Search result for Data types Online Courses & Certifications
Get Course Alerts by Email
Process Diagrams, Flowcharts and BPMN 2.0
by ICAN Consultancy- 4
1 hour on-demand video
Process Models and Diagram Types Data Objects...
$9.99
Nmap course: Nmap Scanning Tool easily for beginners
by PSU Linux [ Python Linux And Ethical hacking ]- 0.0
2 hours on-demand video
Than we gonna learn and understand networking and its different types and what controls the data transfer in a network...
$12.99
International Cyber Conflicts
by Sanjay Goel , Kevin Williams- 4.5
Approx. 9 hours to complete
• Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda Evolution and Types of Cybercrime Types of the Attacks Readings for Modes and Types...
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. What if you could help prevent a data breach in your organization? Types of firewall configurations How data breaches are exposed...
Qualitative Data Collection Methods
by Karen Andes, PhD- 0.0
Approx. 14 hours to complete
This course presents a detailed overview of qualitative methods of data collection, including observation, interviews, and focus group discussions. We will start with an in-depth overview of each method, explore how to plan for data collection, including developing data collection guides, and discuss techniques for managing data collection. Qualitative Research Design & Data Collection...
Mastering MS Excel
by Alvin Pillay- 0.0
5 hours on-demand video
moving data Chapter 11 teaches you about a tool that makes data formatting your data as tables. Removing duplicate data rows, defining named ranges, creating a pick list using data validation, protecting your sheet and workbook, inserting fancy graphics....
$12.99
Computer Networking
by Nick Feamster , Joshua Valdez- 0.0
Approx. 3 months
Want to build on your Computer Networking knowledge or move into Network Engineering positions such as Systems Admin, Network Admin or Technical Operations (WebOps)? If so, this is the class for you. This is an advanced Computer Networking course that delves into the latest concepts and tools used by the CN industry....
Free
Related searches
Metagenomics applied to surveillance of pathogens and antimicrobial resistance
by Ana Sofia Ribeiro Duarte , Tine Hald , Sünje Johanna Pamp , Patrick Munk , Liese Van Gompel , Valeria Bortolaia , Pimlapas Leekitcharoenphon- 4.7
Approx. 15 hours to complete
- the principles behind various tools available for analysis of metagenomics data General introduction to bioinformatics analysis of metagenomics data General introduction to bioinformatics analysis of metagenomics data Analysis and visualization of read count data Analysis and visualization of read count data...
Swift 4 and iOS 11: Building a Store Front App
by Andi Setiyadi- 4.4
25 hours on-demand video
One of the challenges were learning how to best use all types of view controllers available within iOS SDK. The focus on this Swift course is to get familiar with many different types of VIEW CONTROLLERS in iOS framework that are available and serving different purposes depending on the app functionalities that we want to deliver. Swift FundamentalsAuto Layout and Size ClassesUIViewControllerUITabBarControllerUITableViewControllerUIPageViewControllerUICollectionViewControllerUISplitViewControllerUIPopoverPresentationControllerUIAlertControllerIntroduction to Core Data...
$11.99
A Guide to Security Information and Event Management - SIEM
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 3.8
16.5 hours on-demand video
You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. You will learn that SIEM is necessary because of the rise in data breaches and to meet stringent compliance requirements...
$16.99