Free

IT Support

Beginner

This course is designed to simulate a real Service Desk environment and …

What you'll learn
How a support / service desk operates
Create, assign, resign, and close a ticket
Troubleshooting basic IT issues
Hardware Concepts
ITIL key terms
Free

Cloud Computing

Beginner

This course will help students gain an understanding of how …

What you'll learn
Install and configure Kubernetes
Be able to run stateless and stateful applications on Kubernetes
Use Volumes to provide persistence to your containers
Install and use kubeless to run functions (serverless) on Kubernetes
Free

Machine Learning with Artificial Intelligence

Beginner

Are you prepared for the inevitable AI revolution? Artificial Intelligence …

What you'll learn
Understand the concepts and branches of AI
Understand the machine learning algorithms
Understand and implement regression, classification, and clustering algorithms
Understand and implement artificial neural network and deep learning
Featured
Free

Foundations of Project Management

Beginner

Learners will be taught about the essentials of project management, …

What you'll learn
What is project management?
What are the essential concepts of project management?
What factors affect the state of a project?
Core concepts of project management
Project phases and processes, such as traditional project life cycles
The role of the project manager
Featured
Free

Digital Skills: Succeeding in a Digital World

Beginner

This online course will develop participants’ confidence and skills to …

What you'll learn
Understand and be confident in your online identity
Use technology confidently and critically to achieve your study, work and life goals
Reflect proactively on your level of digital confidence, and identify steps for further development.
Free

Network Security

Beginner

This course discusses the key problems involved in achieving a …

What you'll learn
Identify some of the factors driving the need for network security
Identify and classify particular examples of attacks
Define the terms vulnerability, threat and attack
Identify physical points of vulnerability in simple networks
Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare