Education Course Catalog

Offering a range of courses to support your career advancement, including preparation for taking the Computer Society's certification exams.
Our Products
Type:
Topic:
Deciding to migrate a business’ IT infrastructure to the Cloud involves a great deal more than the realization that one may not have to purchase all of the software, hardware and IT infrastructure nominally required to run the business...
Type: Course, Certificate of achievement
Topic: Cloud Computing
Migrating IT infrastructures to the Cloud is becoming a cost effective solution to the ever increasing burden of maintaining complex software and hardware systems. As with any new concept that plays a central role in business, the Cloud must be understood. Specifically, the differences between managing an in-house IT infrastructure versus a Cloud-based infrastructure are critical...
Type: Course, Certificate of achievement
Topic: Cloud Computing
Managers are often faced with having to decide if, and how to upgrade their IT infrastructure, and how to pay for it. In an environment of tight budgets and soaring hardware and software costs, they are also looking for alternatives to making huge investments that will have to be upgraded again and again...
Type: Course, Certificate of achievement
Topic: Cloud Computing
Multi-core Video Lectures Series
Type: Certificate of achievement, Lecture
Topic: Multi-core
Software design is both the process of defining the architecture, components, interfaces and other characteristics of a system, and the result of that process...
Type: Course
Topic: Software Engineering
Secure coding is becoming increasingly important due to various emerging threats. Although many of the existing secure coding best practices are programming language and domain‐specific, there are also language and domain‐neutral knowledge to be obtained by software developers...
Type: Course, Certificate of achievement
Topic: Security
This course offers a comprehensive coverage of practical knowledge in how to design secure software as well as insights on the significance of the role secure design plays during a software development life cycle. Some of the critical topics covered in this course include secure design principles and processes in addition to fundamental security concepts such as access control, encryption, etc...
Type: Course, Certificate of achievement
Topic: Security
This course offers a comprehensive coverage of practical knowledge in how to design secure software as well as insights on the significance of the role secure design plays during a software development life cycle. Some of the critical topics covered in this course include secure design principles and processes in addition to fundamental security concepts such as access control, encryption, etc...
Type: Course, Certificate of achievement
Topic: Security
Software security is becoming increasingly important due to the numerous emerging threats exploiting software vulnerabilities. This course provides a broad overview of various software security threats and some of the most effective countermeasures used to thwart both well-known and newly emerging software security threats...
Type: Course, Certificate of achievement
Topic: Security
Embedded software is found in most electronic devices designed today. Embedded software controls our cell phones, microwaves, network routers, automobiles, and industrial controls. Each of these embedded systems is unique and highly customized to the specific application. As a result, embedded systems development is a widely varying field that can take years to master.
Type: Course, Certificate of achievement
Topic: Embedded Systems
An online inference engine monitors and extracts usage cues from wearables and identifies whether the user is busy, alone, happy, or stressed. Experiments show 85 percent identification accuracy with negligible energy cost.
Type: Short-course, Quartos
Topic: Wearables
The recent English Court of Appeal case of Google v. Vidal-Hall raises three issues for many Internet-based businesses: whether they can be sued in tort for misuse of private information, whether browser-generated information is defined as personal data, and whether compensation for emotional distress without accompanying financial loss can be awarded.
Type: Short-course, Quartos
Topic: Risk-Based Security
A risk-based cybersecurity framework must continuously assimilate new information and track changing stakeholder priorities and adversarial capabilities, using decision-analysis tools to link technical data with expert judgment.
Type: Short-course, Quartos
Topic: Risk-Based Security
Given the threat of security breaches, to both cloud service providers and organizational cloud service users, cloud security and privacy are growing public policy concerns as well a salient area of inquiry for researchers...
Type: Short-course, Quartos
Topic: Risk-Based Security
Norman Fenton and Martin Neil explain the world of Bayesian decision networks and the development of the company Agena, which developed its own Bayesian network platform.
Type: Short-course, Quartos
Topic: Risk-Based Security
Current public and private healthcare information technology initiatives have failed to achieve secure integration among providers. Applying the "keep it simple, stupid" principle offers key guidance for solving this problem.
Type: Short-course, Quartos
Topic: Healthcare Cybersecurity
Healthcare social networking sites (HSNSs) provide users with tools and services to easily establish contact with each other around shared problems and utilize the wisdom of crowds to attack disease. The increasing popularity of HSNSs has led to concern over the privacy of health-related data published through these websites...
Type: Short-course, Quartos
Topic: Healthcare Cybersecurity
Despite the ambiguities of healthcare security costs and benefits, market mechanisms can nudge healthcare organizations toward effective proactive and voluntary security actions. However, the effectiveness of market mechanisms suffers from the economic forces of the imperfect US healthcare market.
Type: Short-course, Quartos
Topic: Healthcare Cybersecurity
Managing large, heterogeneous, and rapidly increasing volumes of data, and extracting value out of such data, has long been a challenge. In the past, this was partially mitigated by fast processing technologies that exploited Moore's law.
Type: Short-course, Quartos
Topic: Healthcare Cybersecurity
Although a wide range of organizations are adopting the cloud to deploy a variety of applications, security concerns keep many from deploying certain types of applications, such as healthcare and financial, in the cloud. This article explores how federated clouds can be exploited to meet applications' security requirements.
Type: Short-course, Quartos
Topic: Healthcare Cybersecurity
A proposed property-aware name service simultaneously supports what, where, and when properties of each IoT object through unique, text-based, and human-readable identity assignments.
Type: Short-course, Quartos
Topic: Internet of Things
Engineering Internet of Things (IoT) and cloud services to provide a coherent software layer for continuous deployment, provision, and execution of applications for various domains is complex.
Type: Short-course, Quartos
Topic: Internet of Things
Internet of Things analytics engines are complex to use and often optimized for a single domain or limited to proprietary data. A prototype system shows that existing Web analytics technologies can successfully be repurposed for IoT applications including sensor monitoring and user engagement tracking.
Type: Short-course, Quartos
Topic: Internet of Things
What can you glean from using inexpensive, off-the-shelf parts to create Internet of Things (IoT) use cases? As it turns out, a lot. The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.
Type: Short-course, Quartos
Topic: Internet of Things
This article offers expert opinion on two Internet of Things (IoT) perspectives. The first is a research agenda for the IoT to ensure the development of a trusted, secure, reliable, and interoperable net-centric computing environment. The second discusses the IoT as a human agent, extension, and complement.
Type: Short-course, Quartos
Topic: Internet of Things
The Internet of Things (IoT) will democratize knowledge. Organizations are looking for ways to create active knowledge and insight from IoT data and apply this data to new business models in which understanding and addressing customer needs and demands is key. To ensure that the IoT can meet this challenge, the author identifies six key interest areas.
Type: Short-course, Quartos
Topic: Internet of Things
When DevOps started gaining momentum in the software industry, one of the first service-based architectural styles to be introduced, be applied in practice, and become popular was microservices.
Type: Short-course, Quartos
Topic: DevOps
Wotif Group used DevOps principles to recover from the downward spiral of manual release activity that many IT departments face. Its approach involved the idea of "making it easy to do the right thing."
Type: Short-course, Quartos
Topic: DevOps
Most software architecture books focus on building new systems. However, successful systems spend much more time running in their production environment than being initially developed...
Type: Short-course, Quartos
Topic: DevOps
DevOps is about fast, flexible development and provisioning business processes. It efficiently integrates development, delivery, and operations, thus facilitating a lean, fluid connection of these traditionally separated silos.
Type: Short-course, Quartos
Topic: DevOps
Modern software-based services are implemented as distributed systems with complex behavior and failure modes. Chaos engineering uses experimentation to ensure system availability. Netflix engineers have developed principles of chaos engineering that describe how to design and run experiments.
Type: Short-course, Quartos
Topic: DevOps
DevOps, the synergy between software development and IT operations, was an open secret before it became a mass movement. Passionate programmers were often also closet system administrators—sometimes literally so, by nurturing recycled hardware in their home’s closet.
Type: Short-course, Quartos
Topic: DevOps
Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one such network's operation and effectiveness.
Type: Short-course, Quartos
Topic: Cybersecurity
As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat- based cyber defense.
Type: Short-course, Quartos
Topic: Cybersecurity
The ways in which we use and develop tools shape human destiny. This is especially true when such tools are used in harmful ways--as with the recent rash of cyberattacks.
