A key theme of this course is that most health outcomes are …
A key theme of this course is that most health outcomes are driven by personal behavior choices, but that those choices are made in the context of the neighborhoods where we live, work, and play. A corollary to this theme is that engaged citizens are healthier citizens (defined as a "resident of a particular city"). The object of this project is to take the principles learned in the classroom and apply them in a community environment: observe an issue in the community, document it through video/audio commentary, then use the tools of advocacy to address the issue.While designed for a Public Health course, this activity can be adapted for any topic where community organizing can lead to positive change.
Before new interventions can be used in disease control programmes, it is …
Before new interventions can be used in disease control programmes, it is essential that they are carefully evaluated in “field trials”, which may be complex and expensive undertakings. Descriptions of the detailed procedures and methods used in trials that have been conducted in the past have generally not been published.
This course focuses on the fundamentals of information security that are used …
This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Upon successful completion of this course, the student will be able to: explain the challenges and scope of information security; explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security; explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry; identify and explain symmetric algorithms for encryption-based security of information; identify and explain public key-based asymmetric algorithms for encryption-based security of information; describe the access control mechanism used for user authentication and authorization; describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce; describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec); explain the importance of physical security and discuss ways to improve physical security of an enterprise; explain the use of such security tools as firewalls and intrusion prevention systems; explain malicious software issues, such as those brought forth by software-based viruses and worms; explain common software security issues, such as buffer overflow; describe the basic process of risk assessment in the context of overall IT security management. (Computer Science 406)
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.