Back to Courses

Information Technology Courses - Page 8

Showing results 71-80 of 1471
Automate Equipment Ordering Prep Process with Power Automate
In large companies there are usually many requests for new equipment on a monthly basis, and it takes a lot of steps before an employee gets the wanted piece of equipment. This project can help you turn the boring, repetitive business process into a quick solution with just a few clicks. In this 1-hour long guided project, you will learn to create a SharePoint list and set up Power Automate flows for the following process: when an employee of your imaginary company wants a new piece of equipment, they will create a request in SharePoint and if it exceeds a certain amount of money, the general manager must approve it. At the end of the month, all requests are collected into an HTML table and sent via email to the department in charge of ordering the equipment, and the person who made the request receives an email that their request has been approved and the equipment will be ordered. Since this project uses SharePoint (an Office 365 service) and Power Automate (part of the Microsoft Power Platform), you will need access to a Microsoft account and a Microsoft 365 Developer Program subscription. In the video at the beginning of the project you will be given instructions on how to sign up for both. Let’s get started with automating manual, time-consuming business processes!
Exploratory Data Analysis Using AI Platform
This is a self-paced lab that takes place in the Google Cloud console. Learn the process of analyzing a data set stored in BigQuery using AI Platform to perform queries and present the data using various statistical plotting techniques.
Getting Started with MongoDB Atlas on Google Cloud
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will provision a MongoDB Atlas cluster, create a database and set up App Services GraphQL API.
Migrating to Google Cloud
This course introduces participants to the strategies to migrate from a source environment to Google Cloud. Participants are introduced to Google Cloud's fundamental concepts and more in depth topics, like creating virtual machines, configuring networks and managing access and identities. The course then covers the installation and migration process of Migrate for Compute Engine, including special features like test clones and wave migrations.
Compute Engine: Qwik Start - Windows
This is a self-paced lab that takes place in the Google Cloud console. Google Compute Engine lets you create and run virtual machines on Google infrastructure. In this lab you create a Windows Server instance in the Google Compute Engine and access it with RDP. Watch a short preview, Launch a Windows Server Instance, GCP Essentials.
Relational Modeling in Dia
In this course you will learn to interpret and draw a relational model through hands-on exercises using a diagramming tool called “Dia”. You will complete the final step in the database design process as you convert the logical design documented in an Entity Relationship Diagram into a Relational Model. During the conversion, you will investigate relational modeling rules and practice modeling techniques as you learn to resolve one-to-many and many-to-many relationships using foreign keys and bridge tables. Your final Relational Model will become the blueprint for creating a database and its tables. Since data is at the center of any information system, knowledge and understanding of database design will serve you well as a database user or a database designer. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Computer Hardware and Software
This course provides foundational understanding of how computers process information through hardware and software. You will investigate the world of Information Technology (IT) and survey hardware components, mobile devices, operating systems, programs and apps, network fundamentals, the Internet, and touch on security and ethics.
Configure Standard Access Lists on Cisco Routers
Welcome to the CCNA 1.8: Configuring Standard Access Lists (ACLs) on Cisco routers. This project is the eighth in a CCNA learning series that is designed to help you acquire the hands-on skills required to pass the CCNA certification exam. In this 2-hour guided project, you will identify the difference between standard inbound and outbound Access Control Lists (ACLs), configure inbound and outbound ACLs on Cisco routers, and setup ACLs to permit exclusive traffic on Cisco routers.
Smart Device & Mobile Emerging Technologies
Every day you use your smartphone. Your smartphone wakes you up, it is the first thing you use in the morning, and the last thing you check (e.g., alarm setting) before you sleep. In addition, you use it all day. A typical cellphone user touches their mobile phone 2,617 times a day (Dscout report based on 2017) and people spend over 4 hours a day on their mobile phones (Hackernoon report) on average. Smartphones and smart watches are very useful and will become even more useful due to their smaller sizes, lighter weights, versatile functionalities, advanced mobile communications & wireless networking (e.g., Wi-Fi & Bluetooth) technologies. In this course, the start-of-the-art smartphone and smart watch technology and components in addition to the global market trends and future forecasts are introduced. Since everybody uses smartphones and smart watches, knowing the details about the most globally used electronic device will definitely help you in all aspects of new product and app design & development, as well as business planning. In addition, the core technology and components of the world’s most popular smartphones (i.e., the Samsung Galaxy Note8 and Apple iPhone X) and smart watches (i.e., Samsung Gear S3 and the Apple Watch Series 3) are introduced along with details of the iOS and Android smartphone OSs (Operating Systems) and mobile communications 1G to 5G (for details on Wi-Fi and Bluetooth, please take my course “IoT Wireless & Cloud Emerging Technology”). This course ends with projects that teach how to analyze the components of smartphones and check the mobile network. Consequently, this course will prepare you to be more successful in businesses strategic planning in the upcoming smart device era. I cordially welcome you in to the amazing internal dynamics of the smart device world!
Implementing a Risk Management Framework
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position. In this course, a learner will be able to: ● Identify the career development and path of a Cybersecurity professional from entry-level to CISO ● Define and describe the role and function of a CISO in planning for cybersecurity ● Identify the development of a cybersecurity governance program and the role the CISO would play in it ● Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program