IT Training Classes in Dubai

Finding home tutors in Dubai and in other cities in UAE is now easy with MyPrivateTutor. We also help you find tuition classes and coaching centers in Dubai as well as online tutors. Home tuition helps to get higher marks and increase confidence. Use our portal to find the best local tutors, tutorial centers and tuition classes in Dubai.


Home» Course in dubai » IT Training Courses in Dubai
Show Per pages
1 to 25 of 1664 Courses
Classroom
  • Not Rated yet
  • Be First to Review

  • Location: Al barsha
  • Course Fees: Ask Now
  • Duration: 15 Hour
  • Time / Schedule: Sun,Tue,Thu 9pm to 9pm
  • IT Training » MS Office

Course Details

CyberModo has trained many individuals and corporate levels and we are proud for share of contribution we made in the lives of those who we have trained. 

Our Ms-office training program includes word, Excel, PowerPoint and Internet. 

We can assure you of the quality training and all the studies material will be provided to you. Flexible days and time are available on Weekend and Weekdays between 9am to 9pm. 

If you have any further queries, please do not hesitate to call or come down to our institute to discuss more in details with our senior consultant, we will be more than happy to provide you our quick assistance.

Kindly visit our website www.cybermodo.com for IT and www.cybermodo.netfor Management for more details and you can also chat live with our online professionals to help you choose the right course for you. 

We appreciate your course inquiry with CyberModo Solutions - Professional Training Center and look forward to providing you with our Professional Training Services.

To protect your investment - we have a course retake guarantee... so there is absolutely no risk to you.

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Location: Al barsha
  • Course Fees: AED1000
  • Duration: 12 Hour
  • Time / Schedule: Flexible
  • IT Training » MS Office

Course Details

Microsoft Word Advanced

1.    Explore More Text Techniques

  • Adding hyperlinks
  • Inserting fields
  • Adding Bookmarks and Cross References

2.    Use Reference Tools for Longer Documents

  • Adding Footnotes and End notes
  • Creating and Modifying Table of contents
  • Table of figures
  • Table of Authorities
  • Creating and modifying indexes
  • Adding Sources and compiling bibliographies
  • Creating Master Documents

3.    Work with Mail Merge

  • Understanding Mail Merge
  • Preparing Data Sources
  • Using an Outlook Contact List as a Data Source
  • Preparing Main Documents
  • Merging Main Documents and Data Sources
  • Printing Envelopes
  • Sending Personalized Emails to Multiple Recipients
  • Creating and Printing Labels

4.    Collaborate on Documents

  • Co-authoring Documents
  • Sending Documents Directly from Word
  • Adding and Reviewing Comments
  • Tracking and Managing Documents Changes
  • Comparing and Merging Document Changes
  • Password-Protecting Documents
  • Restricting Who Can Do What to Documents
  • Controlling Changes

5.    Working in Word More Efficiently

  • Working with Styles and Templates
  • Default Program Options
  • Customizing the Ribbon
  • Customizing the Quick Access Toolbar
  • Macros in Word
  • Enabling Macros
  • Recording a New Macro o Running a Macro

o Copying a Macro from one Document to another

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Location: Al barsha
  • Course Fees: AED700
  • Duration: 12 Hour
  • Time / Schedule: Flexible
  • IT Training » MS Office

Course Details

Microsoft Word Intermediate

1.    Creating Diagrams

  • Creating and Positioning a diagram
  • Using the text pane
  • Inserting shapes into a diagram
  • Promoting and Demoting shapes in diagram
  • Change a diagram’s layout, colours and shapes
  • Use picture diagrams to show photographs

2.    Insert and Modify Charts

  • Insert a chart into a document
  • Customize a chart, and save it as template
  • Plot Excel data in a chart
  • Formatting a chart
  • Changing chart types
  • Adding axis titles and labels

3.    Use other Visual Elements

  • Adding text and graphic watermarks
  • Insert a symbol
  • Building an equation and add it to the equation gallery
  • Draw and manipulate shapes
  • Insert a screen clipping

4.    Organize and Arrange Content

  • Reorganize a document but adjusting its outline
  • Arranging multiple pictures
  • Insert and format nested tables

5.    Creating Documents For Use Outside of Word

  • Save files in different formats
  • Creating and modifying web documents
  • Create and publish blog posts

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Location: Al barsha
  • Course Fees: AED700
  • Duration: 12 Hour
  • Time / Schedule: Flexible
  • IT Training » MS Office

Course Details

1.    Explore Word

  • Working in the user interface
  • Creating, editing text and saving documents

o Creating a new blank document o Entering text

o Saving the document o Saving into a new folder

o  Compatibility with older versions

  • Opening, Moving around in and closing Documents
  • Viewing documents in different ways
  • Switching between different views o Displaying non-printing characters o Zooming in the document

o  Switching between different word

documents

o Arranging windows of open documents o Displaying rulers in document window

  • Accessing help feature

2.    Editing and Proofread Text

  • Making text changes o Selecting text o Deleting text o Drag and drop

o Cut, Copy and Paste o Paste Options

o  Undo and redo

  • Office clipboard
  • Find and replace text
    • Using find and replace
    • Navigation pane
  • Fine-tuning text
    • Thesaurus
    • Mini-translator
  • Correcting spelling and grammatical errors
    • Spell check
    • Auto Correct
  • Viewing document statistics
  • Inserting saved text
    • Building Blocks
    • Create a new building block
  • Inserting one document into another

3.    Changing the Look of Text

  • Quickly formatting text o Paragraph styles o Character Styles
  • Changing a documents theme
    • Switching between different themes
    • Saving a new theme
  • Manually changing the look of characters
    • Changing font, font size and font colour
    • Bold, Italic and Underline
    • Using the Mini Toolbar
    • Format Painter
    • Font dialog box
    • Highlight text
    • Clear Formatting
  • Manually changing the look of paragraphs
    • Indenting
    • First Line and hanging indents
    • Paragraph alignment
    • Setting up Tabs
    • Adjusting line spacing
    • Paragraph spacing
    • Borders and Shading
  • Character formatting and case considerations
  • Find and replace formatting
  • Creating and modifying lists
    • Bullets and Numbering
  • Customizing bullets and numbering o Sorting lists
  • Formatting text as you type

4.    Organizing Information in Columns and Tables

  • Presenting information in columns o Inserting columns

o Justify paragraphs o Column options

  • Creating tabbed lists
  • Presenting info in tables
  • Inserting a table
  • Inserting and deleting columns and rows o Resizing columns

o  Merge cells

o  Table alignment

o  Converting text to table

  • Performing calculations in tables
  • Other layout options
  • Formatting tables
  • Table style
    • Manual formatting

Add Simple Graphic Elements

  • Inserting and modifying pictures o Insert Picture

o  Resize and crop a picture

o Picture corrections and picture styles o Artistic effects

  • About ClipArt
  • Changing a document background
  • Inserting Building Blocks
  • Inserting a Cover page o Inserting Page Numbers o Headers and Footers
  • Drawing text boxes
  • Adding Word Art
  • Insert Word Art into the document o Wrap text around Word Art
  • Formatting the first letter of a paragraph

6.    Preview, Print and Distribute Documents

  • Previewing and adjusting page layout
    • Adjusting Page size and orientation
    • Setting up margins
  • Controlling what happens on each page
    • Page breaks
    • Section breaks
  • Printing documents
  • Preparing documents for electronic distribution
    • Document properties
  • Document inspector
  • Marking a document as final

Get More Info


Classroom
  • Not Rated yet
  • Be First to Review

  • Location: Al barsha
  • Course Fees: AED1000
  • Duration: 12 Hour
  • Time / Schedule: Flexible
  • IT Training » MS Office

Course Details

1.    Add tables

  • Inserting tables
  • Formatting tables
  • Inserting and updating excel worksheets

2.    Fine Tune Visual Elements

  • Editing pictures
  • Customizing Diagrams
  • Formatting Charts
  • Arranging Graphics
  • Alt Text

3.    Add Other Enhancements

  • Adding WordArt Text
  • Inserting Symbols and Equations
  • Insert Screen Clipping
  • Creating Hyperlinks
  • Attaching the same hyperlink to every slide
  • Attaching actions to text or objects

4.    Add Animation

  • Using Ready Made Animation
  • Customizing animation effects

5.    Add Sound and Movies

  • Inserting and playing Sounds
  • Inserting and playing Videos
  • Inserting videos from web sites

6.    Share and Review Presentations

  • Collaborating with other people
  • Broadcasting presentations
  • Saving presentations in other formats
  • Sending presentations directly from PowerPoint
  • Password Protecting Presentations
  • Adding and Reviewing Comments
  • Merging presentations versions

7.    Create custom Presentation elements

  • Creating theme colours and fonts
  • Viewing and changing slide masters
  • Creating slide layouts
  • Saving custom design templates

8.    Prepare for Delivery

  • Adapting presentations for different audiences
  • Rehearsing presentations
  • Recording presentations
  • Preparing presentations for travel
  • Saving presentations as videos

9.    Customize PowerPoint

  • Change default program options
  • Customizing the ribbon
  • Customizing the Quick Access Toolbar

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 9 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Ethical Hacking

Course Details

About this Course

In this Online Ethical Hacking Course you will learn from beginners to advanced level. You will start to learn from setting up lab so you can prepare your penetration testing lab at your home or office to practice and perform ethical hacking. First , you will learn how to install operating systems into virtualization like VMware.

In this course you will learn to perform Ethical Hacking or penetration testing step by step. You will learn to setup and configure hacking tools in your lab and then usage of it to perform most powerful attacks of hacking. In this course you will learn about penetration testing so instructor will demonstrate how you can perform hacking attack on your own devices in your computer network safely to find vulnerabilities of it and secure them.

This penetration testing course will brief you about computer network also. If you are already working as IT professional or System and network admin in IT industry, this course will help you a lot to secure computer computer network, operate computer network systems, designed computer network systems , monitor computer network systems.

This course will give you more confidence to work as ethical hacker or penetration tester in the live production environment.

This course is designed in a way you will learn from basic to advanced level.

In this course you will learn about most powerful hacking attacks like system hacking , password cracking , web server hacking , scanning networks , sniffing , DDos , web server hacking , web app hacking , enumeration , virus , Trojan , buffer overflow , SQL injection , firewall , ids , IPS , cryptography , wireless , session hijacking , mobile platform hacking , social engineering , Steganography , etc.

In this security course every attack performed in my own lab. This penetration testing course mainly focusing on practicals. This course will teach you step by step practicals that how you can penetrate your own computer networks and defend it from hacker's attack. This online penetration testing course will give you complete white hats skills.

This course is divided in phases like foot printing , scanning , gaining Access , maintaining and covering track.

We tried to make every practicals to be easy to understand however we are giving support to solve queries of students.

This ethical hacking course is designed for educational purpose only. We does not motivate anyone to launch attacks on internet or to your company's environment to damage other. We gives a tips and tricks that how attackers attack on network and how we can defend it by attacking on our own networks and devices. We use our own computer network systems to perform Ethical hacking that we have full permission to launch attack.

Basic knowledge

  • Basic Computer IT Skills
  • Computer With 4GB Of Ram Atleast (8GB Recommended)
  • Operating Systems - Windows , Linux , Kali Linux (We will teach you how you can install it)
  • Computer Network Knowledge Will Be Advantage

What you will learn

  • What is virtualization?
  • Ethical Hacking terms and ethics
  • Phases of hacking
  • Attack categories and vectors
  • Concepts of footprinting
  • Search engine tools
  • Hacking using google tool
  • Website recon tools
  • Metagoofil tool
  • Email headers and footprinting
  • DNS tool
  • WHOIS
  • Network scanning overview and methodology
  • Port discovery
  • Network scanning tools
  • Stealth idle scanning
  • OS and application fingerprinting
  • Vulnerability scanning
  • Network mapping tools
  • Proxy servers
  • Enumeration concepts
  • Netbios enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration
  • SMTP enumeration
  • System Hacking concepts
  • Password cracking
  • Sniffing ( Man in the middle attack)
  • Rainbow crack
  • Password reset
  • DHCP starvation
  • Remote Access method
  • Spyware
  • NTFS alternate data stream exploit
  • Steganography
  • Covering track
  • Malware overview , malware analysis,
  • Trojan concepts , creating trojan
  • Virus
  • Switching security concepts and attack
  • DHCP snooping
  • ARP inspection
  • Social engineering
  • Denial of service attack
  • Session Hijacking
  • Hacking Web Servers
  • Buffer overflow
  • OWASP
  • SQL injection
  • Web app vulnerabilities
  • Wireless hacking concepts
  • Mobile Hacking
  • Firewall
  • IDS and IPS
  • Honeypots
  • Encryption concepts

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 8 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Cyber Security

Course Details

About this Course

** First 30 free registrations with the code: CIBERSEGURIDADENLINEA

Course with coverage in multiple areas of Cybersecurity such as: Fundamentals and principles, Risk management, Access control, Identity management, Network and perimeter security, Internet security, Malware, Threats and attacks, etc. (Threat, risk, vulnerability, authentication, AAA, IdM, threats, attacks, malware, virus, firewall, IPS, IDS, UTM, HTTPS, etc). Workshops and practical laboratories.   

Cybersecurity is one of the fields with the greatest growth and demand in the information technology (IT) industry. According [email protected] Systems , it is estimated that by the year 2019 there will be a deficit of about 2 million cybersecurity professionals worldwide, due to the lack of trained personnel to meet the expected high demand in the area.

Basic knowledge

  • Coverage in multiple areas of cybersecurity, technologies, malware, attacks, network seg, trends and solutions, etc.

What you will learn

  • Training in multiple areas of cybersecurity
  • Threats, attacks, malware and viruses
  • Network security and perimeter security, web security
  • Fundamentals and principles of security, risk management
  • Access control and identity management
  • Firewall, IPS, IDS, UTM, Proxy, AAA, Risk, Vulnerability, Malware, Virus, Security Triad, HTTPS
  • Workshops and practical laboratories

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 1 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Ethical Hacking

Course Details

About this Course

Learn How to Use MicroController in Real World Hacking Scenario

If you remember the scene from Mission Impossible 4 at Burj Khalifa in which Benji ask agent Ethan Hunt that they can not hack burj khalifa server room from inside. The only way to reach the server room is by climbing over the walls of the Burj and placing some hardwarethat contains malware and inserting it to the server. We going to see how we can create that hardware.

In this Course I’m going to show you how we can use tiny 1$ micro controller to hack any PC on your local network as well as anywhere in the world using public IP.

This Microcontroller is called DigiSpark. It is a microcontroller based on Attiny85 development board. It is similar to Arduino but smaller and more powerful in terms of hacking.

Basic knowledge

  • Basic Knowledge of Hacking done some Beginner Hacking Course
  • Knowledge of Basic Linux Commands 
  • Knowledge of Kali Linux 
  • Basic Knowledge of MetaSploit 
  • Basic Knowledge of Payload

What you will learn

  • What is DigiSpark
  • DigiSpark Programming
  • How DigiSpark can be used in Hacking
  • Hacking Windows 10 and Windows 7 Based System using DigiSpark
  • Port Forwarding
  • WAN Attack (Attack on Different Public IP's)

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 3 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

Cyber threats are one of the most clear and present danger looming over organisation in the current digital world. Cyber security is an area where technology, people, process and control work together hand-in-gloves to thwart any information leak and hence saving organisation from financial and reputational loss. Information security is fundamental to cyber security as it prepares the organisation to defend the breach of information assets. Any organisation’s cyber security programs is a combination of security of IT and telecom infrastructure, application, data and people. This is the data, also called as Information, that is vital for organisation’s survival. Hence, Information security management is of fundamental importance in any cyber security initiative adopted my organisations. 

In the new age of digital economy, organisations are struggling to protect their digital asset also called as Information. The Information security management system a.k.a ISMS is one of the framework for organisations to adopt to become proactive to the internal as well as external threat to information security. The risk of information security breach is far-fetched than the old days phenomenon. These RISKs are not only monetary but also brand image, collapse of a business, property damage etc.

The five axes of digital technology viz. Social, Mobility, Analytics, Cloud and Internet of Everything(IOE) are disrupting the conventional method of doing business. Not adopting these technologies is questioning the basic survivability of organisation. As these technologies are getting adopted, the threat surface for information security breach has multiplied many folds. However, only technology does not lead to a super cyber defense mechanism. As high as, 90% of the information security breach has been attributed to employee or partners and their awareness of information security.

Hence, a good information security management system does not have technology as the only facet, but it has people, process, policy and guidelines as the governing principles with ever evolving strategy tuned to the emerging threat vectors in cyber world.

As a matter of fact, a new employee is required to sign information security non-disclosure and compliance document when they join an organisation. But is that effective? Do organisations see the informal chit-chat among employee a threat? Why can’t they create a work culture where information security become a habit of employees like the personal and family security engrained in their habits.

This course is all about understanding the components of information security management systems. It will bring clarity to technical person about the importance of people, process, policy and controls that governs the information security management in an organisation. This is a must course for all seeking a corporate career and being a good corporate citizen. Also, this is the first step for seeking a career in information security management with a gradual rise to the top position in Information security domain in corporate also called as Chief Information Security Officer(CISO).

This course dissects the information security myth from enterprise architect's point of view with the course name titled ‘Constructs of Information Security Management System’. It systematically builds from information to information security to all elements of ISMS starting with fundamental of information characteristics also called as Confidentiality, Integrity, Availability(CIA). As you know information security is the major building block toward a step toward cyber security, learning ISMS basics is a must for all. 

As a bonus lecture, three lectures has been add for the professionals who wants to understand the Enterprise Security Architecture from a technology deployment perspective. This will help the working professional to decide which all technology elements to be implemented in order to secure the enterprise information and be ready to response to a cyber attack. The Chief Enterprise Security Officer (CISO) will have a refresher on technology elements.

Basic knowledge

  • The course requires students to know a brief about digital world like PC, internet and an appreciation of 'Business'.The students should have basic idea of hacking and impacts on organisation. You should appreciate the management aspect of cyber security

What you will learn

  • At the end of course, Students will start believing in policy, process and control aspects of information security management system and they will change their attitude toward cyber security casual to serious. An employed or aspiring to be employed person will change their attitude and will appreciate organisation's information security policy.The students will be able to clearly understand the Confidentiality, Availability and Integrity aspect of Information asset.The information security professions will clearly understand the meaning of Vulnerability, RISK, Policy, Process, Control, guidelines with ample example. Know the Information security standards and frameworks.This course will guide in implementing all elements of Information security management system.The existing cyber security professional will be able to understand and implement enterprise security architecture elements with context to business.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 6 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Networking

Course Details

About this Course

The course contains lectures pertaining to all subjects so that you may pass the Cisco CCNA 200-125 exam. 

Through lectures, students will undergo the process of learning through practice labs and will be able to perform the configuration to real routers and switches with IT professional.

The course will give the good grasp to students with the understanding of core networking concepts such as configuration of routers, switches along with their usage. The course is specifically crafted according to the new syllabus on the Cisco's Official website in order to make you familiarize with the exam topics. 

In Network Fundamentals Section, students will learn about the OSI, TCP/IP models and Protocols, infrastructure components, effects cloud resources in enterprise network architecture, collapsed core tier, three-tier architecture, networking topologies, cabling types, troubleshooting methods, IPv4 addressing, configuration and subnetting along with IPv4 address types, IPv6 addressing and configuration, IPv6 Auto configuration, IPv6 Address Types.

In Lan Switching Technologies Section, students will learn about switching concepts, troubleshooting of cable and interface issues, configuration of VLAN, DTP, VTP, 802.1Q, Native VLAN, PVST+, RPVST+, STP root bridge selection process, PortFast, BPDU guard, CDP, LLDP, and EtherChannel.

In Routing Technologies Section, students will learn about the routing concepts, routing table components, Inter-VLAN routing, IPv4 Static Routing, IPv6 Static routing, OSPFv2, OSPFv3, EIGRP for IPv4, EIGRP for IPv6, and RIPv2.

