• phone icon +44 7459 302492 email message icon info@uplatz.com
  • Register

BUY THIS COURSE (USD 45 USD 139)
4.7 (45 reviews)
( 757 Students )

 

Career Path - IT Support Engineer

Become a front-line (L1) or backend (L2) IT Support Engineer. Learn how to handle technical or business queries. Troubleshoot and resolve tech issues.
( add to cart )
Save 68% Offer ends on 30-Jun-2024
Course Duration: 200 Hours
Preview Career Path - IT Support Engineer course
  Price Match Guarantee   Full Lifetime Access     Access on any Device   Technical Support    Secure Checkout   Course Completion Certificate
Job-oriented
Popular
Great Value
Instant access

Students also bought -

Completed the course? Request here for Certificate. ALL COURSES

IT Support Engineer career path consists of courses that will lead you to a fulfilling career in the IT support area. The key courses included are:

  1. ServiceNow
  2. Introduction to DevOps
  3. Introduction to Unix and Linux
  4. Unix and Linux File Utilities
  5. Linux Utilities
  6. Linux System Administration
  7. Shell Programming
  8. Introduction to Cloud Computing
  9. Microsoft Excel
  10. Google Sheets
  11. Project Management Fundamentals
  12. Microsoft Project
  13. PRINCE2 Fundamentals
  14. Product Management
  15. Computer Hardware Engineering
  16. Business Intelligence for Beginners
  17. CISSP (Cybersecurity)

 

IT support is a promising career path that involves providing technical support to users and businesses, troubleshooting technical issues, and resolving problems related to hardware, software, and networking systems. To pursue a career in IT support engineering, you typically need a degree or diploma in computer science, information technology, or a related field. However, some employers may also accept candidates with relevant experience or certifications in IT support.

IT support engineers typically work in a fast-paced, challenging environment and may be required to work long hours or on-call shifts. They should possess strong problem-solving skills, attention to detail, good communication skills, and the ability to work well under pressure. Some common job titles in IT support engineering include help desk technician, technical support specialist, network support engineer, and system administrator.

 

IT support engineers may work in a variety of industries, such as healthcare, finance, retail, and government. The demand for skilled IT support professionals is expected to grow in the coming years, as businesses increasingly rely on technology to operate and grow. Overall, a career in IT support engineering can be both challenging and rewarding, with opportunities for advancement and competitive salaries.

In addition to the technical skills required for IT support engineering, there are also several non-technical skills that are important for success in this field. These include strong customer service skills, the ability to work well in a team environment, and excellent communication skills.

IT support engineers are often the first point of contact for users who are experiencing technical difficulties, so it is important that they are able to communicate effectively with users who may not have a technical background. Additionally, IT support engineers must be able to work well under pressure and prioritize tasks effectively in order to meet tight deadlines and minimize downtime for users.

 

Some common responsibilities of IT support engineers may include:

a) Providing technical support to users via phone, email, or in-person

b) Troubleshooting hardware, software, and networking issues

c) Installing, configuring, and maintaining computer systems and software

d) Monitoring and maintaining IT infrastructure

e) Developing and implementing IT policies and procedures

f) Collaborating with other IT professionals to ensure system compatibility and security

Course/Topic 1 - ServiceNow - all lectures

  • Lecture 1 - Overview and How to get started with ServiceNow

    • 48:37
  • Lecture 2 - ServiceNow Platform overview

    • 46:28
  • Lecture 3 - Lists and Guided Setup Overview

    • 47:04
  • Lecture 4 - Form Design - Layout - Physical Taskboard

    • 36:32
  • Lecture 5 - Form Templates and Tasks

    • 49:12
  • Lecture 6 - Notifications and Inbound Actions

    • 45:18
  • Lecture 7 - Reports Dashboards and Performance Analytics

    • 42:33
  • Lecture 8 - Knowledge Management and Performance Analytics

    • 48:13
  • Lecture 9 - Service Catalogue - Order Guides - Report Producer

    • 1:00:21
  • Lecture 10 - Flow Designer - Instance Stats - Events

    • 51:36
  • Lecture 11 - Data Schema Overview

    • 40:23
  • Lecture 12 - Access Control - Importing Data - Transform Map

    • 45:27
  • Lecture 13 - Configuration Management Database (CMDB)

    • 39:04
  • Lecture 14 - CMDB - Discovery - Service Mapping - Platform Scripting

    • 50:58
  • Lecture 15 - Platform Scripting and Client Server Side Scripting

    • 55:12
  • Lecture 16 - Migration - Integration - Upgrade

    • 50:09
  • Lecture 17 - Custom Applications - Virtual Agent - Mobile Apps

    • 49:56
  • Lecture 18 - ITIL ITSM overview

    • 1:01:09
  • Lecture 19 - ITSM - Incident - Problem - Change

    • 1:06:50
  • Lecture 20 - Mock Questions - Next Steps - Certification Path

    • 49:54
  • Lecture 21 - ServiceNow Examination overview

    • 26:08
  • Lecture 22 - ServiceNow Exam - Theoretical Concepts

    • 42:42
  • Lecture 23 - ServiceNow Mock Questions Series

    • 54:04
  • Lecture 24 - ServiceNow Interview Questions - part 1

    • 25:08
  • Lecture 25 - ServiceNow Interview Questions - part 2

    • 51:10
  • Lecture 26 - ServiceNow Interview Questions - part 3

    • 45:45

Course/Topic 2 - Introduction to DevOps

  • In this session of you will get an intro about the DevOps.

