Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,260

Information Technology Auditing and Cyber Security

https://www.fox.temple.edu/academics/graduate-programs/specialized-masters/information-technology-auditing-cyber-security

The hands-on curriculum behind the Master of Science in IT Auditing and Cyber-Security can help equip you with the knowledge to make smart business decisions within a rising industry. You’ll learn to analyze data; identify, assess, and communicate cyber risk; and prepare to pass either the Certified Information System Auditor (CISA) exam or the Certified Information System Security Certified ...

Fox School of Business

https://www.fox.temple.edu/

Temple University’s Fox School of Business transforms students into responsible professionals and leaders through a high-quality business education, professional development services and impactful community engagement opportunities. Read more about the Fox School of Business.

Microsoft Word - Ex Final Risk-Control Guide.docx

https://community.mis.temple.edu/mis5121beaver/files/2015/04/Ex-Final-Risk-Control-Guide1.pdf

Risk / Control Matrix This is a case assignment reviews the risk assessment and control Activities of the COSO internal control framework and then illustrates how this is accomplished in a highly integrated computerized enterprise business environment. The Monitoring Activities layer of the COSO framework are then illustrated in this same business environment.

Data Science BS with Computation and Modeling Concentration

https://bulletin.temple.edu/undergraduate/science-technology/data-science-computation-modeling-bs/

Data Science is an interdisciplinary field of study about methods and systems to extract knowledge or insights from large quantities of data coming in various forms. The Bachelor of Science in Data Science is designed for students interested in developing expertise in data science.

IMPLEMENTATION OF VIRTUAL SYNCHRONOUS GENERATOR METHODOLOGIES FOR ...

https://scholarshare.temple.edu/server/api/core/bitstreams/5740f112-5198-41ab-b543-abef21f1c2f8/content

To build up a control strategy of conventional generator without alteration, where voltage and frequency are controlled by the AVR and governor respectively. Study and develop electronic control methodologies to provide additional inertia to microgrid for the better dynamic stability of the system. Design and implement suggested control methodologies for island microgrid connected with both ...

Choose QDA software - Qualitative Data Analysis and QDA Tools ...

https://guides.temple.edu/qda/choosing

This workshop is the second of the two-part workshop on five different Qualitative Data Analysis (QDA) tools – ATLAS.ti, NVivo, Dedoose, Taguette, and QualCoder. The workshop recaps essential and distinctive features demonstrated in the Part 1 recorded workshop and answered questions about the tools. The workshop discusses considerations for choosing among the five tools and provides ...

Images of Galois representations associated to Hida families

https://sites.temple.edu/lang/files/2023/06/BU2015.pdf

Images of Galois representations associated to Hida families Jaclyn Lang University of California, Los Angeles

Business Administration MBA - Temple University

https://www.temple.edu/academics/degree-programs/business-administration-mba-bu-ba-mba

Hone key business management principles including communication, ethics, leadership and strategy, and prepare to start or advance a career in business.

Wireshark_TCP.pdf - Temple University

https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf

The whole transmission time is the difference of the time instant of the first TCP segment (i.e., 0.026477 second for No.4 segment) and the time instant of the last ACK (i.e., 5.455830 second for No. 202 segment).

Graduate Certificate: Information Technology Auditing and Cyber ...

https://bulletin.temple.edu/graduate/scd/fox/information-technology-auditing-cyber-security-certificate/

About the Certificate The graduate certificate program in Information Technology Auditing and Cyber Security (ITACS) immerses students in a series of IT risk management, cyber security and information technology auditing courses. The ITACS graduate certificate is an efficient, high-impact program that prepares the next generation of information assurance specialists for the rapidly changing ...