Course in Information Technology

Top Courses in Information Technology

Information Technology

Information Technology courses are an excellent choice to help advance your career. Whether you are seeking professional development, new skills, or a new career, information technology courses can help you become a more competitive and valuable employee with important skills. There are academic institutions located around the world offering information technology courses through programs that include online and classroom education.

Information technology courses cover a wide range of topics but some themes include software applications, hardware, programming, security, business applications, design, artificial intelligence, databases, medical records, and others. Programs range from a week to a year and can offer certification or diplomas.

If you are considering taking Information Technology courses, then scroll through the programs below to find the program that will help you meet your professional goals and advance your career!

Read More

Digital Transformation from Zero to One

Arden courses at GISMA
Campus Full time 4 days December 2018 United Kingdom London

The program comprises major features of ambitious entrepreneurship and organization starting from idea generation and the freedom to think from first principles rather than accepting the prevailing wisdom and existing structures. [+]

Digital Transformation from Zero to One

The program comprises major features of ambitious entrepreneurship and organization starting from idea generation and the freedom to think from first principles rather than accepting the prevailing wisdom and existing structures. It is a fact that applications of artificial intelligence are constantly impacting society and professional organizations. As a consequence of that, more and more tasks have been taken over by machines or supported by digital assistants. This program expands on the impact that digital tools and social media have been having on our society.

Why choose this program? Practical experience within multinational organizations Practical hands-on course to develop the skills and confidence to succeed Networking opportunities for participants Gain a UK-German corporate sector perspective Tutors with an international working mindset Considerable corporate, and entrepreneurship/consulting experience Central London campus with professional facilities Course Requirements Bachelor degree or professional equivalent, At least 3 years’ related Language level: Proof of fluency in English Awarding body / Certified by ... [-]

Diploma in Network Systems Administrator

Vancouver Career College
Campus Full time 48 weeks September 2019 Canada Abbotsford

If you’re looking to enter the IT field, the Network Systems Administrator program at Vancouver Career College can help you get there. [+]

If you’re looking to enter the IT field, the Network Systems Administrator program at Vancouver Career College can help you get there. In this program, you’ll develop technical skills in network installation, maintenance and management as well as implementation, and operating computer services, preparing you to take on your new career as a network systems administrator.

In addition to developing a solid foundation in general IT skills, you’ll participate in a work placement program, giving you the hands-on experience you need to get out into the workforce and impress employers.

The program also prepares you to write several separate certification exams including Computing Technology Industry Association (CompTIA), Cisco Certified Network Associate (CCNA), and Microsoft Certified Solutions Associate (MCSA).... [-]


ACS Professional Year Program (ICT)

NIT Australia
Online & Campus Combined Full time 44 - 52 weeks Open Enrollment Australia Perth

ACS Professional Year Program for ICT is a 44-52 weeks work readiness program, gazetted by the Department of Immigration and Border Protection (DIBP), and specifically designed for international students who have graduated in Australia and are hoping to apply for permanent residence in Australia. [+]

ACS Professional Year Program (ICT)

For a limited time, we are offering a special discount of $3,280!

Program Details Course ID: ACSPYICT Certificate: ACS Professional Year Certificate Duration: 44 weeks (Including 12 weeks of Internship) Locations: Perth Delivery Type: Blended (Classroom and online) Language: English Program Description

ACS Professional Year Program for ICT is a 44-52 weeks work readiness program, gazetted by the Department of Immigration and Border Protection (DIBP), and specifically designed for international students who have graduated in Australia and are hoping to apply for permanent residence in Australia.

The ACS Professional Year equips participants with the skills and knowledge to successfully enter the Australian workforce in their professional field. It combines face to face workshops with online education and real work experience in internships, to help you to become a young professional rather than a student or recent graduate.... [-]


Data Security (Non-Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2019 United Kingdom Cambridge

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment. [+]

About this course

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:... [-]


International Winter School : IOT

EPITECH
Campus Full time 2 weeks January 2019 France Paris Bordeaux Lille Lyon Marseille Montpellier Nancy Nantes Nice Rennes Strasbourg Toulouse-le-Château + 11 more

From January 22 to February 2, 2018 Week 1: Embedded programming and prototyping Week 2: Project Ideation and Bootstrap [+]

From January 22nd to February 2rd, 2018

WEEK 1: Embedded programming and prototyping

January 22 nd to 26th, 2018

2 days of embedded programming courses and 2 days of lab work on how to prototype basic projects. Students will interact with IOT prototyping devices, 3D printing and learn how to use different components for their projects (motion sensors, camera, wifi, Bluetooth, NFC, etc…). 1 day of Ideation / off-campus activity

