Facebook Messenger

Courses in Dubai

MyPrivateTutor provides a large database of courses including local courses, live courses and online courses spanning over an array of segments and subjects. Search for any course you are interested in and book the one relevant to you.

Home» Courses in Dubai
Show Per pages
Result :1 to 25 of 8369 Courses
Classroom
  • Not Rated yet
  • Be First to Review

  • Area: Al barsha
  • Course Fees: AED3500
  • Duration: 24 Hour
  • Time / Schedule: Sun,Tue,Thu 9pm to 9pm
  • Business Training » Accountancy: Management

Course Details

Organizations spend ample time and money to ensure all associated business risks are mitigated. Except few, most business risks are not accidental but incidental and have definite causes and cures. Majority of these risks stem from staff, suppliers, debtors, business partners etc. Audit frameworks usually focus only one side of picture i.e. creating a safeguard against them rather than addressing the source of risk.

Undoubtedly, in most high profile corporate frauds the most important thing missing was ethical commitment both on the part of the organization as well as staff which resulted in a big disaster. This workshop will offer an insight on how internal controls can be effectively managed through providing effective guidance to staff in case of ethical dilemma and conflict of interest they fact at workplace and auditors can evaluate organizational risk through evaluating "Standard of Business Conduct" of the organization.

Key Deliverables  1. Learn the scope and objective of ethical audit 2. Understand what are ethics and why they are not law 3. Get acquaintance of value based vs compliance based approach to ethics 4. Take insight of ethical audit framework  5. Enhance your skills to evaluate "Standard of Business Conduct" of your organization  6. Master understanding of ethical dilemmas and situation of conflict of interest 7. Identify organization's ethical tolerance limits 8. Evaluate organization ethical control and reporting framework 9. Get Insight of ethical monitoring and appraisal framework at work

Who Should Attend

a. Audit Staff b. Accounts & Finance Staff c. Sales & Marketing Staff d. Procurement & Supply Chain Staff e. Departmental Heads f. IT & Legal Department g. Security Staff h. Corporate Relationship Managers i. Non-Finance Managers

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Area: World trade centre
  • Course Fees: Ask Now
  • Duration: 80 Hour
  • Time / Schedule: Depending on the candidate
  • IT Training » Programming Technology

Course Details

Course Name: CPC (CERTIFIED PROFESSIONAL CODER)

Course Outline:

1) Medical Anatomy and Terminology

2) ICD Coding

3) CPT Coding

4) HCPCS Coding

5) International and Local billing guidelines

6) Business Medicine

Class Timing: Depending on candidate's availability.

Duration of class - 60 hours + 20 hours Mock Training

Fees - Can be discussed

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Area: Al barsha
  • Course Fees: AED3500
  • Duration: 24 + Hour
  • Time / Schedule: Sun,Tue,Thu 9pm to 9pm
  • Other » MS-Projects

Course Details

Upon successful completion of this course, students will be able to:

1. Identify the basic features and components of the Microsoft Project environment. 2. Create a new project plan file and enter project information. 3. Manage tasks by organizing tasks and setting task relationships. 4. Manage resources for a project. 5. Analyze and finalize the project plan. file. 6. Exchange project plan data with other applications. 7. Update a project plan. 8. Manage project costs. 9. Report project data visually. 10. Reuse project plan information.

Who Should Attend:  a. Departemental Heads b. Supply Chain Managers c. Legal Department Managers d. Project professionals e. Customer Service Department

Five Reasons to Join: i. Study with Qualified & Experienced Faculty ii. Choose your own study time based on your availability iii. Highly cost-effective iv. Concepts based study & real-life case studies v. Get the advantage of most convenient locations

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Downtown
  • Course Fees: AED5
  • Duration: 680 Hour
  • Time / Schedule: All Days 10 am to 9 pm
  • Exam Preparation » IIT JEE

Course Details

TestprepKart offers a complete solution for students doing JEE preparation in UAE. We provide quality teachers who prepare students for their exams. We offer online coaching to students preparing for JEE Mains and Advanced. We have embedded required courses for JEE in our curriculum. 

We ensure that the students should be provided with in-depth knowledge of every topic covered in JEE Mains and Advanced preparation. We help to propel your success to get admission in your desired engineering institutes. Through our online coaching classes, students can easily avail the facility of tuitions by sitting at their home itself without going anywhere.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Downtown
  • Course Fees: AED5
  • Duration: 680 Hour
  • Time / Schedule: 10am to 9pm
  • Exam Preparation » NEET

Course Details

TestprepKart hold a legacy to tutor students from various CBSE schools of Dubai, Abu Dhabi, Ajman and Sharjah (UAE) for NEET, AIIMS and much more medical entrance examination. UAE Consists of more than 2.6 million Indians and the natural phenomenon for many NRI parents working over there that their wards get admission in top medical colleges of India. Here comes the worry and distress for those NRI parents in UAE that where should their children would get the best coaching to crack exam like NEET which is considered as one of the toughest exam to clear.

For a competitive exam like NEET or AIIMS a strategic preparatory approach is highly needed. Students preparing for NEET or AIIMS need to plan their preparation schedule in a very effective and efficient way. TestprepKart provides customized preparation courses for each individual student after assessing the aptitude level of the candidate.

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Area: Al barsha
  • Course Fees: AED3000
  • Duration: 24 Hour
  • Time / Schedule: Sun,Tue,Thu 9pm to 9pm
  • Business Training » HR/Personnel

Course Details

Human Resource Management is one of the top agenda in the list of board of directors. Having strategic importance, effective and efficient human resource management is a source of competitive advantage for business organizations. Attempts are being made to quantify the value of Human Resource and development of Human Balance Sheet so as to let the organization realize the financial worth of its Human Resource in terms of contribution to business operations. 

The focus of this certification is to ensure successful recruitment, operation, appraisal, retention and management of Human Resource as a business asset of the organization for the utmost advantage to the organization shareholders expectations. Five Reasons to Join

1. Study with HR Qualified & Experienced Faculty 2. Choose your own study time based on your availability 3. Highly cost effective  4. Concepts based study & real-life case studies 5. Get the advantage of most convenient locations

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 4 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to The Ultimate Ethical Hacking Boot Camp.

