• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

374 Algorithm courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - INTRODUCTION TO CORE PROGRAMMING CONCEPTS * Computer Data Storage and Processing * Application Types * Application Lifecycle * Code Compilation 2 - CORE PROGRAMMING LANGUAGE CONCEPTS * Syntax * Data Types * Variables and Constants 3 - PROGRAM FLOW * Introduction to Structured Programming Concepts * Introduction to Branching * Using Functions * Using Decision Structures * Introducing Repetition 4 - ALGORITHMS AND DATA STRUCTURES * Understand How to Write Pseudocode * Algorithm Examples * Introduction to Data Structures 5 - ERROR HANDLING AND DEBUGGING * Introduction to Program Errors * Introduction to Structured Error Handling * Introduction to Debugging 6 - INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING * Introduction to Complex Structures * Introduction to Structs * Introduction to Classes * Introducing Encapsulation 7 - MORE OBJECT-ORIENTED PROGRAMMING * Introduction to Inheritance * Introduction to Polymorphism * Introduction to .NET and the Base Class Library 8 - INTRODUCTION TO APPLICATION SECURITY * Authentication and Authorization * Code Permissions on Computers * Introducing Code Signing 9 - CORE I/O PROGRAMMING * Using Console I/O * Using File I/O 10 - APPLICATION PERFORMANCE AND MEMORY MANAGEMENT * Value Types vs Reference Types * Converting Types * The Garbage Collector ADDITIONAL COURSE DETAILS: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered Online6 days, Jun 3rd, 13:00 + 2 more
£2975

Python Machine Learning Course, 1-Days, Online Attendance

By Pcw Courses Ltd

This Python Machine Learning online instructor led course is an excellent introduction to popular machine learning algorithms. -------------------------------------------------------------------------------- Python Machine Learning 2-day Course Prerequisites: Basic knowledge of Python coding is a pre-requisite. Who Should Attend? This course is an overview of machine learning and machine learning algorithms in Python SciKitLearn. Practical: * We cover the below listed algorithms, which is only a small collection of what is available. However, it will give you a good understanding, to plan your Machine Learning project * We create, experiment and run machine learning sample code to implement a short selected but representative list of available the algorithms.  Course Outline: Supervised Machine Learning: * Classification Algorithms: Naive Bayes, Decision Tree, Logistic Regression, K-Nearest Neighbors, Support Vector Machine * Regression Algorithms: Linear, Polynomial Unsupervised Machine Learning: * Clustering Algorithms: K-means clustering, Hierarchical Clustering * Dimension Reduction Algorithms: Principal Component Analysis Latent Dirichlet allocation (LDA) * Association Machine Learning Algorithms: Apriori, Euclat Other machine learning Algorithms: * Ensemble Methods ( Stacking, bagging, boosting ) Algorithms: Random Forest, Gradient Boosting * Reinforcement learning Algorithms: Q-Learning * Neural Networks and Deep Leaning Algorithms: Convolutional Network (CNN) Data Exploration and Preprocessing: * The first part of a Machine Learning project understands the data and the problem at hand. * Data cleaning, data transformation and data pre-processing are covered using Python functions to make data exploration and preprocessing relatively easy. What is included in this Python Machine Learning: * Python Machine Learning Certificate on completion   * Python Machine Learning notes * Practical Python Machine Learning exercises and code examples * After the course, 1 free, online session for questions or revision Python Machine Learning. * Max group size on this Python Machine Learning is 4. -------------------------------------------------------------------------------- REFUND POLICY No Refunds

Python Machine Learning Course, 1-Days, Online Attendance
Delivered Online6 hours, Jun 3rd, 10:00 + 15 more
£185

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, Jun 3rd, 13:00 + 25 more
£2475

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Artificial Intelligence in Game Development- Tic Tac Toe AI

By Packt

Artificial intelligence & Javascript 2D Game Development - MinMax algorithm - "Computer vs You" Tic Tac Toe AI game

Artificial Intelligence in Game Development- Tic Tac Toe AI
Delivered Online On Demand
£101.99