    • 17:30

Course/Topic 3 - Introduction to Unix and Linux

  • In this session we will discuss the Linux basics and shell scripting. This video talks about the history of Linux and the introduction to Linux. Further we will see the Login session in Linux and how to work with the Unix file system (Linux Directories) and what is as operating system.

    • 43:58
  • In this session we will discuss Linux basic commands such as ls, pwd, cd, touch, mkdir,rmdir, cp, mv, cat, rm.

    • 44:01
  • In this session we will discuss about the sample command application. This video talks about the Linux Commands and disk and file system. The Linux command is a utility of the Linux operating system. All basic and advanced tasks can be done by executing commands. The commands are executed on the Linux terminal. The terminal is a command-line interface to interact with the system, which is similar to the command prompt in the Windows OS.

    • 33:39
  • In this session we will discuss about the Linux Directories and Meta Characters. This video talks about the handling file and directories with meta characters or wild cards.

    • 44:10
  • In this session we will discuss about the Editor – vi in Linux. This video talks about working with vi as a visual editor along with 3 modes.

    • 54:43
  • In this session we will discuss about the Linux Documentation. This video talks about the Linux documentation along with manual sections including path.

    • 29:49

Course/Topic 4 - Unix and Linux File Utilities

  • In this session we will discuss about standard I/O, redirection and pipes, we will also discuss about the meta characters.

    • 52:51
  • In this session we will discuss about changing file access rights (uses and permission including both symbolic and absolutemodes)

    • 54:59
  • In this session we will discuss about soft links and hard links we will also learn how to check file integrity.

    • 39:32

Course/Topic 5 - Linux Utilities

  • In this session we will discuss about the disk utilities in Linux. This video talks about the different types of disk utilities and its function, such as du (disk usage), df (disk free space), dd, and hexdump.

    • 24:35
  • In this session we will discuss about the process utilities in Linux. This video talks about the differnt types of process utilities and its functions such as ps, kill, xkill, ulimit, sleep, bg, fg, jobs, top

    • 32:41
  • In this session we will discuss about the text processing utilities. This video talks about the text processing utilities such as find, locate and grep.

    • 53:49
  • In this session we will discuss about the other miscellaneous commands used in Linux. This video talks about the commands such as history, tee, free and alias.

    • 19:34
  • In this session we will discuss about the important part of archive and compress utilities in linux. This video talks about various commands for Compressing and decompresses (read as expand compressed file). To compress files you can use gzip, bzip2 and zip commands. To expand compressed file (decompresses) you can use and gzip -d, bunzip2 (bzip2 -d), unzip commands.

    • 46:07
  • In this session we will discuss about the later part of compressing and archiving for backup restore (for backup and restore). This video talks about the utilities such as tar, gzip, gunzip, bzip2, bzcat, lzma, unlzma.

    • 20:48

Course/Topic 6 - Linux System Administration

  • In this session we will discuss basic system administrative topics. This video talks about the user management (who, whoami, groups, su, adduser, deluser, useradd, userdel, id, usermod, users) and time management (time, uptime) in Linux.

    • 36:59
  • In this session we will discuss Run Levels and Root Privileges. This video talks about te init levels along with shutdown (init, shutdown, halt, systemctl) and accessing administrator (root) privileges.

    • 30:10
  • In this session we will discuss talks about the package management in Linux system. This video talks about the package management using apt, apt-gel, apt-cache, dpkg.

    • 46:10
  • In this session we will discuss about the important topics of networking in Linux System. This video talks about the networking by explaining hostname, ifconfig, ping, host dig, nslookup, route, traceroute.

    • 36:20
  • In this session we will discuss about the important topics of networking in Linux System. This video talks about the networking by explaining tracepath, netstat, arp, ftp, sttp, scp, wget, telnet, ssh.

    • 33:27
  • In this session we will discuss file system and devices in linux system. This video talks about the how in linux everything is a file and how a device represents as a file. Further we will see about sda as a block device type special file.

    • 29:32

Course/Topic 7 - Linux Shells and Shell Programming (Bash)

  • In this session we will discuss about the introductory topics of Shells and Shell Programming. This video talks about the command line interpreters and SSH, variable in shell (local and global export). Further we will talk about the environment variables and how to write a script.