NOTE: Any simulation software or application is not included, you are required to download and install and configure the Packet Tracer, GNS3 or BOSON to run the labs for practice. For better understanding and Hands-On experience, students are required to create and configure each and every lab from scratch. Secondly, .PKT files are not uploadable on Simpliv. If you have any query, feel free to ask me through Q&A.

It is strongly suggested that you should use Sybex book by Todd Lammle - CCNA 200-120 with this course.

Basic knowledge

  • You should have very basic understanding of networking
  • All student who enrolled are required to have the simulators i.e. BOSON, GNS3, Cisco Pakcet Tracer etc
  • It is recommended that you should also study CCNA 200-120 Guide Book
  • You should be motivated enough to keep yourself on track

What you will learn

  • They will be able to understand the Associate Level networking concepts
  • They will get better understanding of networking fundamentals
  • They will be able to get enrollment in other CCNA Tracks i.e. Wireless, Security, CyberOps
  • They will be able to get enrollment in CCNP certifications

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 2 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course the viewer will learn step by step Implementation of DMVPN using multiple phases, in this lecture the author will demonstrate the implementation of DMVPN and configuration of DMVPN required for successful connectivity between remote sites. The process of achieving DMVPN using Phase I,II - static and Dynamic tunnels , Phase III using Dynamic Tunnel with IGP routing protocol is included.

The author will design the Topology and complete the configuration step by step.

Basic knowledge

  • CCNA, GNS simulator, Cisco Routers 1800, 1900, 2800

What you will learn

  • The students will learn how to implement DMVPN between Remote offices

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 2 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course the author explains the facts needed to design and implement route redistribution between different networks running different routing protocols. The author shows different topologies and does step by step configuration and applies route redistribution.

The skill to know how to do route redistribution is very essential for any network engineer at any level, this skill helps the student know how to integrate networks during business acquisitions.

Basic knowledge

  • CCENT, CCNA, Cisco routers 1800, 2600, GNS OR VIRL simulator

What you will learn

  • The students will learn how to redistribute routes from one network to another network

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 4 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course the author introduces Border Gateway Protocol -BGP , its concepts and clarifies the concepts using practical scenarios with topology configuration. The author shows step by step configuration to implement BGP and complete the configuration during the lesson. The course is very important to anyone who wants to master BGP concept and also get the practical experience that the author has shared in his designs.

Basic knowledge

  • CCNA, Cisco Routers 1800, 2600, 2900, VIRL Or GNS simulator

What you will learn

  • Student will learn how to manage and administer BGP in the real world

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 1 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course the student will learn important skill of how to filter unwanted routes from the routing tables. This skill will also help the student to keep the routing tables clean in an organization, thus keeping the network safe from malicious injected networks.

          Follow the author as he goes through the steps below

           1. Building Topology to simulate a routing map.

          2. Four cases are created that will show step by step filtering of the routes using Prefix-lists.

Basic knowledge

  • CCNA, Cisco Routers 1800, 1900, 2900, GNS AND VIRL SIMULATOR

What you will learn

  • The student will learn how to build the topology and filter unwanted networks from the routing tables from the core routers

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 1 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

The correct TCP data handling solution using C++

In C/C++, socket programming is one of the most challenging subjects to every developer. Not only the theory of the socket is quite tricky, and there are a lot of things to learn, but we also need much experience and guidance in various cases.

To parse and handle TCP data is that very case. We can recognize the necessity and make sure the solution is correct, only by experience.

With my 16 yrs experience in developing financial trading platforms with Visual C++, I'm sure that you need to learn and utilize this lecture.

Basic knowledge

  • Understanding of socket programming, especially TCP
  • Basic knowledge of C/C++

What you will learn

  • They would be able to build applications communicating through sockets, in their own network or the Internet

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 1 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course, you’ll learn about socket programming. It is the most fundamental and practical knowledge in every IT communications field. It provides an overview of socket communication fundamentals such as UDP, TCP, and its functions. It aims to reduce significant "gotcha" moments the developers may encounter during socket applications development.

Basic knowledge

  • Basic programming concepts is required

What you will learn

  • The students would understand the concepts of Sockets in C++ and develop their Socket applications in the mode most suitable to their requirements

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 2 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

Learn How to Provision Internet Access for an Organization. In this course the author will teach students how to apply different types of NAT, the author will gradually build the student knowledge towards how to apply NAT Overload for an organization. The course will teach the student about the communication model - OSI Model, TCP/IP MODEL and IPv4 classes that are used by Internet and Private organizations.

The author will implement topology designs and configure the network topology step by step and verify the results.

Join now!

Basic knowledge

  • The student should know basic networking concepts, recommended to have already done Subnetting and understands basic routing

What you will learn

  • The student will learn how to provision Internet access for any organization practically
  • The student will learn how to design and configure different types of NAT
  • The student will learn how to apply Static Route, Access-lists and Routemap

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 9 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

Welcome to Ethical Hacking Course ! In this course, you will start as a beginner and leave the course with an expert . The course purely focused on Practicals.

Course is divided in 2 parts: -

  • 1. Network Pentesting 
  • 2. Web Pentesting

The course is structured in a way that will take you through the basics of computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level - by the time you finish, you will have knowledge about most penetration testing fields.

Network Penetration Testing - In this section you will learn major and minor attacks on networks .it can be divided in 3 sections : -

  • Pre-connection: in this section, we still don't know much about penetration testing - all we have is a computer with a wireless card. You will learn how gather information about the networks and computers around you and launch a number of attacks without a password, such as controlling the connections around you (ie: deny/allow any device from connecting to any network). You will also learn how to create a fake access point, attract users to connect to it and capture any important information they enter
  • Gaining Access: Now that you have gathered information about the networks around you and found your target, you will learn how to crack the key and gain access to your target network. In this section you will learn a number of methods to crack WEP/WPA/WPA2 encryption
  • Post Connection: Now you have the key to your target network and you can connect to it. In this section you will learn a number of powerful attacks that can be launched against the network and connected clients. These attacks will allow you to gain access to any account accessed by any device connected to your network and read all the traffic used by these devices (images, videos, audio, passwords ...etc)
  • Gaining Access - In this section you will learn how to gain full control over any computer system
  • Server Side Attacks: In this approach you will learn how to gain full access to systems without the need for user interaction. You will learn how to gather information about a target computer system such as its operating system, open ports, installed services and discover weaknesses and vulnerabilities. You will also learn how to exploit these weaknesses to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries
  • Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the user. In this approach you will learn how to launch a number of powerful attacks to fool the target user and get them to install a backdoor on their device. This is done by creating fake updates and serving them to the user or by backdooring downloaded files on the fly. You will also learn how to gather information about the target person and use social engineering to deliver a backdoor to them as an image or any other file type.Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems

Web Application Penetration Testing - In this section you will learn how webistes actually works . you will learn various web application attacks like sql injection attack , xss attack , csrf attack , shell upload attack , buffer overflow attack , local file inclusion attack etc . we have covered all major attacks on web applications. 

Summary

In this course, you will perform test to carry out and exploit hidden vulnerability within your network and systems, not only you will be exposing those but you will also provide ways and methods to fix and secure and hardening your system security preventing it from any other attacks. You will learn how to test your network against various types of attacks & develop a network-testing environment that can be used totest scanning tools and techniques. Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network, select and configure the most effective tools from Kali Linux to test network security, employ stealth to avoid detection in the network being tested, recognize when stealthy attacks are being used against your network.Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems & learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Port scanning for UDP scanning, stealth scanning, connect & zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.By the end of this course you will become a pro with the tools that Kali Linux offers to perform some advanced penetration testing, how to exploit the vulnerable systems and how to patch them.

NOTE: This course is created for educational purposes only .

NOTE: This course is a product of Sunil Gupta and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Simpliv.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 8 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

12+ Hours of Video Instruction

CCNP Routing and Switching ROUTE 300-101 Complete Video Course is a comprehensive training course that brings Cisco CCNP R&S ROUTE exam topics to life through the use of real-world demonstrations, animations, live instruction, and configurations, making learning these foundational networking topics easy and fun.

Best-selling author, expert instructor, and double CCIE Kevin Wallace walks you through the full range of topics on the CCNP Routing and Switching ROUTE 300-101 exam, including fundamental routing concepts; IGP routing protocols, including RIPng, EIGRP, and OSPF; route distribution and selection; BGP; IPv6 Internet connectivity; router security; and routing protocol authentication. This unique product contains multiple types of video presentations, including live instructor whiteboarding, real world demonstrations, animations of network activity, dynamic KeyNote presentations, doodle videos, and hands-on router and switch CLI configuration and troubleshooting in real lab environments, allowing you to both learn the concepts and the hands-on application.

The 149 videos contained in this product provide you more than 12 hours of instruction. Modules are divided into easy to digest lessons and conclude with summaries and interactive module and glossary quizzes to help assess your knowledge. In addition to the review quizzes, the product also contains interactive exercises to help you truly learn the topics in each module. The product concludes with a series of lessons that give you valuable advice to help prepare for the actual exam.

Designed to take you inside CCNP routing concepts in a unique and interactive way, CCNP Routing and Switching ROUTE 300-101 Complete Video Course is guaranteed to help you master the foundational networking topics that will help you succeed on the exam and on the job.

Who Should Take This Course?

  • Anyone interested in obtaining their CCNP Routing and Switching certification or anyone interested in learning fundamental routing concepts and configuration skills

Basic knowledge

Course Requirements

  • While this complete video training product does not assume any prior knowledge of network administration or configuration, you should understand the fundamental purposes of a network and be comfortable working with a computer

What you will learn

  • Characteristics of routing protocols, including traffic and network types, IGP and EGP comparison, categories of routing protocols, convergence times, route summarization, scalability and Cisco easy virtual networking theory
  • Remote site connectivity, including GRE tunnel theory and configuration, DMVPN, multipoint GRE , next-hop resolution protocol, and IPsec
  • RIPng fundamentals, configuration, and verification
  • EIGRP fundamental and advanced concepts and EIGRP IPv6 and named EIGRP configuration
  • OSPF fundamental and advanced concepts, the OSPF link-state database, and OSPFv3 configuration
  • Route redistribution including seed metrics, redistribution of IPv4 and IPv6 routes into EIGRP and OSPF, manual route redistribution, distribution list configuration with ACLs and prefix lists, route maps, and administrative distance manipulation
  • Route selection including packet switching architecture, CEF configuration and verification, policy-based routing fundamentals and configuration, and Cisco IP SLA fundamentals and configuration
  • Internet connectivity with BGP and advanced BGP concepts
  • IPv6 Internet connectivity including provider assignment of IPv6 addresses, IPv6 static address and default route, traffic filtering, route filtering, and IPv6 over IPv4 and IPV6 BGP sessions.
  • Router and routing security

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 2 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

In this course you will learn how to set up a Nagios 4 server on both Red Hat based and Ubuntu based Linux servers. For Red Hat and CentOS you will learn to install from both source and from packages. With Ubuntu you will learn how to install from source (there are no packages available for Nagios 4 for Debian based systems).

You will also learn how to connect your Nagios server to both Linux and Windows servers for basic monitoring.

Basic knowledge

  • You should have a solid understanding of the basics of Linux and Windows server administration. You should also have a basic understanding of networking and opening ports in firewalls if needed on your network.

What you will learn

  • You will learn to install Nagios 4 monitoring server on both RedHat/Centos Linux and Debian/Ubuntu based systems. You will learn the basics of setting up monitoring of remote Linux and Windows servers. Once you complete the course you will have a monitoring console that will show health of multiple remote servers.

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 2 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

WordPress is well known for its content management capabilities, plugins, themes, and has great use in online marketing.

In fact it is the #1 platform in the world for setting up blogs and sites.

However, Is is often overlooked that with the right combination of plugins, WordPress can be used for other tasks as well, including "offline" businesses, and workflow automation.

This course takes you, the student, from having no WordPress site at all to owning a fully automated forms, and workflow approval system. 

By the end of the course you will have a working WordPress site, you'll know how to setup forms and email notifications and, how to automatically process and approve requests.

By the time you complete this course you should have at least 3 workflows automated!

Basic knowledge

Are there any prerequisites?

There is only one - You need to own, or to be able to purchase a single site license for Gravity Forms plugin ($39), in order to complete the course.

  • If you don't already own a WordPress site - Don't worry, This course shows how to setup one in less than 10 minutes
  • If you don't know how to write code - Don't worry you can complete this course without writing a single line of code!

Course materials includes form resource files, to help you complete course objectives and interactive practice sessions so you can implement what you have learned.

What you will learn

What's the course about?

  • The course is about forms and workflows automation with WordPress

What does it mean?

  • It means that by the end of this course you'll learn how to turn any WordPress site into an automation system for forms and approval workflows

What can you use it for?

  • Anything from job application forms and vacation approvals to daily checklists and change management
  • You are only limited by your imagination!

Why did I make this course?

  • Simple - I am using the same techniques myself on a daily basis with my team
  • They are cost-effective, they work, and I love sharing my experience and knowledge with others

Who should enroll?

  • This course is targeted to anyone who is looking to add automation to his daily "office" tasks without spending a lot of money on workflows and approval tools

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: Ask Now
  • Duration: 4 Hour
  • Time / Schedule: 03/06/2019 to 03/06/2023
  • IT Training » Computation

Course Details

About this Course

Ruby on Rails can seem overwhelming at first, but it doesn’t have to be! In this course I’ll walk you through it step by step and you’ll be building your first web app in MINUTES. You’ll be amazed how quick and easy it is to create very professional looking websites,

even if you have no programming or web design experience at all.

Watch over my shoulder as I build a cool Stock Market app step by step right in front of you. You’ll follow along and build your own copy. By the time we’re finished, you’ll have a solid understanding of Ruby on Rails and how to use it to build awesome web apps.

The course contains 42 videos – and is just over 3 hours long. Watch the videos at your own pace, and post questions along the way if you get stuck. You don’t need any special knowledge or software to take this course, though any experience with HTML or CSS is a plus. You don’t even need to know the Ruby programming language. I’ll walk you through EVERYTHING.

Ruby on Rails is a great web development tool and learning it has never been this easy.

What We'll Build...

  • We'll build a cool Stock Market app that let's you look up stock quotes and financial information and save it to a database.
  • Users can create an account and sign up to your website, log in, add stocks, check stock prices and all kinds of other cool financial information.  
  • We'll style the website using the popular Bootstrap CSS framework (I'll show you how to use it!)
  • Sign up today and I'll see you on the inside!

Basic knowledge

  • You just need a computer with Internet access, and nothing else

What you will learn

  • Build Web Apps With Ruby On Rails
  • Build Your Own Stock Market Website
  • Understand the Bootstrap CSS Framework
  • Use Databases with Ruby on Rails

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: AED519
  • Duration: 30 Hour
  • Time / Schedule: 11th Feb 2019 End Date : 22nd Feb 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)
  • IT Training » Computation

Course Details

Want to learn all the elements of Tableau Desktop 10? You have come to the right place. Simpliv’s Tableau Certification Training will familiarize you with everything about Tableau, including visualizing, data organization and dashboard designing. Our course will ensure that you also don’t get left out of other concepts of Tableau, such as mapping, data connection and statistics. Ideal for system administrators, business intelligence professionals and software developers, Simpliv is all geared to put you on the road to Tableau Desktop 10 Qualified Associate certification.

