IT & Software Courses

All IT & Software Courses

We found 23 courses available for you

Embedded System

25 hours
Intermediate

Embedded System course offers microcontroller programming for beginners, as well …

What you'll learn
Better knowledge of programming and how to implement it for actual development requirements in the industrial projects and applications.
Design and improve testing and maintenance activities and procedures.
Design, implement and develop important applications in a Embedded System environment.

Internet of Things (IoT) Training

25 hours
82 Lessons
Intermediate

Internet of Things (IoT) is driving today's technology by connecting …

What you'll learn
Understand the basics of IoT, which will help you leverage new ideas and applications
Build your own undertakings utilizing The Raspberry Pi
Discover attributes to consider before building an IoT brilliant gadget
Build a Raspberry Pi-based brilliant gadget by associating various sensors and actuators

Ethical Hacking Training

40 hours
Beginner

Ethical hacking is referred to as Penetration Testing, red teaming …

What you'll learn
Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
Cloud computing, threats and security, essentials of container technology and serverless computing
Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. Packet sniffing concepts, techniques, and protection against the same.
Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
Web server and web application-based attacks, methodologies
SQL injection, hijacking, and evasion techniques
Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis

CompTIA A+ (220-1001) Essentials Training

25 hours
111 Lessons
Beginner

The CompTIA A+ certification is the starting point for those …

What you'll learn
All the fundamentals needed to start a career in IT hardware
Demonstrate competence in knowledge in the basics of computer technology, networking, and security
All about hardware: monitors, CPUs, motherboards, hard drives, RAM, and more
Learn to work with hardware, peripherals, networking, and security components
Understand the basics of preventative maintenance, basic networking, installation, troubleshooting and communication skills
How to pass the CompTIA A+ Certification Core 1 (220-1001) exam
The skills to be a great IT and computer tech
How to repair and configure mobile devices
How to set up and configure basic networks
How to build everything from a basic workstation to an awesome gaming system
How to troubleshoot hardware and network issues

CISM Training

32 hours
77 Lessons
Intermediate

This Certified Information Security Manager (CISM) training course focuses on …

What you'll learn
​Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives
Get a thorough experience of development and management of an information security program, and how can it generate value for businesses
Understand, define and design a security architecture for your organization’s IT operations
​Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework
​​Learn how to align business goals with organization’s IT safety and security
Develop a working knowledge of the four domains prescribed by ISACA
​​Gain the relevant knowledge and skills required to pass the CISM exam by ISACA

CISSP Training

30 hours
88 Lessons
Intermediate

Take your career to the next level by earning one …

What you'll learn
Understand and implement fundamental concepts related to IT security
Line up organizational goals with the security functions and implementations
Understand the concepts, principles, structure, and standards to implement, design, monitor, and secure operating systems, networks & applications
Understand the significance of cryptography in providing security services in the modern world
Understand physical security elements and implement appropriate physical security protection measures
Understand the concept of communication and network security
Design test or audit strategies that facilitate the business environment
Optimize operational capacity of an organization by deploying appropriate security countermeasure
Identify potential risks or assess specific threats, vulnerabilities, and controls
comprehend and protect System Lifecycle (SLC) and Software Development Lifecycle (SDLC)

Masters in Cyber Security

200 hours
48 Lessons
All Levels

Master in Cyber Security program prepares professionals to assume cybersecurity …

What you'll learn
Advance your career with 360° Career Support.
Develops in-depth specialist knowledge and a critical understanding of the key aspects of cyber security and data governance.
Equip you with the skills to manage and analyse an organisation's data assets and security measures, and provide an understanding of data governance principles, practices and technologies.
Focuses on a combination of technology, business and policy to give you a well-rounded insight into the vital ways in which information is collected, stored, communicated and protected.