Available courses

English
2 Lessons
English

SecureHigh

4 Lessons
10 Enrolled

Artificial Intelligence in general and Machine Learning in particular (AI/ML) have ushered a new era in many industries, especially in the last two years. This course gives you an overview of AI, its components like Machine-Learning, Natural Language Processing, Robotics, and Computer Vision.  You will also explore various applications like Chat-BOTS, Self-driving-cars and many more. You will also debate the ethical concerns, and the topic of Man Vs Machine and collective-intelligence. 

8 Lessons
3 Enrolled

In this course, you will learn the foundational concepts and business drivers related to solar panel technology and how to install, operate, and maintain this technology safely and optimally. Topics include Introduction to Solar, Solar Installation, Solar Operations & Maintenance, and Business Considerations.

7 Lessons
69 Enrolled

In this course you will learn about the water energy nexus of greywater use and its environmental and social benefits, as well as how to properly install and maintain a greywater system. Topics include Introduction to Greywater, Environmental Impacts, and Greywater System Installation.

6 Lessons
66 Enrolled

In this course, you will learn how human urine can be used at the residential and commercial levels as a path to sustainable fertilizer production for agriculture as well as the associated economic, environmental, and social benefits and entrepreneurial opportunities it offers. Topics include Introduction to Urine Derived Fertilizers, Self-Adoption & Residential Uses, and Commercial Uses & Business Opportunities.

6 Lessons
66 Enrolled

In this course, you’ll learn how to generate hydrogen power from water, including how to build and install a hydrogen generation system for personal and commercial use and emergency response. Topics include Introduction to Hydrogen Power & Use, Social & Economic Benefits, Hydrogen Generation Equipment, and Business Model.

7 Lessons
68 Enrolled

In this course, you will learn the foundational concepts and business drivers related to mobile biorefinery technology and how to operate it safely and optimally. Topics include Introduction to Gasification, Introduction to Mobile Biorefinery Technology, Technology Operations & Real-World Impact, and Operator’s Guide. 

7 Lessons
64 Enrolled

Get an overview of the basic concepts of bioenergy and bioeconomy, Emphasis is given to different strategies to convert biomass to biofuels, available technologies and how these could meet the growing demand for energy in the future.

9 Lessons
53 Enrolled

DEI program aims to create a positive work environment and educate employees on how to treat and integrate people of different backgrounds. This course helps to learn the definitions of DEI , explore its importance in the work place and discover effective ways to create diversity.