Who is the target audience?

 All the professionals who are passionate about business intelligence, data visualization, and data analytics.

Basic knowledge:

 There are no prerequisites for taking up this certification training course.

Curriculam

Visualization with Tableau

  • Tableau - An Introduction   
  • Aggregation and Granularity   
  • Action Filters and Action Highlights   
  • Customer Segmentation Dashboard   
  • Data Blending   
  • Find top 10 Gems   
  • Table Calculations (Explaining various Table calculations )   
  • Difference between Table calculations and Calculated fields  
  • LOD Functions   
  • How to connect to databases (Video based)   
  • How to integrate Tableau with R (Video based)   
  • Dashboarding Techniques   
  • Other Charts   
  • Tableau Server   
  • Interview Preparation   
  • Certification Preparation (Optional)  

New Batch starts from 11th Feb 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: AED519
  • Duration: 26 Hour
  • Time / Schedule: : 04 Feb 2019 End Date : 20 Feb 2019 Days: Mon-Fri (13 Days) 07:00 AM - 9:00 AM (IST)
  • IT Training » Selenium Training

Course Details

This course enables you to master the complete Selenium 3.0 suite. It helps you gain an in-depth knowledge of concepts such as Selenium WebDriver, Web Elements Locating Techniques, Page Object Design Pattern, Framework designing. This course is designed keeping in mind the need of the various IT MNC and startups who are always looking for testing experts who have good knowledge on various aspects of Software Quality Assurance or Software Testing which is the most crucial part for the success of any project.

Who is the target audience?

Manual testers, Test Managers, Test Engineers, Software Developers, Engineers who want to learn Automation testing

Basic knowledge:

A person attending this training should have good knowledge of the following things:

 Conceptual understanding of Manual Testing – what is testing? types of Testing? how to write test cases? And many more.

 Basic Knowledge of Java and its object-oriented programming – if else statements, loops, etc.

 Basic knowledge of Automation Testing would be added advantage.

Curriculam

Module 1

  • What is Selenium?  
  • Generations of Selenium?  
  • An overview of components of Selenium Suite?   
  • Configuration and installation of Software’s   

Module 2

  • Understanding the basics of Webdriver and Java Commands   
  • Introduction to Web Elements  
  • Locator Technique   

Module 3

  • What is validation  
  • Examples on validating - title, elements, error messages  
  • Handling Dynamic Web Elements  
  • Introduction to Synchronization / Wait commands and its types   
  • Fluent wait  

Module 4

  • Introduction to iframe (Inline Frame)  
  • Using iFrame – index, name, id, web element etc  
  • Handling Dynamic Web Elements  
  • Understanding the use of Switch to commands   
  • Understanding advance selenium commands

Module 5

  • What is TestNG  
  • Advantages & Disadvantages  
  • Steps to write a TestNG automation Scrips  
  • What are reports in TestNG  
  • What are reports in TestNG  
  • Annotations, Hierarchy of Annotations  
  • What is XML, Writing XML for TestNG  
  • Executing various concepts of TestNG   
  • Xml based execution for executing suite
  • Capture Screenshots

Module 6

  • Using Selenium and TestNG it in Page Object Model  
  • What is POM
  • Need for POM
  • Introduction to page class
  • Implementing POM with an example

Module 7

  • What is Framework  
  • Types of Framework
  • Apache POI overview
  • Importing and exporting data to excel in Webdriver
  • Data Driven Framework - With Example
  • Keyword Driven Framework - With Example

Event Type - Online Classroom Training

New Batch starts from 04th Feb 2019 Mon-Fri (13 Days) 07:00 AM - 09:00 AM (IST)

Get More Info


Online
  • Not Rated yet
  • Be First to Review

  • Location: Usa
  • Course Fees: AED519
  • Duration: 30hrs. Hour
  • Time / Schedule: 25th Feb 2019 End Date : 08th Mar 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)
  • IT Training » Python Programming

Course Details

Passionate about Python programming? The Information Technology world is waiting for you. This wonderfully flexible, object-oriented language is best learnt when it is learnt with examples. Simpliv offers tons of examples to help you understand the concepts and learn how to implement them in real life to integrate systems. Our course offers you knowledge of how to put Python to the highest use it is capable of being put to: web development, GUI, software development, system admin, and what not. Ideal for anyone who wants to put Python to its optimal use..

Who is the target audience?

 Programmers, Developers, Technical Leads, Architects, Freshers,Data Scientists, Data Analysts,Business Intelligence Managers.

 

Basic knowledge:

You don’t need any specific knowledge to learn Python. A basic knowledge of programming can help.

Curriculam

Python Basics

  • Introduction to Python   
  • Core programming concepts   
  • Objects in Python   
  • Visualizations in Python   
  • Packages in Python   
  • Matrix operations  
  • Dataframes  

New Batch starts from 25th Feb 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)

Get More Info


X

We use cookies to help provide you the best experience on our website. By continuing to use our site, you constent to our use of these cookies.
More Information I accept

Top