Design and development of medical devices, covering regulatory requirements, safety considerations, and emerging technologies.
Exploration of the process of starting and managing new ventures, including opportunity recognition, business planning, and resource acquisition.
Study of financial decision-making in corporations, including capital budgeting, risk management, and capital structure decisions.
Exploration of human development across the lifespan, covering physical, cognitive, and social-emotional changes from infancy to late adulthood.
Application of mechanical principles to biological systems, including the study of motion, deformation, and stress analysis in living organisms.
Detailed examination of communication protocols used in computer networks, including TCP/IP, HTTP, and wireless protocols.
Examination of investment vehicles, strategies, and portfolio management. Topics include stock valuation, bond pricing, and risk assessment.
Study of network architectures, protocols, and applications, including local and wide area networks, and the Internet.
Exploration of the process of starting and managing new ventures, including opportunity recognition, business planning, and resource acquisition.
Interdisciplinary field combining engineering and life sciences to develop biological substitutes for restoring, maintaining, or improving tissue function.
Application of computational methods to biological data analysis, including sequence alignment, genomics, and protein structure prediction.
Study of the flow of goods, services, and information from suppliers to end customers, emphasizing coordination and optimization.
Introduction to quantum mechanics principles applied to computation, including quantum algorithms and potential applications.
Study of network architectures, protocols, and applications, including local and wide area networks, and the Internet.
Exploration of online marketing strategies, including search engine optimization, social media marketing, content marketing, and analytics.
Examination of network vulnerabilities and defense mechanisms, including firewalls, encryption, and intrusion detection systems.
Detailed examination of communication protocols used in computer networks, including TCP/IP, HTTP, and wireless protocols.