Fisher, Doug (Vanderbilt University.) | Isbell, Charles (Georgia Institute of Technology) | Littman, Michael L. (Brown University) | Wollowski, Michael (Rose-Hulman Institute of Technology) | Neller, Todd W. (Gettysburg College) | Boerkoel, Jim (Harvey Mudd College)
The high level of dependency on the internet and technology today has resulted in new revenue streams and business models for organizations, but with this arises new gaps and opportunities for hackers to exploit. Cybercriminals have become increasingly complex and are attempting to steal valuable data like financial data, health records, personal identifiable information (PII) and intellectual property, and are resorting to highly profitable strategies like disrupting the overall operations of a business via DDoS attacks, or monetizing data access via the utilization of advanced ransomware techniques. So, will blockchain technology be a cybersecurity help?
This Specialization covers the concepts and tools you'll need throughout the entire data science pipeline, from asking the right kinds of questions to making inferences and publishing results. In the final Capstone Project, you'll apply the skills learned by building a data product using real-world data. At completion, students will have a portfolio demonstrating their mastery of the material.