Back to Courses









Information Technology Courses - Page 83
Showing results 821-830 of 1471

Python Dynamic HTML Web Server
Web application servers are abundant these days. Each have one thing in common, they ultimately process requests and return web pages. Apache serves PHP pages along with static HTML. Microsoft’s .NET creates dynamic web pages that may be authored using C# or VB and served using IIS. Java Enterprise Edition has many options, WebSphere, WebLogic, and Apache TomEE to name a few server platforms.
Python has its own web server that can be built in one line of code, but it is relatively simple to create the server code yourself. This is useful if you want to understand how web servers work and can be used to quickly test your own web pages. In addition, some browsers will not load local files due to security; using a simple web server solves this issue as well.
In this course, you will create a Python application in which you will create a simple HTTP server, create a static web page, create dynamic pages using python, and access the pages from the server using the command line as well as from a browser.
Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.

Introduction to Mobile Development
If you want to become a mobile developer, this course is a good place to start. You will learn about the day-to-day responsibilities of web and mobile developers and get a general understanding of the core and underlying technologies that power the internet.
You’ll be introduced to core technologies like HTML and CSS, and get opportunities to practice using them.
In this course, you will also discover the unique world of cross-platform mobile applications (apps). Explore the various benefits of using a system like React Native to build mobile apps and get an opportunity to practice the basics.

Juniper Networks Security Concepts and Initial Configuration
In this course, you will be introduced to Juniper’s basic network security design concepts. You will learn about the Junos operating system (Junos OS) along with SRX Series security devices. You will learn the basics of the Junos CLI and J-Web user interfaces including initial configuration tasks and basic interface configuration. The course will explain the concepts of security zone objects, screen objects, address objects, service objects and how they are configured. The different types of security policies and their purpose will be explored along with an explanation on how to implement security policies on SRX Series devices.

HTML and CSS in depth
In this course, you’ll use software development tools like HTML to build attractive web pages that work well—and you’ll use structured semantic data to control how websites appear to the end user.
You will then dive deeper into CSS by applying increasingly specific styling to various elements. You’ll learn to use Bootstrap’s grid system to create layouts and work with components and themes. Finally, you’ll explore debugging and learn how it can be utilized to banish common front-end errors.
By the end of this course you will be able to:
• Create a simple form with a responsive layout using HTML5 and CSS
• Create a responsive layout using CSS
• Create a UI using Bootstrap
• Implement debugging tools
This is a beginner course for learners who would like to prepare themselves for a career in front-end development. To succeed in this course, you do not need prior development experience, only basic internet navigation skills and an eagerness to get started with coding.

Improving Network Performance II
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you'll work on further practical elements of performance testing, toward improving network server performance by using load balancing and content caching.

Cryptography
Welcome to Cryptography!
Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation.
You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure.
Course Objectives
1. Apply the fundamental concepts of cryptography
2. Describe the difference between symmetric and asymmetric cryptography
3. Define the basic requirements for cryptography
4. Identify processes to support secure protocols
5. Describe the process for implementing cryptographic systems
6. Define key management concepts
7. Define Public Key Infrastructure
8. Identify processes for key administration and validation
9. Describe the implementation of secure protocols

Advanced Data Modeling
Develop a working knowledge and familiarity with advanced database concepts such as usage, modeling, automation, storage, optimization and administration.
By the end of this course, you’ll be able to:
- Deploy basic data modeling skills and navigate modern storage options for a data warehouse
- Apply planning and execution of ETL style database engineering by building upon existing MySQL skills
- Develop a working knowledge of the different aspects of managing a database including administration of database operations and concerns, alongside processes and solutions for monitoring, reporting and debugging
- Demonstrate data modeling skills within a real-world project environment
You’ll gain experience with the following tools and software:
- Workbench data modeling software
- Syntaxes used to interact with a data warehouse
- Extract, transform and loading (ETL) techniques and methods
- MySQL data warehouse administration
- Data warehouse monitoring and reporting tools
- Database debugging and testing tools
- Data modeling tools

Configuring IAM Permissions with gcloud
This is a self-paced lab that takes place in the Google Cloud console. In this lab introduces you will use the gcloud CLI tool to set up and configure command features of Cloud Identity and Access Management.

Fundamental Privacy Acts and Laws
In this path we will explore The US Federal Government Branch and Information Privacy. We will also cover US healthcare privacy related laws and privacy compliance including HIPAA, HITECH, GINA and more.

Deploy Go Apps on Google Cloud Serverless Platforms
This is a self-paced lab that takes place in the Google Cloud console. Use GO (golang) to deploy an app on App Engine, Cloud Run, and Cloud Functions using Cloud Build
Popular Internships and Jobs by Categories
Browse
© 2024 BoostGrad | All rights reserved