Back to Courses

Information Technology Courses - Page 8

Showing results 71-80 of 1471
Relational Modeling in Dia
In this course you will learn to interpret and draw a relational model through hands-on exercises using a diagramming tool called “Dia”. You will complete the final step in the database design process as you convert the logical design documented in an Entity Relationship Diagram into a Relational Model. During the conversion, you will investigate relational modeling rules and practice modeling techniques as you learn to resolve one-to-many and many-to-many relationships using foreign keys and bridge tables. Your final Relational Model will become the blueprint for creating a database and its tables. Since data is at the center of any information system, knowledge and understanding of database design will serve you well as a database user or a database designer. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
TensorFlow on Google Cloud
This course covers designing and building a TensorFlow input data pipeline, building ML models with TensorFlow and Keras, improving the accuracy of ML models, writing ML models for scaled use, and writing specialized ML models.
Computer Hardware and Software
This course provides foundational understanding of how computers process information through hardware and software. You will investigate the world of Information Technology (IT) and survey hardware components, mobile devices, operating systems, programs and apps, network fundamentals, the Internet, and touch on security and ethics.
Configure Standard Access Lists on Cisco Routers
Welcome to the CCNA 1.8: Configuring Standard Access Lists (ACLs) on Cisco routers. This project is the eighth in a CCNA learning series that is designed to help you acquire the hands-on skills required to pass the CCNA certification exam. In this 2-hour guided project, you will identify the difference between standard inbound and outbound Access Control Lists (ACLs), configure inbound and outbound ACLs on Cisco routers, and setup ACLs to permit exclusive traffic on Cisco routers.
Smart Device & Mobile Emerging Technologies
Every day you use your smartphone. Your smartphone wakes you up, it is the first thing you use in the morning, and the last thing you check (e.g., alarm setting) before you sleep. In addition, you use it all day. A typical cellphone user touches their mobile phone 2,617 times a day (Dscout report based on 2017) and people spend over 4 hours a day on their mobile phones (Hackernoon report) on average. Smartphones and smart watches are very useful and will become even more useful due to their smaller sizes, lighter weights, versatile functionalities, advanced mobile communications & wireless networking (e.g., Wi-Fi & Bluetooth) technologies. In this course, the start-of-the-art smartphone and smart watch technology and components in addition to the global market trends and future forecasts are introduced. Since everybody uses smartphones and smart watches, knowing the details about the most globally used electronic device will definitely help you in all aspects of new product and app design & development, as well as business planning. In addition, the core technology and components of the world’s most popular smartphones (i.e., the Samsung Galaxy Note8 and Apple iPhone X) and smart watches (i.e., Samsung Gear S3 and the Apple Watch Series 3) are introduced along with details of the iOS and Android smartphone OSs (Operating Systems) and mobile communications 1G to 5G (for details on Wi-Fi and Bluetooth, please take my course “IoT Wireless & Cloud Emerging Technology”). This course ends with projects that teach how to analyze the components of smartphones and check the mobile network. Consequently, this course will prepare you to be more successful in businesses strategic planning in the upcoming smart device era. I cordially welcome you in to the amazing internal dynamics of the smart device world!
Implementing a Risk Management Framework
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position. In this course, a learner will be able to: ● Identify the career development and path of a Cybersecurity professional from entry-level to CISO ● Define and describe the role and function of a CISO in planning for cybersecurity ● Identify the development of a cybersecurity governance program and the role the CISO would play in it ● Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
Google Cloud SDK: Qwik Start - Redhat/Centos
This is a self-paced lab that takes place in the Google Cloud console. In this hands-on lab you will learn how to perform basic tasks in Cloud Storage using the gsutil command-line tool. For a short preview, watch <A HREF="https://youtu.be/69MdTXgA6Ws"/>Cloud SDK - Essential Command-Line Tools for Google Cloud Platform</A>.
Introduction to Docker: Build Your Own Portfolio Site
In this 1-hour long project-based course on Introduction to Docker: Build your own portfolio website, you will learn how to use Docker on the command line and create your own portfolio website from a Bootstrap template in a Docker container. You will get to explore and demystify the Docker landscape and see how Docker works by using it. You will learn many fundamental concepts which will help you progress in your career, studies and knowledge, such as images, containers, the registry, the client/server model in Docker via the Docker Engine etc. You will use various commands and become comfortable spinning up containers, doing basic debugging to see statuses of containers, linking local files to files inside of Docker and learning basic networking to map a container port to a port on your local host machine to set up a development environment with Docker. Most importantly you will leave this course more confident in your knowledge of Docker and ready to understand Docker at a more advanced level, and ready to contribute better to your technical or development teams Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Use SharePoint & Power Virtual Agent to Create Smart Chatbot
It is a common situation that, in any company, employees want to get general information about a topic they are interested in, for example, how many vacation days they have, when was the company founded, do they work on weekends, are there any dressing rules, who is the CEO and so on. Of course, there is always a person or multiple persons in the company who can give those answers, but there is a much better way of providing your colleagues with information they need then chasing those all-knowing employees for answers, and that is a fully automated chatbot created with Power Virtual Agent, which is one of the 4 main parts of the Power Platform. In this 35-minutes long guided project, “Use SharePoint & Power Virtual Agent to Create Smart Chatbot”, you will create a SharePoint site and list, add some data to it and create a Power Virtual Agent chatbot which will automate the information flow from your company to the employees. Once the chatbot is up and running, you and your colleagues won’t have to bother other colleagues in person or send them emails or texts anymore, you will be able to have a nice and easy-going conversation with the bot behind the chatbot and find out the information you need. Since this project uses Office 365 services like SharePoint and Power Virtual Agent (part of the Microsoft Power Platform), you will need access to a Microsoft account and a Microsoft 365 Developer Program subscription account. In the video at the beginning of the project you will be given instructions on how to sign up for both. If you are ready to create your artificial co-worker which will help you and your colleagues provide information to others, then this project is for you! Let's get started!
Splunk Search Expert 102
Take the next step in your knowledge of Splunk. In this course, you will learn how to use time differently based on scenarios, learn commands to help process, manipulate and correlate data.