Course list

As new digital technologies become embedded in business operations, there are more questions than answers for many leaders. How can you harness the power of digital technologies to help your business thrive without falling into pitfalls along the way?

In this course, you will gain a foundation in a number of technological advances. You will start by discussing ways that technologies can improve your personal and professional life, including ways to produce work more smoothly, quickly, and effectively. You will also explore ways that technologies fail to deliver on promised results and access methods to prepare your team to benefit from digital technologies. By the end of this course, you will understand ways to harness the opportunities and avoid the pitfalls of digital technologies.

Entrepreneurship has become more than just a short-term initiative, becoming an essential component of any successful organization. In this course, students will learn to identify, assess, and implement new business opportunities within established organizations to drive and maintain competitive advantage. After completing this course, students will not only be able to formulate business models and develop processes to maximize entrepreneurial abilities, but also increase the overall entrepreneurial spirit of their organizations.

Symposium sessions feature three days of live, highly interactive virtual Zoom sessions that will explore today’s most pressing topics. The Leadership Symposium offers you a unique opportunity to engage in real-time conversations with peers and experts from the Cornell community and beyond. Using the context of your own experiences, you will take part in reflections and small-group discussions to build on the skills and knowledge you have gained from your courses.

Join us for the next Symposium in which we’ll discuss the ways that leaders across industries have continued engaging their teams over the past two years while pivoting in strategic ways. You will support your coursework by applying your knowledge and experiences to relevant topics for leaders. Throughout this Symposium, you will examine different areas of leadership, including innovation, strategy, and engagement. By participating in relevant and engaging discussions, you will discover a variety of perspectives and build connections with your fellow participants from various industries.

Upcoming Symposium: June 4-6, 2024 from 11am – 1pm ET

All sessions are held on Zoom.

Future dates are subject to change. You may participate in as many sessions as you wish. Attending Symposium sessions is not required to successfully complete any certificate program. Once enrolled in your courses, you will receive information about upcoming events. Accessibility accommodations will be available upon request.

Symposium sessions feature three days of live, highly interactive virtual Zoom sessions that will explore today’s most pressing topics. The Marketing Symposium offers you a unique opportunity to engage in real-time conversations with peers and experts from the Cornell community and beyond. Using the context of your own experiences, you will take part in reflections and small-group discussions to build on the skills and knowledge you have gained from your courses.

Join us for the next Symposium, in which we’ll share experiences from across the industry, inspiring real-time conversations about best practices, innovation, and the future of marketing work. You will support your coursework by applying your knowledge and experiences to some of the most pressing topics and trends in the marketing field. By participating in relevant and engaging discussions, you will discover a variety of perspectives and build connections with your fellow participants from across the industry.

Upcoming Symposium: April 9th – 11th, 2024

  • Tuesday, April 9, 2024 11AM – 1PM ET
  • Wednesday, April 10, 2024 11AM – 1PM ET
  • Thursday, April 11, 2024 11AM – 1PM ET

All sessions are held on Zoom.

Future dates are subject to change. You may participate in as many sessions as you wish. Attending Symposium sessions is not required to successfully complete any certificate program. Once enrolled in your courses, you will receive information about upcoming events. Accessibility accommodations will be available upon request.

Since the advent of the internet, programmers have been trying to figure out how to create a [digital] world in which people anywhere - even complete strangers - can transact directly with one another safely and efficiently. In essence, they have been trying to recreate the bedrock of civilization: an orderly system of bookkeeping that allows people to trust each other's claims about what they own, what they owe, and what they are owed. For most of the digital age, this “trust” has been facilitated by third parties such as banks, governments, or credible companies that are willing to guarantee that a transaction is valid and secure. But transactions via third parties are slow and expensive, and they cannot be verified by just anyone, which opens the door to fraud and theft.

Today, the notion of a secure and trusted third party in a digital world isn't purely mythical. And in fact, it's exactly what blockchain technology embodies in a kind of magical way. In this course, you will explore the mechanics of blockchain technology and how the blockchain acts like a trusted third party. To do this, Professor Ari Juels will design a theoretical cryptocurrency from scratch to illustrate how Bitcoin and other cryptocurrencies make use of the blockchain to transfer value from person to person. Then, once you understand how the blockchain acts as a trusted ledger, you will practice articulating other transformative ways in which blockchains can change how commercial and interpersonal connections happen online.

Cryptography has been around for thousands of years and is at the heart of digital communications today. Most people rely on cryptography on a daily basis without even knowing it; most popular messaging apps use encryption to ensure the security of messaging between two people. Blockchain technology, in a similar way, relies on cryptography to protect the identity of those sending and receiving messages and ensures that all information and transactions are secure and legitimate. Thus, to really understand blockchain technology, you have to understand the core principles of cryptography.

This course will walk you through the basics of cryptography: how information has historically been disguised (encrypted) and revealed (decrypted) using mathematics. You will see how a message can be turned into a number, and how that number can be encrypted and decrypted by two complete strangers. You will practice encrypting your own message to understand the basics of what makes a good encryption scheme. Then, you will delve deeper into the specific type of cryptography used in blockchain technology -- public key cryptography - and the promises and limitations it has in carrying out the core functions of a blockchain. You will create your own theoretical gold exchange in order to more fully understand how you can send anything to anyone around the world without a middleman. Ultimately you will know exactly how information on the blockchain is secured, legitimized, and authenticated without needing a third party to verify it.

