Courses are individual classes that can be taken at universities, colleges, junior colleges, and trade schools worldwide. For even greater flexibility, many schools also offer online classes. Students can take individual classes or pursue degree programs.
Information technology involves using or studying systems such as computers that store, send and retrieve information. An information technology program may cover a variety of topics, including programing, software applications and databases.
Europe is, by convention, one of the world's seven continents. Comprising the western most point of Eurasia, Europe is usually divided from Asia by the watershed divides of the Ural and Caucasus Mountains, the Ural River, the Caspian and Black Seas, and the waterways connecting the Black and Aegean Seas.
Course Online in Information Technology in Europe
Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level. [+]
Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level.
With us you study in only 3 semesters, supported by vodcasts, video lectures, tutors and printed as well as digital further education scripts - no matter where you are at the moment.Facts about further education IT-Business Administration (IUBH) Degree : IT-Business Administration (IUBH) Continuing education duration : alternatively 3, 4 or 6 semesters Continuing Education Model : Online Study Language of instruction : German Probationary period : 4 weeks Extension : free of charge Admission Requirements : Without ECTS credits: Without ECTS credits: min. 2-year vocational training or 3 years of professional experience; With receipt of ECTS points: (Fach-) Abitur or completed master examination or min. 2-year training with 3 years of professional experience Accreditation : ZFU (No. 286217) Start of training : at any time Certification : Certificate 2-stage model ... [-]
ICI delivers a web design course that will keep you significant in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course. [+]
ICI delivers a web design course that will keep you significant in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course.Course Outline E-Commerce Internet Marketing Computer Programming Web Scripting Operating System Management Project Management Establishing Your Own Business Career Prospects
Let your creative juices flow into the World Wide Web through a career in web design. Work from home or be employed by established IT and web design companies. Websites and web tools are increasing each day so there would always be a demand for the services of skilled web designers.... [-]
How to learn to complete a complete PenTest by means of several practical examples [+]
How to learn to perform a complete PenTest through several practical examples.What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]
I take you from scratch, step by step so you understand the Security [+]
I take you from scratch, step by step so that you understand Security.What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements Basic PC management. Description
In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]
Learn the basics of computer security to protect yourself from cyber attacks. [+]
Learn the basics of computer security to protect yourself from cyber attacks.What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.What will I learn? Use Host Discovery to discover active systems on the network Use the different portscan types to identify open ports and services Determine software and version of services and operating systems Optimize an Nmap scan Work around firewalls and IDS / IPS with Nmap Use NSE and Nmap scripts specifically and develop them yourself Use additional tools such as Zenmap, ncat and ndiff effectively conditions You should have a solid basic knowledge of networking Windows, Linux and TCP / IP should not be foreign words for you No profound knowledge of TCP / IP is required, all necessary information is provided in the course A high level of motivation and affinity with the topic of network & security will help you get the most out of the course Description ... [-]
Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network + [+]
Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network +What will I learn? After the course you will be able to understand and classify all the essential technologies of modern IT networks These include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6 You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server services At the end of the course you can practice many technologies yourself The course offers optimal preparation for CompTIA Network + certification With this course, you will receive sound basic knowledge, which is valuable for almost all IT areas conditions You should always be able to handle computers It is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topic Description ... [-]
Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. [+]
Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. The Foundation study, accredited by PeopleCert, provides an entry-level understanding of the key terms and concepts that underpin the ITIL® method.
SPOCE's self-study ITIL® Foundation, in particular, aims to provide you with a straightforward route to becoming a fully certificated professional in your own time and at your own pace. It is compatible with laptops, desktops, Android tablets, iPads and mobile devices.... [-]
From sources such as satellites, sensors, and social media, how can environmental data analytics benefit business and research?[+]
From weather fluctuations to the spread of an invasive species, what problems can scientists address by analyzing these vast data collections? What are the potential benefits of business, research, and our daily lives?
Find out about possible career paths and gain insights from industry experts and research scientists working on a range of current projects. From urban planning to monitoring wildlife, explore the complexities of managing and analyzing big data to seek innovative solutions.What topics will you cover?
