.course
ra.org/cou
rse/fog
Cluster
Analysis in
Data Mining
August
2015 –
Sep 27th
2015
University
of Illinois
(Coursera)
https://w
ww.course
ra.org/cou
rse/cluster
analysis
Cloud
Computing
Applications
August
2015 –
Sep 30th
2015
University
of Illinois
https://w
ww.course
ra.org/cou
rse/clouda
pplication
s
Text Mining
and Analytics
Sep 2015 University
– Oct
of Illinois
https://w
ww.course
- Penetration testing, presenting an overview of goals,
techniques, and tools of the trade
This course teaches the fundamentals of Fog Networking, the
network architecture that uses one or a collaborative multitude
of end-user clients or near-user edge devices to carry out
storage, communication, computation, and control in a
network. It also teaches the key results in the design of the
Internet of Things, including consumer and industrial
applications.
Discover the basic concepts of cluster analysis and then study a
set of typical clustering methodologies, algorithms, and
applications. This includes partitioning methods such as kmeans, hierarchical methods such as BIRCH, density-based
methods such as DBSCAN/OPTICS, probabilistic models and EM
algorithm. Learn clustering and methods for clustering high
dimensional data, streaming data, graph data, and networked
data.
Learn of "cloudonomics," the underlying economic reasons that
we are creating the cloud. Learn the basic concepts underlying
cloud services and be able to use services like AWS or
OpenStack Dashboard to construct cloud services or
applications. Demonstrate your ability to create web services,
massively parallel data intensive computations using
Map/Reduce, NoSQL databases, and real-time processing of
real-time data streams. Use machine learning tools to solve
simple problems.
This course will cover the major techniques for mining and
analyzing text data to discover interesting patterns, extract
25th
2015
ra.org/cou
rse/textan
alytics
Cloud
Networking
October
2015 –
Nov 30th
2015
University
of Illinois
https://w
ww.course
ra.org/cou
rse/cloudn
etworking
Data
Visualization
Novemb University
er 2015 – of Illinois
Dec 27th (Coursera)
2015
https://w
ww.course
ra.org/cou
rse/datavi
sualization
useful knowledge, and support decision making with an
emphasis on statistical approaches that can be generally applied
to arbitrary text data in any natural language with no or
minimum human effort.
This course will allow us to explore in-depth the challenges for
cloud networking—how do we build a network infrastructure
that provides the agility to deploy virtual networks on a shared
infrastructure, that enables both efficient transfer of big data
and low latency communication, and that enables applications
to be federated across countries and continents? Examining
how these objectives are met will set the stage for the rest of
the course.
Learn to present data to an observer in a way that yields insight
and understanding. The first week focuses on the infrastructure
for data visualization. It introduces elementary graphics
programming, focusing primarily on two dimensional vector
graphics, and the programming platforms for graphics. This
infrastructure will also include lessons on the human side of
visualization, studying human perception and cognition to gain a
better understanding of the target of the data visualization.
The second week will utilize the knowledge of graphics
programming and human perception in the design and
construction of visualizations, starting with simple charts and
graphs, and incorporating animation and user interactivity. The
third week expands the data visualization vocabulary with more
sophisticated methods, including hierarchical layouts and
networks. The final week focuses on visualization of database
and data mining processes, with methods specifically focused on
Algorithms,
Part II
Oct 31st
– Dec
19th
2014
Princeton
University
https://w
ww.course
ra.org/cou
rse/algs4p
artII
Cryptography I Jan 5th –
Mar 9th
2015
+ Future
sessions
(?)
Stanford
https://w
ww.course
ra.org/cou
rse/crypto
Cryptography
Stanford
https://w
Jan 5th –
visualization of unstructured information, such as text, and
systems for visual analytics that provide decision support.
Part II covers graph-processing algorithms, including minimum
spanning tree and shortest paths algorithms, and string
processing algorithms, including string sorts, tries, substring
search, regular expressions, and data compression, and
concludes with an overview placing the contents of the course
in a larger context.
Cryptography is an indispensable tool for protecting information
in computer systems. This course explains the inner workings of
cryptographic primitives and how to correctly use them.
Students will learn how to reason about the security of
cryptographic constructions and how to apply this knowledge to
real-world applications. The course begins with a detailed
discussion of how two parties who have a shared secret key can
communicate securely when a powerful adversary eavesdrops
and tampers with traffic. We will examine many deployed
protocols and analyze mistakes in existing systems. The second
half of the course discusses public-key techniques that let two
or more parties generate a shared secret key. We will cover the
relevant number theory and discuss public-key encryption and
basic key-exchange. Throughout the course students will be
exposed to many exciting open problems in the field.
The course will include written homeworks and programming
labs. The course is self-contained, however it will be helpful to
have a basic understanding of discrete probability theory.
Cryptography is an indispensable tool for protecting information
II
Feb 20th
2015
+ Future
sessions
(?)
Computationa
l Methods for
Data Analysis
Dec 9th
2014 –
Feb 17th
2015
+ Future
sessions
(?)
Dec 9th
2014 –
Feb 17th
Computationa
l Methods for
Data Analysis
ww.course
ra.org/cou
rse/crypto
2
University
of
Washington
University
of
Washington
in computer systems. This course is a continuation of Crypto
I and explains the inner workings of public-key systems and
cryptographic protocols. Students will learn how to reason
about the security of cryptographic constructions and how to
apply this knowledge to real-world applications. The course
begins with constructions for digital signatures and their
applications. We will then discuss protocols for user
authentication and zero-knowledge protocols. Next we will
turn to privacy applications of cryptography supporting
anonymous credentials and private database lookup. We will
conclude with more advanced topics including multi-party
computation and elliptic curve cryptography. Throughout the
course students will be exposed to many exciting open
problems in the field. The course will include written
homeworks and optional programming labs. The material is
self-contained, but the course assumes knowledge of the topics
covered in Crypto I as well as a basic understanding of discrete
probability theory.
https://w Exploratory and objective data analysis methods applied to the
ww.course physical, engineering, and biological sciences.
ra.org/cou
rse/comp
methods
https://w Exploratory and objective data analysis methods applied to the
ww.course physical, engineering, and biological sciences.
ra.org/cou
2015
Dynamical
Modeling
Methods for
Systems
Biology
Mar 2nd
– Apr
20th
2015
Digital Signal
Processing
Jan 19th
– Mar
30th
2015
rse/comp
methods
Icahn
https://w
School of
ww.course
Medicine at ra.org/cou
Mount Sinai rse/dynam
icalmodeli
ng
École
Polytechniq
ue Fédérale
de
Lausanne
We take a case-based approach to teach contemporary
mathematical modeling techniques. The course is appropriate
for advanced undergraduates and beginning graduate
students. Lectures provide biological background and describe
the development of both classical mathematical models and
more recent representations of biological processes. The course
will be useful for students who plan to use experimental
techniques as their approach in the laboratory and employ
computational modeling as a tool to draw deeper understanding
of experiments. The course should also be valuable as an
introductory overview for students planning to conduct original
research in modeling biological systems.
This course focuses on dynamical modeling techniques used in
Systems Biology research. These techniques are based on
biological mechanisms, and simulations with these models
generate predictions that can subsequently be tested
experimentally. These testable predictions frequently provide
novel insight into biological processes. The approaches taught
here can be grouped into the following categories: 1) ordinary
differential equation-based models, 2) partial differential
equation-based models, and 3) stochastic models.
https://w The goal of the course is to develop a complete working set of
TIES324 Signaa Timo
ww.course digital signal processing notions from the ground up. DSP is
linkäsittely, 4 Hämäläine
ra.org/cou arguably at the heart of the “digital revolution” that, in the
op
n
rse/dsp
space of just a few decades, has enabled unprecedented levels
of interpersonal communication and of information availability.
