Back to Courses

Information Technology Courses - Page 18

Showing results 171-180 of 1471
Tencent Cloud Practitioner
This course is primarily aimed at cloud professionals who are interested in learning about Tencent Cloud's products and services. It equips learners with a foundational knowledge in cloud computing and prepares them to take the Tencent Cloud Practitioner examination. After completing this course, learners will be able to explain the different features, advantages, uses cases, and billing methods of several core Tencent Cloud products.
Introduction to Technical Support
Gain the daily work skills and knowledge you’ll need for IT Technical Support career success. This course, part of the IBM Technical Support Professional Certificate, is designed for beginners with no prior IT experience or formal degree. Get an insider’s view into IT Support work. Learn about IT Support roles and levels, the support escalation matrix, ticketing systems, common support tools, and remote support software. Then, hear about career opportunities and career pathways from experienced, expert Information Technology professionals. By the end of this course, you will be able to: - Describe and develop a customer service and support mindset. - Define the levels of IT support and the escalation matrix. - Explore the features and benefits of ticketing systems. - Identify support tools and systems used in technical support. - Explore various tech support roles and responsibilities, including service level agreement responsibilities. - Recognize the career paths and progression in Technical Support. These skills will equip you to speak with prospective employers and ask insightful questions that demonstrate your knowledge of the day-to-day administrative role-related responsibilities.
VM Migration: Introduction to StratoZone Assessments
This is a self-paced lab that takes place in the Google Cloud console. In this lab you'll learn how to assess an IT environment with StratoZone's scalable discovery.
How To Build a Network Topology Using GNS3
In this 1-hour 30-mins long project-based course, you will learn how to build a network topology using GNS3, as well as configuring network devices and troubleshooting them. You’ll also learn how to create subnets and how to secure your network devices. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Visualize Real Time Geospatial Data with Google Data Studio
This is a self-paced lab that takes place in the Google Cloud console. Use Google Dataflow to process real-time streaming data from a real-time real world historical data set, storing the results in Google BigQuery and then using Google Data Studio to visualize real-time geospatial data.
Launching into Machine Learning
The course begins with a discussion about data: how to improve data quality and perform exploratory data analysis. We describe Vertex AI AutoML and how to build, train, and deploy an ML model without writing a single line of code. You will understand the benefits of Big Query ML. We then discuss how to optimize a machine learning (ML) model and how generalization and sampling can help assess the quality of ML models for custom training.
Security Operations
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to:  Explain concepts of security operations. - Discuss data handling best practices. - Identify important concepts of logging and monitoring. - Summarize the different types of encryption and their common uses. - Describe the concepts of configuration management. - Explain the application of common security policies. - Discuss the importance of security awareness training. - Practice the terminology of and review the concepts of network operations. Agenda Course Introduction Module 1: Understanding Data Security and Encryption Module 2: Controls and Asset Management Module 3: Best Practice Security Policies Module 4: Understand Security Education Training and Awareness (SETA) Module 5: Security Operations Review Final Assessment This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
Configure Your IDE with Visual Studio Code
In this 1 hour guided project, you will learn how to configure your IDE (integrated development environment) with Visual Studio Code. This project was designed with beginners in mind. You do not need extensive development knowledge to follow along. Although we will set up a development environment for various programming languages. However, you can apply the same principle to set up for other languages. We will only focus on configuring Visual Studio Code and NOT the particulars writing code.
Introduction to Software, Programming, and Databases
There are many types of software and understanding software can be overwhelming. This course aims to help you understand more about the types of software and how to manage software from an information technology (IT) perspective. This course will help you understand the basics of software, cloud computing, web browsers, development and concepts of software, programming languages, and database fundamentals. After completing this course, you will have a better understanding of software processes, and you'll be more confident in your understanding of using and securing your applications. In this course, you'll learn about software that ranges from the operating system running on your mobile phone to the applications that run databases on your computer at work. You'll also begin to understand more about installing and managing web browsers, using extensions and plug-ins, and keeping web browsers secure and updated. Additionally, you'll see how cloud-based technologies can help businesses create and deploy applications more quickly. This course will also teach you about the development and delivery of software and applications. By the end of the course, you'll understand simple programming concepts and types, and you'll become more familiar with the fundamentals of database management.
Smart Analytics, Machine Learning, and AI on GCP
Incorporating machine learning into data pipelines increases the ability of businesses to extract insights from their data. This course covers several ways machine learning can be included in data pipelines on Google Cloud depending on the level of customization required. For little to no customization, this course covers AutoML. For more tailored machine learning capabilities, this course introduces Notebooks and BigQuery machine learning (BigQuery ML). Also, this course covers how to productionalize machine learning solutions using Vertex AI. Learners will get hands-on experience building machine learning models on Google Cloud using QwikLabs.