WEEK 2: Project Ideation and Bootstrap

January 29th to February 2nd, 2018

With the help of the Epitech Innovation Hub, IOT professionals and Epitech instructors, students will have to challenge themselves and make a working prototype of the connected object of their choice! Previous year projects include autonomous plant watering systems, an automatic barman, an automatic remote controlled car, and much more! Several cultural activities and company visits will be included in the program. Below are some examples: - French language and culture - Visit of Eiffel Tower - Visit of Palace of Versailles - Visit to start-ups and accelerators - Disneyland This list is tentative. The final list of activities will be communicated to the students upon their arrival.... [-]


CISSP Prep Class

University of Fairfax
Online May 2019 USA Roanoke

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits) [+]

IA7000 Security in the Digital Age

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

Join the Cybersecurity Elite U of F Cybersecurity Education Path

Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.... [-]


Learn Blockchain Development: Convert App to Dapp

BitDegree
Online Open Enrollment Lithuania 139 - 309

Learn How To Make A Decentralized Blockchain App Using Ethereum & Solidity From A Centralized MERN App [+]

About

Do you want to build your own blockchain application but don't know where to start? No worries! This course has got you covered!

Learn To Build Decentralized Applications

The Blockchain is rightfully the talk of the town. It's an exciting new technology that brings major opportunities to almost every sector of the economy you can think of. Every major company out there is looking for ways to utilize Blockchain. In this environment, everyone is looking for a Blockchain developer. This course is an excellent opportunity to get ahead of the curve.

There are some resources out there for learning Solidity. However, there is hardly any resources, guides or courses that teach you how to convert a standard app to a decentralized app (also known as dapp) - and that's what most companies are looking for. The purpose of this course is to give you hands-on experience in building a centralized and a decentralized app. Basically the best of both worlds from scratch!... [-]


Further education it-Betriebswirt / -in (iubh)

IUBH Fernstudium
Online Full time Part time 18 - 36 months Open Enrollment Germany Bad Honnef + 1 more

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level. [+]

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level.

With us you study in only 3 semesters, supported by vodcasts, video lectures, tutors and printed as well as digital further education scripts - no matter where you are at the moment.

Facts about further education IT-Business Administration (IUBH) Degree : IT-Business Administration (IUBH) Continuing education duration : alternatively 3, 4 or 6 semesters Continuing Education Model : Online Study Language of instruction : German Probationary period : 4 weeks Extension : free of charge Admission Requirements : Without ECTS credits: Without ECTS credits: min. 2-year vocational training or 3 years of professional experience; With receipt of ECTS points: (Fach-) Abitur or completed master examination or min. 2-year training with 3 years of professional experience Accreditation : ZFU (No. 286217) Start of training : at any time Certification : Certificate 2-stage model ... [-]

Developing Augmented and Virtual Reality Apps

Columbia College Chicago Online
Online 8 weeks June 2019 USA USA Online

The augmented reality and virtual reality (AR/VR) industry is a multi-billion dollar industry. Augmented and virtual reality technologies are rapidly moving from gaming to serious business. Once the province of game developers, industry-professionals are recognizing the revolutionary potential of AR and VR. [+]

DEVELOPING AUGMENTED AND VIRTUAL REALITY APPS Overview

The augmented reality and virtual reality (AR/VR) industry is a multi-billion dollar industry. Augmented and virtual reality technologies are rapidly moving from gaming to serious business. Once the province of game developers, industry-professionals are recognizing the revolutionary potential of AR and VR. Startups are working to apply AR and VR to everything from marketing and advertising to medicine and healthcare—and even space exploration and military training. VR, which projects the user into a fully constructed reality, has proven valuable for tasks such as training simulations and real estate tours. AR is being used more and more in devices such as head-mounted displays (HMDs), laptops, smartphones, and tablets, and allows more user freedom while requiring less equipment.... [-]


Management Information Systems Essentials - Level 2

London Business Training & Consulting
Campus Full time 1 week January 2019 United Kingdom London

Upon completion of this course, you will be able to: evaluate the potential benefits of social media information systems to organizations; appreciate the uses of business intelligence systems; differentiate the key elements of information systems development and understand the role system developments plays in MIS, etc. [+]

Management Information Systems Essentials – Level 2 KEY INFORMATION Course Code: IT102B Duration: 1 week Fee: £2675 COURSE OUTLINE Social Media Information Systems What is a social media information system (SMIS)? SMIS to advance organizational strategy Increasing social capital Managing the risks of social media Where is social media taking us? Business Intelligence Systems How do organizations use business intelligence (BI) systems? The three primary activities in the BI process Using data warehouses and data marts to acquire data Three techniques for processing BI data The alternatives for publishing BI Information Systems Development What is systems development? The five phases of the systems development lifecycle (SDLC) Accomplishing system definition The users’ role in the requirement phase Designing the five components Implementing an IS The tasks for system maintenance Problems with the SDLC Information Systems Management Functions and organization of the IS department How do organizations plan the use of IS? Advantages and disadvantages of outsourcing User rights and responsibilities Information Security Management The goal of IS security How big is the computer security problem? Responding to security threats Technical safeguards Data safeguards Human safeguards Responding to security incidents Target audience ... [-]

Specialization in Big Data and Business Intelligence

Universidad EIA
Campus 2 semesters January 2019 Colombia Envigado

In the world, organizations generate, collect, store, process and analyze more and more data. We are facing an "explosion of the quantity available", since the growth of these is at least exponential. [+]

Why study Specialization in Big Data and Business Engineering?

In the world, organizations generate, collect, store, process and analyze more and more data. We are facing an "explosion of the quantity available", since the growth of these is at least exponential. According to a study by Gartner, cited by Jaspersoft, the volume generated in 2009 alone was greater than that created in the previous 5,000 years (Jaspersoft, nd). Also in 2009, Computerworld, in its publication of the 10 most important trends in ICT management, stressed that "in the next five years, company data will grow an additional 650%."

Profiles

Training objective: The graduate of the Specialization in Big Data and Business Intelligence is competent to:... [-]


Summer School Smart City

Peter the Great St. Petersburg Polytechnic University
Campus Full time 2 weeks September 2019 Russia Saint Petersburg

Students during this program will work in groups on creation of prototypes and functional models of urban-themed projects under guidance of experienced moderators. The course includes using different types of tools for digital fabrication from computer aided design programs to cnc machines such as laser cutter, pcb milling machine, 3D-printer etc. The course accepts student project ideas (requires an interview with lab representatives before applying). [+]

The course provides students with comprehensive introduction to:

Implementation of product ideas through instruments of digital fabrication; Project management and development; Fabrication-oriented design and operating CNC machines.

Students will gain theoretical knowledge and practical experience of:

Using modern CAD systems (Autodesk Fusion 360, Solidworks, Eagle, Altium); Electronics design; Programming; Project design; Project development; Digital fabrication; Rapid prototyping. [-]

Microsoft Professional Program in DevOps (Microsoft)

edX
Online September 2019 USA Cambridge

To support companies in their desire to be more agile, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. [+]

To support companies in their desire to be agiler, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. Built with the focus on what you need you need to work in DevOps, the Microsoft Professional Program Certificate will help you learn the skills necessary for a DevOps culture in your workplace.

Program Details

Courses

7 courses + Final Capstone Project Effort 16 - 30 hours per course Price

$99 per course / $792 for the entire program... [-]


Course: Big Data Hadoop and Spark Developer Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Big Data Hadoop training course lets you master the concepts of the Hadoop framework and prepares you for Cloudera’s CCA175 Big data certification. With our online Hadoop training, you’ll learn how the components of the Hadoop ecosystem, such as Hadoop 2.7, Yarn, MapReduce, HDFS, Pig, Impala, HBase, Flume, Apache Spark, etc. fit in with the Big Data processing lifecycle. Implement real life projects in banking, telecommunication, social media, insurance, and e-commerce on CloudLab. [+]

Key features 48 hours of instructor-led training 24 hours of self-paced video 5 real-life industry projects using Hadoop and Spark Hands-on practice on CloudLab Training on Yarn, MapReduce, Pig, Hive, Impala, HBase, and Apache Spark Aligned to Cloudera CCA175 certification exam

Big Data Hadoop training course lets you master the concepts of the Hadoop framework and prepares you for Cloudera’s CCA175 Big data certification. With our online Hadoop training, you’ll learn how the components of the Hadoop ecosystem, such as Hadoop 2.7, Yarn, MapReduce, HDFS, Pig, Impala, HBase, Flume, Apache Spark, etc. fit in with the Big Data processing lifecycle. Implement real life projects in banking, telecommunication, social media, insurance, and e-commerce on CloudLab.... [-]


Course in Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks

FutureLearn
Online Part time 2 weeks November 2018 United Kingdom UK Online

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening. [+]

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening.

In this course, you’ll explore some of the common cyber threats facing small and medium enterprises, what a cyber attack means, and what practical tools and strategies you can put in place to prevent them.

Investigate a real cyber attack in action

We’ll start by looking at the recent Panama Papers leak to find out more about cyber threats, the methods that hackers use, and what the consequences of cyber attacks can be for small and medium enterprises.

Explore strategies for protecting your organisation against cyber attacks After viewing a simulation of a cyber attack in action, we’ll then take a look at some of the tools and preventative strategies that you can put in place to protect your organisation.... [-]