    • 55:18
  • In this session we will discuss about the introductory topics of Shells and Shell Programming. This video talks about the command line interpreters and SSH, variable in shell (local and global export). Further we will talk about the environment variables and how to write a script.

    • 55:18
  • In this session we will discuss about the quoting mechanism and test command. This video talks about the quotes both single and double along with variables. Further we will see about test commands or expr.

    • 28:52
  • In this session we will discuss about the Arithmetic and Increment Decrement. This video talks about the different types of operators like arithmetic operators, increment and decrement operators, relational operators, logical and Boolean operators, string operators and file operators.

    • 15:54
  • In this session we will discuss about the relational and logical operators in Linux. This video further talks about the types of operators and relation between 2 operators. In this video we will discuss about the

    • 15:15
  • In this session we will discuss further about the types of operators. This videos talks about the string and file test operator, which are very important in the Linux shell scripting.

    • 27:25
  • In this session we will discuss about the conditional statements in Linux shell scripting. This video talk about the conditional execution like (&& and ||). Further we will see the conditional statements like if …fi, if….else, if….elif….else.

    • 36:55
  • In this session we will discuss about the loops function in Linux scripting. This video talks about the different types of loops like repetitive or iterative loop, while loop, for loop and until loop.

    • 54:56
  • In this session we will discuss about the loop control statements. The BASH shell has three loop control structures: while, for, and for-in. There are two condition structures: if and case. The control structures have as their test the execution of a Linux command. All Linux commands return an exit status after they have finished executing.

    • 40:46
  • In this session we will discuss about the nested loops with sample programs. This video talks about the nested loops for…while, for…until, for …. For, while…. while. A nested loop is an inner loop placed inside another one (loop)

    • 39:59
  • In this session we will discuss about the arrays in linux scripting. This video talks about what is arrays and arrays initialization and assignment. An array is a systematic arrangement of the same type of data. But in Shell script Array is a variable which contains multiple values may be of same type or different type since by default in shell script everything is treated as a string.

    • 48:10
  • In this session we will discuss important features of functions in Linux. Functions is a powerful feature of shell programming. It is a group of commands organized by common functionality. We will talk about defining the functions and invoicing the functions.

    • 43:25
  • In this session we will discuss about the later parts of functions in Linux. This video talks about the add function, return function and other functions.

    • 16:46
  • In this session we will discuss about the command line arguments. This video talks about how commands can be defined as input given to a command line to process that input with the help of given command. Argument can be in the form of a file or directory. Arguments are entered in the terminal or console after entering command.

    • 33:22
  • In this session we will discuss about the command line options. This video tells us how command-line options are single letters preceded by a single hyphen.

    • 22:35
  • In this session we will discuss about the Command Line Arguments and Options Slides with slides. This video talks about character $ and how it is used to access input arguments to the scripts.

    • 9:12
  • In this session we will discuss about the signals used in linux. This video talks about the signal indication for the event in a processing.

    • 28:17
  • In this session we will discuss we will about the concept of debugging in linux. This video talks about the different debugging techniques and trace errors under such trying circumstances.

    • 15:05
  • In this session we will discuss about the important utilities in Linux. This video talks about the the different utilities and its functions such as, bc, cmp, diff, uniq, paste, join.

    • 43:25
  • In this session we will discuss about the later part of utilities in Linux. This video talks about the later types of utilities such as, cut, tr, sed.

    • 37:56
  • In this session we will discuss about the programs used in Linux. This video talks about the program using utilities, linux program and shell scripting.

    • 22:37

Course/Topic 8 - Cloud Computing Basics - all lectures

  • In this lecture session we learn about cloud computing, which means storing and accessing data over the internet instead of a hard disk. It is defined as a service that provides users to work over the internet.

    • 38:26
  • In this lecture session we learn about cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

    • 30:33
  • In this lecture session we learn about Cloud computing is a general term for anything that involves delivering hosted services over the internet. These services are divided into three main categories or types of cloud computing.

    • 33:14
  • In this tutorial we learn about the importance of cloud computing can be found in using services like Google Drive and Apple iCloud. The use of these services allows documents, contacts, pictures, and a whole lot more online.

    • 32:19

Course/Topic 9 - Microsoft Excel - all lectures

  • Lecture 1 - Introduction to Microsoft Excel

    • 19:48
  • Lecture 2 - Key in Data

    • 12:46
  • Lecture 3 - Font and Alignment

    • 13:52
  • Lecture 4 - Cut Paste and Format Painter

    • 07:20
  • Lecture 5 - Control plus Keys

    • 23:40
  • Lecture 6 - Home Commands and Clipboard

    • 20:09
  • Lecture 7 - File Tab

    • 12:49
  • Lecture 8 - Sorting and Filtering

    • 26:09
  • Lecture 9.1 - Basic Formulas

    • 23:00
  • Lecture 9.2 - Text Formulas

    • 32:49
  • Lecture 10.1 - VLookup - part 1

    • 26:39
  • Lecture 10.2 - VLookup - part 2

    • 06:20
  • Lecture 10.3 - HLookup

    • 14:22
  • Lecture 10.4 - This is a bonus session on Vlookup from a different tutor

