The 2nd top hit for ‘Cloud Computing’ on Google says, ‘Cloud computing is a general term for the delivery of hosted services over the internet.’ Unfortunately, that definition is completely wrong. This course is designed to clear up the many misunderstandings about Cloud Computing and to give you a crystal clear and easy-to-understand explanation of […]
Learners will gain a fundamental understanding of this database application’s environment and basic database principles. They will be able to demonstrate the correct use of key features and the ability to create and maintain tables, relationships, forms, reports, and queries.
Understand and implement essential access control measures to protect sensitive information, focusing on user permissions, authentication, and monitoring in compliance with CMMC.
ISO/IEC 20000, often referred to simply as ISO 20000, is the international IT service management (ITSM) standard that enables IT organizations (whether in-house, outsourced, or external) to ensure that their ITSM processes are aligned both with the needs of the business and with international best practice.In this training, you will learn how ISO 20000 helps […]
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Service Integration and Management (SIAM) is a management methodology for environments where services are sourced from multiple service providers and not just a single service provider. In this series we explore the SIAM Eco-system including the business case for SIAM, the benefits of the methodology, the processes involved, and the challenges to implementing and maintaining […]
Administrative office procedures may not be glamorous, but they are essential to the success of any enterprise. A well run office reduces miscommunications and helps to eliminate common errors. By making the administrative office a priority, you will establish clear policies and procedures with employee understanding and buy-in, which ensures that your work environment runs […]
Learners in this self-paced, on-demand, online course gain a thorough understanding of how Insider Threats Awareness is an essential component of a comprehensive cyber security program. Using case studies and real-life examples, the course teaches the common indicators which highlight actions and behaviors that can signify an insider threat within the place of duty. Upon […]
Administrative assistants are a key part of most office environments. They work quietly in the background, ensuring that the business runs smoothly and efficiently. This workshop will give new administrative assistants tools that will make them that person that the office can’t live without. Experienced administrative assistants will learn new tools that will make them […]
A convolutional neural network (CNN) is a feed-forward neural network that is generally used to analyze visual images by processing data with grid-like topology. Everyone learns CNN & sequential modeling but is lagging with mathematical intuition behind the algorithm & essential concepts like channels, kernels & filters which are backbones of Deep Learning. As you […]
Custom object detection is the trending landscape these days in computer vision mainly due to the thousands of emerging use cases with a huge number of real-world applications. A neural network with some level of complexity, usually at least two layers, qualifies as a deep neural network (DNN), or deep net for short. Deep nets […]
Machine Learning, often called AI, is one of the most innovative areas of technology. Over the last few years, it has revolutionized our society with novelties such as automated cars, facial recognition, and language translations. You have heard about the power of ML but you do not know how it can bring value to your […]
This course is a natural and logical extent of the previous Open source intelligence course where we placed a good foundation to move to more advanced topics concerning OSINT and the Privacy perspective of your digital life. This course assumes you are familiar with basic search operators and generic OSINT processes (requirements planning, keyword indexing, […]
Vue is an open-source, progressive JavaScript framework for building user interfaces. Vue supports the component-based approach to building web Apps. The single-file components are independent and loosely coupled to enable better code reuse and quicker development. In part 1 of this series, you learned the fundamentals of Vue JS, how different kinds of bindings […]
Artificial intelligence (AI) is leading the front of the digital transformation strategy in finance today. AI can practically be employed in everything present in the digital world. We will begin with an introduction to Artificial Intelligence and all the related terms. Here, we will get to know the connection between AI and Finance. Moving ahead, […]
Artificial intelligence (AI) is leading the front of the digital transformation strategy in finance today. AI can practically be employed in everything present in the digital world. We will begin the course by learning about the time value of money and get introduced to many terminologies like NPV, IRR, payback rule, and payback period. All […]
Artificial intelligence (AI) is leading the front of the digital transformation strategy in finance today. AI can practically be employed in everything present in the digital world. We will start with an introduction to volatility derivatives and get to know about the volatility index, VIX index calculation, and algorithmic theory. We will then move to […]
The purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the Amazon Web Services certification exams. Designed by IT experts, this test prep is a great way to prepare for your Amazon Web Services certification exam and excel.
The online community for freely available tools and technologies in Web Application Security known as OWASP deals with tools, and technologies in the field of web application security. The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, […]
Beginners in Python programming need a step-by-step guide and a bit of handholding for learning the basics of programming with Python 3. If you want to learn how to program with Python 3 you will LOVE this course! We will cover the start with Python Programming Language and its history. We will also learn the […]
Are you Learning statistics but it doesn’t help, as learning is nothing apart from collecting information without applying hands-on techniques with real-time data sets? Building assumptions is one of the important key roles in Data Science. To validate your assumption, applied statistics will help you to master the concepts. We are going to focus on […]
Every organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.
Reverse Engineering For Everyone! — by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only […]
Reverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]
Reverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]