You are required to have completed the following course or have equivalent experience before taking this course:

  • Cryptocurrencies and Ledgers

Whether you need to tackle a complex project, communicate more effectively, rethink your organization or your job, solve world hunger, or figure out your teenager, systems thinking can help you. All of these are complex and challenging real-world problems, sometimes called wicked problems. We all confront problems, big and small, in our personal and professional lives, and most of us are searching for better ways to solve them. In this course, Professors Derek and Laura Cabrera will demonstrate how we can use systems thinking to solve everyday and wicked problems, to transform our organizations, and to increase our personal effectiveness.

At its core, systems thinking attempts to better align the way we think with how the real world works. Our thinking is based on our mental models, but these models, created from our unique perspective with its inherent biases, are usually inadequate representations of reality. The Cabreras illustrate how we can use feedback to recognize and adapt our mental models so that they better align with reality, enhancing our problem-solving capabilities.

For systems thinking to be successful, it must be adaptive. In this course, you will explore the concept of complex adaptive systems, and while these systems seem unnecessarily complicated, the Cabreras will reveal a surprising discovery. Underlying all complex adaptive systems are simple rules, and applying these rules is the key to transforming the way we frame and solve everyday problems.

For organizations to succeed, they need to develop individuals who are constantly learning and adapting according to information on the ground. Sharing key mental models—at the organizational, team, and individual levels—is critical to creating a culture of learning that enables the organization to survive and thrive through chaos and complexity.

In this course, Professors Derek and Laura Cabrera demonstrate how to become a systems leader; that is, someone who can use systems thinking at the organizational level, at the team level, and at the individual level. You will create a culture for your organization that is built on shared mental models and develop techniques to incentivize thought leaders to support the culture based on your vision, mission, capacity, and learning. At the team level, where the real work of the organization gets done, you will explore the process of building, sharing and evolving mental models through collaborative mapping and feedback processes. And finally, you will turn your own thinking into doing, to ensure that your actions are aligned with key organizational mental models. With tools, techniques, and expert guidance, you can begin to implement systems thinking at all levels of the organization, creating teams and individuals upon which organizational culture, values, and success are built.

These courses are required to be completed prior to starting this course:

  • Framing Complex Problems with Systems Thinking
  • Using the Four Simple Rules of Systems Thinking
  • Visualizing and Modeling Complex Systems
  • Building Analytical and Emotional Intelligence with Systems Thinking
  • Designing Organizations for Systems Thinking
VUCA is an acronym that stands for “volatility, uncertainty, complexity, and ambiguity.” Learn from General George W. Casey, Jr. how leaders understand and counteract the impacts of the VUCA world to lead more effectively today. In this course, you will gain insights into how you can identify and reduce the impact of volatility, uncertainty, complexity, and ambiguity in your workplace, elevating your opportunity to succeed. You will match your strengths and weaknesses with the leadership characteristics essential in today's VUCA world to formulate an action plan to guide you in improving your leadership skills. Finally, you will develop skills to improve your vision, courage, and character, ultimately preparing you to lead in a VUCA world.
Organizations that instill a clear vision and an effective business strategy at all levels are far more likely to succeed in our increasingly volatile, uncertain, complex, and ambiguous (VUCA) world. But before you can effectively define and impart your vision and business strategy to your organization, you must analyze and have a comprehensive understanding of the various facets of your operating environment. In this course, you will explore effective ways to achieve these goals with General George W. Casey, Jr. You will objectively assess the three critical dimensions of your operating environment (internal, external, and competitive) using the VUCA index so you can identify potential vulnerabilities and opportunities for your organization. You will then identify the characteristics of an effective vision statement and outline a clear vision for your organization. Finally, you will outline a plan to instill your vision and business strategy in your organization.

When your audience can quickly and efficiently understand what the data is telling them without having to scour every row and column, they can gain insights from your analysis more efficiently. In this course, you will apply the power of Excel pivot tables to see your data from multiple perspectives, use data visualization techniques that effectively communicate your analysis to your audience, create charts that quickly and clearly visualize your analysis, and apply the principles of graphical integrity to your charts.

You are required to have completed the following course or have equivalent experience before taking this course:

  • Getting Started with Spreadsheet Modeling and Business Analytics

In order to execute the most informed business analyses, we need the right tools for making predictions from data. Excel provides powerful predictive analytic tools that let the user forecast trends and make predictions with historical data.

In this course, you will conduct financial analyses by comparing loan scenarios using financial functions, identifying what values are needed to achieve a desired result, and quickly identifying how changes in your data will impact outcomes. You will leave this course with the ability to leverage reliable historical data to generate simulations and make predictions.

You are required to have completed the following course or have equivalent experience before taking this course:

  • Getting Started with Spreadsheet Modeling and Business Analytics
In this course, you will examine security for computers and networked information systems. The focus is abstractions, principles, and defenses for implementing military and commercial-grade secure systems. Through this lens, you will explore security and survivability for computers and communications networks as well as policy issues such as the national debates on cryptography policy and the meaning of privacy. That journey will be informed by a survey of technical means for implementing the various properties that comprise "trustworthiness" in a computing system, including mechanisms for authorization and authentication along with cryptographic protocols.

In this course, you will determine the best defensive strategy for data usage under privacy constraints. You will explore the relationship between transparency and control by conducting an audit of your organization's privacy policy. You will evaluate high-level protection approaches to masking customer data and examine data from a customer acquisition campaign to assess accuracy of the metrics. Finally, you will measure profitability loss from defensive data protection measures.

The following course is required to be completed before taking this course:

  • Data Privacy in Marketing

How It Works

Watch the Video

Request Information Now by completing the form below.

Act today—courses are filling fast.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.