Online Course in Information Technology in Middle East

Top Online Courses in Information Technology 2018 in Middle East

Information Technology

Courses are individual units of study that can be taken singly or as a series of classes concentrated in a specific area of study. Individual classes can vary in length, cost, and number of sessions per week.

Information technology studies are created to provide students with technological skills and knowledge. They may explore how electronic data is created, processed and stored as well as topics such as security, hardware, software applications and artificial intelligence.

Nothing helps scholars grow like exposure to a diverse set of ideals and backgrounds and that’s just what any student will get in the Middle East. From ancient civilizations to modern day cultures, scholars have the opportunity to experience new things in this region.

Course Online in Information Technology in Middle East

Read More

ETHICAL HACKING - ADVANCED TRAINING

Delphi Star Training
Online Part time January 2018 United Arab Emirates Dubai

A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems. [+]

About Our Ethical Hacking Training

A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems.

Using penetration testing techniques. These penetration tests are employed by organizations that hire certified hackers to penetrate computer and network systems with a focus on determining and fixing security vulnerabilities. If you go this in an unauthorized way then this is referred as Blackhat hacking. A penetration test is done with the permission of an owner of the targeted systems.... [-]


Fundamentals Of Ethical Hacking: Practical Course

Udemy
Online Part time 21 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

How to learn to complete a complete PenTest by means of several practical examples [+]

How to learn to perform a complete PenTest through several practical examples.

What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]

Basics Of Professional Ethical Hacking

Udemy
Online Part time 5 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

I take you from scratch, step by step so you understand the Security [+]

I take you from scratch, step by step so that you understand Security.

What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements  Basic PC management. Description

In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.

The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]

Ethical Hacking: The Complete Course

Udemy
Online Part time 9 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn the basics of computer security to protect yourself from cyber attacks. [+]

Learn the basics of computer security to protect yourself from cyber attacks.

What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]

The Data Sciences From A To Z

Udemy
Online Part time 20 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.

What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]

Hacking With Nmap: Portscanning And Vulnerability Analysis

Udemy
Online Part time 8 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.

What will I learn? Use Host Discovery to discover active systems on the network Use the different portscan types to identify open ports and services Determine software and version of services and operating systems Optimize an Nmap scan Work around firewalls and IDS / IPS with Nmap Use NSE and Nmap scripts specifically and develop them yourself Use additional tools such as Zenmap, ncat and ndiff effectively conditions You should have a solid basic knowledge of networking Windows, Linux and TCP / IP should not be foreign words for you No profound knowledge of TCP / IP is required, all necessary information is provided in the course A high level of motivation and affinity with the topic of network & security will help you get the most out of the course Description ... [-]

Computer Networks (comptia Network +) - The Comprehensive Course

Udemy
Online Part time 25 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network + [+]

Learn all the important technologies of modern IT networks, including preparation for the exam CompTIA Network +

What will I learn? After the course you will be able to understand and classify all the essential technologies of modern IT networks These include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6 You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server services At the end of the course you can practice many technologies yourself The course offers optimal preparation for CompTIA Network + certification With this course, you will receive sound basic knowledge, which is valuable for almost all IT areas conditions You should always be able to handle computers It is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topic Description ... [-]

Course in Information Technology

EELU Egyptian E-Learning University
Online Full time September 2018 Egypt Egypt Online

The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. [+]

Information Technology

The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. It can also help them in pursuing research or graduate studies in this field. Moreover, with the basic background they acquire, they can follow up technological advances and carry on a lifelong learning career.

Dean

Dr. Manal Ahmed Ismail Shoman is a professor of Computer Engineering at Helwan University, Faculty of Engineering. She received her Ph.D. Degree in Computers and Systems Engineering from the Faculty of Engineering, Ain Shams University, 1996. Currently, she is the Director of Information Technology program at Egyptian E-Learning University (EELU). She held a position of Director of Information Technology Center at Helwan University for 5 years. She was Project Manager and PI for Helwan University Management Information System Project, Feb. 2006 till 2009. She was Vice-Project Manager of "Enhancing the Use of Teaching Technologies and Facilities at Helwan University" financed by the Egyptian Higher Education Enhancement Project Fund, aiming to enhance the abilities of Helwan University staff members to use computers and multimedia in teaching and converting their teaching materials into electronic form (September 2004 - September 2006). She is the author and co-author of more than 35 research papers in international conferences and academic journals.... [-]