Certified Ethical Emerging Technologist (CEET)

(CEET.AD1) / ISBN : 978-1-64459-535-0
Dieser Kurs beinhaltet
Lessons
TestPrep
Hands-On Labs
AI Tutor (Hinzufügen Auf)
Holen Sie sich eine kostenlose Testversion

Über diesen Kurs

Der Kurs Certified Ethical Emerging Technologist (CEET) befasst sich eingehend mit den ethischen Überlegungen rund um neue Technologien. Von künstlicher Intelligenz und Blockchain bis hin zu Cybersicherheit und Datenschutz deckt dieser Kurs ein breites Spektrum an Themen ab, die für das Verständnis und die Bewältigung ethischer Herausforderungen im digitalen Zeitalter von wesentlicher Bedeutung sind. Dieser Kurs hilft Ihnen, die ethischen Rahmenbedingungen und Prinzipien zu verstehen, die die Entwicklung und den Einsatz neuer Technologien bestimmen, sowie die ethischen Auswirkungen wichtiger technologischer Trends und Innovationen.

Fähigkeiten, die Sie erwerben werden

Unterricht

11+ Unterricht | 236+ Übungen | 76+ Tests | 141+ Karteikarten | 141+ Glossar der Begriffe

Testvorbereitung

50+ Fragen vor der Beurteilung | 2+ Ausführliche Tests | 50+ Fragen nach der Bewertung | 100+ Testfragen zur Praxis

Praktische Übungen

12+ LiveLab | 12+ Videoanleitungen | 21+ Minutes

1

About This Course

  • Course Description
  • Course Objectives
2

Introduction to Ethics of Emerging Technologies

  • TOPIC A: What’s at Stake
  • TOPIC B: Ethics and Why It Matters
  • TOPIC C: Ethical Decision-Making in Practice
  • TOPIC D: Causes of Ethical Failures
  • Summary
3

Identifying Ethical Risks

  • TOPIC A: Ethical Reasons
  • TOPIC B: Stumbling Blocks for Ethical Reasoning
  • TOPIC C: Identify Ethical Risks in Product Development
  • TOPIC D: Tools for Identifying Ethical Risks
  • TOPIC E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks
  • Summary
4

Ethical Reasoning in Practice

  • TOPIC A: Ethical Theories
  • TOPIC B: Use Ethical Decision-Making Frameworks
  • TOPIC C: Select Options for Action
  • TOPIC D: Avoid Problems in Ethical Decision-Making
  • Summary
5

Identifying and Mitigating Security Risks

  • TOPIC A: What Is Security?
  • TOPIC B: Identify Security Risks
  • TOPIC C: Security Tradeoffs
  • TOPIC D: Mitigate Security Risks
  • Summary
6

Identifying and Mitigating Privacy Risks

  • TOPIC A: What Is Privacy?
  • TOPIC B: Identify Privacy Risks
  • TOPIC C: Privacy Tradeoffs
  • TOPIC D: Mitigate Privacy Risks
  • Summary
7

Identifying and Mitigating Fairness and Bias Risks

  • TOPIC A: What Are Fairness and Bias?
  • TOPIC B: Identify Bias Risks
  • TOPIC C: Fairness Tradeoffs
  • TOPIC D: Mitigate Bias Risks
  • Summary
8

Identifying and Mitigating Transparency and Explainability Risks

  • TOPIC A: What Are Transparency and Explainability?
  • TOPIC B: Identify Transparency and Explainability Risks
  • TOPIC C: Transparency and Explainability Tradeoffs
  • TOPIC D: Mitigate Transparency and Explainability Risks
  • Summary
9

Identifying and Mitigating Accountability Risks

  • TOPIC A: What Is Accountability?
  • TOPIC B: Identify Accountability Risks
  • TOPIC C: Accountability Tradeoffs
  • TOPIC D: Mitigate Accountability Risks
  • Summary
10

Building an Ethical Organization

  • TOPIC A: What Are Ethical Organizations?
  • TOPIC B: Organizational Purpose
  • TOPIC C: Ethics Awareness
  • TOPIC D: Develop Professional Ethics within Organizations
  • Summary
11

Developing Ethical Systems in Technology- Focused Organizations

  • TOPIC A: Policy and Compliance
  • TOPIC B: Metrics and Monitoring
  • TOPIC C: Communication and Stakeholder Engagement
  • TOPIC D: Ethical Leadership
  • Summary

1

Identifying Ethical Risks

  • Performing Nmap Port Scanning
  • Detecting Rootkits
  • Performing IDS Configuration with Snort
  • Reviewing Ethical Guidelines
2

Ethical Reasoning in Practice

  • Reviewing the Human Rights Policies of a Company
3

Identifying and Mitigating Security Risks

  • Creating and Binding an SSL Certificate to a Website
  • Performing SQL Injection with Kali Linux
  • Analyzing Malware
  • Simulating the DDoS Attack
  • Establishing an SSH Connection
4

Identifying and Mitigating Privacy Risks

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption

Certified Ethical Emerging Technologist (CEET)

$ 279.99

Kaufe jetzt
Scrolle nach oben