Professional Package
Cloud Security and DevOps Professional 101
Difficulty Level
Third class advanced professional
Duration
26 Weeks
Certification
Yes
Program Path
7
Description
Program Outcomes
2021 Course Calendar
Learning Path Steps
This course is geared for people who want to gain an overall understanding of the AWS Cloud Platform. The course will provide a high-level of understanding on AWS core services and security. This course will focus on the following content: The Cloud 1, understanding your AWS account, understanding the AWS environment, securing your AWS resources, the core compute services, the core storage services, the core database services, the core networking services, and automating your AWS workloads.
This course focuses on the cloud concepts, Azure services, Azure workloads, security and privacy in Azure as well as Azure pricing and support. Azure fundamentals can be used to prepare for other Azure role-based or specialty certifications but it is not a prerequisite for any of them.
This course focuses on core Azure services, Azure workloads, security and governance. You will learn how to deploy, manage and scale Azure virtual machines, administer Azure using the Resource Manager, Azure portal, Cloud shell, Azure Powershell, CLI and ARI Templates, administer Azure App Service, Azure Container Instances, and Kubernetes and monitor the Azure infrastructure with Azure Monitor, Azure alerts, Log Analytics, and Network Watcher.
This course focuses on how to manage identities, provide role-based access, and secure data within an Azure ecosystem. You will learn how to implement security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.
This course focuses on the development and deployment of backup, recovery and cloud computing strategies, master functional programming fundamentals, understand object-oriented design principles and patterns and work confidently with operators, conditionals and loops.
This course focuses on the XML Security standards, XML vocabularies and processing rules in order to meet security requirements. The standards include the use of legacy cryptographic and security technologies and emerging XML technologies in order to provide a flexible, extensible and practical solution toward meeting security requirements. It also covers XML Digital Signature for integrity and signing solutions, XML Encryption for confidentiality, XML Key Management (XKMS) for public key registration, location and validation, Security Assertion Markup Language (SAML) for conveying authentication, authorization and attribute assertions, XML Access Control Markup Language (XACML) for defining access control rules, and Platform for Privacy Preferences (P3P) for defining privacy policies and preferences. Major use cases include securing Web Services (WS-Security) and Digital Rights Management (eXtensible Rights Markup Language 2.0 – XrML).
This course introduces students to PL/SQL, Oracle’s procedural extension language for SQL and the Oracle relational database. Participants explore the differences between SQL and PL/SQL. They also examine the characteristics of PL/SQL and how it is used to extend and automate SQL to administer the Oracle database. It culminates with a project that challenges students to program, implement, and demonstrate a database solution for a business or organization.
This course focuses on Python as a language with a simple syntax, and a powerful set of libraries. It is an interpreted language, with a rich programming environment, including a robust debugger and profiler. This course is an introduction to the Python programming language for students without prior programming experience. It covers data types, control flow, object-oriented programming, and graphical user interface-driven applications. Examples and problems are drawn from diverse areas such as text processing, simple graphics creation and image manipulation, HTML and web programming, and genomics.
PEARL is a higher programming language, which allows a comfortable, secure and almost processor independent programming of multitasking and realtime problems and has been standardized since 1977 at various stages of its development, the last time 1998 as PEARL-90 (DIN 66253-2 1998, Berlin, Beuth-Verlag, 1998). All basic data types and language structures of other procedural programming languages exist in PEARL. In addition PEARL offers comfortable language elements for the handling of multitasking- and realtime tasks. Like most other high-level languages, PEARL supports procedure and functions, and passing parameters to these can be done by value or by reference
This is an interpreted, high-level, general-purpose programming language. It is dynamically typed and uses garbage collection. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming. According to the creator, Ruby was influenced by Perl, Smalltalk, Eiffel, Ada, BASIC, and Lisp.
This course introduces computer JAVA programming language with unique architecture that enables programmers to develop a single application that can run across multiple platforms seamlessly and reliably. In this hands-on course, students gain extensive experience with Java and its object-oriented features. Students learn to create robust console and GUI applications and store and retrieve data from relational databases.
This course aims to provide a first introduction to quantum computing that highlights the paradigm change between conventional computing and quantum computing and introduces several basic quantum algorithms.
Short description here.
This course includes the activities that maintain and provide systematic proof of both adherence to internal policies and the external laws, guidelines, or regulations imposed upon the company. This is done through a defensible process. It includes the two elements of compliance: one that focuses on the management of compliance, and the second manages the integrity of the system used to adhere to and prove compliance.
Digital Forensic focuses on evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
This course introduces students to the intricacies of reverse-engineering, machine code, assembly language, system-level and code-level reversing and the legality of reverse-engineering.