COURSE 2: GET STARTED WITH PYTHON

Module 3: Loops and Strings INTRODUCTION – Loops and Strings In this section, you will learn how to use iterative statements, or simply loops, to carry on something you have done rough and are often going to repeat. Additionally, you will learn more about string manipulation with slicing, indexing and formatting. Learning Objectives Understand concatenation, … Read more

Module 2: Basics of IP Addressing and the OSI Model 

INTRODUCTION – BASICS OF IP ADDRESSING AND THE OSI MODEL A knowledge introduction to IP addressing and how it affects network traffic routing will be provided. Application and transport protocols will also be explored for a fuller understanding of their roles in network communication. Gradually, more information will be acquired concerning firewalls and advanced concepts … Read more

Module 1: TCP/IP Framework 

INTRODUCTION – TCP/IP Framework This module serves as an introduction to the TCP/IP framework, Ethernet, LAN networks, and basic concepts in routing and switching. In addition, you will learn about address translation and the differences between Intrusion Detection and Intrusion Prevention Systems. Finally, the course will conclude with an exploration of packet networks. Learning Objectives: … Read more

Module 4: Deep Dive – Injection Vulnerability

INTRODUCTION – DEEP DIVE – INJECTION VULNERABILITY In this very module, you will be able to listen to the opinion an Subject Matter Expert from IBM reveals about the prevalently existing Injection vulnerabilities. You will also be able to learn basis concepts of OS Command Injection as well as SQL Injection. Objectives of Learning: Detect … Read more

Module 3: Introduction to Databases 

INTRODUCTION – Introduction to Databases This module enables the learner to understand the classification of data sources and data models, different types of data types, and best practices to protect organizational data. The module has finally ended, and the real-world scenario is exploring using IBM Security Guardium as an example of a practical Data Protection … Read more

Module 3: Windows Operating System Security Basics

INTRODUCTION – Windows Operating System Security Basics As far as this module is concerned, you will be introduced to the file system and directory structures that are specific to the Windows operating system. You will also get used to different shortcut keys and commands that are designed to help you navigate through the entire Windows … Read more

Module 2: Visualize Results

INTRODUCTION – Visualize Results This is a comprehensive course that immerses learners in the world of Business Intelligence (BI) visualizations with an emphasis on the delicate balance in their design. It will expose them to the trade-offs that come into play when effective data communication goes hand-in-hand with visual representation choices. By taking hands-on exercises, … Read more

Module 5: Final Project

INTRODUCTION – Final Project You will learn in this module to apply a structural problem-solving framework for challenging projects. Focus on understanding the problem, available solutions, and drawing up a proper plan to meet the challenge’s specifications. Objectives of Learning: Use a framework: Build a structure from startup to completion to attack complex problems systematically. … Read more

Week 1: Coursera AWS Fundamentals Specialization

INTRODUCTION We shall cover the fundamental concepts of “least privilege” and the “Shared Responsibility Model.” Learn also about the AWS compliance programs and secure AWS accounts through AWS IAM. WEEK 1 QUIZ 1 1. What security mechanism can add an extra layer of protection to your AWS account in addition to a username password combination? … Read more