Week 1: Introduction to big dataSources of big data, including satellites for looking at the surface of the Earth Environmental analytics and the link to big data Computing power, processing, and storage of environmental data ... [-]
What does it mean to learn in a networked world? Find out, and discover how to make use of your own personal learning network. [+]
Digital technologies have fundamentally changed how we learn. The web is no longer simply an information resource, but also a space for interaction, scholarship, and creativity.
In this world where knowledge is widely distributed, accessibility is determined by and dependent on the strength of an individual’s learning network. This course will equip you with the skills needed to succeed in education, in this networked age. You’ll explore our digital differences and how to address them and examine ways to grow and manage your own personal learning network.What topics will you cover? How we learn in the network age (learning theory) Understanding digital inequalities and digital citizenship in an educational context What your Personal Learning Network (PLN) looks like and how you use it Growing your network – making new connections and assessing reliability Contributing to your network – managing your online identity (single vs multiple); creating and sharing Putting your network to work – searching; sending/requesting/posting; collaborating What will you achieve? ... [-]
We combine the theory of concurrent programming with the practice of how that works in Erlang. You’ll get the opportunity to reinforce what you learn through practical exercises and more substantial, optional practical projects. [+]
Concurrent functional programming is increasingly important in providing global-scale applications on the internet. We combine the theory of concurrent programming with the practice of how that works in Erlang. You’ll get the opportunity to reinforce what you learn through practical exercises and more substantial, optional practical projects. Functional programming has been a strength the University of Kent for the last 30 years. Throughout the course, you’ll learn with Simon Thompson – co-author of one of the standard introductions to Erlang, O’Reilly Media’s Erlang Programming.What topics will you cover? Processes and messages in Erlang Message-passing concurrency Designing for robustness Handling errors and dealing with exceptions Testing and fixing concurrency Multicore and distributed Erlang OTP: The Open Telecom Platform What will you achieve? Develop concurrent programs in Erlang using processes and message-passing communication between them Describe the mechanisms underlying message processing in Erlang Explain the life-cycle of an Erlang process and the handling of errors Design and implement robust systems in Erlang Summarise the design principles underlying the Open Telecom Platform (OTP) Who is the course for? ... [-]
Learn how predictive analytics tools can help you gain insights from big data. Collecting big data is just the first step; once you have it, how do you make sense of it? This free online course will show you how predictive analytics tools can help you gain information, knowledge and insights from big data. [+]
Learn how predictive analytics tools can help you gain insights from big data. Collecting big data is just the first step; once you have it, how do you make sense of it? This free online course will show you how predictive analytics tools can help you gain information, knowledge and insights from big data.
Over the next four weeks, experience the power of HPE’s Vertica Analytics platform as an applied tool. Using Vertica Analytics and a case study approach, apply built-in predictive analytics functions and algorithms – linear regression, logistics regression and k-means clustering – to derive insight from your data, helping to create opportunities for your organisation.What topics will you cover? Modelling, estimation and prediction Estimation and prediction using linear regression Estimation and prediction using logistic regression Estimation and prediction using k-means clustering What will you achieve? Describe big data analytics Identify solutions to big data problems Evaluate predictive data analysis models Assess the suitability of predictive models Model data using various predictive models Who is the course for? ... [-]
Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening. [+]
Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening.
In this course, you’ll explore some of the common cyber threats facing small and medium enterprises, what a cyber attack means, and what practical tools and strategies you can put in place to prevent them.Investigate a real cyber attack in action
We’ll start by looking at the recent Panama Papers leak to find out more about cyber threats, the methods that hackers use, and what the consequences of cyber attacks can be for small and medium enterprises.
Explore strategies for protecting your organisation against cyber attacks After viewing a simulation of a cyber attack in action, we’ll then take a look at some of the tools and preventative strategies that you can put in place to protect your organisation.... [-]
Get certified as an Agile Project Management Practitioner with this training and examination package. [+]
The Foundation stage will take students through basic and advanced principles that make up the Agile methodology:The concepts, benefits and risks. The philosophy, approach and principles. Understanding the DSDM Atern lifecycle and products. Recruiting or assembling appropriate project teams. How to plan and run a facilitated workshop. Model and prototype aspects of the solution to ensure the correct development path is being followed. Elicit, analyse, prioritise and manage requirements for deliverables. Create a timeboxed plan. Understanding the importance of negotiation and collaboration with key stakeholders. How to set up and manage an Agile project. ... [-]