Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube
Explore how community-led peace programs are revolutionizing public safety through the experiences of Aqeela Sherrills, a key negotiator of the historic 1992 Los Angeles gang peace treaty that significantly reduced citywide violence. Learn about the groundbreaking Scaling Safety initiative that empowers trusted local leaders to redefine public safety from within their communities, moving beyond traditional law enforcement approaches to create sustainable, grassroots solutions. Discover the strategies and principles behind successful community peace negotiations, understand how rival gang members came together to forge an unprecedented treaty, and examine how these proven methods are being scaled across cities throughout the United States. Gain insights into the power of insider leadership, community trust-building, and locally-driven safety programs that address root causes of violence while fostering lasting transformation from the ground up.

YouTube
Explore a 42-minute panel discussion from the American Geophysical Union's Science Policy Conference 2012 focused on improving public safety in the face of natural hazards. Gain insights from experts including Timothy Manning of FEMA, Marcia McNutt of the U.S. Geological Survey, and Kristin Jacobs, a Florida county commissioner. Learn about effective strategies for mitigating injury and death during natural disasters, the importance of scientific study in understanding hazards and societal reactions, and the role of prediction, detection, mapping, and monitoring in enhancing public safety. Discover how policymakers and scientists are working together to protect millions of people endangered by natural hazards each year.

YouTube
Explore the intersection of cryptography, security, and public policy in this 37-minute conference talk. Delve into the role of the US government in shaping cryptographic standards and policies. Examine key topics such as authentication, technology in government, and the evolution of encryption algorithms like DES, AES, and SHA. Analyze the "Going Dark" debate and its implications for law enforcement and privacy. Discuss the concept of lawful access and its potential impact on encryption. Gain insights into the technical considerations and ongoing discussions surrounding cryptography and public safety. Understand the current state of play and potential future directions in balancing security, privacy, and government interests in the digital age.

YouTube
Watch a conference presentation from the 2017 Kyoto Global Conference for Rising Public Health Researchers focusing on environmental safety, specifically water and air quality. Join speaker Bunyarit Panyapinyopol from Mahidol University as they present during Session 5 at the Yamauchi Hall, Shiran Kaikan venue. Learn about interdisciplinary approaches and collaborative efforts aimed at achieving health for all through the lens of environmental safety and public health research.

YouTube
Explore a thought-provoking talk featuring CDC Director Mandy Cohen as she discusses the critical role of the Centers for Disease Control and Prevention in safeguarding public health. Gain insights into the agency's multifaceted responsibilities, including monitoring infectious diseases, ensuring emergency preparedness, and addressing various health challenges. Delve into the lessons learned from COVID-19 and other public health crises, and understand the importance of rebuilding trust in government and scientific expertise. Learn about the CDC's state-of-the-art laboratories, data analytics capabilities, and diverse workforce that contribute to its mission. Discover how the agency tackles issues ranging from vaccine distribution to environmental threats, workplace safety, opioid use, and chronic diseases. This engaging discussion, part of the Aspen Ideas: Health event, offers a unique opportunity to hear directly from a key figure in America's public health system about the challenges and opportunities facing the CDC in today's complex health landscape.

YouTube
Watch a thought-provoking conversation with Dr. Rochelle Walensky, Director of the US Centers for Disease Control and Prevention (CDC), as she discusses the agency's role in protecting public health. Gain insights into the CDC's response to the COVID-19 pandemic, its ongoing responsibilities in various health domains, and plans for modernizing the agency's systems and structures. Explore topics such as data modernization, emerging pathogens, genomics, and the CDC's approach to firearm violence as a public health issue. Learn about the challenges faced by the CDC during the pandemic, including decision-making processes, public communication, and balancing multiple health priorities. Discover Dr. Walensky's vision for shaping the CDC's future and addressing critical public health concerns in this engaging 49-minute discussion from the Aspen Ideas: Health 2022 conference.

YouTube
Explore the intersection of cybersecurity, public safety, and policy in this 55-minute conference talk from BSidesLV 2016. Join Amanda Craig and Jen Ellis as they discuss the critical work of "I Am The Cavalry," a grassroots organization focused on issues where computer security intersects with public safety and human life. Gain insights into the challenges and opportunities in aligning cybersecurity efforts with public policy to enhance overall safety in an increasingly connected world.

YouTube
Explore leadership transformation strategies in this 48-minute conference talk featuring Ely Reyes, Director of Public Safety & Chief of Police at Cedar Hill, who successfully transformed a 73-officer department through systematic leadership principles. Learn how effective leaders maintain operational credibility while building comprehensive succession planning programs, discover mentorship approaches that shaped leadership growth through attention to detail, and understand career transition strategies from military to police leadership roles. Examine frameworks for decision escalation and daily communication, explore methods for proving operational competence when transitioning to chief positions, and understand approaches to building effective team culture through organizational values systems. Gain insights into handling tough decisions under constant legal risk, discover financial counseling strategies for new officers, and explore systematic leadership development programs for succession planning. Understand digital age challenges affecting youth and social media safety concerns, learn about staying current with industry trends through conferences and networking, and examine AI integration approaches in policing that balance technological advancement with community trust and clear legal boundaries. The discussion covers hiring strategies that screen for core values, training recommendations for identifying personal shortcomings, and the most challenging aspects of transitioning from assistant chief to chief positions, providing comprehensive guidance for law enforcement leadership development and organizational transformation.

YouTube
Explore the critical work of the Centers for Disease Control and Prevention (CDC) in this 47-minute conversation with Director Robert Redfield. Gain insights into the agency's wide-ranging responsibilities, from promoting childhood vaccines and disease prevention to tracking global microbial outbreaks and conducting research in 200 laboratories. Learn about the CDC's priorities, current health risks facing the nation, and strategies for effective defense against public health threats. Discover Redfield's perspective on key issues such as healthcare delivery, vaccine hesitancy, prevention strategies, Medicaid expansion, and the role of data in public health decision-making. Delve into discussions on behavioral interventions, climate change impacts on health, and the future of healthcare in the United States.

FutureLearn
Enhance your knowledge of global food safety and nutrition issues Food security is reliable access to a sufficient quantity of affordable, safe, and nutritious food. On this three week course, you’ll learn some of the challenges of ensuring food security faced by researchers, policymakers and individuals worldwide. Understand food safety and nutrition issues and why they occur on a global scale You’ll explore how large-scale change (industrialisation, globalisation, population growth and climate change) affects food safety and understand the consequences for the world’s health and nutrition. Uncover the evolving challenges of ensuring food safety Using examples from current research, you’ll explore common and emerging global food safety issues. You’ll investigate some well- documented food scandals and scares as well as hidden or chronic exposures to contaminated food before you discover innovations designed to counter food safety risks. Explore today’s pressing global nutrition issues As you consider whose responsibility it is to maintain the safety of our food, you’ll learn the biological function of different nutrients and examine the global impact of nutrient deficiency and malnutrition. You’ll also explore global nutrition challenges and ways of reducing the burden of malnutrition and nutrition deficiencies. You’ll consider the difficulties in meeting macronutrient and micronutrient requirements and explore research into developing sustainable responses to the world’s nutritional needs. Learn from industry experts This course draws from innovative research into food safety and nutrition conducted by the University of Leeds, Jiangsu University in China, and The Nelson Mandela African Institution of Science and Technology in Tanzania. This course is financially supported by the British Council. This course is designed to educate and train the next generation of scientists in food safety, nutrition, and agriculture and broaden public awareness of food security issues.

YouTube
Explore a case study on implementing Kubernetes for the US National Capital Region's Identity and Access Management System (IAMS) in this conference talk. Discover the ten-year journey of IAMS, managed by Fairfax County VA, from virtual appliances to Kubernetes implementation. Learn how the program addressed challenges in automation, scalability, and cost management for public safety systems. Gain insights into automating builds, updating dependencies, transitioning to stateless log management, and adopting GitOps for managing multiple environments and secrets. Understand the unique challenges of building an automated system in a public safety environment with a mix of cloud-native and legacy systems. Delve into practical solutions for integrating Kubernetes into critical infrastructure supporting first responders and public safety personnel in the DC region.

Udemy
Informatica Data Direction Application configuration & usage , Integration with Informatica Master Data Management (MDM) What you'll learn: IDD Subject Area BasicsDetailed view of IDD Configuration ManagerCreate Subject Area, Subject Area Child and Grand ChildDetailed view of IDD ApplicationConfigure InternationalizationUnderstanding Properties files The overview of the Informatica Master Data Director course is for beginners who would like to start their career as MDM Developer or IDD Developer. The course focuses on various features of Informatica Data Director and how to configure it in simple steps.At the end of this course, you should be able to -Access Data Director Configuration Manager, IDD ApplicationUnderstand IDD Concepts - Subject Areas and Subject Area GroupsPerform ORS BindingConfigure Subject Areas and Subject GroupsConfigure children and Grand ChildrenConfigure Cleansing and ValidationsSearch records using IDD ApplicationCreate basic and advanced searchesCreate and Update EntitiesExport and Import IDD ApplicationUnderstand configuration files

YouTube
Learn how to effectively educate and engage a board of directors on cybersecurity matters in this informative conference talk from the Central Ohio InfoSec Summit 2016. Explore the critical role of board members in overseeing organizational security, including their responsibilities, governance duties, and the importance of transparency. Discover strategies for communicating security and business value, implementing a comprehensive approach to enterprise risk management, and addressing legal implications. Gain insights into handling breaches, managing outsourcing risks, and preparing for unplanned events. Examine the challenges of educating developers, mitigating insider threats, and establishing proper governance structures. Delve into topics such as incident response, systemic escalation, and the composition of an effective board. Equip yourself with the knowledge to bridge the gap between cybersecurity professionals and board members, ensuring a strategic direction that aligns with business objectives and protects valuable assets.

