Master MongoDB, an open-source document database and leading NoSQL database that provides high performance, high availability, and automatic scaling. This course covers the MongoDB Community version for beginners and provides over 50 live-running queries, including creating new databases and tables.
This course first equips you with the fundamentals of Python and then progresses to teach you how to use various libraries such as NumPy, Pandas, Seaborn, Bokeh, and so on. This course contains several mini projects so that, by the end of this course, you will be equipped with the essential tools you need to become a visualization expert.
Artificial Intelligence is here. What does it mean for Project Management and Project Managers? I delivered a special live briefing on 1 November 2022, to answer the questions I was asking: 🤖 What is Artificial Intelligence? 🦾 What is the role of AI in Project Management? ⚠️ What are the issues surrounding AI? 🧩 What do Project Managers need to do to prepare ourselves? ⚖️ And ended with my assessment of Artificial Intelligence in Project Management
Plan, deploy and monitor cloud solutions in Microsoft Azure's Infrastructure as a Service
Get started with Neural networks and understand the underlying concepts of Neural Networks, Convolutional Neural Networks, and Recurrent Neural Networks. This hands-on course will help you understand deep learning in detail with no prior coding or programming experience required.
Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis. With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00
Start your journey with the Linux command line with zero knowledge. This course will start from scratch with instructions to install a Linux OS on a virtual machine and advance to higher-level concepts with no prior knowledge required.
Learning Outcomes Get an introduction to Python programming Know how to do conditional branching with Python Deepen your knowledge of importing external/internal libraries in Python Learn about project rock, paper and scissors as well as strings operation, time and date in Python Acquire more knowledge about data storage structures, tuples, lists and dictionary Enhance your understanding of import tricks, import operating systems and platforms and exception handling in Python Learn how to instal Packages and Scheduling in Python Description Python is a highly multi-purposeful still easy-to-understand programming language, which is why it is more adaptable all over the world. Whether to make a web application in data science, software engineering, mobile app development, or artificial intelligence - every industry uses Python to accomplish its work. Therefore, if you are planning to pursue a career in these sectors, develop your Python skills with the Diploma In Python Programming course. We made this course with an aim of enhancing your programming language skills in Python and making you job ready. Therefore, this course includes some easy-to-digest modules on topics such as - conditional branching with Python, writing user functions in Python, file handling, reading and writing using Python and many more. Moreover, we will introduce you to the procedure of data storage structures, tuples, lists and dictionaries through Python. Further topics will be discussed in the modules for which you need to enrol in our comprehensive course. So, join this course now to acquire the exclusive knowledge of Python and a CPD certificate of achievement after completing this course. Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment After completing this course, you will be provided with some assessment questions. To pass that assessment you need to score at least 60%. Our experts will check your assessment and give you feedback accordingly. Career path After finishing this course you will get the expertise to aim for a career in the following positions: Web Developer Software Engineer Data Scientist Machine Learning Engineer Data Analyst Course Content Unit 01: Introduction to Python Programming Module 01: Course Introduction 00:02:00 Unit 02: Getting Started with Python Module 01: Software Installation 00:02:00 Module 02: Hello World Program 00:06:00 Module 03: Input and Output 00:07:00 Module 04: Calculating Average of 5 Numbers 00:03:00 Unit 03: Conditional Branching with Python Module 01: If Loop In Python 00:06:00 Module 02: Program Using If Else part 1 00:03:00 Module 03: Program Using If Else part 2 00:08:00 Module 04: Program for Calculator 00:02:00 Module 05: Program Using For Loop 00:08:00 Module 06: For Table 00:05:00 Module 07: For loop and Mathematical Operator in Python 00:04:00 Module 08: Factorial of Number Using Python 00:06:00 Module 09: Program Using While 00:05:00 Module 10: While Loop Example 00:07:00 Module 11: Tasks for Practice 00:02:00 Unit 04: Importing external/internal library in python Module 01: Importing Library in Python 00:07:00 Unit 05: Project Rock Paper and Scissors Module 01: Rock Paper and Scissor Game 00:06:00 Unit 06: Strings Operation in Python Module 01: Program Using String part 1 00:05:00 Module 02: Program using String 2 00:06:00 Module 03: Program Using String 3 00:06:00 Module 04: Program Using String part 4 00:03:00 Unit 07: Date and time in Python Module 01: Use of Date and Time part 1 00:05:00 Module 02: Use of Date and Time part 2 00:05:00 Unit 08: File Handling, read and write using Python Module 01: File Handling Part 1 00:08:00 Module 02: File Handling Part 2 00:07:00 Unit 09: Data Storage Structures, Tuple, List and Dictionary Module 01: Tuple in Python Part 1 00:10:00 Module 02: Tuple in Python Part 2 00:07:00 Module 03: Using Lists part 1 00:07:00 Module 04: Using List part 2 00:12:00 Module 05: Using Lists part 3 mm 00:06:00 Module 06: Using Lists part 4 00:08:00 Module 07: Using Lists part 5 00:02:00 Module 08: Use of Dictionary Part 1 00:04:00 Module 09: Use of Dictionary Part 2 00:05:00 Module 10: Use of Dictionary Part 3 00:08:00 Module 11: Use of Dictionary Part 4 00:07:00 Unit 10: Writing user functions in Python Module 01: Function in Python Part 1 00:06:00 Module 02: Function in Python Part 2 00:05:00 Module 03: Function in Python Part 3 00:04:00 Module 04: Function in Python Part 4 00:07:00 Module 05: Function in Python Part 5 00:08:00 Unit 11: Sending mail Module 01: Send Email 00:09:00 Unit 12: Import Tricks in Python Module 01: Import Study part 1 00:07:00 Module 02: Import Study part 2 00:03:00 Unit 13: Import Operating System and Platform Module 01: Importing OS 00:06:00 Module 02: Import Platform 00:05:00 Unit 14: Exceptions handling in python Module 01: Exception in Python part 1 00:11:00 Module 02: Exception in Python part 2 00:07:00 Module 03: Exception in Python part 3 00:05:00 Unit 15: Installing Packages and Scheduling In Python Module 01: Installing Packages using built in package manager 00:08:00 Module 02: Scheduler in Python 00:05:00 Unit 16: Data Base In Python using sqlite Module 01: Data Base 1 00:08:00 Module 02: Data Base 2 00:09:00 Module 03: Data Base 3 00:08:00 Module 04: Data base 4 00:07:00 Module 05: Data Base 5 00:06:00 Unit 17: Running Program from Command Prompt and jupyter Notebook Module 01: IDE_1 00:05:00 Module 02: IDE_2 00:07:00 Unit 18: Conclusion Module 01: Conclusion 00:02:00 Resources Resources - Diploma in Python Programming 00:00:00 Recommended Materials Workbook - Diploma in Python Programming 00:00:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00
This PMI-RMP Certification Training will help you master the processes of risk management and the structured and objective approach to addressing uncertainty in projects. You will learn how to conduct risk planning, identification and analysis, and control both known and unknown risks in projects.