Learn Ethical Hacking from a world famous Ethical Hacker who has professional endorsements from people like Mark Cuban Billionaire tech entrepreneur, Star of Shark Tank, and the legendary cybersecurity expert John McAfee. 

Seely "thinks entirely out of the box, and has consistently looked to leverage his skills for the good of society,"

McAfee said in a statement.

This course is jam-packed with content and will take an absolute beginner in cybersecurity & ethical hacking from zero to being able to actually hack wireless routers, crack passwords, and understand the reasons why those things work. You will be getting live video demonstrations, lectures, and in some video's ill be on camera explaining something.

We talk about the process of hacking, from gathering information in the Recon phase, to more involved looks at our targets in the scanning phase. Enumeration and System hacking bring the basic "hacking process" to a close, but that is not the end of things, far from it.

Many of today's large hacks and data breaches that you see all over the news are the results of very clever & persistent social engineers. Social Engineers figure out that you can't always hack the machines, and sometimes its much easier to hack the unsuspecting person using the machine. Learn valuable skills in conducting Social Engineering Penetration Tests as well as how to protect against social engineering attacks.

You are going to enjoy the demos on the course as they will walk you through the whole process and not just the highlights. You can follow along with every single demo and make them into practice courses for yourself. 

in just a few hours, you will already be figuring out new ways to use the software tools and tricks I have shown you and come up with new things to try. It is kind of addicting once you get into it.

I can't promise a prestigious job right out of the gate, but I can promise you that you will learn way more in this course than you thought was possible, and you will want to learn even more.

Get rid of the mystery and learn what real hackers know. If you are excited at the idea of being an ethical hacker, then there is no better place to start than right here.

Who is the target audience?

  • Anyone with a basic tech/computer background that wants to learn about ethical hacking and cybersecurity
  • Anyone already in the information security field who wants to get some practical experience and brush up on skills

BASIC KNOWLEDGE

  • A basic understanding of computers
  • A basic understanding of networking
  • Windows / Linux / Mac Operating system and hardware capable of running virtual machines, or spare hardware to run the other operating systems necessary to perform the Practice Demos

WHAT YOU WILL LEARN

  • Setup a testing lab for penetration testing
  • Identify and hack into wireless access points
  • Recover lost passwords with password cracking tools
  • Simulate a phishing attack to steal usernames and passwords with a decoy website

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 4.30 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to the IT Fundamentals; FC0-501. The Total Course from Mike Meyers, Scott Jernigan, and Total Seminars.

Be your own Geek. This course is for everyone who has had to call a Help Desk or a Geek friend to help them with basic PC and mobile issues. You will learn about PCs, tablets, phones, networks, and Internet issues. You will also learn about security, safety, and preventative maintenance.

Learn how to:

  •  Identify and understand basic computer components and what they do
  •  Understand operating systems, data storage and sharing
  •  Set up and configure a basic PC workstation
  •  Work with applications and files
  •  Handle basic software installation
  •  Set up and configure a mobile device
  • Connect to networks and the Internet
  •  Identify/prevent basic security risks
  •  Identify compatibility issues
  •  Understand safety and preventative maintenance of computers

This course covers everything you need to know to pass the CompTIA IT Fundamentals Certification FC0-U51 exam. The first goal of the course is to help users better understand, set up, configure, and troubleshoot PCs and mobile devices. The process will prepared you to pass the CompTIA IT Fundamentals exam. 

The course covers all the CompTIA IT Fundamentals FC0-U51 objective domains:

1.0 Software

2.0 Hardware

3.0 Security

4.0 Networking

5.0 Basic IT Literacy

The Total IT Fundamentals Course covers everything you need to know to be your own PC, mobile, network, and security Geek.

Who is the target audience?

  • This course is for EVERYONE who uses PCs and mobile devices.
  • CompTIA has a certification for IT Fundamentals (FC0-U51) but the course will help any user better understand the technology they use every day.

BASIC KNOWLEDGE

  • Basic user of PCs, mobile devices, the Internet and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.

WHAT YOU WILL LEARN

  • The first and most important goal of this course is to help every PC and mobile device user to better understand the setup, software installation and configuration, network connectivity, security issues and basic troubleshooting.
  • By the end of the course, you will better understand everything from file structure, to software installation, to WiFi connectivity and troubleshooting to overall setup, configuration and troubleshooting PCs and mobile devices.
  • This course will help you prepare for and pass the CompTIA IT Fundamentals FC0-U51 Certification exam.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 15.33 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to the CompTIA Network+ Certification; N10-006. The Total Course from Mike Meyers and Total Seminars.

This course is over 15 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-006) Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.

The course covers all the exam topics including:

  • Network architectures
  • Cabling and topology
  • Ethernet basics
  • Network installation
  • TCP/IP applications and network protocols
  • Routing
  • Network naming
  • Advanced networking devices
  • IPv6
  • Remote connectivity
  • Wireless networking
  • Virtualization and cloud computing
  • Network operations
  • Managing risk

This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.

Who is the target audience?

  • This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.

BASIC KNOWLEDGE

  • Basic familiarity with networks.
  • There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Simpliv.

WHAT YOU WILL LEARN

  • This is a complete and comprehensive CompTIA Network+ Certification (N10-006) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
  • Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great Network tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Network+ Certification will help you land a Network tech job or if you are already a network tech, get that raise or advancement you are seeking.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 14 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to the CompTIA A+ Certification 902. The Total Course from Mike Meyers and Total Seminars.

This is the second of a two-course series for CompTIA A+ and is designed to prepare you to take and pass the CompTIA A+ 220-902 exam. To become fully A+ certified you will need to pass both the 220-901 and 220-902 exams. This course is over 10 hours in length containing over 100 video lectures. The first goal of the course is to make you a good PC Tech and in the process make sure you are ready to pass the CompTIA 902 exam.

The course covers all the CompTIA A+ 220-902 Objective Domains:

1.0 Windows Operating Systems: 29%

2.0 Other Operating Systems & Technologies: 12%

3.0 Security: 17%

4.0 Software Troubleshooting: 28%

5.0 Operational Procedures: 13%

Topics include how to:

  • Set up, upgrade and maintain all versions of Windows.
  • Basics of OS X and Linux.
  • Configure and secure mobile devices.
  • Protect your PC and your network.
  • Work with virtualization technologies.
  • Understand safety and environmental issues.

