Inhalt: In the information age, companies need skilled professionals who can glean useful intelligence from troves of data. These data science roles can be challenging, rewarding, and lucrative. If you''re interested in pursuing a career in this growing field, then the Certified Analytics Professional (CAP) certification may be right for you. In this course, Jungwoo Ryoo provides an expedited overview of each of the first four domains in the CAP exam, helping you get up to speed with some of the core data science concepts covered on the test. After going over the history of CAP and related certifications, he dives into domains 1-4: Business Problem Framing, Analytics Problem Framing, Data, and Methodology. Umfang: 01:31:40.00
Inhalt: Want to accelerate your career in data science and analytics? Consider earning the Certified Analytics Professional (CAP) credential. This premier data science certification shows potential employers that you can glean insights from data and use your findings to determine logical next steps. In the Certified Analytics Professional (CAP) Cert Prep series, Jungwoo Ryoo provides test takers with an understanding of how a core set of data science topics are relevant and necessary to obtain a CAP credential in an expedited fashion. In this installment of the series, he provides a study guide for exam domains 5-7. Plus, he shares case studies that demonstrate how the CAP knowledge domain concepts work in the real world. Umfang: 01:04:52.00
Inhalt: Computer Forensik kommt ins Spiel, wenn eine Lücke in der IT-Sicherheit ausgenutzt wurde oder ein System auf Spuren eines Verbrechens untersucht werden muss. Dann gilt es Beweise sicherzustellen und den Angriff zu analysieren. Damit ist die Computer Forensik ein vielseitiges und immer wichtiger werdendes Teilgebiet im Bereich IT-Sicherheit. FH-Professor Simon Tjoa erklärt Ihnen in diesem Kurs die Grundlagen der Computer Forensik inklusive der wesentlichen Spezialisierungen innerhalb dieser Disziplin und bietet Ihnen eine Einführung in die wichtigsten Tools und Techniken. So erhalten Sie einen Überblick über diesen Beruf mit praktischen Übungen, die Ihnen einen Eindruck der Beweissicherung von der Vorbereitung bis zur Analyse vermitteln. Umfang: 01:44:04
Inhalt: The career opportunities in data science, big data, and data analytics are growing dramatically. If you're interested in changing career paths, determining the right course of study, or deciding if certification is worth your time, this course is for you. Jungwoo Ryoo is a professor of information science and technology at Penn State. Here he reviews the history of data science and its subfields, explores the marketplaces for these fields, and reveals the five main skills areas: data mining, machine learning, natural language processing (NLP), statistics, and visualization. This leads to a discussion of the five biggest career opportunities, the six leading industry-recognized certifications available, and the most exciting emerging technologies. Along the way, Jungwoo discusses the importance of ethics and professional development, and provides pointers to online resources for learning more. Umfang: 01:12:36.00
Inhalt: The explosion of data in recent years has made the field of data science-in which professionals work to glean insights from this abundant information-increasingly more vital. If you're looking to pursue a career or to work with experts in this rapidly-growing field, it's crucial that you familiarize yourself with the tools of the trade. In this course, instructor Jungwoo Ryoo helps to acquaint you with some of the most well-known data science tools in the areas of cloud computing, distributed file storage, distributed processing, and machine learning. Throughout this course, Jungwoo provides coverage of Proxmox, Hadoop, Spark, and Weka, discussing how to install and leverage each tool in your data science workflow. To wrap up, he explains how Hadoop, Spark, and Weka can work collaboratively to produce the best results. Umfang: 02:23:22.00
Inhalt: Explore essential concepts, skills, and techniques for managing network security and forensics. In this course, Jungwoo Ryoo explains how to improve network security and forensics by leveraging data. He begins by reviewing essentials such as firewalls, VPNs, and vulnerability management systems. Next, he explores different data sources, and explains how the data from diverse sources can be a powerful tool to enhance your network security. Jungwoo also covers network data collection techniques and tools, and machine learning and visualization to process network data and detect anomalies. Umfang: 01:03:23.00
Inhalt: Information technology (IT) has changed the way we approach ordinary tasks-from settling the bill at restaurants to driving-and more industries than ever are leveraging IT to work smarter. As companies strive to keep up with the times, the number of available tech jobs has grown exponentially. It's a great time to launch a career in this ever-changing field. But with so many options to choose from, how do you determine which path is right for you? In this course, Jungwoo Ryoo shines a spotlight on a variety of careers in software engineering, system administration, cybersecurity, and data science. Jungwoo breaks down what each job actually entails, shares practical tips that can help you break into the career of your choice, and discusses relevant certifications. Umfang: 01:18:45.00
Inhalt: Software developers are constantly told to use secure coding practices. Luckily, with today's tools, secure code doesn't take a lot of time or effort. There are security frameworks (authentication, authorization, etc.) developers can use as their own. There are also static and dynamic code analysis tools to test code. Plus, with security patterns that can be implemented at the design level-before coding ever begins-you can make sure you're not reinventing the wheel. Jungwoo Ryoo is a faculty member teaching cybersecurity and information technology at Penn State. In this course, he'll introduce secure software development tools and frameworks and teach secure coding practices such as input validation, separation of concerns, and single access point. He'll also show how to recognize different kinds of security threats and fortify your code. Plus, he'll help you put a system in place to test your software for any overlooked vulnerabilities. Umfang: 01:01:07.00
Inhalt: Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. Although this course won't teach you everything you need to know to become a digital forensics detective, it does cover all the essentials of this growing (and exciting) technical field. Jungwoo Ryoo reviews the basics: the goals of computer forensics, the types of investigations it's used for, and the different specializations within the field. Then, he shows how to prepare for an investigation; acquire data; make sure data is kept in its original state with software and hardware write blockers; analyze the data; and generate a report. He uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with tools that are in your budget. Umfang: 02:49:24.00
Inhalt: Network forensics is used to find legal evidence in network devices. In this course, Jungwoo Ryoo covers all of the major concepts and tools in this growing technical field. Jungwoo begins by reviewing the basics: the goals of network forensics, a network forensic investigator's typical toolset, and the legal implications of this type of work. Then, he shows how to prepare for an investigation; acquire network logs and investigate network events; collect and investigate network traffic; and leverage various network forensics tools, such as Wireshark, Splunk, and tcpdump. Along the way, he uses a combination of open-source and commercial software, so you can uncover the information you need with tools that are in your budget. Umfang: 02:15:47.00
Inhalt: Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets. Umfang: 01:36:09.00
Inhalt: Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network. Umfang: 02:35:29
Inhalt: Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network. Umfang: 01:49:02.00
Inhalt: Design patterns encourage clean programming. In this course, take a look at some advanced design patterns as applied to Python. Instructor Jungwoo Ryoo begins by looking at why-or why not-use design patterns in the first place. Jungwoo then steps through some design best practices, going over topics such as quality attributes and domain-specific patterns. He also introduces some practical design patterns described by the Gang of Four, including Command, Interpreter, and Memento. Plus, he helps you grasp how these patterns actually work at the code level by walking through sample scripts. Umfang: 01:24:57.00
Inhalt: Design patterns encourage programming efficiency and code reuse. This course is a look at traditional design patterns as applied to Python. Jungwoo Ryoo covers 15 essential creational, structural, and behavioral patterns to help you solve common coding challenges, while introducing best practices that will keep your solutions consistent, complete, and correct. Umfang: 01:59:14.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 07.05.2024, 18:13 Uhr. 719 Zugriffe im Mai 2024. Insgesamt 510.949 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral