2682 Results
As communications and networking technologies evolve, alternatives to traditional enterprise networks have emerged. There is demand in all sectors and industries for employees who not only understand these emerging technologies but can also implement them to save time and money while increasing security of corporate communications. This micro-credential allows current industry employees to build...
As communications and networking technologies evolve, alternatives to traditional enterprise networks have emerged. There is demand in all sectors and industries for employees who not only understand these emerging technologies but can also implement them to save time and money while increasing security of corporate communications. This micro-credential allows current industry employees to build...
With the release of ChatGPT and the several iterations that followed, there has never been more interest and use in AI platforms. AI platforms are being used across industries, from marketing, real estate and computer programming. While AI platforms can generate responses within seconds, it isn't necessarily always accurate. In this twenty-hour micro-credential badge on PAI-Prompt Engineering...
Continuing from Programming Fundamentals, this course introduces the object-oriented programming concepts of encapsulation, inheritance, and polymorphism, class design using UML, exception handling, GUI development using the Swing and JFX packages, event-driven programming, and using the JDBC package to connect to databases.
Students will learn common computer programming algorithms and the data structures used to implement them, emphasising the relationship between algorithms, programming, and data structures. Special focus will be on the underpinnings and implementations of various commonly used data structures.
This course provides the fundamental concepts of Object-Oriented software development using the C++ language.
This course will concentrate on the concepts of auditing, controls and security in an IT environment. Topics covered include general and application internal controls, security, governance, standards, guidelines and regulations. Methods and procedures to assess the risks and evaluate controls over information systems in an organization will be examined.
This course provided students with a comprehensive overview of the domains or areas of study in the CISSP (Certified Information Systems Security Professional) certification. Domains include; Security and Risk Management), Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software...
This course will provide necessary skills to identify essential elements of a Security Management System, and the business processes that require protection. Risk assessments will identify vulnerabilities and required countermeasures to prevent and mitigate system failures. The consequences of data loss and the required safeguards are part of the process. The course will concentrate on the...
Students will expand their knowledge of coding Electronic Health records by utilizing the principles and guidelines of ICD-10-CA/CCI. The importance of accuracy and consistency will be evaluated using case studies. Students will also explore the relationship between data collection and the classification system as it relates to decision making and resource allocation.