Course in Information Technology in Europe

Find Courses in Information Technology in Europe 2018

Information Technology

There are hundreds of nationally recognized Professional qualifications & training courses from the worlds leading education providers. Course objectives should lead to teaching methods and student interest.

Information technology involves using or studying systems such as computers that store, send and retrieve information. An information technology program may cover a variety of topics, including programing, software applications and databases.

Europe is, by convention, one of the world's seven continents. Comprising the western most point of Eurasia, Europe is usually divided from Asia by the watershed divides of the Ural and Caucasus Mountains, the Ural River, the Caspian and Black Seas, and the waterways connecting the Black and Aegean Seas.

View all Courses in Information Technology in Europe 2018

Read More

Data Security (Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2018 United Kingdom Cambridge

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors. [+]

About this course

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:

Understand the requirement for security governance and the legal aspects of cyber security as it applies to an IT system Identify the type of vulnerabilities and threat vectors to an IT system Suggest the cyber control required to reduce the threat vectors Understand the implication of various strategies used in mitigation of a cyber-attack. Understand the security architecture of an organization Conduct a vulnerability assessment Syllabus ... [-]

Data Security (Non-Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2018 United Kingdom Cambridge

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment. [+]

About this course

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:... [-]


International Winter School : IOT

EPITECH
Campus Full time 2 weeks January 2019 France Paris Bordeaux Lille Lyon Marseille Montpellier Nancy Nantes Nice Rennes Strasbourg Toulouse + 11 more

From January 22 to February 2, 2018 Week 1: Embedded programming and prototyping Week 2: Project Ideation and Bootstrap [+]

From January 22nd to February 2rd, 2018

WEEK 1: Embedded programming and prototyping

January 22 nd to 26th, 2018

2 days of embedded programming courses and 2 days of lab work on how to prototype basic projects. Students will interact with IOT prototyping devices, 3D printing and learn how to use different components for their projects (motion sensors, camera, wifi, Bluetooth, NFC, etc…). 1 day of Ideation / off-campus activity

WEEK 2: Project Ideation and Bootstrap

January 29th to February 2nd, 2018

With the help of the Epitech Innovation Hub, IOT professionals and Epitech instructors, students will have to challenge themselves and make a working prototype of the connected object of their choice! Previous year projects include autonomous plant watering systems, an automatic barman, an automatic remote controlled car, and much more! Several cultural activities and company visits will be included in the program. Below are some examples: - French language and culture - Visit of Eiffel Tower - Visit of Palace of Versailles - Visit to start-ups and accelerators - Disneyland This list is tentative. The final list of activities will be communicated to the students upon their arrival.... [-]


Fundamentals Of Ethical Hacking: Practical Course

Udemy
Online Part time 21 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

How to learn to complete a complete PenTest by means of several practical examples [+]

How to learn to perform a complete PenTest through several practical examples.

What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]

Basics Of Professional Ethical Hacking

Udemy
Online Part time 5 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

I take you from scratch, step by step so you understand the Security [+]

I take you from scratch, step by step so that you understand Security.

What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements  Basic PC management. Description

In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.

The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]

Ethical Hacking: The Complete Course

Udemy
Online Part time 9 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn the basics of computer security to protect yourself from cyber attacks. [+]

Learn the basics of computer security to protect yourself from cyber attacks.

What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]

The Data Sciences From A To Z

Udemy
Online Part time 20 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.

What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]

Hacking With Nmap: Portscanning And Vulnerability Analysis

Udemy
Online Part time 8 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.

What will I learn?Use Host Discovery to discover active systems on the networkUse the different portscan types to identify open ports and servicesDetermine software and version of services and operating systemsOptimize an Nmap scanWork around firewalls and IDS / IPS with NmapUse NSE and Nmap scripts specifically and develop them yourselfUse additional tools such as Zenmap, ncat and ndiff effectivelyconditionsYou should have a solid basic knowledge of networkingWindows, Linux and TCP / IP should not be foreign words for youNo profound knowledge of TCP / IP is required, all necessary information is provided in the courseA high motivation and affinity to the topic networkdescription... [-]

Computer Networks (CompTIA Network) - The Comprehensive Course

Udemy
Online Part time 25 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA Network [+]

Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA Network

What will I learn?After the course you will be able to understand and classify all the essential technologies of modern IT networksThese include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server servicesAt the end of the course you can practice many technologies yourselfThe course provides optimal preparation for CompTIA Network certificationWith this course, you will receive sound basic knowledge, which is valuable for almost all IT areasconditionsYou should always be able to handle computersIt is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topicdescription... [-]

Further Education It-Betriebswirt / -in (iubh)

IUBH Fernstudium
Online Full time Part time 18 - 36 months Open Enrollment Germany Bad Honnef + 1 more

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level. [+]

Our certificate course IT-Betriebsbirtin -inin IUBH enables you in just three semesters excellent education and training at university level.

With us you study in only 3 semesters, supported by vodcasts, video lectures, tutors and printed as well as digital further education scripts - no matter where you are at the moment.

