|Course or Certification Name||Category||Location||Mode of learning|
|Internet of Things Intermediate Online Instructor led certification||Internet of Things||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|SHRM Senior Certified Professional (SHRM-SCP)||Talent Management||Online self study|
|Professional in Human Resources (PHR)||Talent Management||Online self study|
|SHRM Certified Professional (SHRM-CP) Course||Talent Management||Online self study|
|Qlikview||Qlikview||Online self study|
|AWS Certified Developer - Associate||Cloud Computing||Online self study|
|Financial Technologies (FinTech) for Leadership in the Digital World||Financial modelling||Classroom|
|Certified Ethical Hacker 9 (CEH v9)||Ethical Hacking||Classroom|
|CISSP (Online Classroom - Flexi Pass)||cissp||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Oracle Database 11g: Secure Backup||Online self study|
|Be A White Hat Hacker and Pen Tester||Online self study|
|Cryptography: Learn Public Key Infrastructure from Scratch||Web Technologies||Online self study|
|QuickBooks Payroll - QuickBooks Online 2019||Payroll Management||Online self study|
|Cybersecurity Fundamentals||Cyber Security||Online self study|
|Cloud Development Professional Training||Cloud Computing||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
IoT extends the Internet from mostly used devices like desktop and portable computers, Smartphones and tablets to various variants of devices and everyday things that utilize embedded technology to speak and act with the external surroundings, all via net. Learn how you can derive deep business insight from the Internet of Things (IoT) while boosting your skills from Collabera TACT and be future ready. By 2020 the number of devices connected is predicted to reach a whopping 25 Billion across the globe. With such great magnitude of work being done in the field, IoT has become one of the hottest skills for job seekers in recent times. Programmers, Developers, Engineers and Network Experts are believed to be the primary beneficiaries of IoT.
The course is aimed at providing advice, guidance and counsel to the candidates. HR Practitioners are also involved in the decision making and problem solving processes. In this course, you will scout behavioral competencies, ethical practice, capabilities for improving the effectiveness in the workplace, some judgement examples and so on. It is actually helpful for HR professionals who wish to develop abilities for advancing their career. The course also includes global job market issues, organizational hiring needs, key activities for successful onboarding and workforce planning. Besides this, it will help prepare for the SHRM-CP/SCP certification exams, it is equally useful for HR professionals who want to develop capabilities for improving their effectiveness in the workplace and advancing their career.
The course tests applicants and administrative functions like organizational documents to make sure acquiescence with key regulations, how to measure employee opinions and the job analysis process. It also emphasizes on recruitment strategies and job analysis. HR experts require to establish main criteria for retention, promotion, hiring and ways to approach recruitment efforts in order to achieve organizational goals. The course will focus on the significant skills and techniques for securing staffing alternatives. In the end, applicants participate in enterprise risk management to make sure that company’s risks are handled, monitored and analyzed on a daily basis. Besides this, it also helps the individuals preparing for the Human Resource Certification Institute’s examination.
Earning SHRM certification makes you a recognized professional and leader in the HR domain. The course covers plan risk responses and control risks so that you gain benefit on potential opportunities in the project risk management area. It will set you apart from the applicants, proving you great level of knowledge and skills. The course directly links to on-the job experiences and realistic work situations, making it one of the most popular certifications for HR experts. It also covers all the essential project documents and ideas that need updates as these processes are carried out. Besides this, it will help prepare for the SHRM-CP/SCP certification exams, it is equally useful for HR professionals who want to develop capabilities for improving their effectiveness in the workplace and advancing their career.
This course is a comprehensive training on Qlikview Software and its usage. The major topics include QlikView Overview, Qlikview Application, Objects such as sheets, list-boxes and charts, Working with scripts, Loading data, Deploying Qlikview applications, Chart Properties, different types of charts-Radar Chart, Maco Chart, Grid Chart and Funnel Chart.
Amazon Web Services, a subsidiary of Amazon, is a suite of cloud computing services. This AWS Certified Developer course has been specifically designed to provide the candidates with a comprehensive understanding of the platform to develop web application of high availability. With quality online learning modules, the course offers training on the various features and services available on the AWS. It will provide the best learning resources for the learners to get hands-on experience on developing Node.js applications on AWS. This course covers other areas of AWS, including core services and other related areas.