Who is the target audience?

  • This course is intended for anyone that is preparing for an entry-level PC technician position or looking to improve their skills and become CompTIA A+ Certified. However, it goes beyond that and will give you the skills you need to be a better tech on the job.

BASIC KNOWLEDGE

  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.

WHAT YOU WILL LEARN

  • This is a complete and comprehensive CompTIA A+ 220-902 course. It is designed to prepare the student to be able to take and pass the second of two A+ exams needed to become CompTIA A+ Certified. To become A+ Certified requires you to pass BOTH the 220-901 and 220-902 exams. There is a separate course covering the 220-901 exam.
  • Once you complete the two CompTIA A+ courses, you will have the knowledge and confidence to pass the exams AND the skills to be a great PC tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA A+ Certification will help you land your first PC tech job or if you are already a PC tech, get that raise or advancement you are seeking.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 16 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to the CompTIA A+ Certification 901. The Total Course from Mike Meyers and Total Seminars.

This is the first of a two-course series for CompTIA A+ and is designed to prepare you to take and pass the CompTIA A+ 220-901 exam. To become fully A+ certified you will need to pass both the 220-901 and 220-902 exams. This course is over 14 hours in length containing over 120 video lectures. The first goal of the course is to make you a good PC Tech and in the process make sure you are ready to pass the CompTIA 901 exam.

The course covers all the CompTIA A+ 220-901 Objective Domains:

1.0 Hardware: 34%

2.0 Networking: 21%

3.0 Mobile Devices: 17%

4.0 Hardware & Networking Troubleshooting: 28%

Topics include how to:

  • Work with CPU, RAM, BIOS, motherboards, power supplies, and other PC components.
  • Install, configure, and maintain hard drives.
  • Manage input devices and removable media.
  • Troubleshoot and fix common PC problems.
  • Install video and multimedia cards.
  • Work with smartphones, tablets, and other mobile devices.
  • Install and configure wired and wireless networks.
  • Connect to the Internet.
  • Install, configure, and manage printers and other peripherals

Who is the target audience?

  • This course is intended for anyone that is preparing for an entry level PC technician position or looking to improve their skills and become CompTIA A+ Certified. However, it goes beyond that and will give you the skills you need to be a better tech on the job.

BASIC KNOWLEDGE

  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.

WHAT YOU WILL LEARN

  • This is a complete and comprehensive CompTIA A+ 220-901 course. It is designed to prepare the student to be able to take and pass the first of two A+ exams needed to become CompTIA A+ Certified. To become A+ Certified requires you to pass BOTH the 220-901 and 220-902 exams. There is a separate course covering the 220-902 exam.
  • Once you complete the two CompTIA A+ courses, you will have the knowledge and confidence to pass the exams AND the skills to be a great PC tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA A+ Certification will help you land your first PC tech job or if you are already a PC tech, get that raise or advancement you are seeking.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 14 Hour
  • Time / Schedule: Online Courses
  • IT Training » Networking

Course Details

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

The course covers all the CompTIA Security+ SY0-401 Objective Domains:

1.0 Network Security: 20%

2.0 Compliance and Operational Security: 18%

3.0 Threats and Vulnerabilities: 20%

4.0 Application, Data and Host Security: 15%

5.0 Access Control and Identity Management: 15%

6.0 Cryptography: 12%

Topics include:

  • Risk management.
  • Cryptography.
  • Authentication and authorization.
  • Host, LAN, and application security.
  • Wireless, cloud and mobile security.
  • Environmental and personnel security and controls.

This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

Who is the target audience?

  • This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.

BASIC KNOWLEDGE

  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+ and Network+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Simpliv.

WHAT YOU WILL LEARN

  • This is a complete and comprehensive CompTIA Security+ Certification; SY0-401 course. It is designed to prepare the student to be able to take and pass the exam to become CompTIA Security+ Certified.
  • Once you complete the course you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Security+ Certification will help you land a great It security tech job or if you are already a security tech, get that raise or advancement you are after.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 1 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

This course teaches the student advanced methods or steps that can be used to protect one's computer against malicious intrusion, either in the form of a hacking attempt or in the form of attacks by viruses. The course covers the following topics:

  • Terminology and types of hacker attacks taking place today
  • Password design and password strategies that can be used to protect you
  • Ways to protect your computer and its content through improved "privacy" settings
  • How to actually increase the Privacy Settings on your Windows 10 operating system
  • The difference between anti-hacking software and anti-virus software
  • The importance of anti-virus software
  • Best practices for using anti-virus software effectively

Once a student completes this course, he or she will have a much clearer understanding as to how intrusion attack attempts occur and how one can protect oneself against them.

BASIC KNOWLEDGE

A student should have a basic understanding of anti-virus software.

A student should know how to get to the "Settings" area of their computer's "Control Panel" to make changes.

WHAT YOU WILL LEARN

Through this course, you will learn how to:

  • Increase the security of your computer and better protect your data
  • Implement strategies to help protect against hackers, viruses, and other external threats
  • Know how to increase the privacy of your computer, your data and protect yourself while surfing the Internet

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 7 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman.

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

The course covers all the CompTIA CSA+ CS0-001 Objective Domains:

1.0 Threat Management: 27%

2.0 Vulnerability Management: 26%

3.0 Cyber Incident Response: 23%

4.0 Security Architecture and Tool Sets: 24%

Topics include:           

  • Threat and vulnerability management
  • Conducting an analyzing reconnaissance
  • Responding to network-based threats
  • Securing a corporate network
  • Cyber incident response
  • Determining the impact of incidents
  • Preparing the incident response toolkit

CSA+ provides substantial earnings potential

A career in information security analysis ranked seventh on U.S. News and World Report’s list of the 100 best technology jobs for 2017. According to the Bureau of Labor Statistics, the median pay for an information security analyst is $90,120 per year.

CSA+ certified skills are in-demand

Properly trained IT security staff who can analyze, monitor and protect cybersecurity resources are in high demand.  The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest growing overall job category, with 37 percent overall growth between 2012 and 2022.

Follow the CompTIA Cybersecurity Certification Pathway

IT Fundamentals > A+ > Network+ > Security+ > CSA+ > CASP

Who is the target audience?