Facts about further education IT-Business Administration (IUBH) Degree : IT-Business Administration (IUBH) Continuing education duration : alternatively 3, 4 or 6 semesters Continuing Education Model : Online Study Language of instruction : German Probationary period : 4 weeks Extension : free of charge Admission Requirements : Without ECTS credits: Without ECTS credits: min. 2-year vocational training or 3 years of professional experience; With receipt of ECTS points: (Fach-) Abitur or completed master examination or min. 2-year training with 3 years of professional experience Accreditation : ZFU (No. 286217) Start of training : at any time Certification : Certificate 2-stage model ... [-]

ITIL Foundation e-Learning with exams

SPOCE Project Management
Online Part time 6 months Open Enrollment United Kingdom UK Online

Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. [+]

ITIL Foundation e-Learning with exams

Programme description

Take the first steps into the ITIL® Service Management lifecycle with this globally recognized qualification from SPOCE. ITIL® Foundation certification will provide you with an entry level qualification in IT Service Management and sits perfectly with other project management methods such as PRINCE2®. The Foundation study, accredited by PeopleCert, provides an entry-level understanding of the key terms and concepts that underpin the ITIL® method.

SPOCE's self-study ITIL® Foundation, in particular, aims to provide you with a straightforward route to becoming a fully certificated professional in your own time and at your own pace. It is compatible with laptops, desktops, Android tablets, iPads and mobile devices.... [-]


Course in IT (Web Design)

International Career Institute
Online Full time Part time Open Enrollment United Kingdom London

ICI delivers a web design course that will keep you signed in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course. [+]

ICI delivers a web design course that will keep you significant in the booming e-commerce and IT sectors. Our course teaches you everything you need to create practical and attractive web pages. As web designers become more in demand, you will definitely thank yourself for choosing this course.

Course Outline E-Commerce Internet Marketing Computer Programming Web Scripting Operating System Management Project Management Establishing Your Own Business Career Prospects

Let your creative juices flow into the World Wide Web through a career in web design. Work from home or be employed by established IT and web design companies. Websites and web tools are increasing each day so there would always be a demand for the services of skilled web designers.... [-]


Executive Program In Big Data For Executives

inesdi - Digital Business School
Campus Full time 12 weeks April 2018 Spain Madrid Colombia Bogotá + 2 more

The management of Big Data today is key and the way to enhance its value is through business intelligence. [+]

Courses in Information Technology in Europe 2018. The management of Big Data today is key and the way to enhance its value is through business intelligence./>In the professional environment, the need arises to form business profiles with a managerial character oriented to data management. For this, it is fundamental to have basic notions of the different technological tools, as well as to know how to interpret the data, without needing to be a technical professional.At the end of this Executive Program, the professionals who study it will have acquired the following competences:/>Identify the digital competences of the Big Data process flow.Lead and interact with a work team with technical knowledge in data management.Interpret the data to be able to reach business conclusions.Incorporate support systems for decision making in professional life.Generate and understand scorecards.Understand and manage tools for the analysis of large volumes of data.Manage data visualization tools.Fundamental aspects of cybersecurity in data environment.Understand the legal framework of Big Data, data protection and intellectual property.ProgramModule 1. Presentation/>Academic presentationMethodology of the programFinal project proposal and work methodModule 2. Data-based business strategyData-driven business strategyData-based business modelsBusiness IntelligenceDigital PlatformsModule 3. Introduction to Digital AnalyticsIntroduction to Digital AnalyticsDigital analytics technology and toolsSocial paid: when, how and why pay in social networks?Module 4. Big Data Technologies EcosystemEcosystem of Big Data technologiesAnalysis of geolocated data: extraction, monitoring and listeningOpen data analysisNatural Language ProcessingEmbedded systems, IoT, Smart CitiesVisualization and interpretation of data (Tableau workshop)Module 5. Funding and profitability of projectsProject financing and profitabilityMarketing and marketing Automation processesStrategic direction... [-]

Understanding Big Data - CPD & IAO Accredited

iStudy
Online Full time Part time Open Enrollment United Kingdom London

Deal with large numbers and key information in this Big Data Course Are interested in understanding and protecting big data? Do you want to utilize any data that have been presented to you to its full extent? This Innovative Course will solve all of your problems! [+]

Why You Should Choose Understanding Big Data Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday – Friday) Efficient exam system, assessment, and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for?

Understanding Big Data is CPD certified and CiQ Gold accredited. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds.... [-]


Course in Blockchain in the Energy Sector

FutureLearn
Online Part time 4 weeks January 2019 United Kingdom UK Online

Understand how blockchain works, where the technology has come from and why it will empower energy customers like never before. [+]

Understand the disruptive potential of blockchain in the energy sector

This online course studies the incredibly disruptive potential of blockchain technology in the energy sector. You will look at how blockchain works and start to understand the background, value proposition and geopolitical context that brought it to the center of everyone’s attention.

The course will offer a clear overview of how and why blockchain will take over the energy sector, optimizing old processes and empowering the customers like never before. This will create a new paradigm, where users can buy and sell energy from and to each other.

What topics will you cover? What is blockchain? Digital currencies The evolution and future of blockchain Smart contracts and decentralized applications Blockchain in the energy sector: the new paradigm P2P energy trading Blockchain applied to EV charging What will you achieve? ... [-]