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP AND PTP TRAINING COURSE DESCRIPTION This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. WHAT WILL YOU LEARN * Recognise the importance of timing and synchronisation. * Explain how NTP works. * Explain how PTP works. NTP AND PTP TRAINING COURSE DETAILS * Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. * Prerequisites: TCP/IP foundation for engineers * Duration 1 day NTP AND PTP TRAINING COURSE CONTENTS * Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. * NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration * More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. * PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. * More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Quantum Algorithms for Computational Finance

By Qureca

ABOUT THE COURSE “Quantum Computing for Finance” is an emerging multidisciplinary field of quantum physics, finance, mathematics, and computer science, in which quantum computations are applied to solve complex problems. “Quantum Algorithms for Computational Finance” is an advanced course in the emerging field of quantum computing for finance. This technical course will develop an understanding in quantum algorithms for its implementation on quantum computers. Through this course, you will learn the basics of various quantum algorithms including: * Grover’s and Rudolf’s algorithm, * Quantum amplitude Estimation (QAE) algorithm envisioned as a quadratic speed-up over Classical Monte-Carlo simulations, * Combinatorial optimization algorithms namely Quantum Approximate Optimization Algorithm (QAOA), and Variational Quantum Eigensolver (VQE), and * Quantum-inspired optimization algorithms – Simulated Coherent Ising Machine (Sim-CIM), and Simulated Bifurcation Algorithm (SBA). This course is meant for all those learners who want to explore the long-term employability of quantum computing in finance, assuming that you are familiar with the concepts of quantitative and computational finance. In addition, the course contains several Python based programming exercises for learners to practice the algorithms explained throughout the course. This course is the second part of the specialised educational series: “Quantum Computing for Finance”. WHAT SKILLS YOU WILL LEARN * Ability to perform quantum arithmetic operations and simulations. * An understanding of the Quantum Amplitude Estimation algorithm and its variants. * The computational and modelling techniques for option pricing and portfolio optimization on a quantum computer. * The skills for a career in quantum finance including Quantum Algorithmic Research, Quantitative Asset Management and Trading, financial engineering, and risk management, using quantum computing technology. COURSE PREREQUISITES All potential learners must have prior knowledge or familiarity with basic quantum algorithms/basic quantum programming. Before enrolling this course, we recommend all learners to complete the first course “Introduction to Quantitative and Computational Finance [https://platform.qureca.com/courses/introduction-to-quantitative-and-computational-finance/]” of the series “Quantum Computing for Finance”, if they have no previous experience with the concepts of quantitative and computational finance. DURATION The estimated duration to complete this course is approximately 6 weeks (~4hrs/week). COURSE ASSESSMENT To complete the course and earn the certification, you must pass all the quizzes at the end of each lesson by scoring 80% or more on each of them. INSTRUCTORS [https://platform.qureca.com/courses/quantum-algorithms-for-computational-finance/#course-section__instructors] https://platform.qureca.com/author/kevincallaghan/ QuantFi [https://platform.qureca.com/author/kevincallaghan/]QuantFi is a French start-up research firm formed in 2019 with the objective of using the science of quantum computing to provide solutions to the financial services industry. With its staff of PhD's and PhD students, QuantFi engages in fundamental and applied research in in the field of quantum finance, collaborating with industrial partners and universities in seeking breakthroughs in such areas as portfolio optimisation, asset pricing, and trend detection.

Quantum Algorithms for Computational Finance
Delivered Online On Demand
£800

Machine Learning and Data Science with Python: A Complete Beginners Guide

By Packt

This course will be mainly focusing on machine learning algorithms. Throughout this course, we are preparing our machine to make it ready for a prediction test.

Machine Learning and Data Science with Python: A Complete Beginners Guide
Delivered Online On Demand
£93.99

Python 3: Project-based Python, Algorithms, Data Structures

By Packt

Learn to program with Python 3, visualize algorithms and data structures, and implement them in Python projects

Python 3: Project-based Python, Algorithms, Data Structures
Delivered Online On Demand
£135.99

Learning Algorithms in JavaScript from Scratch

By Packt

Make your code and programs faster and more efficient by using algorithms

Learning Algorithms in JavaScript from Scratch
Delivered Online On Demand
£117.99

Educators matching "Algorithm"

Show all 11