Linear and
Integer
Programming
Oct 20th
– Dec
15th
2014
University
of Colorado
Boulder
In the class, starting from the basic definitions of a discrete-time
signal, we will work our way through Fourier analysis, filter
design, sampling, interpolation and quantization to build a DSP
toolset complete enough to analyze a practical communication
system in detail. Hands-on examples and demonstration will be
routinely used to close the gap between theory and practice.
https://w Linear Programming (LP) is arguably one of the most important
ww.course optimization problems in applied mathematics and engineering.
ra.org/cou The Simplex algorithm to solve linear programs is widely
rse/linear regarded as one among the "top ten" algorithms of the 20th
programm century. Linear Programs arise in almost all fields of engineering
ing
including operations research, statistics, machine learning,
control system design, scheduling, formal verification and
computer vision. It forms the basis for numerous approaches to
solving hard combinatorial optimization problems through
randomization and approximation.
The primary goals of this course will be to:
1. Understand the basic theory behind LP, algorithms to solve
LPs, and the basics of (mixed) integer programs.
2. Understand important and emerging applications of LP to
economic problems (optimal resource allocation, scheduling
problems), machine learning (SVM), control design (finite
horizon optimal control, dynamic programming), and formal
verification (ranking functions, symbolic execution, SMT
solvers).
At the end of the course, the successful student will be able to
cast various problems that may arise in her research as
optimization problems, understand the cases where the
Heterogeneou
s Parallel
Programming
Jan 12th
– Mar
8th 2015
University
of Illinois at
UrbanaChampaign
Gamification
Jan 26th
University
optimization problem will be linear, choose appropriate solution
methods and interpret results appropriately. This is generally
considered a useful ability in many research areas.
https://w All computing systems, from mobile to supercomputers, are
ww.course becoming heterogeneous, massively parallel computers for
ra.org/cou higher power efficiency and computation throughput. While the
rse/hetero computing community is racing to build tools and libraries
to ease the use of these systems, effective and confident use of
these systems will always require knowledge about low-level
programming in these systems. This course is designed for
students to learn the essence of low-level programming
interfaces and how to use these interfaces to achieve
application goals. CUDA C, with its good balance between user
control and verboseness, will serve as the teaching vehicle for
the first half of the course. Students will then extend their
learning into closely related programming interfaces such as
OpenCL, OpenACC, and C++AMP.
The course is unique in that it is application oriented and only
introduces the necessary underlying computer science and
computer engineering knowledge for understanding. It covers
the concept of data parallel execution models, memory models
for managing locality, tiling techniques for reducing bandwidth
consumption, parallel algorithm patterns, overlapping
computation with communication, and a variety of
heterogeneous parallel programming interfaces. The concepts
learned in this course form a strong foundation for learning
other types of parallel programming systems.
https://w Gamification is the application of digital game design techniques
Grow to
Greatness:
Smart Growth
for Private
Businesses,
Part I
– Apr
10th
2015
of
Pennsylvani
a
Oct 20th
– Dec
8th 2014
University
of Virginia
ww.course
ra.org/cou
rse/gamifi
cation
to non-game problems, such as business and social impact
challenges. Video games are the dominant entertainment form
of our time because they are powerful tools for motivating
behavior. Effective games leverage both psychology and
technology, in ways that can be applied outside the immersive
environments of games themselves. Gamification as a business
practice has exploded over the past two years. Organizations
are applying it in areas such as marketing, human resources,
productivity enhancement, sustainability, training, health and
wellness, innovation, and customer engagement. Game thinking
means more than just dropping in badges and leaderboards; it
requires a thoughtful understanding of motivation and design
techniques. This course examines the mechanisms of
gamification and provides an understanding of its effective use.
Subtitles for all video lectures available in: English, Russian
(provided by Digital October), Turkish (Koc University)
https://w Most entrepreneurship courses focus on how to start a
ww.course business. Few focus on the next big entrepreneurial inflection
ra.org/cou point: how do you successfully grow an existing private
rse/growt business? This is the focus of this Course. It is based on the
ogreatnes instructor's research and thirty years of real-world experience
s
advising private growth companies.
