There are hundreds of nationally recognized Professional qualifications & training courses from the worlds leading education providers. Course objectives should lead to teaching methods and student interest.
The field of information technology focuses on the creation, storing, sending, processing and retrieving of electronic data. Studies may teach students about different types of applications as well as some skills such as programming.
Nothing helps scholars grow like exposure to a diverse set of ideals and backgrounds and that’s just what any student will get in the Middle East. From ancient civilizations to modern day cultures, scholars have the opportunity to experience new things in this region.
View all Courses in Information Technology in Middle East 2018
How to learn to complete a complete PenTest by means of several practical examples [+]
How to learn to perform a complete PenTest through several practical examples.What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]
I take you from scratch, step by step so you understand the Security [+]
I take you from scratch, step by step so that you understand Security.What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements Basic PC management. Description
In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]
Learn the basics of computer security to protect yourself from cyber attacks. [+]
Learn the basics of computer security to protect yourself from cyber attacks.What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]
Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]
Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.What will I learn?Use Host Discovery to discover active systems on the networkUse the different portscan types to identify open ports and servicesDetermine software and version of services and operating systemsOptimize an Nmap scanWork around firewalls and IDS / IPS with NmapUse NSE and Nmap scripts specifically and develop them yourselfUse additional tools such as Zenmap, ncat and ndiff effectivelyconditionsYou should have a solid basic knowledge of networkingWindows, Linux and TCP / IP should not be foreign words for youNo profound knowledge of TCP / IP is required, all necessary information is provided in the courseA high motivation and affinity to the topic networkdescription... [-]
Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA Network [+]
Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA NetworkWhat will I learn?After the course you will be able to understand and classify all the essential technologies of modern IT networksThese include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server servicesAt the end of the course you can practice many technologies yourselfThe course provides optimal preparation for CompTIA Network certificationWith this course, you will receive sound basic knowledge, which is valuable for almost all IT areasconditionsYou should always be able to handle computersIt is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topicdescription... [-]
A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems. [+]
A Certified Ethical Hacker is a qualified Professional, who take care of Vulnerabilities and Weakness in a Targeted Systems. And uses Analysis Data and Tools as a Malicious Hacker, but in a Legitimate and Lawful manner to assess the Security Posture of Target Systems. Ethical Hacker Course is a knowledge obtained by assessing the security of Computer Systems.
Using penetration testing techniques. These penetration tests are employed by organizations that hire certified hackers to penetrate computer and network systems with a focus on determining and fixing security vulnerabilities. If you go this in an unauthorized way then this is referred as Blackhat hacking. A penetration test is done with the permission of an owner of the targeted systems.... [-]
The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. [+]
The Faculty of Computer and Information Technology aims to provide graduates with the skills and knowledge to help them in the acquisition of appropriate careers after graduation in the field of Information Technology. It can also help them in pursuing research or graduate studies in this field. Moreover, with the basic background they acquire, they can follow up technological advances and carry on a lifelong learning career.Dean
Dr. Manal Ahmed Ismail Shoman is a professor of Computer Engineering at Helwan University, Faculty of Engineering. She received her Ph.D. Degree in Computers and Systems Engineering from the Faculty of Engineering, Ain Shams University, 1996. Currently, she is the Director of Information Technology program at Egyptian E-Learning University (EELU). She held a position of Director of Information Technology Center at Helwan University for 5 years. She was Project Manager and PI for Helwan University Management Information System Project, Feb. 2006 till 2009. She was Vice-Project Manager of "Enhancing the Use of Teaching Technologies and Facilities at Helwan University" financed by the Egyptian Higher Education Enhancement Project Fund, aiming to enhance the abilities of Helwan University staff members to use computers and multimedia in teaching and converting their teaching materials into electronic form (September 2004 - September 2006). She is the author and co-author of more than 35 research papers in international conferences and academic journals.... [-]
SAP Financial Accounting and Controlling course is structured to provide you the skills how to work with general ledger accounts, balances and line items [+]
SAP Financial Accounting and Controlling course is structured to provide you the skills how to work with general ledger accounts, balances and line items; post, search and display documents; and generate a set of balanced and reconcilable financial statements such as Balance Sheets, Profit & Loss and Cash Flow.Special Discounts for experienced Accounts Professionals. With Free sessions for Interview Preperation , Job Assistance, Free software .[-]
Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]
Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers.EC-Council - Disaster Recovery Professional
The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.... [-]
The most widely established approach to IT Service Management in the world. [+]
The most widely established approach to IT Service Management in the world. IT skills alone are no longer an asset for an IT professional or a corporation. Professionals need to combine their IT expertise with business acumen and focus on continuous service improvement. ITIL® can deliver great cost savings for an organization by promoting the optimum use of its assets - people processes and technology. Zeus Consulting offers a complete portfolio of innovative ITIL training courses ranging from Awareness, Foundation and Intermediate levels through to the Expert Level certification.What is ITIL®?
ITIL® (Information Technologies Infrastructure Library) is the most widely established approach to IT Service Management in the world, with more than 1,500,000 certified people. Developed by the UK Office of Government Commerce (OGC), ITIL® is fully compatible with ISO/IEC 20000, the first International Service Management Standard for organizational certification and compliance.... [-]