-
Course – 1 : Artificial Intelligence ( AI )
- Introducing Artificial Intelligence (AI)
- Branches of AI
- Role of Data, Algorithms and Hardware in AI
- Data Analysis with AI
- Machine Learning in AI
- Deep Learning in AI
- Planning with AI
- Computer Vision, Voice and Natural Language Processing with AI
- Robotics with AI
- Future of AI
-
Course – 2 : Machine Learning
- Introduction to Machine Learning
- Applications of Machine Learning
- Supervised vs Unsupervised Learning
- Python libraries suitable for Machine Learning
- Regression
- Linear Regression
- Non-linear Regression
- Model evaluation methods
- Classification
- K-Nearest Neighbor
- Decision Trees
- Logistic Regression
- Support Vector Machines
- Model Evaluation
-
Course – 3 : Deep Learning
- History of Deep Learning
- Neural Network
- Activation Function
- Learning Algorithm
- Data Augmentation
- Visualizing CNN
- Enf2End Model ( Encoder & Decoder )
-
Course – 4 : Data Analysis – Alteryx
- Powerful Data Visualization
- Data Blending and Join
- Explore Interactive Insights
- Transforming and Analyzing Data
- Data Cleansing & Data Preparation
- Data Parsing and Reporting
-
Course – 5 : AWS – Amazon Web Services
- AWS Overview and Fundamentals
- Designing Highly Available, Cost-efficient, Fault-tolerant, and Scalable Systems
- Identity Access Management (IAM)
- Amazon Virtual Private Cloud (VPC)
- Elastic Compute Cloud (EC2)
- Amazon Simple Storage Service (S3)
- Amazon Route 53
- Databases
- Application Services
-
Course – 6 : Big Data
- Introduction Big Data
- Introduction Hadoop
- Hive
- Querying Big Data with Hive
- Pig
- Map Reduce
- HBASE
- HDFS
-
Course – 7 : Internet of Things ( IoT )
- Exploring Internet of Things and Its Architecture
- Describing IoT Boards
- Introduction to Arduino
- Interfacing with Arduino
- Introduction to Raspberry Pi
- Interfacing with Raspberry Pi Board
- Exploring Operating Systems of IoT
- Introducing IOT Cloud Platforms
- Big Data Analytics in IoT
- Network Virtualization and IoT
- Cybersecurity in IOT
-
Course – 10 : Game Design
-
Course – 11 : Cyber Security
- Introduction to Cyber Security
- Describing Data Security and Its Need.
- Securing Windows, Linux and MAC Operating systems.
- Exploring Browser and Internet Safety.
- Exploring Email and how to secure from email threats.
- Social Networking: Associated Risk and Solutions.
- Safeguarding the Mobile Devices.
- Cloud and Its Associated Threats.
- Communicating securely over network connections.
- Threats and Solutions.
- Preparing for Unforeseen Threats.
-
Course – 12 : Augmented Reality
Course – 13 : DevOps ( Jenkins, Bit Bucket, GIT Hub, Dockers, etc… )
- Overview of DevOps
- Version Control with Git
- What is version control Preview
- What is Git
- Why Git for your organization Preview
- Install Git
- Common commands in Git
- Continuous Deployment with Docker
- Shipping Transportation Challenges
- Introducing Docker
- Understanding images and containers
- Running Hello World in Docker
- Introduction to Container Preview
- Container Life Cycle
- Sharing and Copying
- Base Image
- Docker File
- Working with containers
- Publishing Image on Docker Hub
-
Course – 14 : Selenium Testing
- Introduction to Selenium
- Why Selenium?
- Selenium – Web driver Preview
- Creating Test Cases in Selenium WebDriver (Waits)
- What and why X-Path
- Handling different controls on Webpage
-
Course – 15 : Ethical Hacking
- Introduction to Ethical Hacking
- Footprinting & Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Hacking Web Servers & Applications
- Hacking Wireless Networks
- Cryptography
Back to Top