Online Course in Information Technology

Best Online Courses in Information Technology 2018

Information Technology

An online course is a web-based learning experience in which students log on and engage in traditional class activities such as reading, discussion and testing. The online format allows for completion of coursework on each student’s schedule, but engagement and collaboration are still fostered in the online classroom.

What is an online course in IT? Information technology, or IT for short, is the catchall phrase that refers to the systems, hardware, software and network applications that work to manage and communicate information used by companies and individuals. You will study these aspects of IT with the goal of understanding how information is handled, what common problems occur throughout this process and what methods are commonly used to mitigate complications. Students should emerge with a solid understanding of IT’s essential principles as well as the problem-solving methods that should be applied.

This online course can benefit students by acquainting them with the foundation of the information technology sector, but more importantly, by imparting the analytical skills necessary to find solutions to problems. The latter of these skills are sure to be an asset in nearly any position or situation.

You can get more information on the expenses of an online course in IT by contacting the admissions office where you plan to attend. A representative will calculate your applicable costs.

IT is recognized as one of the most rapidly growing fields, so of course, there won’t likely be a shortage of jobs to pursue with your newfound IT expertise. You can qualify yourself further by completing your degree program, too. Some of the positions you may be qualified for include IT specialist, network engineer, technical support personnel or web developer. With such a range of options, it’s no wonder this degree is such a popular option.

You may be able to enroll in an online course in IT through your own university. Search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

Read More

Data Security (Non-Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2018 United Kingdom Cambridge

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment. [+]

About this course

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:... [-]


Further Education It-Betriebswirt / -in (iubh)

IUBH Fernstudium
Online Full time Part time 18 - 36 months Open Enrollment Germany Bad Honnef + 1 more

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level. [+]

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level.

With us you study in only 3 semesters, supported by vodcasts, video lectures, tutors and printed as well as digital further education scripts - no matter where you are at the moment.

Facts about further education IT-Business Administration (IUBH) Degree : IT-Business Administration (IUBH) Continuing education duration : alternatively 3, 4 or 6 semesters Continuing Education Model : Online Study Language of instruction : German Probationary period : 4 weeks Extension : free of charge Admission Requirements : Without ECTS credits: Without ECTS credits: min. 2-year vocational training or 3 years of professional experience; With receipt of ECTS points: (Fach-) Abitur or completed master examination or min. 2-year training with 3 years of professional experience Accreditation : ZFU (No. 286217) Start of training : at any time Certification : Certificate 2-stage model ... [-]

Apache Spark Certification Training

Edureka
Online Full time Part time 12 days Open Enrollment India India Online + 1 more

This Spark training will enable learners to understand how Spark executes in-memory data processing and runs much faster than Hadoop MapReduce. Learners will master Scala programming and will get trained on different APIs which Spark offers such as Spark Streaming, Spark SQL, Spark RDD, Spark MLlib and Spark GraphX. [+]

About the Course

This Spark training will enable learners to understand how Spark executes in-memory data processing and runs much faster than Hadoop MapReduce. Learners will master Scala programming and will get trained on different APIs which Spark offers such as Spark Streaming, Spark SQL, Spark RDD, Spark MLlib and Spark GraphX. This Edureka course is an integral part of Big Data developer's learning path.

Course Objectives

After completing the Apache Spark training, you will be able to:

Understand Scala and its implementation Master the concepts of Traits and OOPS in Scala programming Install Spark and implement Spark operations on Spark Shell Understand the role of Spark RDD Implement Spark applications on YARN (Hadoop) Learn Spark Streaming API Implement machine learning algorithms in Spark MLlib API Analyze Hive and Spark SQL architecture Understand Spark GraphX API and implement graph algorithms Implement Broadcast variable and Accumulators for performance tuning Project Who should go for this Course? ... [-]

ETHICAL HACKING - ADVANCED TRAINING

Delphi Star Training
Online Part time January 2019 United Arab Emirates Dubai

A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems. [+]

About Our Ethical Hacking Training

A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems.

