Lesson n. 1: Digital Transformation – Introduction
Prerequisites: Knowledge representation and modeling
The three phases of Digital Transformation: AsIs, Transformation, ToBe
|
|
Michele Missikoff
|
Lesson n. 2: Digital Transformation – Model-Driven Transformation
The three layers of Model-Driven Engineering: Computational Independent Models (CIM), Platform Independent Models (PIM), Platform Specific Models (PSM)
EasInnova Matrix
|
|
Michele Missikoff
|
Lesson n. 3: Digital Transformation – The EasInnova Methodology
CIM: AsIs, Trans, ToBe
PIM: AsIs, Trans, ToBe
PSM: AsIs, Trans, ToBe
|
|
Michele Missikoff
|
Lesson n. 4: Digital Transformation – Pizza shop example of DT
A simple example to show how the EasInnova Methodology can be used
Final considerations on the EasInnova Methodology
|
|
Michele Missikoff
|
Lesson n. 5: General Soft Skills - Personal and Interpersonal Communication
Personal and Interpersonal Communication, Ethical and Sustainable Thinking
|
|
Manuel Castro
|
Lesson n. 6: General Soft Skills - Presentations
Presentations
|
|
Manuel Castro
|
Lesson n. 7: General Soft Skills - Intelligence and Relation
Intelligence and Relations: Motivation, Perseverance, Resilience
|
|
Manuel Castro
|
Lesson n. 8: General Soft Skills - Time and Resources Management
Time and Resources Management
|
|
Manuel Castro
|
Lesson n. 9: E-leadership and negotiation - Management and Entrepreneurship
E-Leadership, Management and Entrepreneurship
|
|
Manuel Castro
|
Lesson n. 10: E-leadership and negotiation - Teamwork and Opportunities
Teamwork and Opportunities
|
|
Manuel Castro
|
Lesson n. 11: E-leadership and negotiation - Innovation and Creativity
Innovation and Creativity
|
|
Manuel Castro
|
Lesson n. 12: E-leadership and negotiation - Negotiation and Strategic Vision
Negotiation and Strategic Vision
|
|
Manuel Castro
|
Lesson n. 13: Cyber Security and Protection of Critical Infrastructures - Basic security concepts
Basic security concepts
|
|
Elio San Cristobal
|
Lesson n. 14: Cyber Security and Protection of Critical Infrastructures - Network communication
Network communication
|
|
Elio San Cristobal
|
Lesson n. 15: Cyber Security and Protection of Critical Infrastructures - Cloud computing and security
Cloud computing and security
|
|
Elio San Cristobal
|
Lesson n. 16: Cyber Security and Protection of Critical Infrastructures - Big Data and Analytics
Big Data and Analytics
|
|
Elio San Cristobal
|
Lesson n. 17: Cyber Security and Protection of Critical Infrastructures - Phases of an Attack
Phases of an Attack
|
|
Elio San Cristobal
|
Lesson n. 18: Cyber Security and Protection of Critical Infrastructures - Pentesting
Pentesting
|
|
Elio San Cristobal
|
Lesson n. 19: Cyber Security and Protection of Critical Infrastructures - Malware
Malware
|
|
Elio San Cristobal
|
Lesson n. 20: Cyber Security and Protection of Critical Infrastructures - Cyber threats and risk
Cyber threats and risk
|
|
Elio San Cristobal
|
Lesson n. 21: Cyber Security and Protection of Critical Infrastructures - Organization and protection of critical infrastructures
Organization and protection of critical infrastructures
|
|
Elio San Cristobal
|
Lesson n. 22: Cyber Security and Protection of Critical Infrastructures - Security policies
Security policies
|
|
Elio San Cristobal
|
Lesson n. 23: Cyber Security and Protection of Critical Infrastructures - Pillars of Industry 4.0 and Business opportunities
Pillars of Industry 4.0 and Business opportunities
|
|
Elio San Cristobal
|
Lesson n. 24: Cyber Security and Protection of Critical Infrastructures - Cybersecurity challenges and recommendations
Cybersecurity challenges and recommendations
|
|
Elio San Cristobal
|
Lesson n. 25: Cyber Security and Protection of Critical Infrastructures - Vertical and horizontal integration
Vertical and horizontal integration
|
|
Elio San Cristobal
|