    • 10:27
  • Lecture 10.5 - This is a bonus session on Vlookup from a different tutor

    • 05:02
  • Lecture 11.1 - Pivot Tables - part 1

    • 15:16
  • Lecture 11.2 - Pivot Tables - part 2

    • 07:14
  • Lecture 11.3 - Pivot Tables - part 3

    • 23:38
  • Lecture 11.4 - Pivot Tables - part 4

    • 11:47
  • Lecture 12.1 - Charts - part 1

    • 09:05
  • Lecture 12.2 - Charts - part 2

    • 21:01
  • Lecture 12.3 - Column Charts

    • 30:28
  • Lecture 12.4 - Bar Charts

    • 09:07
  • Lecture 12.5 - Line Charts

    • 09:57

Course/Topic 10 - Google Sheets course - all lectures

  • Lesson 1 - Introduction to Google Sheets

    • 02:31
  • Lesson 2 - Menu Options - File

    • 08:40
  • Lesson 3 - Menu Options - Edit

    • 03:30
  • Lesson 4 - Menu Options - View

    • 04:49
  • Lesson 5 - Menu Options - Insert

    • 04:59
  • Lesson 6 - Menu Options - Format

    • 10:21
  • Lesson 7 - Menu Options - Data and more

    • 18:17
  • Lesson 8 - Entering Data and Editing

    • 07:12
  • Lesson 9 - Functions - Numeric Function

    • 15:24
  • Lesson 10 - Functions - Text Function

    • 30:38
  • Lesson 11 - Functions - Date Functions

    • 06:21
  • Lesson 12 - Charts and Conditional Formatting

    • 22:12
  • Lesson 13 - Pivot Tables

    • 23:21
  • Lesson 14 - Saving - Sharing

    • 06:22

Course/Topic 11 - Project Management Fundamentals - all lectures

  • In this first video tutorial on Project Management, you will learn an Introduction to Project Management, its history, benefits, an illustration to Gantt Chart, a view on some of the International standards of practicing Project Management, an overview of what exactly is a project, its relationship with General Project Management practices, Triple Constraints Theory and the role of a Project Manager and its characteristics in Project Management.

    • 39:36
  • In this second session of Project Management, you will understand what is Process Oriented Project Management, Project Processes and its categories, what is Project Management and Product Oriented processes and an overview of different process groups and its knowledge areas.

    • 21:23
  • In this lecture, you will learn what is a process in Project Management and its different stages in a Project Life cycle, how a process is linked to different process groups. Also, you will learn about the different Knowledge Areas related to a Process in Project Management.

    • 28:19
  • In this video, you will learn about the Project Planning Process and Group Processes and the different processes involved in managing the Scope and Scheduled Constraints.

    • 26:25
  • In this last session on Project Management Fundamentals, you will learn about the different constraints involved like Cost, Quality, Resources, Risks, etc. in a Process Group and how it helps in managing the entire project in Project Management.

    • 20:36

Course/Topic 12 - Microsoft Project (basic to advanced) - all lectures

  • Lecture 1 - Overview of Microsoft Project

    • 07:47
  • Lecture 2 - The Stage

    • 24:17
  • Lecture 3 - The Back Stage

    • 17:29
  • Lecture 4 - Views and Tables in MSP

    • 24:03
  • Lecture 5 - Project Initiation - part 1

    • 27:44
  • Lecture 6 - Project Initiation - part 2

    • 07:16
  • Lecture 7 - Tasks and Milestones

    • 24:00
  • Lecture 8 - Linking Tasks

    • 28:24
  • Lecture 9 - More on Linking Tasks

    • 29:41
  • Lecture 10 - Creating Resources

    • 29:04
  • Lecture 11 - Creating Resources - advanced

    • 23:25
  • Lecture 12 - Assigning Resources

    • 27:58
  • Lecture 13 - Applying Cost Tables

    • 11:42
  • Lecture 14 - Units Work Duration

    • 34:39
  • Lecture 15 - Handy Features - revised

    • 09:36
  • Lecture 16 - Critical Path Identification

    • 15:58
  • Lecture 17 - Resource Leveling

    • 21:15
  • Lecture 18 - Baselining

    • 16:02
  • Lecture 19 - Updating Project - part 1

    • 25:48
  • Lecture 20 - Updating Project - part 2

    • 17:44
  • Lecture 21 - Updating Project - part 3

    • 23:29
  • Lecture 22 - Monitoring

    • 28:24
  • Lecture 23 - Controlling - part 1

    • 22:52
  • Lecture 24 - Controlling - part 2

    • 19:54
  • Lecture 25 - Reports Pack

    • 32:56
  • Lecture 26 - Support EVM

    • 11:58

Course/Topic 13 - PRINCE2 Fundamentals - all lectures

  • Lecture 1 - Introduction to PRINCE2

    • 22:18
  • Lecture 2 - PRINCE2 Principles

    • 40:47
  • Lecture 3 - Aspects - Phases - Conclusion

    • 54:47

Course/Topic 14 - Product Management - all lectures

  • Lecture 1 - Introduction to Product Management

    • 25:28
  • Lecture 2 - Deep-dive into Product Management

    • 39:10

Course/Topic 15 - Computer Hardware Engineering - all lectures

  • In this lecture session we learn about the basics of hardware in computer hardware engineering and also talk about features and function of hardware in brief.