Using penetration testing techniques. These penetration tests are employed by organizations that hire certified hackers to penetrate computer and network systems with a focus on determining and fixing security vulnerabilities. If you go this in an unauthorized way then this is referred as Blackhat hacking. A penetration test is done with the permission of an owner of the targeted systems.... [-]


Technician In Network Administration

Instituto Profesional IACC
Online Part time 2 years Open Enrollment Chile Chile Online

The Technical Career in Network Administration of IACC, forms technical capable of managing voice and data networks according to the needs of each organization. The curriculum covers areas such as computer audit and computational security, service management, mobile and wireless technologies, network hardware and software, voice and data transmission, monitoring, routing and network management, voice and video service management , among others. [+]

Title : Network Administration Technician Duration Career : 2 years Modality of Study : 100% online Description of the Race

The Technical Career in Network Administration of IACC, forms technical capable of managing voice and data networks according to the needs of each organization. The curriculum covers areas such as computer audit and computational security, service management, mobile and wireless technologies, network hardware and software, voice and data transmission, monitoring, routing and network management, voice and video service management , among others.

The curriculum is characterized by its high practical content, this, with the aim of promoting knowledge and enhance the development of the student's professional skills, aimed at achieving the skills and technical skills required in the exercise of their functions in the work environment... [-]


ITIL Foundation e-Learning with exams

SPOCE Project Management
Online Part time 6 months Open Enrollment United Kingdom UK Online

Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. [+]

ITIL Foundation e-Learning with exams

Programme description

Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. The Foundation study, accredited by PeopleCert, provides an entry-level understanding of the key terms and concepts that underpin the ITIL® method.

SPOCE's self-study ITIL® Foundation, in particular, aims to provide you with a straightforward route to becoming a fully certificated professional in your own time and at your own pace. It is compatible with laptops, desktops, Android tablets, iPads and mobile devices.... [-]


Course in IT (Web Design)

International Career Institute
Online Full time Part time Open Enrollment United Kingdom London

ICI delivers a web design course that will keep you signed in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course. [+]

ICI delivers a web design course that will keep you significant in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course.

Course Outline E-Commerce Internet Marketing Computer Programming Web Scripting Operating System Management Project Management Establishing Your Own Business Career Prospects

Let your creative juices flow into the World Wide Web through a career in web design. Work from home or be employed by established IT and web design companies. Websites and web tools are increasing each day so there would always be a demand for the services of skilled web designers.... [-]


Hardware and Networking

On Sky Global
Online Full time 3 - 9 months Open Enrollment USA USA Online

The course covers important concepts about the computer and basic networking concepts and common network industry terminology. It examines popular networking topologies and devices, network configuration, and introduction to servers and network security. [+]

HARDWARE AND NETWORKING Open to: High School or College Level Prerequisites: Computer Literary Course Format: Individually Paced Course Length: Typically 3 months Course Code: HN COURSE DESCRIPTION

The course covers important concepts about the computer and basic networking concepts and common network industry terminology. It examines popular networking topologies and devices, network configuration, and introduction to servers and network security.

DETAILED COURSE INFORMATION Introduction Hardware & Networking Software and hardware Input/output devices Network topologies: LAN, WAN, MAN, PAN, CAN Introduction to Various Networking Devices Assembling and disassembling Network basic and configuration Network Troubleshooting Introduction to servers and network security Types of Internet connections Dial-up, Broadband, Leased Line, Wi-Fi, Wi-Max, 2G, 3G, 4G, WWW, E-mails, Search Engines, Social Networking. Cloud application Essential Security Measures TUTORIALS/SEMINARS ... [-]

Understanding Big Data - CPD & IAO Accredited

iStudy
Online Full time Part time Open Enrollment United Kingdom London

Deal with large numbers and key information in this Big Data Course Are interested in understanding and protecting big data? Do you want to utilize any data that have been presented to you to its full extent? This Innovative Course will solve all of your problems! [+]

Why You Should Choose Understanding Big Data Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday – Friday) Efficient exam system, assessment, and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for?

Understanding Big Data is CPD certified and CiQ Gold accredited. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds.... [-]


Course in Concurrent Programming in Erlang

FutureLearn
Online Part time 3 weeks Open Enrollment United Kingdom UK Online

We combine the theory of concurrent programming with the practice of how that works in Erlang. You’ll get the opportunity to reinforce what you learn through practical exercises and more substantial, optional practical projects. [+]

Concurrent functional programming is increasingly important in providing global-scale applications on the internet. We combine the theory of concurrent programming with the practice of how that works in Erlang. You’ll get the opportunity to reinforce what you learn through practical exercises and more substantial, optional practical projects. Functional programming has been a strength the University of Kent for the last 30 years. Throughout the course, you’ll learn with Simon Thompson – co-author of one of the standard introductions to Erlang, O’Reilly Media’s Erlang Programming.

