Available courses

This is the work involved in developing and maintaining servers and systems on the web. It includes database and web servers, infrastructure and cloud services.

Web development is the work involved in developing a website for the Internet (World

Wide Web) or an intranet (a private network). Web development can range from

developing a simple single static page of plain text to complex web-based internet

applications (web apps), electronic businesses, and social network services. A more

comprehensive list of tasks to which web development commonly refers, may


include web engineering, web design, web content development, client liaison, client-

side/server-side scripting, web server and network security configuration, and e-

commerce development.

NETWORK AND CYBER SECURITY -COURSE OUTLINE

 

 

 

1

Introduction to Computer Networking and Security:
Computer Crime, Security and Computer Viruses
Ch.1 - Introduction NETWORK AND CYBER SECURITY -COURSE OUTLINE

 

2

Introduction to Computer Networking and Security:

 

3

Cryptography:
Ch.2 - Conventional Encryption and Message Confidentiality

 

4

 

5.

Cryptography: Types

 

Ch.3 - Public-Key Cryptography and Message Authentication

 

 

 

 

6

Network Security Applications: Ch. 4 - Authentication Applications

 

7

Network Security Applications: Ch.5 - Electronic Mail Security

 

8

Network Security Applications: Ch.6 - IP Security

 

 

 

9

Network Security Applications: Ch.7 - Web Security

 

10

Ch.8 - Network Management Security

 

 

 

 

11.

System Security: Ch.9 - Intruders and Viruses

 

System Security: Ch.10 - Firewalls

 

12.                Concepts of Certified Ethical Hacking

 

13.              Practical Test

 



Network and cyber security consists of the policies and practices adopted to prevent and

monitor unauthorized access, misuse, modification, or denial of a computer

network and network-accessible resources. Network security involves the authorization of

access to data in a network, which is controlled by the network administrator. Users

choose or are assigned an ID and password or other authenticating information that

allows them access to information and programs within their authority. Network security

covers a variety of computer networks, both public and private, that are used in

everyday jobs; conducting transactions and communications among businesses,

government agencies and individuals. Networks can be private, such as within a

company, and others which might be open to public access. Network security is involved

in organizations, enterprises, and other types of institutions. It does as its title explains: it

secures the network, as well as protecting and overseeing operations being done. The

most common and simple way of protecting a network resource is by assigning it a

unique name and a corresponding password. 

Software development tool is a computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications. The term usually refers to relatively simple programs, that can be combined together to accomplish a task, much as one might use multiple hand tools to fix a physical object. The most basic tools are a source code editor and a compiler or interpreter, which are used ubiquitously and continuously. Other tools are used more or less depending on the language, development methodology, and individual engineer, and are often used for a discrete task, like a debugger or profiler. Tools may be discrete programs, executed separately – often from the command line – or may be parts of a single large program, called an integrated development environment (IDE). In many cases, particularly for simpler use, simple ad hoc techniques are used instead of a tool, such as print debugging instead of using a debugger, manual timing (of overall program or section of code) instead of a profiler, or tracking bugs in a text file or spreadsheet instead of a bug tracking system.

An operating system (or OS) is a group of computer programs, including device drivers, kernels, and other software that lets people interact with a computer. It manages computer hardware and software resources. It provides common services for computer programs. An OS can be small (like MenuetOS), or large (like Microsoft Windows). Different operating systems can be used for different purposes. Some are used for everyday things like on a personal computer. Others are mobile operating systems or are used for specialized work. An operating system has many jobs. It makes sure that all the programs can use the CPU, system memory, displays, input devices, and other hardware. Some also give the user an interface to use a computer. An OS is also responsible for sending data to other computers or devices on a network.

Data science is an inter-disciplinary field that uses scientific methods, processes,

algorithms and systems to extract knowledge and insights from structured

and unstructured data. Data science is related to data mining and big data.

Data science is a "concept to unify statistics, data analysis, machine learning and their

related methods" in order to "understand and analyze actual phenomena" with data. It

employs techniques and theories drawn from many fields within the context

of mathematics, statistics, computer science, and information science. Turing

award winner Jim Gray imagined data science as a "fourth paradigm" of science

(empirical, theoretical, computational and now data-driven) and asserted that

"everything about science is changing because of the impact of information technology"

and the data deluge.

Target: Undergraduate and Postgraduate Students/Career Software Developers with a basic understanding of the software development lifecycle. Basic experience in coding required