This course is intended for anyone who is interested in a Cybersecurity position or looking to improve their security skills. The course will prepare you to pass the CompTIA CSA+ Certification Exam. It goes beyond certification and gives you the skills you need to be a better cybersecurity analyst.

BASIC KNOWLEDGE

  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites as the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+, Network+, and Security+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+, Network+, and Security+ Certification courses on Simpliv.

WHAT YOU WILL LEARN

  • This is a complete and comprehensive CompTIA CSA+ Certification (CS0-001) course. It is designed to prepare the student to be able to take and pass the Cybersecurity Analyst exam and become CompTIA CSA+ Certified.
  • Learn skills to break into a career in information security analysis, which ranks 7th in the 100 best tech jobs for 2017, and is predicted to be the fastest growing overall job category between 2012-2022. Cybersecurity Analysts earn a median pay of $90,120.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 16.38 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course, we cover end-point-protection, which is an extremely important and hot topic in cybersecurity right now!

Become a cybersecurity specialist - Go from a beginner to advance in this easy to follow the expert course. 

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. 

Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer. 

Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity. 

BASIC KNOWLEDGE

  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volumes 1, 2 and 3 of this complete course before watching this volume 4 although it is not required.
  • You can take this volume as a stand-alone course.
  • Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

WHAT YOU WILL LEARN

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Become a cyber security specialist
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 13.23 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence.

Covering all major platforms including Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.

Become a cybersecurity specialist. - Go from beginner to expert in this easy to follow the advanced course.

We cover in detail all the best anonymising and privacy methods. Including;

  • Tor
  • VPNs - Virtual Private Networks
  • Proxy servers - HTTP, HTTPS, SOCKs and Web
  • SSH Secure Shell
  • Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux
  • OPSEC - Operation Security
  • I2P - The Invisible Internet Project
  • JonDoNym
  • Off-site connections - Hotspots and Cafes
  • Mobile, Cell Phones & Cellular Networks
  • Bulletproof hosting 
  • and more....

For each of these anonymizing methods we analysis in detail their strengths and weaknesses, we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attacks.

Advanced anonymity: We explore chaining and nesting anonymizing services together to provide layers of obfuscation for maximum anonymity against even the most well-resourced adversaries.

We cover bypassing censors, firewalls, and proxies. Learn to bypass the trickiest of censoring devices including DPI (deep packet inspection).

The course covers both the theory and practical.  

This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity. 

BASIC KNOWLEDGE

  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volume 1 and 2 of this complete course before watching this volume (3) although it is not required.
  • Most items referenced in this course are free. But you may elect to purchase additional software, hardware, and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course.
  • Please note this is Volume 3 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

WHAT YOU WILL LEARN

  • An advanced practical skill-set in how to stay anonymous online, how to maintain privacy and how to bypass firewalls and proxies.
  • After this course, you will have a detailed understanding of how anonymity online might be achieved against various types of adversaries. From corporations to nation-state adversaries.
  • Become a cybersecurity specialist.
  • The very latest up-to-date information and methods.
  • You will learn how to apply effective OPSEC or operational security to maintain anonymity online. OPSEC is the actions and behaviours required to maintain security and anonymity.
  • We look at live operating systems, what they are, which are the best ones, and how they can be used for security, privacy, and anonymity.
  • You will gain a complete understanding of how to use virtual private networks (or VPNs) for security, privacy and to attempt anonymity. Everything from choosing a provider to preventing protocol leaks.
  • We fully explore the anonymising service and darknet known as Tor. What are its weaknesses and what you can do to mitigate those weaknesses to improve your anonymity and security when you are using Tor. Including exploring the use of virtual and hardware routers and gateways.
  • You will learn how proxies servers are used for privacy and hiding your IP address. You will understand the difference between the various types of proxies, what they are suitable for, and importantly learn about their many weaknesses.
  • We cover how to use the extremely versatile SSH protocol for optimal security, privacy, and anonymity. Covering local, remote and dynamic port forwarding. Authentication and hardening.
  • You will understand the i2p darknet and how to best use it with optimal configuration to protect your security and anonymity.
  • We look at other privacy and anonymizing services too such as JonDoNym, botnets, and bulletproof hosting services.
  • We cover in detail how censorship can be circumvented by learning how to bypass firewalls, proxies, deep packet inspection technology and nation state censorship.
  • Then we learn the more advanced methods of anonymization by exploring nesting and chaining anonymizing services together. You will understand their strengths, weaknesses and what each chaining method is suitable for.
  • You will understand how to use off-site connections such as Wi-Fi hotspots and Internet cafes for privacy and anonymity. How to use them securely and anonymously even against a well-resourced adversary with global influence.
  • We cover how to use cellular networks for privacy and anonymity. You will understand the inherent weaknesses of cellular networks and how to use them best for privacy and anonymity.
  • For each section, you will learn both the theory and how to step by step setup each method.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 12.25 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning .

You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services.

You will understand the various types of firewalls that are available and what threats each help mitigate.

Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios.

We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.

You will master network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network. Using tools like Wireshark, Tcpdump and Syslog.

We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online.

We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services.

Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens .

The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking.

This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.

BASIC KNOWLEDGE

  • This course is designed for personal and home cyber security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cyber security, privacy, and anonymity.
  • It is recommended that you watch volume 1 of this complete course before watching this volume (2) although it is not required.
  • You can take this volume as a stand-alone course.
  • You should have a basic understanding of networking concepts.
  • Please note this is volume 2 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

WHAT YOU WILL LEARN

  • An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
  • In this volume, we take a detailed look at network security.
  • The very latest up-to-date information and methods.
  • Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
  • You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios.
  • Learn to configure and architect a small network for maximum physical and wireless security.
  • Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog.
  • Understand how we are tracked online by corporations, nation-states your ISP and others.
  • We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.
  • Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.
  • What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 11 Hour
  • Time / Schedule: All days
  • IT Training » Cyber Security

Course Details

This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment.

We explore the Darknet and mind-set of the cyber criminal. Covering malware, exploit kits, phishing, zero day vulnerabilities and much more.

You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.

You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.

There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.

Master defences against phishing, SMShing, vishing, identity theft, scam, cons an other social engineering threats.

Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.

This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.

BASIC KNOWLEDGE

  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals , government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

WHAT YOU WILL LEARN

  • An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance.
  • The very latest up-to-date information and methods.
  • We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux.
  • Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
  • You will master encryption in an easy to follow crash course.
  • Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
  • You will learn about nation state secret tracking and hacking infrastructure.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 7 Hour
  • Time / Schedule: All days
  • IT Training » Machine Learning

Course Details

If you want to learn how to start building professional, career-boosting mobile apps and use Machine Learning to take things to the next level, then this course is for you. The Complete iOS Machine Learning Masterclass™ is the only course that you need for machine learning on iOS. Machine Learning is a fast-growing field that is revolutionizing many industries with tech giants like Google and IBM taking the lead. In this course, you’ll use the most cutting-edge iOS Machine Learning technology stacks to add a layer of intelligence and polish to your mobile apps. We’re approaching a new era where only apps and games that are considered “smart” will survive. (Remember how Blockbuster went bankrupt when Netflix became a giant?) Jump the curve and adopt this innovative approach; the Complete iOS Machine Learning Masterclass™ will introduce Machine Learning in a way that’s both fun and engaging.

In this course, you will:

  • Master the 3 fundamental branches of applied Machine Learning: Image & Video Processing, Text Analysis, and Speech & Language Recognition
  • Develop an intuitive sense for using Machine Learning in your iOS apps
  • Create 7 projects from scratch in practical code-along tutorials
  • Find pre-trained ML models and make them ready to use in your iOS apps
  • Create your own custom models
  • Add Image Recognition capability to your apps
  • Integrate Live Video Camera Stream Object Recognition to your apps
  • Add Siri Voice speaking feature to your apps
  • Dive deep into key frameworks such as coreML, Vision, CoreGraphics, and GamePlayKit.
  • Use Python, Keras, Caffee, Tensorflow, sci-kit learn, libsvm, Anaconda, and Spyder–even if you have zero experience
  • Get FREE unlimited hosting for one year
  • And more!

This course is also full of practical use cases and real-world challenges that allow you to practice what you’re learning. Are you tired of courses based on boring, over-used examples? Yes? Well then, you’re in a treat. We’ll tackle 5 real-world projects in this course so you can master topics such as image recognition, object recognition, and modifying existing trained ML models. You’ll also create an app that classifies flowers and another fun project inspired by Silicon Valley™ Jian Yang’s masterpiece: a Not-Hot Dog classifier app! 

Why Machine Learning on iOS

One of the hottest growing fields in technology today, Machine Learning is an excellent skill to boost your your career prospects and expand your professional tool kit. Many of Silicon Valley’s hottest companies are working to make Machine Learning an essential part of our daily lives. Self-driving cars are just around the corner with millions of miles of successful training. IBM’s Watson can diagnose patients more effectively than highly-trained physicians. AlphaGo, Google DeepMind’s computer, can beat the world master of the game Go, a game where it was thought only human intuition could excel.

In 2017, Apple has made Machine Learning available in iOS 11 so that anyone can build smart apps and games for iPhones, iPads, Apple Watches and Apple TVs. Nowadays, apps and games that do not have an ML layer will not be appealing to users. Whether you wish to change careers or create a second stream of income, Machine Learning is a highly lucrative skill that can give you an amazing sense of gratification when you can apply it to your mobile apps and games.

Why This Course Is Different

Machine Learning is very broad and complex; to navigate this maze, you need a clear and global vision of the field. Too many tutorials just bombard you with the theory, math, and coding. In this course, each section focuses on distinct use cases and real projects so that your learning experience is best structured for mastery.

This course brings my teaching experience and technical know-how to you. I’ve taught programming for over 10 years, and I’m also a veteran iOS developer with hands-on experience making top-ranked apps. For each project, we will write up the code line by line to create it from scratch. This way you can follow along and understand exactly what each line means and how to code comes together. Once you go through the hands-on coding exercises, you will see for yourself how much of a game-changing experience this course is.

As an educator, I also want you to succeed. I’ve put together a team of professionals to help you master the material. Whenever you ask a question, you will get a response from my team within 48 hours. No matter how complex your question, we will be there–because we feel a personal responsibility in being fully committed to our students.

By the end of the course, you will confidently understand the tools and techniques of Machine Learning for iOS on an instinctive level.

Don’t be the one to get left behind. Get started today and join millions of people taking part in the Machine Learning revolution.

topics: ios 11 swift 4 coreml vision deep learning machine learning neural networks python anaconda trained models keras tensorflow scikit learn core ml ios11 Swift4 scikitlearn artificial neural network ANN recurrent neural network RNN convolutional neural network CNN ocr character recognition face detection ios 11 swift 4 coreml vision deep learning machine learning neural networks python anaconda trained models keras tensorflow scikit learn core ml ios11 Swift4 scikitlearn artificial neural network ANN recurrent neural network RNN convolutional neural network CNN ocr character recognition face detection ios 11 swift 4 coreml vision deep learning machine learning neural networks python anaconda trained models keras tensorflow scikit learn core ml ios11 Swift4 scikitlearn artificial neural network ANN recurrent neural network RNN convolutional neural network CNN ocr character recognition face detection ios 11 swift 4 coreml vision deep learning machine learning neural networks python anaconda trained models keras tensorflow scikit learn core ml ios11 Swift4 scikitlearn artificial neural network ANN recurrent neural network RNN convolutional neural network CNN ocr character recognition face detection ios 11 swift 4 coreml vision deep learning machine learning neural networks python anaconda trained models keras tensorflow scikit learn core ml ios11 Swift4 scikitlearn artificial neural network ANN recurrent neural network RNN convolutional neural network CNN ocr character recognition face detection 

Who is the target audience?

  • People with a basic foundation in iOS programming who would like to discover Machine Learning, a branch of Artificial Intelligence
  • People who want to pursue a career combining app development and Machine Learning to become a hybrid iOS developer and ML expert
  • Developers who would like to apply their Machine Learning skills by creating practical mobile apps
  • Entrepreneurs who want to leverage the exponential technology of Machine Learning to create added value to their business could also take this course. However, this course does assume that you are familiar with basic programming concepts such as object oriented programming, variables, methods, classes, and conditional statements

BASIC KNOWLEDGE

  • Basic understanding of programming
  • Have access to a MAC computer or MACinCloud website

WHAT YOU WILL LEARN

  • Build smart iOS 11 & Swift 4 apps using Machine Learning
  • Use trained ML models in your apps
  • Convert ML models to iOS ready models
  • Create your own ML models
  • Apply Object Prediction on pictures, videos, speech and text
  • Discover when and how to apply a smart sense to your apps

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 9 Hour
  • Time / Schedule: All days
  • IT Training » R Programming

Course Details

Taught by a Stanford-educated, ex-Googler and an IIT, IIM - educated ex-Flipkart lead analyst. This team has decades of practical experience in quant trading, analytics and e-commerce. 

This course is a gentle yet thorough introduction to Data Science, Statistics and R using real life examples. 

Let’s parse that.

Gentle, yet thorough: This course does not require a prior quantitative or mathematics background. It starts by introducing basic concepts such as the mean, median etc and eventually covers all aspects of an analytics (or) data science career from analysing and preparing raw data to visualising your findings. 

Data Science, Statistics and R: This course is an introduction to Data Science and Statistics using the R programming language. It covers both the theoretical aspects of Statistical concepts and the practical implementation using R. 

Real life examples: Every concept is explained with the help of examples, case studies and source code in R wherever necessary. The examples cover a wide array of topics and range from A/B testing in an Internet company context to the Capital Asset Pricing Model in a quant finance context. 

What's Covered:

Data Analysis with R: Datatypes and Data structures in R, Vectors, Arrays, Matrices, Lists, Data Frames, Reading data from files, Aggregating, Sorting & Merging Data Frames

Linear Regression: Regression, Simple Linear Regression in Excel, Simple Linear Regression in R, Multiple Linear Regression in R, Categorical variables in regression, Robust regression, Parsing regression diagnostic plots

Data Visualization in R: Line plot, Scatter plot, Bar plot, Histogram, Scatterplot matrix, Heat map, Packages for Data Visualisation : Rcolorbrewer, ggplot2

Descriptive Statistics: Mean, Median, Mode, IQR, Standard Deviation, Frequency Distributions, Histograms, Boxplots

Inferential Statistics: Random Variables, Probability Distributions, Uniform Distribution, Normal Distribution, Sampling, Sampling Distribution, Hypothesis testing, Test statistic, Test of significance

Using discussion forums

Please use the discussion forums on this course to engage with other students and to help each other out. Unfortunately, much as we would like to, it is not possible for us at Loonycorn to respond to individual questions from students:-(

We're super small and self-funded with only 2 people developing technical video content. Our mission is to make high-quality courses available at super low prices.

The only way to keep our prices this low is to *NOT offer additional technical support over email or in-person*. The truth is, direct support is hugely expensive and just does not scale.

We understand that this is not ideal and that a lot of students might benefit from this additional support. Hiring resources for additional support would make our offering much more expensive, thus defeating our original purpose.

It is a hard trade-off.

Thank you for your patience and understanding!

Who is the target audience?

  • Yep! MBA graduates or business professionals who are looking to move to a heavily quantitative role
  • Yep! Engineers who want to understand basic statistics and lay a foundation for a career in Data Science
  • Yep! Analytics professionals who have mostly worked in Descriptive analytics and want to make the shift to being modelers or data scientists
  • Yep! Folks who've worked mostly with tools like Excel and want to learn how to use R for statistical analysis

BASIC KNOWLEDGE

  • No prerequisites : We start from basics and cover everything you need to know. We will be installing R and RStudio as part of the course and using it for most of the examples. Excel is used for one of the examples and basic knowledge of excel is assumed.

 

WHAT YOU WILL LEARN

  • Harness R and R packages to read, process and visualize data
  • Understand linear regression and use it confidently to build models
  • Understand the intricacies of all the different data structures in R
  • Use Linear regression in R to overcome the difficulties of LINEST() in Excel
  • Draw inferences from data and support them using tests of significance
  • Use descriptive statistics to perform a quick study of some data and present results

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 29 Hour
  • Time / Schedule: All days
  • IT Training » Big Data & Hadoop

Course Details

This course is a really comprehensive guide to the Google Cloud Platform - it has ~25 hours of content and ~60 demos.

The Google Cloud Platform is not currently the most popular cloud offering out there - that's AWS of course - but it is possibly the best cloud offering for high-end machine learning applications. That's because TensorFlow, the super-popular deep learning technology is also from Google.

What's Included:

  • Compute and Storage - AppEngine, Container Enginer (aka Kubernetes) and Compute Engine
  • Big Data and Managed Hadoop - Dataproc, Dataflow, BigTable, BigQuery, Pub/Sub 
  • TensorFlow on the Cloud - what neural networks and deep learning really are, how neurons work and how neural networks are trained.
  • DevOps stuff - StackDriver logging, monitoring, cloud deployment manager
  • Security - Identity and Access Management, Identity-Aware proxying, OAuth, API Keys, service accounts
  • Networking - Virtual Private Clouds, shared VPCs, Load balancing at the network, transport and HTTP layer; VPN, Cloud Interconnect and CDN Interconnect
  • Hadoop Foundations: A quick look at the open-source cousins (Hadoop, Spark, Pig, Hive and HBase)

Who is the target audience?

  • Yep! Anyone looking to use the Google Cloud Platform in their organizations
  • Yep! Anyone who is interesting in architecting computes, networking, loading balancing and other solutions using the GCP
  • Yep! Anyone who wants to deploy serverless analytics and big data solutions on the Google Cloud
  • Yep! Anyone looking to build TensorFlow models and deploy them on the cloud

BASIC KNOWLEDGE

  • Basic understanding of technology - superficial exposure to Hadoop is enough.

WHAT YOU WILL LEARN

  • Deploy Managed Hadoop apps on the Google Cloud
  • Build deep learning models on the cloud using TensorFlow
  • Make informed decisions about Containers, VMs and AppEngine
  • Use big data technologies such as BigTable, Dataflow, Apache Beam and Pub/Sub

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 14 Hour
  • Time / Schedule: All days
  • IT Training » Big Data & Hadoop

Course Details

Taught by a 4 person team including 2 Stanford-educated, ex-Googlers and 2 ex-Flipkart Lead Analysts. This team has decades of practical experience in working with Java and with billions of rows of data. 

This course is a zoom-in, zoom-out, hands-on workout involving Hadoop, MapReduce and the art of thinking parallel. 

Let’s parse that.

Zoom-in, Zoom-Out:  This course is both broad and deep. It covers the individual components of Hadoop in great detail, and also gives you a higher level picture of how they interact with each other. 

Hands-on workout involving Hadoop, MapReduce : This course will get you hands-on with Hadoop very early on.  You'll learn how to set up your own cluster using both VMs and the Cloud. All the major features of MapReduce are covered - including advanced topics like Total Sort and Secondary Sort. 

The art of thinking parallel: MapReduce completely changed the way people thought about processing Big Data. Breaking down any problem into parallelizable units is an art. The examples in this course will train you to "think parallel". 

What's Covered: Lot's of cool stuff ..

Using MapReduce to:

  • Recommend friends in a Social Networking site: Generate Top 10 friend recommendations using a Collaborative filtering algorithm. 
  • Build an Inverted Index for Search Engines: Use MapReduce to parallelize the humongous task of building an inverted index for a search engine. 
  • Generate Bigrams from text: Generate bigrams and compute their frequency distribution in a corpus of text. 

Build your Hadoop cluster: 

  • Install Hadoop in Standalone, Pseudo-Distributed and Fully Distributed modes 
  • Set up a hadoop cluster using Linux VMs.
  • Set up a cloud Hadoop cluster on AWS with Cloudera Manager.
  • Understand HDFS, MapReduce and YARN and their interaction 

Customize your MapReduce Jobs: 

  • Chain multiple MR jobs together
  • Write your own Customized Partitioner
  • Total Sort : Globally sort a large amount of data by sampling input files
  • Secondary sorting 
  • Unit tests with MR Unit
  • Integrate with Python using the Hadoop Streaming API

.. and of course all the basics: 

  • MapReduce : Mapper, Reducer, Sort/Merge, Partitioning, Shuffle and Sort
  • HDFS & YARN: Namenode, Datanode, Resource manager, Node manager, the anatomy of a MapReduce application, YARN Scheduling, Configuring HDFS and YARN to performance tune your cluster. 

Using discussion forums

Please use the discussion forums on this course to engage with other students and to help each other out. Unfortunately, much as we would like to, it is not possible for us at Loonycorn to respond to individual questions from students:-(

We're super small and self-funded with only 2 people developing technical video content. Our mission is to make high-quality courses available at super low prices.

The only way to keep our prices this low is to *NOT offer additional technical support over email or in-person*. The truth is, direct support is hugely expensive and just does not scale.

We understand that this is not ideal and that a lot of students might benefit from this additional support. Hiring resources for additional support would make our offering much more expensive, thus defeating our original purpose.

It is a hard trade-off.

Thank you for your patience and understanding!

Who is the target audience?

  • Yep! Analysts who want to leverage the power of HDFS where traditional databases don't cut it anymore
  • Yep! Engineers who want to develop complex distributed computing applications to process lot's of data
  • Yep! Data Scientists who want to add MapReduce to their bag of tricks for processing data

BASIC KNOWLEDGE

  • You'll need an IDE where you can write Java code or open the source code that's shared. IntelliJ and Eclipse are both great options.
  • You'll need some background in Object-Oriented Programming, preferably in Java. All the source code is in Java and we dive right in without going into Objects, Classes etc
  • A bit of exposure to Linux/Unix shells would be helpful, but it won't be a blocker

WHAT YOU WILL LEARN

  • Develop advanced MapReduce applications to process BigData
  • Master the art of "thinking parallel" - how to break up a task into Map/Reduce transformations
  • Self-sufficiently set up their own mini-Hadoop cluster whether it's a single node, a physical cluster or in the cloud.
  • Use Hadoop + MapReduce to solve a wide variety of problems : from NLP to Inverted Indices to Recommendations
  • Understand HDFS, MapReduce and YARN and how they interact with each other
  • Understand the basics of performance tuning and managing your own cluster

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 5 Hour
  • Time / Schedule: All days
  • IT Training » Hardware Training

Course Details

Prerequisites: Working with HBase requires knowledge of Java

Record and run settings a team which includes 2 Stanford-educated, ex-Googlers and 2 ex-Flipkart Lead Analysts. This team has decades of practical experience in working with large-scale data processing jobs. 

Relational Databases are so stuffy and old! Welcome to HBase - a database solution for a new age. 

HBase: Do you feel like your relational database is not giving you the flexibility you need anymore? Column-oriented storage, no fixed schema and low latency make HBase a great choice for the dynamically changing needs of your applications. 

What's Covered: 

25 solved examples covering all aspects of working with data in HBase

CRUD operations in the shell and with the Java API, Filters, Counters, MapReduce 

Implement your own notification service for a social network using HBase

HBase and it’s role in the Hadoop ecosystem, HBase architecture and what makes HBase different from RDBMS and other Hadoop technologies like Hive. 

Using discussion forums

Please use the discussion forums on this course to engage with other students and to help each other out. Unfortunately, much as we would like to, it is not possible for us at Loonycorn to respond to individual questions from students.

We're super small and self-funded with only 2 people developing technical video content. Our mission is to make high-quality courses available at super low prices.

The only way to keep our prices this low is to *NOT offer additional technical support over email or in-person*. The truth is, direct support is hugely expensive and just does not scale.

We understand that this is not ideal and that a lot of students might benefit from this additional support. Hiring resources for additional support would make our offering much more expensive, thus defeating our original purpose.

It is a hard trade-off.

Thank you for your patience and understanding!

Who is the target audience?

  • Yep! Anyone who is interested in understanding HBase, NoSQL and distributed database management
  • Yep! Engineers who want to move away from RDBMS and use HBase for their database solution
  • Yep! Folks who are using Hadoop ecosystem tools for analytical processing and want a single system for both OLAP and OLTP

BASIC KNOWLEDGE

  • You'll need to have an IDE where you can run Java code, IntelliJ IDEA and Eclipse are both good options
  • You'll need to have some experience with Java programming

WHAT YOU WILL LEARN

  • Set up a database for your application using HBase
  • Integrate HBase with MapReduce for data processing tasks
  • Create tables, insert, read and delete data from HBase
  • Get an all-round understanding of HBase and it's role in the Hadoop ecosystem

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 5:25 Hour
  • Time / Schedule: All days
  • IT Training » Python

Course Details

Few programming languages provide you with the flexibility and pure power of Python.