This Course will challenge how you think about growth; give you
tools to help you plan for growth, assess the preconditions to
grow, and manage the risks of growth. You will study stories of
how five different private businesses faced their growth
challenges.
Growth, if not properly managed, can overwhelm a business,
Grow to
Greatness:
Smart Growth
for Private
Businesses,
Part II
Jan 12th
– Feb
13th
2015
University
of Virginia
destroying value and in many cases even causing the business to
fail. However, the research shows that every growth business
faces common challenges. You can learn from others'
experience—you do not have to "reinvent the wheel".
The Course format is case based. Each case tells a compelling
story. You will learn from Julie Allinson, Susan Fellers, Dave
Lindsey, Parik Laxinarayan and Eric Barger. In addition, each
week, we will discuss a different content theme. In Weeks and 2
and 5, you will engage in Workshops where you will be asked to
use and apply the Course tools and concepts to create growth
strategies for two different real-life businesses. You will have
the opportunity to create a Course Community of fellowstudents to learn from each other as the Course progresses.
You will learn about the: "3 Myths of Growth"; the "Truth About
Growth"; why growth is like "Mother Nature"; the "Gas Pedal"
approach to growth; the all important "4 Ps" of how to grow;
and how to scale a business strategically.
https://w Most entrepreneurship courses focus on how to start a
ww.course business. Few focus on the next big entrepreneurial inflection
ra.org/cou point: how do you successfully grow an existing private
rse/GTG
business? This is the focus of this Course. It is based on the
instructor's research and thirty years of real-world experience
advising private growth companies.
This Course will focus on the common “people” challenges
private growth companies face as they grow. You will study
stories of how six different private businesses faced their
growth challenges.
While strategic focus and operational excellence are necessary
Developing
Innovative
Ideas for New
Companies
Nov 10th
2014 –
Jan 5th,
2015
+
Dec 1st
2014 –
University
of
Maryland,
College
Park
to build a great growth company, they are not sufficient.
Growth requires the right kind of leadership, culture, and
people. My research clearly showed that many entrepreneurs
struggle with personal challenges presented to them by growth,
as well as the challenge of hiring the right people and building
the right management team that can play well together. The
research shows that every growth business faces common
challenges. You can learn from others' experience—you do not
have to "reinvent the wheel".
The Course format is story based. Each case tells a compelling
story. You will learn from Barbara Lynch, Ryan Dienst, Steve
Ritter, Randy Bufford, John Gabbert, and Mike Cote. In addition,
each week, we will discuss a different content theme. In Week
3, you will engage in a Workshop where you will be asked to
apply the Growth System Assessment Tool. You will have the
opportunity to create a Course Community of fellow students to
learn from each other as the Course progresses.
You will learn how entrepreneurs must grow, too; the “secret”
of high performance; people-centric leadership; how to create
high employee engagement; how to create an internal Growth
System; and how to build a senior management team.
https://w This course assists aspiring entrepreneurs in developing great
ww.course ideas into great companies. With strong economies presenting
ra.org/cou rich opportunities for new venture creation, and challenging
rse/innova economic times presenting the necessity for many to make their
tiveideas
own job, the need to develop the skills to develop and act on
innovative business opportunities is ever present.
Using proven content, methods, and models for new venture
Jan 26th
2015
Content
Strategy for
Professionals:
Engaging
Audiences for
Your
Organization
Jan 19th
–
Mar 1st
2015
Northweste
rn
University
opportunity assessment and analysis, students will learn how to
enhance their entrepreneurial mindset and develop their
functional skill sets to see and act entrepreneurially. The initial
steps to creating a business plan, and raising financial capital to
launch the firm, are examined as well. Our goal is to demystify
the startup process, and to help you build the skills to identify
and act on innovative opportunities now, and in the future.
https://w Why Content Strategy is essential for professionals in any
ww.course organization – business, non-profit, or government.
ra.org/cou Content Strategy is a conversation that provides thoughtrse/conte leadership. It starts a “conversation” with users and
ntstrategy stakeholders inside and outside an organization. Conversations
are the natural way people think about complex issues.
Conversations also enable people to develop “stories,” which
lead to understanding and helpful mental pictures. Content
Strategy practitioners are at all levels of the best enterprises – in
all departments and sectors from the top leader to the
newcomer in the ranks.
In this complex information age, forward-thinking employees
know that if they and their organizations are to thrive, they
need to go beyond their job descriptions. They must master the
most demanding communications frontier – creating engaging,
strategic, honest stories and information that is valued by their
most important audiences. In turn that will make their
enterprise stand out.
Regardless of their department, area of work, or expertise,
Content Strategy practitioners know how to use words, pictures,
video, and social and mobile media to interact with their most
International
Organizations
Management
Nov 10th University
–
of Geneva
Dec 15th
2014
important constituents with trustable, actionable information
that the audience values and will use. The strategic content they
produce enhances the audience’s lives and deepens their
understanding and engagement with the organization.
Content Strategy is similar to the best examples of journalism,
but it is done by non-journalism organizations. Content Strategy
is always honest, trustable, and transparent. It tells all sides of
every story it reports. Often it is also deeper and directed at
topics and audiences that traditional journalism under-serves or
does not reach at all. Content Strategy is not advertising,
marketing, or public relations. It is different because it never
pursues the persuasive goals that are appropriate in those
disciplines.
https://w International and not-for-profit organizations present an
ww.course increasingly complex environment to work in and therefore
ra.org/cou require for their successful management an unprecedented
rse/intero level of managerial skills on top of a deep understanding of the
rg
socioeconomic and political context they operate in. This course
is designed to provide students with (1) basic notions of the
practice of international relations (2) a general overview of the
management challenges international and not-for-profit
organizations are faced with as well as key theoretical
frameworks and practical tools for managers to excel in this
environment. Key areas of management will be reviewed, from
strategy setting to implementation through marketing & fund
raising, and assessment. (3) Given the growing interaction
between public and private sectors, this course also touches
upon the management of public/private partnerships.
Inspiring
Leadership
through
Emotional
Intelligence
Nov 3rd
2014 –
Jan 5th
2015
Case
Western
Reserve
University
https://w
ww.course
ra.org/cou
rse/lead-ei
Introduction
Feb 2nd
University
https://w
Great leaders move us through our emotions. They establish a
deep emotional connection with others called resonance. Their
own levels of emotional intelligence allow them to create and
nurture these resonant relationships. They use their EI as a path
to resonant leadership through mindfulness, hope, compassion,
and playfulness. Unfortunately, most people in leadership and
helping positions (i.e., doctors, teachers, coaches, etc.) lose their
effectiveness over time because of the cumulative damage from
chronic stress. But humans can renew themselves,
neurologically, hormonally, and emotionally.
Based on decades of research into emotional
intelligence competencies and longitudinal studies of their
development, the course will examine resonance and
developing "resonant leadership" capability, emotional
intelligence, and the experiences of mindfulness, hope, and
compassion. Using the latest in neuroscience, behavioral,
organizational and psychological research, participants
will understand the theory, research, and experience of the
Positive Emotional Attractor that is an essential beginning to
sustained, desired change for individuals, teams, organizations
and communities.
The course will consist of nine classes, with three or so modules
per class, to be taken over 8 weeks. Each module will consist of
a video, assigned and recommended readings, reflective
exercises, writing in your Personal Journal, and on-line,
asynchronous discussions. Each class will have personal learning
assignments to use and tests of comprehension.
This course is primarily devoted to the fundamental principles of
to Finance
– May
18th
2015
+
Jun 1st –
Sep 14th
2015
+
Oct 5th
2015 –
Jan 18th
2016
of Michigan
ww.course
ra.org/cou
rse/introfi
nance
valuation. We will learn and apply the concepts of time value of
money and risk to understand the major determinants of value
creation. We will use both theory and real world examples to
demonstrate how to value any asset.
Download