What topics will you cover? Processes and messages in Erlang Message-passing concurrency Designing for robustness Handling errors and dealing with exceptions Testing and fixing concurrency Multicore and distributed Erlang OTP: The Open Telecom Platform What will you achieve? Develop concurrent programs in Erlang using processes and message-passing communication between them Describe the mechanisms underlying message processing in Erlang Explain the life-cycle of an Erlang process and the handling of errors Design and implement robust systems in Erlang Summarise the design principles underlying the Open Telecom Platform (OTP) Who is the course for? ... [-]

Course in Python Data Structures

Coursera
Online Part time 7 weeks September 2018 USA USA Online

This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data structures such as lists, dictionaries, and tuples to perform increasingly complex data analysis. [+]

This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data structures such as lists, dictionaries, and tuples to perform increasingly complex data analysis. This course will cover Chapters 6-10 of the textbook “Python for Everybody”. This course covers Python 3. Chapter Six: Strings In this class, we pick up where we left off in the previous class, starting in Chapter 6 of the textbook and covering Strings and moving into data structures. The second week of this class is dedicated to getting Python installed if you want to actually run the applications on your desktop or laptop. If you choose not to install Python, you can just skip to the third week and get a head start. Unit: Installing and Using Python In this module you will set things up so you can write Python programs. We do not require the installation of Python for this class. You can write and test Python programs in the browser using the "Python Code Playground" in this lesson. Please read the "Using Python in this Class" material for details. Chapter Seven: Files Up to now, we have been working with data that is read from the user or data in constants. But real programs process much larger amounts of data by reading and writing files on the secondary storage on your computer. In this chapter, we start to write our first... [-]


Basics Of Professional Ethical Hacking

Udemy
Online Part time 5 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

I take you from scratch, step by step so you understand the Security [+]

I take you from scratch, step by step so that you understand Security.

What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements  Basic PC management. Description

In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.

The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]

Microsoft Professional Program in DevOps (Microsoft)

edX
Online Full time Part time September 2018 USA Cambridge

To support companies in their desire to be more agile, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. [+]

To support companies in their desire to be agiler, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. Built with the focus on what you need you need to work in DevOps, the Microsoft Professional Program Certificate will help you learn the skills necessary for a DevOps culture in your workplace.

Program Details

Courses

7 courses + Final Capstone Project Effort 16 - 30 hours per course Price

$99 per course / $792 for the entire program... [-]


Blockchain Certification Course

ACADGILD
Online Full time 12 weeks March 2019 USA USA Online

Blockchain is touted as the new internet. It is in the same stage of development and capability of disruption as the internet was in the 1990s. It is a digital platform where information and assets can be shared. The platform is incredibly transparent, secure, fast, despite being decentralized. It is already quite popular, and rapidly changing the way markets and organizations function. If you want to be a part of this economy, this course can help you. You will learn the basics of blockchain – the technology that drives Bitcoin, Ripple, Ethereum, etc. You will also learn its advanced applications like Smart Contracts and Assets. [+]

Intensive 4-month Program Collaborative Assignments with Mentors Master Blockchain Technology Learn EVM Architecture, Solidity Codes, and How to Write Smart Contracts

DURATION

12 Weeks

EFFORT

8-10 Hrs/Week

CAREERS

Blockchain Developer, Engineer, Architect, Solidity Developer, Researcher, Product Manager.

Blockchain is touted as the new internet. It is in the same stage of development and capability of disruption as the internet was in the 1990s. It is a digital platform where information and assets can be shared. The platform is incredibly transparent, secure, fast, despite being decentralized. It is already quite popular and rapidly changing the way markets and organizations function. If you want to be a part of this economy, this course can help you.... [-]


CISSP Prep Class

University of Fairfax
Online May 2018 USA Washington Four

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits) [+]

IA7000 Security in the Digital Age

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

Join the Cybersecurity Elite U of F Cybersecurity Education Path

Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.... [-]