    • 36:22
  • In this tutorial we learn about Computer architecture comprises rules, methods, and procedures that describe the execution and functionality of the entire computer system. In general terms, computer architecture refers to how a computer system is designed using compatible technologies.

    • 21:16
  • In this lecture session we learn about Computer instructions are a set of steps or documentation that includes information on how to operate, perform, or otherwise maintain particular computer software or hardware.

    • 24:06
  • In this tutorial we learn about Infix expression is an expression in which the operator is in the middle of operands, like operand operator operand. Postfix expression is an expression in which the operator is after operands, like operand operator. Postfix expressions are easily computed by the system but are not human readable.

    • 20:59
  • In this tutorial we learn about Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems. These systems use this code to understand operational instructions and user input and to present a relevant output to the user.

    • 36:52
  • In this lecture session we learn about The processor, also known as the CPU, provides the instructions and processing power the computer needs to do its work. The more powerful and updated your processor, the faster your computer can complete its tasks. By getting a more powerful processor, you can help your computer think and work faster.

    • 40:15
  • In this lecture session we learn about Memory is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use. Memory is one of the basic functions of a computer, because without it, a computer would not be able to function properly.

    • 21:09
  • In this lecture session we learn about Cache is the temporary memory officially termed “CPU cache memory.” This chip-based feature of your computer lets you access some information more quickly than if you access it from your computer's main hard drive.

    • 25:34
  • In this lecture session we learn about Computer memory of two basic types – Primary memory(RAM and ROM) and Secondary memory (hard drive, CD, etc). Random Access Memory (RAM) is primary-volatile memory and Read-Only Memory (ROM) is primary-non-volatile memory.

    • 39:57
  • In this tutorial we learn about The disk drive on a computer is the part that contains the disk or into which a disk can be inserted. The disk drive allows you to read information from the disk and store information on the disk.

    • 47:06
  • In this lecture session we learn about NTFS, which stands for NT file system and the New Technology File System, is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).

    • 36:50
  • In this lecture session we learn about CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. The original data format standard was defined by Philips and Sony in the 1983 Yellow Book.

    • 51:54
  • In this lecture session we learn about In computing, a pipeline, also known as a data pipeline, is a set of data processing elements connected in series, where the output of one element is the input of the next one. The elements of a pipeline are often executed in parallel or in time-sliced fashion.

    • 22:07
  • In this lecture session we learn about Instruction-level parallelism (ILP) is the parallel or simultaneous execution of a sequence of instructions in a computer program. More specifically ILP refers to the average number of instructions run per step of this parallel execution.

    • 20:16
  • In this lecture session we learn about A traditional monitor is only used to display (output) information from a computer and provides no source of input. For this reason, a computer monitor is considered an output device.

    • 19:48
  • In this lecture session we learn about A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and cost.

    • 36:01
  • In this lecture session we learn about Bridge devices working at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them. Bridges are similar to repeaters and hubs in that they broadcast data to every node.

    • 52:59
  • In this lecture session we learn about The clock speed (commonly referred to as the frequency) of a CPU is how many instructions per second it can process and is typically reported in MHz or GHz.

    • 59:54

Course/Topic 16 - Business Intelligence Specialization - all lectures

  • In this lecture session we learn about basic introduction to business intelligence and also talk about factors of business intelligence in brief.

    • 1:20:10
  • In this tutorial we learn about business Intelligence, as a technological concept, which began shortly after the 1988 international conference, The Multiway Data Analysis Consortium, held in Rome. The conclusions reached at this conference jump-started efforts for simplifying BI analysis, while making it more user-friendly.

    • 2:42:42
  • In this lecture session we learn about The general process of business intelligence is as follows: Gathering data and organizing it through reporting. Turning it into meaningful information through analysis. Making actionable decisions aimed at fulfilling a strategic goal.

    • 1:03:39
  • In this lecture session we learn that Data Warehousing may be defined as a collection of corporate information and data derived from operational systems and external data sources and also talk about features of data warehousing.

    • 1:45:30
  • In this lecture session we learn about Business intelligence (BI) combines business analytics, data mining, data visualization, data tools and infrastructure, and best practices to help organizations to make more data-driven decisions.

    • 1:36:03
  • In this tutorial we learn about Apache HTTP Server is a free and open-source web server that delivers web content through the internet. It is commonly referred to as Apache and after development, it quickly became the most popular HTTP client on the web.

