Content Gallery
Available Content:

How to Be a Statistical Detective
Statistical errors are surprisingly common in medical literature. Learn some of the simple tools and techniques to detect (and prevent) these errors.

Transitioning to a Remote Workforce
Organizations should focus their digital transformation on these 3 areas.

6 essential traits you need to look for in an online graduate certificate program

4 Key Considerations When Pursuing a Career in Product Management
Learn how to take the next step toward a career in product management.

Fitting professional education into a busy schedule
Learn techniques to help you balance online education with a full-time career.

What Does the Future Hold for Cryptocurrency?
Join Joseph A. Grundfest, professor at the Stanford Law School, and find "The truth about trustless systems".

Psychology’s Role in Brand Marketing
Jonathan Levav
Learn about the relationship between products and marketing and how strong branding elicits positive feelings that consumers associate with certain goods or services.

Marketing Fundamentals
Jonathan Levav
Good marketing is essential for business success, regardless of the industry, product or service. Getting the basics down is an essential first step on your marketing journey.

Ensuring Market Adoption
Jonathan Levav
Successful products address customer pain points and meet their most pressing needs. But how do you identify those concerns? That's where the ACCORD Framework comes in.

Breaking Down Customer Segmentation
Jonathan Levav
Customer segmentation involves a lot more than just breaking down your target audience by age or purchase power. Find out how consumer profiles can inform successful marketing strategies.

Bugs in Crypto Implementations
Professor Dan Boneh | May 29, 2018
How can you be sure that your messages are safe and secure? Realize the vulnerabilities in WEP and iMessage.

Lessons from Mirai and the Current State of IoT Security
Professor Zakir Durumeric | June 5, 2018
Who was responsible for the Mirai Bonet? What were their motives? Study the evolution of this major attack and its impact on IoT Security.