Udemy
Active Directory services : Active Directory DS, Active directory GPO, Active directory DNS, Active Directory PS & many. What you'll learn: Will get expertise on operations of Active Directory components such as :-Active Directory Management ToolsActive Directory Administrative CenterActive Directory Users & ComputersActive Directory Group Policy ObjectsActive Directory Sites and ServicesActive Directory DNSActive Directory Backup and RestorePlanning Domain ControllerActive Directory PowerShell This course is build for novice employees to professionals.The course of contents are :Active Directory sites and servicesActive Directory management toolsActive Directory Users and Computers Active Directory Administrative CenterActive Directory DNSActive Directory and Group Policy ObjectActive Directory Backup &RestoreActive Directory PowerShell Windows Server Active Directory is very much indeed a important subject in Windows Server administration. In this course I have tried my best to cover all components of Active Directory. Active Directory networking and maintenance is a really important work for a system administrator's day to day job life. Active Directory is not only about managing users and computers in an organisation, it is an art for a system administrator how the he/she built a secure network to protect company's inside informations, from malicious users.In this course I have covered Active Directory administration for operating systems such asWindows Server 2019 Active Directory PowerShellWindows Server 2016 Active DirectoryWindows Server 2012/2012R2 Active Directory

Swayam
ABOUT THE COURSE:This course thoroughly explores public administration, a discipline dedicated to implementing public policy. The curriculum will delve into the core concepts of public interest, public service motivation, and bureaucratic theory, as well as the historical evolution and contemporary challenges of public administration. Students will gain insights into the public policy process, including policy formulation, implementation, evaluation, and reform. The course will also cover public financial management, human resource management in the public sector, e-governance, ethics and integrity in public service, and comparative public administration. Through a combination of lectures, discussions, case studies, and practical exercises, this course aims to equip students with a solid foundation in public administration theory and practice, preparing them for careers in public service and policy analysis.INTENDED AUDIENCE: UG/PG/PhD and Aspirants of UPSC and State PSC’sPREREQUISITES: 12th pass

Coursera
In this course, learners are exposed to an overview of public relations principles and theories relevant to practice. You will explore the field, including the origin and trends affecting the future of the industry as well as how to land a job in public relations. This course provides a broad overview of working in public relations and how different tenets of persuasion are used in practice. The course also addresses ethical implications of public relations.

Coursera
This course offers a comprehensive introduction to public policy and the processes through which it is formulated, implemented, and evaluated. It addresses fundamental questions such as: Why do we need public policy? How is it made? What types of policies exist? Learners will explore the political, social, and economic contexts in which policies are developed, adopted, and assessed, gaining insights into how these factors shape outcomes. The course examines key theories and frameworks that guide the policymaking process, while also identifying challenges such as political capture, implementation gaps, and unintended consequences. Learners will be introduced to strategies for influencing different stages of the policy cycle and will develop the ability to critically assess policy effectiveness and equity. Special emphasis is placed on understanding the role of communication and advocacy in shaping public policy agendas. Throughout the course, real-world examples and case studies related to poverty, unemployment, education, health care, and the environment will be used to explore public policy paradoxes. Students will learn how poorly designed policies can exacerbate exclusion and inequality, while well-crafted policies can enhance social mobility and opportunity. By the end of the course, learners will be equipped to analyze, critique, and contribute to effective policymaking in diverse contexts.

YouTube
Explore the intersection of public policy and the Internet of Things in this 57-minute conference talk by Jessica Wilkerson at BSidesLV 2017. Gain insights into the challenges and opportunities presented by the growing network of connected devices, and learn how policymakers are addressing security and privacy concerns in the IoT landscape. Discover the implications of emerging regulations and standards on the development and deployment of smart technologies across various sectors. Understand the role of "I Am The Cavalry" in shaping responsible IoT policies and fostering collaboration between technologists and policymakers to ensure a safer, more secure connected future.

YouTube
Explore the state of automotive cyber safety in this comprehensive conference talk from BSidesLV 2015. Delve into crucial topics such as safety by design, learning from failures, and segmentation isolation. Examine real-world examples, including Microsoft's approach and United Airlines' experiences. Investigate the stages of SSL enlightenment and the challenges of hackable vehicles. Address industry concerns like the lack of financial incentives and responsibility avoidance. Analyze the implications of remote kill switch vulnerabilities and vehicle-to-vehicle communication. Discover supply chain principles and the road ahead for cyber safety in the automotive industry. Evaluate technical solutions, trust levels, and the concept of technical debt. Explore emerging technologies like head-up display helmets and Tesla's manufacturing processes. Gain valuable insights into the future of automotive cybersecurity and its impact on vehicle safety.

YouTube
Explore a comprehensive lecture on verifying the safety of distributed systems presented by Professor Mooly Sagiv. Delve into two ongoing efforts aimed at tackling the challenges of developing and testing these complex systems. Learn about IVY, an interactive static analysis tool for proving safety in infinite-state systems with unbounded nodes, combining SAT solver automation and user interaction. Discover the RML modeling language and its role in effective verification. Examine the verification of stateful networks with Middleboxes, understanding their abstract effects and the complexity of stateful network verification. Gain insights from a leading researcher in large-scale program analysis and shape analysis, covering essential topics in programming languages, compilers, and software composition.