Course in Computing in Middle East

Compare Course Studies in Computing in Middle East 2017

Computing

A course refers to a specialized study program. It usually takes place on campus but can be delivered online. Courses are popular for people who want to get specific knowledge in one subject.

The Middle East boasts a uniquely diverse population filled with a myriad of political, cultural and religious identities. In this setting, students have the opportunity to learn first hand about historic cultures and empires based in the region.

View all Course Studies in Computing in Middle East 2017

Read More

Java Fundamentals for Android™ Development Course

Al Dar University College
Campus Full time 2 days September 2017 United Arab Emirates Dubai

Developing applications for Android™ systems requires basic knowledge of Java programming language. This is a two-day (12-hours) introductory course that focuses on the fundamentals of Java programming language, its framework, syntax, and paradigm. [+]

Course Studies in Computing in Middle East 2017. About This Course Developing applications for Android™ systems requires basic knowledge of Java programming language. This is a two-day (12-hours) introductory course that focuses on the fundamentals of Java programming language, its framework, syntax, and paradigm. The course will focus on object-oriented programming and techniques which are mainly used in Android software development kit (SDK). It will provide the basic tools and skills to ensure a smooth start with Android application development. This is a crucial course for any non-Java programmer planning to learn the development of Android applications, though it is not mapped to any exam. Course Prerequisites This course is designed for software developers or anyone interested in building Android applications. However, computer programming experience in any language is a required prerequisite in order to benefit from this course. Upon completing this course, students will be able to: The fundamentals of Java Virtual Machine. Writing, compiling, and running basic Java applications. Using the Eclipse integrated development environment (IDE). Java basic syntax and control statements. Java object oriented programming’s basic concepts: classes, interfaces, inheritance, polymorphism… etc. Java collections, file input/output, serialization, try/catch/finally …etc. Installation and setup of Android SDK, plugins and Android emulator. Writing a ‘Hello World’ Android application. Course Outline : Lesson 1: Java Basics Introduction Java programming language Java Virtual Machine JDK and JRE Setting up your machine for Java programming Hello World in Java Using a text Editor Using an IDE Java Primitive Data Type Naming Arrays Control Flow If/Else and Switch Switch statement While loop For Loop Lesson 2: Object Oriented Programming Introduction Object Oriented Programming Objects Classes Inheritance Interface Access Modifiers Constructors Method overriding and overloading Polymorphism Lesson 3: Java Topics Introduction Java Collections Interfaces Implementations Serialization Deserializing [-]

EC-Council Certified Courses

Zeus Consulting
Campus Full time 5 days September 2017 United Arab Emirates Dubai

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. EC-Council - Disaster Recovery Professional The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Who Should Attend Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. EC-Council - Certified Encryption Specialist ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Students will learn the basics of information theory as it applies to cryptography. Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Students will master significant concepts such as diffusion, confusion, and Kerkchoff’s principle. Target Audience Penetration Testers, Computer Forensics Specialists, Anyone involved in selecting, implementing VPN’s or digital certificates, Anyone involved in information security operations EC-Council - Certified Security Specialist EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Target Audience The EC-Council Certified Security Specialist (ECSS) program is designed primarily for students of academic institutions. It covers the fundamental basics of information security, computer forensics, and network security. The program will give a holistic overview of the key components of information security. Students, who complete the ECSS program, will be equipped with the adequate foundation knowledge and should be able to progress onto the next level. EC-Council - Certified Secure Computer User The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. Target Audience This course is specifically designed for todays' computer users who use the internet and the www extensively to work, study and play. EC-Council - Network Security Administrator The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. The ENSA Course is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Who Should Attend This course will significantly benefit System Administrators, System Engineers, Firewall Administrators, Network Managers, IT Managers, IT Professionals and anyone who is interested in network security technologies. EC-Council - Certified Security Analyst The EC–Council Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology. Target Audience Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA program Certified Ethical Hacker   A comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic 
Target Audience This course is designed for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure. [-]

ITIL® Certifications - Foundation, Intermediate, Expert

Zeus Consulting
Campus Full time 3 - 20 days September 2017 United Arab Emirates Dubai

The most widely established approach to IT Service Management in the world. [+]

Course Studies in Computing in Middle East 2017. The most widely established approach to IT Service Management in the world. IT skills alone are no longer an asset for an IT professional or a corporation. Professionals need to combine their IT expertise with business acumen and focus on continuous service improvement. ITIL® can deliver great cost savings for an organization by promoting the optimum use of its assets - people processes and technology. Zeus Consulting offers a complete portfolio of innovative ITIL training courses ranging from Awareness, Foundation and Intermediate levels through to the Expert Level certification. What is ITIL®? ITIL® (Information Technologies Infrastructure Library) is the most widely established approach to IT Service Management in the world, with more than 1,500,000 certified people. Developed by the UK Office of Government Commerce (OGC), ITIL® is fully compatible with ISO/IEC 20000, the first International Service Management Standard for organizational certification and compliance. Who is ITIL® for? - IT professionals who are involved in the delivery or support of IT services - Business professionals who need to further understand how IT can help maximize their business potential ITIL® Qualification Scheme ITIL® Foundation This level is suitable for individuals who require a basic understanding of the ITIL framework and how it may be used to enhance the quality of IT service management within an organization. ITIL® Intermediate This level is suitable for those who require a deeper understanding of the ITIL Service Management Practice and how it may be implemented to enhance the quality of IT service management within an organization. ITIL® Expert This level is achieved by accumulating 22 credits through the first two levels of the Scheme. About Trainer Naseeb Roumia Contributing to Global Best Management Practices in the areas of Service Management, Governance & Strategy, Risk Management, Project & Programme Management, Emerging Technologies, Excellence, and Business Analysis. Expertise lie among International Programs such as ITIL®, PRINCE2®, COBIT®5, MSP®, Business Analysis, ISO 20000, ISO 27001, ISO 22301, ISO 31000, Cloud Computing, Kepner Tregoe®, TOGAF®, PMP®, EFQM, and M_O_R to fulfil the strategic objectives of businesses in alignment to the UAE vision within the Emirates. As a culturally aware consultant, Naseeb has been imparting international programs as a knowledge transfer initiative among professionals belonging to different backgrounds throughout the Middle East and North Africa region. Additionally, he has been engaged with several levels of leading, planning, consulting, training and supporting a functionally organized, technically oriented environment with staff working on a wide variety of technical activities. [-]