
2 Courses
Information Technology
The 5-days training program helps you turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks. Instead of merely teaching a few hack attack tricks, this training program provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them. In addition, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.
Information Technology
An enormous amount of data is generated by corporations, institutions, governments and individuals everyday. However, this data by itself and in its raw form is of limited utility. If analyzed properly and transformed into relevant information it can provide valuable insights and thereby facilitate effective strategies and actions. Managers in the modern-day organization have to be well versed with the art and science of evidence-based decision-making – using data for knowledge discovery. As the most commonly used spreadsheet, MS-Excel is the handiest tool for managers in facilitating everyday data analysis. Professionals well versed in MS-Excel can greatly enhance effectiveness of data-based analytics in a cost-efficient manner.