If you're becoming a professional developer, or are early in your development career, adding the Python skill set isn't just a resume embellishment-- It's an empowering language that will allow you to write procedural code in many types of environments and for many uses.

Python is commonly used for server side programming for complex web applications or as a middle tier language providing web services or a communication layer with larger ecommerce systems. That being said, it's also a great language for beginners. The clear syntax makes it very easy to learn, and the powerful libraries make all types of programming possible. There are libraries for everything from games and graphics to complex mathematics to network and embedded programming.

Watch, Learn and Do

Programming is not a spectator sport and if you want to learn Python well, this course contains everything you need.

Skill oriented instructor-led lectures will demonstrate each important Python skill. You'll be able to study and modify the code on your own to cement each topic. Python code coding lab exercises will familiarize you not just with Python syntax, but how real problem-solving in Python is done. You'll complete a more comprehensive project to help you integrate the different skills that are part of core Python.

Who is the target audience?

  • First time Python programmers
  • Students and Teachers
  • IT pros who want to learn to code
  • Aspiring data scientists who want to add Python to their tool arsenal

BASIC KNOWLEDGE

  • Students should be comfortable working in the PC or Mac operating system

WHAT YOU WILL LEARN

  • How to use the Python Shell
  • How to use interactive mode in Python
  • How to develop and run programs in the IDLE editor
  • How to run Python scripts directly from the command line
  • How to use the print() function
  • How to use separators and new line characters to modify command line output
  • Assign variables of different types
  • Understand integer, floating point, complex and string variables
  • Be able to extract substrings
  • Easily concatenate strings
  • Create Lists and Tuples
  • Create key value pairs and store them in dictionaries
  • Understand mathematical operators used in Python
  • Apply the order of operations to mathematical operations
  • Utilize comparison operators to determine logical outcomes
  • Use logical operators to join comparisons
  • Write conditional statements to correctly branch code
  • Use If, else and else if statements to apply branching
  • Understand how and when to used nested if statements
  • Use the shortcut Ternary operator
  • Be able to use looping structures effectively
  • Create While loops
  • Be able to use For loops to loop through an objects properties
  • Be able to construct nested loops and understand their utility.
  • Cast variables from one type to another using built-in Python functions
  • Use the Mathematical functions within Python to evaluate expressions
  • Randomize numbers and selections with the Randomization tools
  • Use Python String functions such as find(), join() and split()
  • Create immutable tuples
  • Access values within tuples
  • Use tuple functions to manipulate tuple data
  • Declare a dictionary and populate it with key/value pairs
  • Access and edit values within dictionaries
  • Extract date and time information from the time tuple
  • Use the calendar object to work with calendar related information
  • Create custom functions
  • Send arguments to functions using order or keyword
  • Create default function arguments
  • Read and obtain keyboard input
  • Read from a text file and process the data in Python
  • Write to a text file from Python
  • Append to a text file
  • Handle exceptions with try/except/else in Python
  • Use Python within the cgi-bin or a web server
  • Process form data from Python

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Area: Usa
  • Course Fees: AED44
  • Duration: 5 Hour
  • Time / Schedule: All days
  • IT Training » Programming Technology

Course Details

Image Processing Applications on Raspberry Pi is a beginner course on the newly launched Raspberry Pi 3 and is fully compatible with Raspberry Pi 2 and Raspberry Pi Zero.

The course is ideal for those who are new to the Raspberry Pi and want to explore more about it.

You will learn the components of Raspberry Pi, connecting components to Raspberry Pi, installation of NOOBS operating system, basic Linux commands, Python programming and building Image Processing applications on Raspberry Pi.

This course will take beginners without any coding skills to a level where they can write their own programs.

Basics of Python programming language are well covered in the course.

Building Image Processing applications are taught in the simplest manner which is easy to understand.

Users can quickly learn hardware assembly and coding in Python programming for building Image Processing applications. By the end of this course, users will have enough knowledge about Raspberry Pi, its components, basic Python programming, and execution of Image Processing applications in the real time scenario.

The course is taught by an expert team of Electronics and Computer Science engineers, having PhD and Postdoctoral research experience in Image Processing. 

Anyone can take this course. No engineering knowledge is expected. Tutor has explained all required engineering concepts in the simplest manner.

The course will enable you to independently build Image Processing applications using Raspberry Pi.

This course is the easiest way to learn and become familiar with the Raspberry Pi platform.

By the end of this course, users will build Image Processing applications which includes scaling and flipping images, varying brightness of images, perform bit-wise operations on images, blurring and sharpening images, thresholding, erosion and dilation, edge detection, image segmentation. User will also be able to build real-world Image Processing applications which includes real-time human face eyes nose detection, detecting cars in video, real-time object detection, human face recognition and many more. 

The course provides complete code for all Image Processing applications which are compatible on Raspberry Pi 3/2/Zero.

Who is the target audience?

  • Anyone who wants to explore Raspberry Pi and interested in building Image Processing applications

BASIC KNOWLEDGE

  • Only High School Maths
  • No prior programming knowledge is expected
  • All the code files and images used in this course will be provided
  • Hardware needed: Raspberry Pi 3/2/Zero, Monitor, Mouse, Keyboard, HDMI-VGA connector, USB flash drive (minimum storage capacity 2 GB), Micro SD card (minimum storage capacity 8 GB), Micro SD card reader, Power adapter (2 Amp, Micro-USB charger is preferred), USB Webcam (minimum 5 Megapixel resolution)

WHAT YOU WILL LEARN

  • What is Raspberry Pi? and what are its components?
  • Understand peripherals that need to be connected to Raspberry Pi
  • Wire up your Raspberry Pi to create a fully functional computer
  • Easily learn preparing SD Card to load Operating System for Raspberry Pi
  • Install packages needed to build Image Processing applications
  • Learn basic programming aspects of Python
  • Create simple Image Processing applications using Python and OpenCV
  • Build real-world Image Processing applications on Raspberry Pi

Get More Info


  • Tenderroots
  • Tenderroots
Top