The financial world is going through an era of digital transformation. The impact of social media, mobility, Big Data and machine learning, Internet of Things, information security and blockchain, and artificial intelligence based robotics is being felt as firms strive to meet the expectations of the new-age millennial customers through digital mastery. Digital change management in the banking and financial services industry and capital markets needs new capabilities in leaders who have the vision to develop novel technological innovation for transforming the world of banking, trading, risk management, customer management and advisory, payments and fraud detection. This program aims to inspire leaders of firms with the required organizational and technological know- how for creating a novel digital vision for the financial organizations with measurable impact.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization
Oracle Secure Backup or OSB is centralized tape-management software that allows you to backup and restore data using a variety of machine architectures. The Oracle Database 11g covers how OSB complements the Oracle backup and recovery options, as well as terminology, interface options, and backup management features. Also, the course helps you to explore how you can decide on the structure of the domain, install OSB on Linux and removing OSB. The modules that the course covers include Configuring OSB and Security, Securing Domain and Data in Oracle Secure Backup, RMAN and Oracle Secure Backup, Managing Backups and Infrastructure and Tape Vaulting, Duplication, and Tuning. Additionally, this course also describes integrated disk and tape backup, how to register the administrative server in Enterprise Manager, checking RMAN backup and recovery settings, creating database backup storage selectors, and using time-managed and content-managed expiration policies.
"Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metasploit , Scapy and WireShark. The course is divided into the following main sections: | Ethical Hacking Concepts -What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques Real World Information Gathering -Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration Scanning and Vulnerability Gathering -Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification Network Attacking Techniques Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks Web Exploitation Techniques Learn about password attacks, SQL Injections, RCE and DOS attacks Wireless Network Security Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks Metaspoilt Learn to use the metaspoilt tool for your projects Detection Evasion Learn about the detection evasion techniques This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise."
In this course we'll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.
QuickBooks Online 2019 payroll will describe the payroll process for a small business in detail, so bookkeepers, accountants, and business owners can better understand how to set up payroll, process payroll, and troubleshoot problems related to payroll.| This course will introduce the payroll set-up in the QuickBooks Online 2019 system, walking through payroll screens.| We will discuss payroll legislation that will affect payroll calculations within QuickBooks Online 2019 and list the payroll forms we will need to generate from Quickbooks Online.| The course will walk through the process of entering a new employee into the QuickBooks Online 2019 system and describe where the data would be received from in practice including Form W-4.| We will discuss Federal Income Tax (FIT) calculations within QuickBooks Online 2019. The course will describe how FIT is calculated, what is needed for QuickBooks Online to calculate FIT, and how to enter the data into the accounting system.| The course will describe the Federal Income Contributions Act (FICA) and its components.| We will calculate social security and describe how QuickBooks Online 2019 will help with the calculations as we process payroll.| The course will calculate Medicare and describe how QuickBooks Online 2019 will help with the calculations of Medicare when we process payroll. | We will calculate Federal Unemployment (FUTA) and discuss how FUTA is related to state unemployment (SUTA).| The course will describe and calculate employer taxes and discuss which taxes are employee taxes and which taxes are employer taxes.
In Cybersecurity Fundamentals course, participants will study all about cybersecurity fundamentals which spans across topics like detecting threats, protecting systems and networking, as well as anticipating possible cyber-attacks. | Cybersecurity Fundamentals is an introductory course dealing in computing security. Participants enrolling for the same will gain an extensive overview of numerous computing security topics. Study cybersecurity concepts in detail as well as vital issues and tools for problem solving in computing security domain. | Participants will also get an opportunity to learn all the indispensable techniques for protecting systems and network infrastructures, and also examining, monitoring and envisaging potential cyber threats and attacks. Learn how to devise and implement security solutions for organizations of all sizes. | The Cybersecurity Fundamentals course is under the umbrella of RITx Cybersecurity MicroMasters Program which prepares candidates for computing security.
Cloud Development Professional is a 360° Training Program offered to professionals who want to deepen their knowledge and expertise in the field of AWS Cloud Computing. This program is updated regularly to comply with the latest industry standards, and is created and delivered by certified expert practitioners, with a passion for their craft. | This course is targeted towards professionals who desire to learn concepts and integrate skills relating to cloud computing and AWS into their work.