• Course – 1 : Artificial Intelligence ( AI )

    • Introducing Artificial Intelligence (AI)
    • Branches of AI
    • Role of Data, Algorithms and Hardware in AI
    • Data Analysis with AI
    • Machine Learning in AI
    • Deep Learning in AI
    • Planning with AI
    • Computer Vision, Voice and Natural Language Processing with AI
    • Robotics with  AI
    • Future of AI
  • Course – 2 : Machine Learning

    • Introduction to Machine Learning
      • Applications of Machine Learning
      • Supervised vs Unsupervised Learning
      • Python libraries suitable for Machine Learning
    • Regression
      • Linear Regression
      • Non-linear Regression
      • Model evaluation methods
    • Classification
      • K-Nearest Neighbor
      • Decision Trees
      • Logistic Regression
      • Support Vector Machines
      • Model Evaluation
  • Course – 3 : Deep Learning

    • History of Deep Learning
    • Neural Network
    • Activation Function
    • Learning Algorithm
    • Data Augmentation
    • Visualizing CNN
    • Enf2End Model ( Encoder & Decoder )
  • Course – 4 : Data Analysis – Alteryx

    • Powerful Data Visualization
    • Data Blending and Join
    • Explore Interactive Insights
    • Transforming and Analyzing Data
    • Data Cleansing & Data Preparation
    • Data Parsing and Reporting
  • Course – 5 : AWS – Amazon Web Services

    • AWS Overview and Fundamentals
    • Designing Highly Available, Cost-efficient, Fault-tolerant, and Scalable Systems
    • Identity Access Management (IAM)
    • Amazon Virtual Private Cloud (VPC)
    • Elastic Compute Cloud (EC2)
    • Amazon Simple Storage Service (S3)
    • Amazon Route 53
    • Databases
    • Application Services
  • Course – 6 : Big Data

    • Introduction Big Data
    • Introduction Hadoop
    • Hive
    • Querying Big Data with Hive
    • Pig
    • Map Reduce
    • HBASE
    • HDFS
  • Course – 7 : Internet of Things ( IoT )

    • Exploring Internet of Things and Its Architecture
    • Describing IoT Boards
    • Introduction to Arduino
    • Interfacing with Arduino
    • Introduction to Raspberry Pi
    • Interfacing with Raspberry Pi Board
    • Exploring Operating Systems of IoT
    • Introducing IOT Cloud Platforms
    • Big Data Analytics in IoT
    • Network Virtualization and IoT
    • Cybersecurity in IOT
  • Course – 10 : Game Design

  • Course – 11 : Cyber Security

    • Introduction to Cyber Security
    • Describing Data Security and Its Need.
    • Securing Windows, Linux and MAC Operating systems.
    • Exploring Browser and Internet Safety.
    • Exploring Email and how to secure from email threats.
    • Social Networking: Associated Risk and Solutions.
    • Safeguarding the Mobile Devices.
    • Cloud and Its Associated Threats.
    • Communicating securely over network connections.
    • Threats and Solutions.
    • Preparing for Unforeseen Threats.
  • Course – 12 : Augmented Reality

    Course – 13 : DevOps  ( Jenkins, Bit Bucket, GIT Hub, Dockers,  etc…  )

    • Overview of DevOps
    • Version Control with Git
      • What is version control Preview
      • What is Git
      • Why Git for your organization Preview
      • Install Git
      • Common commands in Git
    • Continuous Deployment with Docker
      • Shipping Transportation Challenges
      • Introducing Docker
      • Understanding images and containers
      • Running Hello World in Docker
      • Introduction to Container Preview
      • Container Life Cycle
      • Sharing and Copying
      • Base Image
      • Docker File
      • Working with containers
      • Publishing Image on Docker Hub
  • Course – 14 : Selenium Testing

    • Introduction to Selenium
    • Why Selenium?
    • Selenium – Web driver Preview
    • Creating Test Cases in Selenium WebDriver (Waits)
    • What and why X-Path
    • Handling different controls on Webpage
  • Course – 15 : Ethical Hacking

    • Introduction to Ethical Hacking
    • Footprinting & Scanning Networks
    • Vulnerability Analysis
    • System Hacking
    • Malware Threats
    • Social Engineering
    • Denial-of-Service
    • Session Hijacking
    • Hacking Web Servers & Applications
    • Hacking Wireless Networks
    • Cryptography