    • 1:10:35
  • In this lecture session we learn about NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats. A NoSQL database generally means that it is non-relational, distributed, flexible and scalable.

    • 1:48:46
  • In this lecture session we learn about basic introduction of data analytics and also talk about features and functions of data analytics.

    • 1:07:03
  • In this lecture session we learn about Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications. BI tools support an enhanced user experience with visualization, real-time analytics and interactive reporting.

    • 1:03:54
  • In this lecture session we learn about Designing a collection strategy is one way to ensure that your accounts receivable stays under control and you continue to collect your cash. Without one, there is disorganization, disconnections, miscommunications and just simply chaos in the accounts receivable department.

    • 59:47
  • In this tutorial we learn about Survival analysis is a branch of statistics for analyzing the expected duration of time until one event occurs, such as death in biological organisms and failure in mechanical systems.

    • 1:08:06
  • In this lecture session we learn about Geospatial analysis is the gathering, display, and manipulation of imagery, GPS, satellite photography and historical data, described explicitly in terms of geographic coordinates or implicitly, in terms of a street address, postal code, or forest stand identifier as they are applied to geographic models.

    • 1:23:43
  • In this lecture session we learn about Data mining is used to explore increasingly large databases and to improve market segmentation. By analyzing the relationships between parameters such as customer age, gender, tastes, etc., it is possible to guess their behavior in order to direct personalized loyalty campaigns.

    • 1:47:09
  • In this lecture session we learn about It is the simplest unsupervised learning algorithm that solves clustering problems. K-means algorithm partitions n observations into k clusters where each observation belongs to the cluster with the nearest mean serving as a prototype of the cluster.

    • 1:08:09
  • In this lecture session we learn about Density-based spatial clustering of applications with noise (DBSCAN) is a well-known data clustering algorithm that is commonly used in data mining and machine learning.

    • 1:32:29
  • In this lecture session we learn about Regression analysis is a reliable method of identifying which variables have impact on a topic of interest. The process of performing a regression allows you to confidently determine which factors matter most, which factors can be ignored, and how these factors influence each other.

    • 43:19
  • In this lecture session we learn about machine learning techniques in business intelligence and also talk about features and function of machine learning techniques in brief.

    • 1:12:20
  • In this lecture session we learn about machine learning is the necessary piece for truly self-service BI tools. BI tools with machine learning implementations not only enable deeper insights into data, but they also empower business people to take analysis into their own hands.

    • 2:34:07
  • In this lecture session we learn about Predictive analytics combining several data analysis techniques, such as machine learning, data mining, and statistics.

    • 1:47:14
  • In this lecture session we learn about Crowdsourced data collection is a participatory method of building a dataset with the help of a large group of people. This page provides a brief overview of crowdsourced data collection in development and highlights points to consider when crowdsourcing data.

    • 1:56:04
  • In this lecture session we learn about basic introduction to business analysis and also talk about features and functions of business analysis.

    • 1:46:49
  • In this tutorial we learn about Data models define how the logical structure of a database is modeled. Data Models are fundamental entities to introduce abstraction in a DBMS.

    • 1:01:32
  • In this lecture session we learn about deep dive into data warehousing and also talk about some key features of deep dive data warehousing.

    • 2:22:58
  • In this lecture session we learn about how we reduce the development time to market and also talk about common patterns in deep dive into data warehousing and also talk about features of patterns.

    • 53:34
  • In this lecture session we learn about basic introduction to data warehousing and also talk about features of data warehousing.

    • 1:33:00
  • In this lecture session we learn about Feature extraction for machine learning and deep learning. Feature extraction refers to the process of transforming raw data into numerical features that can be processed while preserving the information in the original data set. It yields better results than applying machine learning directly to the raw data.

    • 1:57:04
  • In this lecture session we learn about Integration Platform as a Service (iPaaS) is a suite of cloud services enabling development, execution and governance of integration flows connecting any combination of on premises and cloud-based processes, services, applications and data within individual or across multiple organizations.

    • 1:00:53
  • In this lecture session we learn about Business intelligence concepts refer to the usage of digital computing technologies in the form of data warehouses, analytics and visualization with the aim of identifying and analyzing essential business-based data to generate new, actionable corporate insights.

    • 1:48:15
  • In this lecture session we learn about Contextual analysis is the systematic analysis—identification, sorting, organization, interpretation, consolidation, and communication—of the contextual user work activity data gathered in contextual inquiry, for the purpose of understanding the work context for a new system to be designed.

    • 1:17:25
  • In this lecture session we learn about Organizational intelligence is the capacity of an organization to create knowledge and use it to strategically adapt to its environment or marketplace. It is similar to I.Q., but framed at an organizational level. While organizations in the past have been viewed as compilations.

    • 1:36:55
  • In this lecture session we learn about the Information Systems Business Analysis program (ISBA) will help you develop critical skills in areas such as: application software, business data analysis and modeling, customer engagement management, business processes, enterprise resource planning, and communications.

