Search result for Control system design Online Courses & Certifications
Get Course Alerts by Email
Hands-on Professional Programming for Beginners: Python + SE
by Sriram Vajapeyam- 4.4
12 hours on-demand video
Software engineering tools such as Integrated Development Environments and Version Control Systems, program development methodologies such as Agile, and programming skills such as requirement specification, top-down design, object-oriented design, and software testing are essential requirements for a software engineer. Top-down Program design GIT Version Control System User Interface (UI) design...
$12.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities....
$21.99
The Complete C Developer Course - Build 7 Exciting Projects!
by Prashant Shinde- 3.8
14.5 hours on-demand video
Do you know the most part of the popular operating system UNIX is written in c . ■ Loop control structure . ■ Develop an advanced Project on " Student Database Management System " . Develop an Advanced Project " Student Database Management System " ....
$12.99
Information Systems Auditing, Controls and Assurance
by Garvin Percy DIAS- 4.7
Approx. 9 hours to complete
Finally, you will get to observe how we can make the system changes more manageable using formal IS Management practices, such as Change Management Controls and Emergency Changes. 2 Introduction to Risk in Information System 2 Design and Selection 6 Case studies: System Changeover Scenarios IS Maintenance and Control More about different environments of an information system...
3 Days Linux Administration Course
by Imran Afzal (285,000+ students)- 4.6
10.5 hours on-demand video
Day 1 – Installation, Configuration, File System and Basic Commands File system structure description File system navigation commands File system paths Day 2 – Linux System Administration System utility commands (date, uptime, hostname, which, cal, bc etc. Day 3 – Advance Linux System Administration System Monitoring Commands (top, df, dmesg, iostat 1, netstat, free etc....
$19.99
Learning Path: Python:Data Visualization with Matplotlib 2.x
by Packt Publishing- 3.8
10.5 hours on-demand video
Plot scaffolding is a very interesting topic wherein you'll be taken through axes and figures to help you design excellent plots. You'll learn how to control axes and ticks, and change fonts and colors. Aldrin Kay Yuen Yim is a PhD student in computational and system biology at Washington University School of Medicine....
$9.99
ASP.Net MVC Quick Start
by Brian Gorman- 4.6
13 hours on-demand video
MVC = Model, View, Controller, and is a well-known and established design pattern. In Microsoft's MVC framework, we find that convention is favored over configuration, so as long as we follow a few simple guidelines, the system will do a lot of the work for us....
$14.99
Related searches
2020 Complete Ruby on Rails 6 Bootcamp: Learn Ruby on Rails
by Tony Staunton- 4.5
14 hours on-demand video
User Interface Design Version Control with Git...
$9.99
Complete Linux Security & Hardening with Practical Examples
by Imran Afzal (200k+ students)- 4.5
16 hours on-demand video
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. PAM Config File – Control Flags Access Control List (ACL) Section 7 - Securing Linux System Design is very good and easy which helps to understand things better....
$17.99
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities. Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities....
$15.99