Type: Short-course, Quartos
Topic: Cybersecurity
Large organizations often face difficult tradeoffs in balancing the need to share information with the need to safeguard sensitive data. A prominent way to deal with this tradeoff is on-the-fly screen masking of sensitive data in applications...
Type: Short-course, Quartos
Topic: Cybersecurity
The growing volumes of time-stamped data available from sensors, social media sources, Web logs, and medical histories present remarkable opportunities for researchers and policy analysts.
Type: Short-course, Quartos
Topic: Big Data
With the proliferation of social media, which is largely fostered by the boom of the Internet and mobile ecosystems, a huge amount of multimedia data has been generated, forming the multimedia big data.
Type: Short-course, Quartos
Topic: Big Data
With the proliferation of social media, which is largely fostered by the boom of the Internet and mobile ecosystems, a huge amount of multimedia data has been generated, forming the multimedia big data.
Type: Short-course, Quartos
Topic: Big Data
Specifically, the author examines the consequences of unevenness in big data, digital data going from local controlled settings to uncontrolled global settings, privacy effects of reputation monitoring systems, and inferring knowledge from social media.
Type: Short-course, Quartos
Topic: Big Data
The Internet of Things (IoT) enables data collection on a large scale, but the extraction of knowledge from this data can lead to user privacy issues. This article discusses privacy challenges in the IoT.
Type: Short-course, Quartos
Topic: Big Data
Cloud computing has transformed people's perception of how Internet-based applications can be deployed in datacenters and offered to users in a pay-as-you-go model. Despite the growing adoption of cloud datacenters, challenges related to big data application management still exist...
Type: Short-course, Quartos
Topic: Big Data
Exponential data growth from the Internet, low-cost sensors, and high-fidelity instruments have fueled the development of advanced analytics operating on vast data repositories. These analytics bring business benefits ranging from Web content personalization to predictive maintenance of aircraft components....
Type: Short-course, Quartos
Topic: Big Data
With greater availability of data, businesses are increasingly becoming data-driven enterprises, establishing standards for data acquisition, processing, infrastructure, and decision making. Enterprises now have people dedicated to performing analytic work to support decision makers.
Type: Short-course, Quartos
Topic: Big Data
Multi-core Roundtable Discussion by all presenters
Type: Lecture
Topic: Multi-core
Dr. Peng Tu is a Principle Engineer and manages the Technology Pathfinding engineering team in the Developer Product Division of Intel Corporation.
Type: Lecture
Topic: Multi-core
Yaoqing Gao’s major interests are compilation technology, optimization and performance tuning tools, parallel programming models and languages, and computer architecture, and as an IBM Master Inventor, he has authored over 30 issued and pending patents.
Type: Lecture
Topic: Multi-core
Professor Sadayappan’s current research centers around domain-specific compiler optimization and high-performance scientific computing, including some recent projects such as the PolyOpt polyhedral optimizer in the ROSE compiler and the Tensor Contraction Engine.
Type: Lecture
Topic: Multi-core
David Kuck is an Intel Fellow working on hardware/software co-design in Intel’s Software and Solutions Group, and is the founder of the Center for Supercomputing Research and Development.
Type: Lecture
Topic: Multi-core
Professor Feautrier’s research interests include computer architecture, operating systems, parallel programming, automatic parallelization, and program optimization, and he has been one of the prime movers behind the polyhedral model, an abstract representation of regular programs.
Type: Lecture
Topic: Multi-core
Professor Kasahara has been researching on OSCAR Automatic Parallelizing and Power Reducing Compiler and OSCAR Multicore architecture for more than 30 years, and led four Japanese national projects on parallelizing compilers, multicores, and green computing.
Type: Lecture
Topic: Multi-core
The author of over 300 conference and journal articles and many books, Dr. Nicolau has chaired numerous international conferences and is editor in chief of the International Journal of Parallel Programming, the oldest journal in that field.
Type: Lecture
Topic: Multi-core
Dr. Eigenmann’s research interests include optimizing compilers, programming methodologies and tools, performance evaluation for high-performance computers and cyberinfrastructures, and he currently serves as program director at the National Science Foundation.
Type: Lecture
Topic: Multi-core
Dependences and Dependence Analysis by Utpal Banerjee: Utpal Banerjee's research interests in computer science are in the general area of parallel processing and he has published four books on loop transformations and dependence analysis, with a fifth one on instruction level parallelism on the way.