    • 1:17:17
  • In this lecture session we learn about Operational intelligence (OI) is an approach to data analysis that enables decisions and actions in business operations to be based on real-time data as it's generated or collected by companies.

    • 1:01:04
  • In this lecture session we learn about Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.

    • 1:17:07
  • In this lecture session we learn about Operational intelligence (OI) is an approach that gives you real-time information about what's happening in your business. It can help you make quick decisions that make your operations better. Cut through the noise of software delivery and break silos with powerful dashboards and reports.

    • 1:00:43

Course/Topic 17 - CISSP (Cybersecurity) - all lectures

  • In this lecture session we learn about the basics of cybersecurity and also cover basic functions and factors of cybersecurity in brief.

    • 1:10:40
  • In this lecture session we learn about CISSP certification guide and also talk about factors of CISSP certification guide in cybersecurity.

    • 33:09
  • In this lecture session we learn about cyber information systems security professional certification domain and talk about overview of domain in brief.

    • 2:19:49
  • In this lecture session we learn about CISSP exam preparation guide in cyber security and also talk about more guides for exam preparation.

    • 31:24
  • In this lecture session we learn about CISSP preparation techniques and also talk about cyber security function and importance.

    • 1:04:33
  • In this lecture session we learn about risk analysis in cyber information systems security professionals and also talk about risk analysis factors in brief.

    • 54:10
  • In this lecture session we learn about goals of risk analysis and also talk about risk analysis factors in cybersecurity in brief.

    • 39:20
  • In this lecture session we learn about cybersecurity goals the object of cybersecurity is to prevent the risk and also cover all types of goals in cyber security.

    • 22:03
  • In this lecture session we learn about types of cyber attacks in cybersecurity and also talk about how we prevent us from thes cyber attacks.

    • 15:54
  • In this lecture session we learn about types of cyber attackers in cybersecurity and also cover all attackers in brief.

    • 53:16
  • In this lecture session we learn about cybersecurity archival storage and also talk about storage factors in brief.

    • 54:48
  • In this lecture session we learn about cybersecurity VPNS and also talk about other VPNs of cybersecurity and importance of VPNs.

    • 54:04
  • In this lecture session we learn about cyber security standards in system security professionals and also talk about standard security.

    • 56:36
  • In this lecture session we learn about cyber security challenges in cyber security in cyber attacks.

    • 1:02:03
  • In this lecture session we learn about different mail service providers and also talk about mail service providers factors.

    • 1:11:00
  • In this lecture session we learn about the security and risk management domain and also talk about functions of security and risk management.

    • 59:12
  • In this lecture session we learn about the importance of security and risk management in brief.

    • 23:10
  • In this lecture session we learn about factors of security and risk management in brief.

    • 34:05
  • In this lecture session we learn about implementation of confidentiality and also talk about implementation of integrity in brief.

    • 27:33
  • In this lecture session we learn boat asset security domain and also talk about functions of asset security domain in brief.

    • 38:12
  • In this lecture session we learn about asset security domain importance and also talk about more security domains in brief.

    • 1:14:35
  • In this lecture session we learn about security architecture and engineering domain and also talk about factors of security architecture in brief.

    • 43:22
  • In this lecture session we learn about the function of security architecture and engineering domain in brief.

    • 26:10
  • In this lecture session we learn about governance, intelligence and also talk about operation and management.

    • 34:54
  • In this lecture session we learn about product ciphertext messages and also talk about the importance of security architecture and engineering domain.

    • 22:24
  • In this lecture session we learn about the fundamentals concept of security models and also talk about more concepts in brief.

    • 26:43
  • In this lecture session we learn about migration plans and perform migration and also talk about trust and assurance.

    • 12:34
  • In this lecture session we learn about generating, store and limit the use of cryptography keys.

    • 1:11:38
  • In this lecture session we learn about fire suppression systems in brief and also talk about fire sprinkler systems in cyber security.

    • 35:09
  • In this lecture session we learn about certified information system security professionals and also talk about what is cissp.

    • 26:36
  • In this lecture session we learn about cissp domain and also talk about why we need cissp in cyber security.

    • 33:35
  • In this lecture session we learn about the importance of cissp in security architecture and engineering.

    • 1:19:30
  • In this lecture session we learn about communication and network security and also talk about factors of communication and networks security.

    • 18:15
  • In this lecture session we learn about communication and networks security domain and also talk about functions of network security.

    • 38:59
  • In this lecture session we learn about deals with networks components related topics like networks models in cyber security.

    • 28:43
  • In this lecture session we learn about secure network components and also talk about factors of network components.

    • 29:52
  • In this lecture session we learn about components related topics like networks and also cover more topics in cyber security.

    • 1:37:35
  • In this lecture session we learn about identity and access management and also cover functions of identity access management.

    • 40:52
  • In this lecture session we learn about security assessment and testing domain and also talk about other assessments in domain.

