The following courses were designed with the mindset of helping people understand how technology can be used for social good. In today’s age, exponential developments in technology are presenting just as many amazing innovations as alarming concerns. It becomes the individual’s responsibility to address them, educate themselves about the science of the matter, and collaborate with others to continuously solve these problems.
Network effects are the key to navigating a world with such rapidly expanding information access and as such, students should keep a particular learning goal in mind when going through the material by considering the following framework:
The point here is that ideally this curriculum should not only help trigger those “aha!” moments, but also inspire students to reinforce their learning with a Level 2 Understanding and become teachers themselves, creating exponential effects and spreading the most relevant information.
This course is best suited for newcomers to the world of programming. Students will establish a foundational understanding of the basic logical principles that govern the behavior of a program and a recommended continuation is introduced after the fundamental foundation has been set. This will help students reinforce these principles in practice and start building a familiarity for reading and writing source code.
This course is aimed at improving students’ ability to discover and verify digital information. As the virtually limitless amount of information available on the internet continues to grow into new forms and sizes, one of the most critical components of software literacy includes becoming proficient in finding high quality information. This demands a strong scientific methodology for ensuring that corrupted information is not incorporated into your work and research.
This course provides key insights for those who have specialized their skillset in design, marketing, or programming and want to gain a more holistic understanding of the software development process. Project managers may also find some of the material helpful for reinforcing their knowledge and adapting parts of their own management methods.
Part 1 will teach basic ways to assess exposure to common risks that affect anyone using the software of the Internet. Part 2 will dive deeper into the more specific vulnerabilities currently present in critical components of Internet infrastructure, introducing blockchain as a networking protocol and outlining the general principles that govern any trusted relationships required for different kinds of computing.