Course in Information Technology in North America

Find Courses in Information Technology in North America 2018

Information Technology

A course refers to a specialized study program. It usually takes place on campus but can be delivered online. Courses are popular for people who want to get specific knowledge in one subject.

The field of information technology focuses on the creation, storing, sending, processing and retrieving of electronic data. Studies may teach students about different types of applications as well as some skills such as programming.

The United States of America is a large country in Northern America, often known as the "USA", the "US", the "United States", "America", or simply "the States". It also gathers over 310 million people which is the world's third largest population. It includes densely populated cities with sprawling suburbs, and vast, uninhabited and naturally beautiful areas at the same time.

View all Courses in Information Technology in North America 2018

Read More

Cloud Computing

On Sky Global
Online Full time 3 - 9 months Open Enrollment USA USA Online

The course examines the most important APIs used in the Amazon and Microsoft Cloud, including the techniques for building, deploying, and maintaining machine images and applications. [+]

CLOUD COMPUTING Open to: High School or College Level Prerequisites: Java Programming (JA 101) Course Format: Individually Paced Course Length: Typically 3 months Course Code: CC 101 COURSE DESCRIPTION

Cloud Computing opens the possibility of highly elastic scalability in the delivery of enterprise applications and software as a service (SaaS). Amazon Elastic Cloud, Microsoft’s Azure, Google App Engine, and many other Cloud offerings give mature software vendors and new start-ups the option to deploy their applications to systems of infinite computational power with practically no initial capital investment and with modest operating costs proportional to the actual use. The course examines the most important APIs used in the Amazon and Microsoft Cloud, including the techniques for building, deploying, and maintaining machine images and applications. We will learn how to use Cloud as the infrastructure for existing and new services. We will use open source implementations of highly available clustering computational environments, as well as RESTFul Web services, to build very powerful and efficient applications. We also learn how to deal with not trivial issues in the Cloud, such as load balancing, caching, distributed transactions, and identity and authorization management. In the process, we will also become very familiar with Linux operating system.... [-]


Data Communications and Network

On Sky Global
Online Full time 3 - 9 months Open Enrollment USA USA Online

Data Communications and Network covers the following core topics: Layered network architectures and the TCP/IP model, Link layer error and flow control mechanisms; Packet switching, Wired and wireless local and wide area networks, Medium access control procedures, Internetworking with switches, bridges, and routers. Routing, algorithms and Network security. [+]

DATA COMMUNICATIONS AND NETWORK Open to: High School or College Level Prerequisites: Knowledge of Probability Theory Course Format: Individually Paced Course Length: Typically 3 months Course Code: DCN COURSE DESCRIPTION

Data Communications and Network covers the following core topics: Layered network architectures and the TCP/IP model, Link layer error and flow control mechanisms; Packet switching, Wired and wireless local and wide area networks, Medium access control procedures, Internetworking with switches, bridges, and routers. Routing, algorithms and Network security.

DETAILED COURSE INFORMATION Basic concepts of networking. Network topologies. The concept of layered architecture modeling including OSI and the TCP/IP protocol suite. Client-server communications. Physical layer functionalities including signaling, modulation, multiplexing, line coding, and synchronization. Transmission media. Network performance measures including throughput, delays are presented. Data vs. signaling rates, channel bandwidth, and capacity. Link layer functionalities including frame synchronization, error detection, and control including ARQ, flow control mechanisms including sliding windows. Circuit, packet and virtual circuit switching technologies Local area network technologies including ETHERNET, Token Rings. Multiple-access schemes such as CSMA/CD, CSMA/CA and Token-passing. MAC addressing. Switched vs. shared ETHERNETs. Performance evaluation, including throughputs and delays. Internetworking devices including repeaters, bridges, switches, routers, and gateways. Network layer protocols, including IP, ARP, and ICMP. IP addressing schemes. Subnetting Internet routing including protocols used on the Internet such as RIP, OSPF, and BGP. Transport layer protocols including UDP and TCP. Ports and sockets. TCP connection establishment. Error, flow and congestion control in TCP. Applications layer protocols such as HTTP, FTP, DNS, SMTP, TELNET Network... [-]

Hardware and Networking

On Sky Global
Online Full time 3 - 9 months Open Enrollment USA USA Online

The course covers important concepts about the computer and basic networking concepts and common network industry terminology. It examines popular networking topologies and devices, network configuration, and introduction to servers and network security. [+]

HARDWARE AND NETWORKING Open to: High School or College Level Prerequisites: Computer Literary Course Format: Individually Paced Course Length: Typically 3 months Course Code: HN COURSE DESCRIPTION

The course covers important concepts about the computer and basic networking concepts and common network industry terminology. It examines popular networking topologies and devices, network configuration, and introduction to servers and network security.

DETAILED COURSE INFORMATION Introduction Hardware & Networking Software and hardware Input/output devices Network topologies: LAN, WAN, MAN, PAN, CAN Introduction to Various Networking Devices Assembling and disassembling Network basic and configuration Network Troubleshooting Introduction to servers and network security Types of Internet connections Dial-up, Broadband, Leased Line, Wi-Fi, Wi-Max, 2G, 3G, 4G, WWW, E-mails, Search Engines, Social Networking. Cloud application Essential Security Measures TUTORIALS/SEMINARS ... [-]

Fundamentals Of Ethical Hacking: Practical Course

Udemy
Online Part time 21 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

How to learn to complete a complete PenTest by means of several practical examples [+]

How to learn to perform a complete PenTest through several practical examples.

What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]

Basics Of Professional Ethical Hacking

Udemy
Online Part time 5 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

I take you from scratch, step by step so you understand the Security [+]

I take you from scratch, step by step so that you understand Security.

What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements  Basic PC management. Description

In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.

The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]

Ethical Hacking: The Complete Course

Udemy
Online Part time 9 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn the basics of computer security to protect yourself from cyber attacks. [+]

Learn the basics of computer security to protect yourself from cyber attacks.

What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]

The Data Sciences From A To Z

Udemy
Online Part time 20 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS. [+]

Data Science, Business Analytics, Data Analysis, Data Mining, Tableau, Statistics, Modeling, Regression, SQL, SSIS.

What will I learn? Perform all the steps of a complex Data Science project correctly Create Visualizations in Tableau Doing Data Mining in Tableau Understand how to apply the chi-square test Apply the Ordinary Least Squares method to make Linear Regressions Evaluate all types of models thanks to the R-Squared Evaluate all types of models thanks to Adjusted R-Squared Create a Simple Linear Regression Model Create a Multiple Linear Regression Model Create Dummy Variables Interpreting the coefficients of Multiple Linear Regression Read Outputs of Linear Regression Models Use Backward Elimination, Forward Selection, and Bidirectional Elimination methods to create statistical models Create a Logistic Regression Model Integrate the intuition of Logistic Regression Analyze the False Positives & False Negatives and understand the difference Read a Confusion Matrix Create a Robust Model of Geo-Demographic Segmentation Transform independent variables for modeling Derive independent variables for modeling Check the presence of multicollinearity using VIF (Variance Inflation Factor) Have an intuition of multicollinearity Use the Cumulative Accuracy Profile (CAP) to evaluate models Build the CAP curve in Excel Use the Training Set and the Test Set to build robust models Draw insights from your CAP curve Understanding the Odds Ratio Getting business insights from the coefficients of a Logistics Regression Understand what pattern deterioration looks like Apply three levels of model maintenance to prevent model deterioration Install and use SQL Server Install and use Microsoft Visual Studio Shell Clean up data... [-]

Hacking With Nmap: Portscanning And Vulnerability Analysis

Udemy
Online Part time 8 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.

What will I learn?Use Host Discovery to discover active systems on the networkUse the different portscan types to identify open ports and servicesDetermine software and version of services and operating systemsOptimize an Nmap scanWork around firewalls and IDS / IPS with NmapUse NSE and Nmap scripts specifically and develop them yourselfUse additional tools such as Zenmap, ncat and ndiff effectivelyconditionsYou should have a solid basic knowledge of networkingWindows, Linux and TCP / IP should not be foreign words for youNo profound knowledge of TCP / IP is required, all necessary information is provided in the courseA high motivation and affinity to the topic networkdescription... [-]

Computer Networks (CompTIA Network) - The Comprehensive Course

Udemy
Online Part time 25 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA Network [+]

Learn all the important technologies of modern IT networks including preparation for the Exam CompTIA Network

What will I learn?After the course you will be able to understand and classify all the essential technologies of modern IT networksThese include Ethernet, VLANs, port security, switching and routing, firewalls, DMZ, VPN and RAS, WLAN, network management, IT security and IPv6You will also learn how to configure Windows and Linux on the network, and how to set up Active Directory DNS and Web servers and other server servicesAt the end of the course you can practice many technologies yourselfThe course provides optimal preparation for CompTIA Network certificationWith this course, you will receive sound basic knowledge, which is valuable for almost all IT areasconditionsYou should always be able to handle computersIt is an advantage if you have already gained some experience with networks. While the course does not require any prior knowledge, understanding requires some affinity to the topicdescription... [-]

CISSP Prep Class

University of Fairfax
Online May 2018 USA Washington Four

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits) [+]

IA7000 Security in the Digital Age

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

Join the Cybersecurity Elite U of F Cybersecurity Education Path

Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.... [-]


Blockchain Certification Course

ACADGILD
Online Full time 12 weeks March 2019 USA USA Online

Blockchain is touted as the new internet. It is in the same stage of development and capability of disruption as the internet was in the 1990s. It is a digital platform where information and assets can be shared. The platform is incredibly transparent, secure, fast, despite being decentralized. It is already quite popular, and rapidly changing the way markets and organizations function. If you want to be a part of this economy, this course can help you. You will learn the basics of blockchain – the technology that drives Bitcoin, Ripple, Ethereum, etc. You will also learn its advanced applications like Smart Contracts and Assets. [+]

Intensive 4-month Program Collaborative Assignments with Mentors Master Blockchain Technology Learn EVM Architecture, Solidity Codes, and How to Write Smart Contracts

DURATION

12 Weeks

EFFORT

8-10 Hrs/Week

CAREERS

Blockchain Developer, Engineer, Architect, Solidity Developer, Researcher, Product Manager.

Blockchain is touted as the new internet. It is in the same stage of development and capability of disruption as the internet was in the 1990s. It is a digital platform where information and assets can be shared. The platform is incredibly transparent, secure, fast, despite being decentralized. It is already quite popular and rapidly changing the way markets and organizations function. If you want to be a part of this economy, this course can help you.... [-]


Microsoft Professional Program in DevOps (Microsoft)

edX
Online Full time Part time September 2018 USA Cambridge

To support companies in their desire to be more agile, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. [+]

To support companies in their desire to be agiler, the lines between development and operations are becoming increasingly blurred. Through continuous integration and deployment, students will learn how to react to changing market conditions. In a world where your audience taste can change on a dime, ensure audience happiness by learning about application monitoring and feedback loops. Built with the focus on what you need you need to work in DevOps, the Microsoft Professional Program Certificate will help you learn the skills necessary for a DevOps culture in your workplace.

Program Details

Courses

7 courses + Final Capstone Project Effort 16 - 30 hours per course Price

$99 per course / $792 for the entire program... [-]


Course : Introduction to Big Data

Coursera
Online Part time 3 weeks September 2018 USA USA Online

Interested in increasing your knowledge of the Big Data landscape? This course is for those new to data science and interested in understanding why the Big Data Era has come to be. [+]

Interested in increasing your knowledge of the Big Data landscape? This course is for those new to data science and interested in understanding why the Big Data Era has come to be. It is for those who want to become conversant with the terminology and the core concepts behind big data problems, applications, and systems. It is for those who want to start thinking about how Big Data might be useful in their business or career. It provides an introduction to one of the most common frameworks, Hadoop, that has made big data analysis easier and more accessible -- increasing the potential for data to transform our world! At the end of this course, you will be able to: * Describe the Big Data landscape including examples of real-world big data problems including the three key sources of Big Data: people, organizations, and sensors. * Explain the V’s of Big Data (volume, velocity, variety, veracity, valence, and value) and why each impact data collection, monitoring, storage, analysis, and reporting. * Get value out of Big Data by using a 5-step process to structure your analysis. * Identify what are and what are not big data problems and be able to recast big data problems as data science questions. * Provide an explanation of the architectural components and programming models used for scalable big data analysis. * Summarize the features and value of core Hadoop stack components including the YARN resource and job management system, the HDFS file system and the... [-]


Course in Python Data Structures

Coursera
Online Part time 7 weeks September 2018 USA USA Online

This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data structures such as lists, dictionaries, and tuples to perform increasingly complex data analysis. [+]

This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data structures such as lists, dictionaries, and tuples to perform increasingly complex data analysis. This course will cover Chapters 6-10 of the textbook “Python for Everybody”. This course covers Python 3. Chapter Six: Strings In this class, we pick up where we left off in the previous class, starting in Chapter 6 of the textbook and covering Strings and moving into data structures. The second week of this class is dedicated to getting Python installed if you want to actually run the applications on your desktop or laptop. If you choose not to install Python, you can just skip to the third week and get a head start. Unit: Installing and Using Python In this module you will set things up so you can write Python programs. We do not require the installation of Python for this class. You can write and test Python programs in the browser using the "Python Code Playground" in this lesson. Please read the "Using Python in this Class" material for details. Chapter Seven: Files Up to now, we have been working with data that is read from the user or data in constants. But real programs process much larger amounts of data by reading and writing files on the secondary storage on your computer. In this chapter, we start to write our first... [-]


Course in Cryptography I

Coursera
Online Part time 7 weeks September 2018 USA USA Online

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications.

[+]

Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course, participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects. In a second course (Crypto II) we will cover more advanced cryptographic tasks such as zero-knowledge, privacy mechanisms, and other forms of encryption.... [-]