Courses can be taken to achieve a variety of purposes: They can serve as remedial or foundational classes, they might be taken to gain valuable skills, or they could be chosen simply to pursue an interest.
Information technology involves using or studying systems such as computers that store, send and retrieve information. An information technology program may cover a variety of topics, including programing, software applications and databases.
Asia is the world's largest and most populous continent, located primarily in the eastern and northern hemispheres. It covers 8.7% of the Earth's total surface area and comprises 30% of its land area.
Course Online in Information Technology in Asia
A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems. [+]
A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems.
Using penetration testing techniques. These penetration tests are employed by organizations that hire certified hackers to penetrate computer and network systems with a focus on determining and fixing security vulnerabilities. If you go this in an unauthorized way then this is referred as Blackhat hacking. A penetration test is done with the permission of an owner of the targeted systems.... [-]
Big Data is about the tremendous amount of data being generated in this data-driven world. Whatever we do in this world leaves a digital trace. Big Data has become a very vital element for business growth and innovation that relies on technologies such as the Internet of Things and Data Analytics.[+]
Big Data is about the tremendous amount of data being generated in this data-driven world. Whatever we do in this world leaves a digital trace. Big Data has become a very vital element for business growth and innovation that relies on technologies such as the Internet of Things and Data Analytics. Big Data will revolutionize the operations of any organizations, just like how the internet did. Do you want to be part of the revolution? Are you cut out for Big Data?Big Data is the IT megatrend that will define this decade…Why?
Data is only as useful as the individual interpreting it, who can translate the findings from data into actionable insights. People with Big Data Analytics skills are in demand. Many companies do not have employees who can interpret data - find the trends, patterns, and stories. These insights drive the decision making in every company. Join the Data Executive course of 361DM to know how Big Data Analytics can be a world of opportunities.... [-]
Are you looking to build a career in Big Data Analytics? Every professional working in the corporate environment must think of their way to the next position. If you are interested in Big Data Analytics then you must retool your skills to be a part of the Big Data space. [+]
Are you looking to build a career in Big Data Analytics? Every professional working in the corporate environment must think of their way to the next position. If you are interested in Big Data Analytics then you must retool your skills to be a part of the Big Data space. This industry requires some basic qualities like a strong grounding in mathematics, familiarity with programming languages, understanding the logic of analytical modeling, content knowledge and above all an inherent sense of curiosity. 361DM career transition programs are designed to identify the skills you need to transition to an analytics career. Get trained by industry thought leaders in Big Data Analytics with focus on solving real corporate problems.... [-]
You would have probably heard that Big Data and Analytics is one area of technology consisting of skills gaps. What corporate really mean by “skill gap” is that there aren’t enough engineers with the right mix of technical ability, the skill of understanding business requirement and knowledge of data science, the three main ingredients of Big Data Analytics.[+]
You would have probably heard that Big Data and Analytics is one area of technology consisting of skills gaps. What corporate really mean by “skill gap” is that there aren’t enough engineers with the right mix of technical ability, the skill of understanding business requirement and knowledge of data science, the three main ingredients of Big Data Analytics. 361DM has the comprehensive solution for Engineers and make them data-savvy professionals. We train the students depending on the current skills required by the corporate world. Be a part of 361DM. Grab the opportunity and get the right platform to enter the Big Data Analytics Industry.... [-]
How to learn to complete a complete PenTest by means of several practical examples [+]
How to learn to perform a complete PenTest through several practical examples.What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]
I take you from scratch, step by step so you understand the Security [+]
I take you from scratch, step by step so that you understand Security.What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements Basic PC management. Description
In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]
Learn the basics of computer security to protect yourself from cyber attacks. [+]
Learn the basics of computer security to protect yourself from cyber attacks.What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.What will I learn? Use Host Discovery to discover active systems on the network Use the different portscan types to identify open ports and services Determine software and version of services and operating systems Optimize an Nmap scan Work around firewalls and IDS / IPS with Nmap Use NSE and Nmap scripts specifically and develop them yourself Use additional tools such as Zenmap, ncat and ndiff effectively conditions You should have a solid basic knowledge of networking Windows, Linux and TCP / IP should not be foreign words for you No profound knowledge of TCP / IP is required, all necessary information is provided in the course A high level of motivation and affinity with the topic of network & security will help you get the most out of the course Description ... [-]
Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network + [+]
Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network +What will I learn? After the course you will be able to understand and classify all the essential technologies of modern IT networks These include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6 You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server services At the end of the course you can practice many technologies yourself The course offers optimal preparation for CompTIA Network + certification With this course, you will receive sound basic knowledge, which is valuable for almost all IT areas conditions You should always be able to handle computers It is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topic Description ... [-]
The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. [+]
The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. It can also help them in pursuing research or graduate studies in this field. Moreover, with the basic background they acquire, they can follow up technological advances and carry on a lifelong learning career.Dean
Dr. Manal Ahmed Ismail Shoman is a professor of Computer Engineering at Helwan University, Faculty of Engineering. She received her Ph.D. Degree in Computers and Systems Engineering from the Faculty of Engineering, Ain Shams University, 1996. Currently, she is the Director of Information Technology program at Egyptian E-Learning University (EELU). She held a position of Director of Information Technology Center at Helwan University for 5 years. She was Project Manager and PI for Helwan University Management Information System Project, Feb. 2006 till 2009. She was Vice-Project Manager of "Enhancing the Use of Teaching Technologies and Facilities at Helwan University" financed by the Egyptian Higher Education Enhancement Project Fund, aiming to enhance the abilities of Helwan University staff members to use computers and multimedia in teaching and converting their teaching materials into electronic form (September 2004 - September 2006). She is the author and co-author of more than 35 research papers in international conferences and academic journals.... [-]