Type: Lecture
Topic: Multi-core
Autoparallelization for GPUs by Wen-mei Hwu: With research interests in the area of architecture, implementation, compilation, and algorithms for parallel computing, Wen-mei Hwu is the chief scientist of the Parallel Computing Institute and director of the IMPACT Research Group.
Type: Lecture
Topic: Multi-core
Professor Padua is an internationally recognized expert on autotuning, high level notations for parallel programming, compiler evaluation, and the efficient implementation of scripting languages, and is also a member of the editorial boards of IEEE Transactions of Parallel and Distributed Systems, the Journal of Parallel and Distributed Computing, and the International Journal of Parallel Programming.
Type: Lecture
Topic: Multi-core
This professional competency certification requires successful completion of Certificates of Proficiency in the following four key knowledge areas: Software Engineering Requirements, Software Engineering Design, Software Engineering Construction, Software Engineering Testing and the successful completion of two applied modules.
Type: Certification, Exam
Topic: Software Engineering
This professional competency certification requires successful completion of Certificates of Proficiency in the following four key knowledge areas: Software Engineering Requirements, Software Engineering Design, Software Engineering Construction, Software Engineering Testing and the successful completion of two applied modules.
Type: Certification, Exam
Topic: Software Engineering
This certification recognizes candidates who have acquired the basic knowledge and understanding required for developing software products. It requires a coherent, demonstrable understanding of the principles and processes in software requirements, software design, software construction, and software testing. There are no prerequisites required for registration.
Type: Certification, Exam
Topic: Software Engineering
Software Engineering Economics are about making decisions related to software engineering in a business context. Success of any software engineering project is partly dependent on effective business management. Software engineering economics provides a way to examine the attributes of software and software processes in a systematic way that relates them to economic measures.
Type: Course
Topic: Software Engineering
Software Quality can be defined as the capability of a software product to satisfy stated and implied needs under specified conditions. Additionally, Quality refers to the degree to which software products meet their stated requirements.
Type: Course
Topic: Software Engineering
Models and Methods impose a structure on software engineering with the goal of making that activity systematic, repeatable and quality-oriented. Models provide an approach to problem solving, notations and procedures for model construction and analysis.
Type: Course
Topic: Software Engineering
An engineering process can be defined as a set of inter-related activities that transform one or more inputs into outputs, while consuming resources to accommodate that transformation. In software engineering, processes refer specifically to activities by software engineers to develop, maintain and operate software. In overview, software engineering process can be examined on two levels.
Type: Course
Topic: Software Engineering
Once a software product is delivered, it must evolve – or change – over time. When in actual operations, defects are discovered, operating environments change, and new user requirements emerge. While the Maintenance phase of the life cycle generally begins following a post-implementation period, actual maintenance activates may occur earlier.
Type: Course
Topic: Software Engineering
Once a software product is delivered, it must evolve – or change – over time. When in actual operations, defects are discovered, operating environments change, and new user requirements emerge. While the Maintenance phase of the life cycle generally begins following a post-implementation period, actual maintenance activates may occur earlier.
Type: Course
Topic: Software Engineering
Software testing consists of the dynamic verification that a program provides the expected behaviors on a finite set of test cases, suitably selected from an infinite domain of execution possibilities. Software testing is no longer limited to activities that start only after coding (construction) is complete.
Type: Course
Topic: Software Engineering
Software Construction is the detailed creation of working software through a combination of coding, verification, unit testing, integration testing and debugging. Construction uses the output from the design process to build software therein described, and provides an output to testing.
Type: Course
Topic: Software Engineering
Software requirements engineering is the process of determining what is to be produced in a software system. It has the widely recognized goal of determining the needs for, and the intended external behavior, of a system design.
Type: Course
Topic: Software Engineering
Software development is not a straightforward process and often requires multiple iterations between the development phases. To cope with this dynamic nature of software development, software engineers need to control the changes in the development process.
Type: Course
Topic: Software Engineering
There are no posts for this Type and Topic selection.

Computer Society Members Save on Conferences & Events

  • Engage with the brightest minds.
  • Share best practices and innovative solutions.
  • Choose from 180+ technical conferences worldwide.