|Course or Certification Name||Category||Location||Mode of learning|
|Internet of Things Capstone V2: Build a Mobile Surveillance System||Internet of Things||Online self study|
|Certified Environmentalist Government Certification||Environment management||Offline self study|
|Network Security Basics||Online self study|
|MalariaX: Defeating Malaria from the Genes to the Globe||Health care & Medicine||Online self study|
|The Complete Cyber Security Course : Hackers Exposed!||Online self study|
|Risk Management in Stock Broking House Certification Course||Stock Trading & Technical Analysis||Online self study|
|Postgraduate Diploma in Artificial Intelligence||Data Science||Classroom|
In the Capstone project for the Internet of Things specialization, you will design and build your own system that uses at least 2 sensors, at least 1 communication protocol and at least 1 actuator. You will have a chance to revisit and apply what you have learned in our courses to achieve a robust, practical and/or fun-filled project. | We absolutely encourage you to design whatever you can think up! This is your chance to be creative or to explore an idea that you have had. But if you don’t have your own idea, we provide the description of a surveillance system, for you to build. We will participate in the Capstone with you by building a surveillance system that features an off-grid solar powered workstation that will serve as a hub to multiple surveillance sensors.
Environmentalists work with government organisations or corporate bodies to help minimise the impact that business activities have on the environment. The course is designed to give candidates a comprehensive training on various areas of legal, policies and issues related to business practices affecting the environment. Vskills Environmentalist course awards a government certification to the candidates and tests their ability to manage environmental compliance and programs as per a company’s requirements.
Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.
How can we eradicate malaria? Explore the scientific and technological underpinnings of malaria, as well as the historical, political, social, and economic contexts in which control, elimination, and eradication efforts unfold | Through foundational lectures and supplemental interviews, this course provides participants with a toolbox of knowledge and skills. Learners will be guided through the analysis of real-world data and its effective use in problem-solving. Analytical approaches focus on how to develop and implement evidence-based intervention strategies to contribute to national and local malaria eradication efforts.
Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to follow expert course. Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux. This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments. We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more. You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities. You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
Risk management in broking house certificate course will be very benificial for those who want to make their career as risk manager at stock broking houses and financial insitutions. This course covers end to end knowledge and day to day function of RMS and surveillance department.
Artificial intelligence (AI) is a field of computer science that enables computers and machines to perform tasks normally requiring human intelligence. Its many applications range from chess-playing robots and autonomous cars to speech, image, and language processing, robotic manufacturing, and surveillance systems. In the twenty-first century, AI has experienced a resurgence following concurrent advances in computer power, large amounts of data, and theoretical understanding. AI techniques have now become an essential part of the technology industry, helping to solve many challenging problems in computer science