7 Lessons
13 Enrolled

Bioenergy & Bioeconomy

9 Lessons
12 Enrolled

The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and everyday lives. It has become increasingly critical in the cyber-age.Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations.Attacks are getting more sophisticated, more frequent, and reaching more people around the world.That makes it important for you and everyone else to become aware of the effects of cybersecurity issues.This certificate program covers the detection of attacks against networks ranging from local physical issues through global collaboration against threats.COURSE CURRICULUM:Module-1: Basics of network operations and mechanisms: Physical and logical layersProtocols and IP, Sniffing, TCP, UDP, DNS How does the traffic flow?Governance, Flow of traffic and SMTPLive Lab-exercises, and QuizModule-2: Basics of network attack methods:Components, and attack mechanismsAttacker objectives, capabilitiesAttacker methods and mechanismsDefender's viewpoints and objectivesAttack methodologiesStarting position and attack progressionPassive and active attack toolsDesign basis threatLive Lab-exercises and QuizModule-3: Basics of network attack detection mechanisms:The magnitude of the problemAttacks on Vs. through networksDetecting known attack sequencesLive Lab-exercises and QuizModule-4: Automated detection tools, operational methodologies:A general approach to detectionLoss of accountabilityDetection and response in a NOCLive Lab-exercises and QuizPROGRAM DELIVERY:Online remote with automated and semi-automated assistanceLectures via video from a cloud LMS platformLive Laboratory examples and experiments from the Cyber LabsExams live online remoteTotal of around 75 hours, over 8 weeks (Can change depending on your background, schedule, etc.)OUTCOME / BENEFITS:Learn from a world‐class expert instructor, who first coined the term “computer virus” and invented the virus defense techniques, who is an (ISC)² Fellow with over 40 years of experience in the cybersecurity industry and academiaReceive a Certificate upon successfully completing the courseHands‐on‐experience: Access iZen’s Innovation Lab during the course. Use lab exercises to reinforce the understanding of concepts. Learn by carrying out real-life use‐cases This is an “Outcome-based training” with a focus on employability. Courses are designed to prepare you for employment opportunities. For example, a certificate in “Network Attacks Detection” offers you the opportunity to work at a Network Operations Center. There are over 400,000 jobs currently open in the cybersecurity field, in the US alone, and similar demands exist in the rest of the worldINSTRUCTOR: Dr. Fred CohenDr. Fred Cohen has 40+ years of experience building companies and supporting risk management and strategic decision making for enterprises of all sizes and sorts. He is globally recognized as an innovative expert in information protection and cybersecurity. He is one of the only 20 Cybersecurity experts in the world, recognized as a fellow of (ISC)² at “Cybersecurity and IT Security Certifications and Training”. Dr. Cohen works closely with global experts to help bring knowledge of all things Cyber to program attendees from around the WorldDr. Cohen has a long history of being ahead of the curve. Following are some of the highlights of his accomplishments:First defined the term "Computer Virus" and invented most of the widely used computer virus defense techniquesWon several international awards for his work in CybersecurityLed the team that defined the information assurance problem as it relates to critical infrastructure protectionDid seminal researcher in the use of deception for information protectionHis "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global useA leader in advancing the science of digital forensic evidence examinationTop-flight information protection consultant and industry analyst for many yearsAuthored more than 200 invited, refereed, and other scientific and management research articlesWrote monthly articles on cyber since 1995 and wrote several books on information protectionHis "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues  worldwideLeading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and bookletsHis "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk showsThe research community has widely used his series of "Infosec Baseline" studies as stepping off points for further researchHis "50 Ways" series is very popular among practitioners looking for issues to be addressedHis "World War 3 ... Information Warfare Basics" is highly regarded among the thinkers in this arenaFounded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps programTaught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil mattersWas named the "most famous hacker" of all time by ABC news in 2009Dr. Cohen has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University).

6 Lessons
5 Enrolled

Overview:The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and everyday lives. It has become increasingly critical in the cyber-age.Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations.Attacks are getting more sophisticated, more frequent, and reaching more people around the world.That makes it important for you and everyone else to become aware of the effects of cybersecurity issues.This certificate program covers the basics and dimensions of cybersecurity, along with case studies and global perspectives from the world-class experts in the field.COURSE CURRICULUM:Module-1: Basics of Cybersecurity: Basic issues & implicationsWhat to do about them?How the business works, Duty to protectRisk-management, Security-managementControl-architecture, and Technical security-architectureDecision-ProcessCyber-Lab SampleQuizModule-2: Dimensions of Cybersecurity:Critical-InfrastructureIT Versus OTManagement Versus TechnologyQuizModule-3: Vertical Drill-downs, Case-studies:Medical-Healthcare Case StudyWater Case StudyCity-power and Tribal-investments case-studyCity Government Case StudyBanking & Financial ServicesCyber Board Game Startup Case StudyQuizModule-4: Global Perspectives from Guest lecturers:Chris Blask: Organizing-CybersecurityDr. Jennifer Bayuk: Risk-AnalysisProf. Lucina Duranti: Records ManagementQuizPROGRAM DELIVERY:Online remote with automated and semi-automated assistanceLectures via video from a cloud LMS platformLive Laboratory examples and experiments from the Cyber LabsExams live online remoteTotal of around 45-60 hours, over 8 weeks (Can change depending on your background, schedule, etc.)OUTCOME / BENEFITS:Learn from a world‐class expert instructor, who first coined the term “computer virus” and invented the virus defense techniques, who is an (ISC)² Fellow with over 40 years of experience in the cybersecurity industry and academiaReceive a Certificate upon successfully completing the courseHands‐on‐experience: Access iZen’s Innovation Lab during the course. Use lab exercises to reinforce the understanding of concepts. Learn from real-life use‐casesINSTRUCTOR: Dr. Fred CohenDr. Fred Cohen has 40+ years of experience building companies and supporting risk management and strategic decision making for enterprises of all sizes and sorts. He is globally recognized as an innovative expert in information protection and cybersecurity. He is one of the only 20 Cybersecurity experts in the world, recognized as a fellow of (ISC)² at “Cybersecurity and IT Security Certifications and Training”. Dr. Cohen works closely with global experts to help bring knowledge of all things Cyber to program attendees from around the WorldDr. Cohen has a long history of being ahead of the curve. Following are some of the highlights of his accomplishments:First defined the term "Computer Virus" and invented most of the widely used computer virus defense techniquesWon several international awards for his work in CybersecurityLed the team that defined the information assurance problem as it relates to Critical-Infrastructure ProtectionDid seminal researcher in the use of deception for information protectionHis "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global useA leader in advancing the science of digital forensic evidence examinationTop-flight information protection consultant and industry analyst for many yearsAuthored more than 200 invited, refereed, and other scientific and management research articlesWrote monthly articles on cyber since 1995 and wrote several books on information protectionHis "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues  worldwideLeading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and bookletsHis "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk showsThe research community has widely used his series of "Infosec Baseline" studies as stepping off points for further researchHis "50 Ways" series is very popular among practitioners looking for issues to be addressedHis "World War 3 ... Information Warfare Basics" is highly regarded among the thinkers in this arenaFounded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps programTaught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil mattersWas named the "most famous hacker" of all time by ABC news in 2009Dr. Cohen has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University).

6 Lessons
1 Enrolled

This course will help you with a basic understanding of the Big-Data landscape. Big-Data analytics helps uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful information - from large and variety of data-sets. 

5 Lessons
1 Enrolled

We are in the cognitive era. Enterprises and even nations arevying for a leadership position in AI/ML technology and applications.  Witha great deal of attention given to Machine Learning (ML) and a wide spectrum ofapplications in real life, many are beginning to seek a better understanding ofMachine Learning and the many benefits it offers to organizationsglobally.  Machine Learning (ML) and DeepLearning (DL), and Natural Language Processing (NLP) – are at the forefront ofmajor innovations, some examples being image identification, marketing campaigncustomization, genomics, self-driving car navigation, and thousands of otherapplications from every possible domain.

8 Lessons
1 Enrolled

Bioenergy & Bioeconomy

2 Lessons
Spanish

En este curso, aprenderá los conceptos fundamentales y los impulsores comerciales relacionados con la tecnología de paneles solares y cómo instalar, operar y mantener esta tecnología de manera segura y óptima. Los temas incluyen Introducción a la energía solar, instalación solar, operaciones y mantenimiento solar y consideraciones empresariales.

7 Lessons
55 Enrolled

En este curso, aprenderá sobre el nexo agua-energía del uso de aguas grises y sus beneficios ambientales y sociales, además de cómo instalar y mantener adecuadamente un sistema de aguas grises. Los temas incluyen introducción a las aguas grises, impactos ambientales e instalación del sistema de aguas grises.

6 Lessons
56 Enrolled

En este curso, aprenderá cómo la orina humana puede usarse a nivel residencial y comercial como un camino hacia la producción sostenible de fertilizantes para la agricultura y los beneficios económicos, ambientales y sociales asociados. Los temas incluyen introducción a los fertilizantes derivados de la orina, auto-adopción y usos residenciales, y usos comerciales y oportunidades comerciales.

6 Lessons
55 Enrolled

En este curso, aprenderá cómo generar energía de hidrógeno de agua, incluido cómo construir e instalar un sistema de generación de hidrógeno para uso personal y comercial y respuesta a emergencias. Los temas incluyen introducción a la energía y el uso del hidrógeno, beneficios sociales y económicos, equipos de generación de hidrógeno y modelo comercial.

7 Lessons
55 Enrolled

En este curso, aprenderá los conceptos fundamentales y los impulsores comerciales relacionados con la tecnología de biorrefinería móvil y cómo operarla de manera segura y óptima. Los temas incluyen Introducción a la Gasificación, introducción a la tecnología de biorrefinería móvil, operaciones tecnológicas e impacto en el mundo real y guía del operador.

7 Lessons
55 Enrolled