An applied analysis and design class that addresses the use of object-oriented techniques. Topics include domain modeling, use cases, architectural design and modeling notations. Students apply techniques in analysis and design projects. Focus is on key object-oriented design patterns and principles. This course can be taken for academic credit as part of CU Boulder’s Masters … [Read more...] about Object-Oriented Analysis and Design: Patterns and Principles
Computer Science
Advanced Cybersecurity Risk Management
In the ever-evolving landscape of cybersecurity, mastering risk management is crucial. This advanced course equips learners with a deep understanding of risk management frameworks such as ISO, NIST, and COBIT, exploring their unique applications and integrations into organizational practices. Participants will gain hands-on experience with cutting-edge technology tools for risk … [Read more...] about Advanced Cybersecurity Risk Management
Crafting User Interface – End to End Web Development
This course is the first step in the End-to-End Web Development specialization, focusing on mastering the art of creating engaging and responsive user interfaces (UIs). You will learn the fundamentals of HTML, CSS, and JavaScript, as well as explore advanced topics such as responsive design, UI design principles, CSS frameworks, and JavaScript front-end frameworks like React. … [Read more...] about Crafting User Interface – End to End Web Development
Introduction to Cloud Next Generation Firewall
This training course introduces Cloud NGFW. Topics include how Cloud NGFW provides centralized firewall management, centralized firewall visibility, advanced threat protection, and firewall insights. … [Read more...] about Introduction to Cloud Next Generation Firewall
Security & Ethical Hacking: Attacking the Network
This course explains the science and art behind offensive security techniques used in penetration testing of networks and systems. A review of networking concepts is given. Students will utilize low-level programming through network interfaces, in executing a variety of network attacks, while learning to use essential auxiliary tooling for both recon and active attacks. An … [Read more...] about Security & Ethical Hacking: Attacking the Network