    • 10:37
  • In these lecture sessions we learn about collecting security process data in security assessment in cyber security.

    • 33:23
  • In these lecture sessions we learn about what is security assessment and testing in brief.

    • 19:24
  • In these lecture sessions we learn about three general types of vulnerability assessment and also talk about function of vulnerability in brief.

    • 1:32:31
  • In these lecture sessions we learn about security operation domain in brief and also talk about misuse case testing in brief.

    • 43:36
  • In this lecture session we learn about security operation in cyber security and also talk about factors of security operation.

    • 31:48
  • In this lecture session we learn about access control types in security operation in brief and also talk about protective parameters in cyber security.

    • 25:43
  • In this lecture session we learn about security operation importance and also cover all parameters of security operations.

    • 45:53
  • In this lecture session we learn about data loss prevention, steganography and watermarking in security operations.

    • 31:31
  • In this lecture session we learn about training and awareness and also talk about implementing recovery services.

    • 10:35
  • In this lecture session we learn about a fully functional data center that is always up and running with real time in cyber security.

    • 54:01
  • In this lecture session we learn about standardizing a configuration across the device in security operation and also talk about system resilient.

    • 2:12:29
  • In this lecture session we learn about the basics of software development security domain in cyber security and also talk about what is security domain in brief.

    • 53:04
  • In this lecture session we learn about software development security domain function and importance.

    • 29:18
  • In this lecture session we learn about software assurance maturity model and also talk about building security in maturity model in brief.

    • 24:16
  • In this lecture session we learn about unknown vulnerabilities and also talk about software libraries and operating systems.

    • 18:00
Course Objectives Back to Top
Course Syllabus Back to Top
Certification Back to Top
Career & Jobs Back to Top
Interview Questions Back to Top
Course Quiz Back to Top
Start Quiz
Q1. What are the payment options?
A1. We have multiple payment options: 1) Book your course on our webiste by clicking on Buy this course button on top right of this course page 2) Pay via Invoice using any credit or debit card 3) Pay to our UK or India bank account 4) If your HR or employer is making the payment, then we can send them an invoice to pay.

Q2. Will I get certificate?
A2. Yes, you will receive course completion certificate from Uplatz confirming that you have completed this course with Uplatz. Once you complete your learning please submit this for to request for your certificate https://training.uplatz.com/certificate-request.php

Q3. How long is the course access?
A3. All our video courses comes with lifetime access. Once you purchase a video course with Uplatz you have lifetime access to the course i.e. forever. You can access your course any time via our website and/or mobile app and learn at your own convenience.

Q4. Are the videos downloadable?
A4. Video courses cannot be downloaded, but you have lifetime access to any video course you purchase on our website. You will be able to play the videos on our our website and mobile app.

Q5. Do you take exam? Do I need to pass exam? How to book exam?
A5. We do not take exam as part of the our training programs whether it is video course or live online class. These courses are professional courses and are offered to upskill and move on in the career ladder. However if there is an associated exam to the subject you are learning with us then you need to contact the relevant examination authority for booking your exam.

Q6. Can I get study material with the course?
A6. The study material might or might not be available for this course. Please note that though we strive to provide you the best materials but we cannot guarantee the exact study material that is mentioned anywhere within the lecture videos. Please submit study material request using the form https://training.uplatz.com/study-material-request.php

Q7. What is your refund policy?
A7. Please refer to our Refund policy mentioned on our website, here is the link to Uplatz refund policy https://training.uplatz.com/refund-and-cancellation-policy.php

Q8. Do you provide any discounts?
A8. We run promotions and discounts from time to time, we suggest you to register on our website so you can receive our emails related to promotions and offers.

Q9. What are overview courses?
A9. Overview courses are 1-2 hours short to help you decide if you want to go for the full course on that particular subject. Uplatz overview courses are either free or minimally charged such as GBP 1 / USD 2 / EUR 2 / INR 100

Q10. What are individual courses?
A10. Individual courses are simply our video courses available on Uplatz website and app across more than 300 technologies. Each course varies in duration from 5 hours uptop 150 hours. Check all our courses here https://training.uplatz.com/online-it-courses.php?search=individual

Q11. What are bundle courses?
A11. Bundle courses offered by Uplatz are combo of 2 or more video courses. We have Bundle up the similar technologies together in Bundles so offer you better value in pricing and give you an enhaced learning experience. Check all Bundle courses here https://training.uplatz.com/online-it-courses.php?search=bundle

Q12. What are Career Path programs?
A12. Career Path programs are our comprehensive learning package of video course. These are combined in a way by keeping in mind the career you would like to aim after doing career path program. Career path programs ranges from 100 hours to 600 hours and covers wide variety of courses for you to become an expert on those technologies. Check all Career Path Programs here https://training.uplatz.com/online-it-courses.php?career_path_courses=done

Q13. What are Learning Path programs?
A13. Learning Path programs are dedicated courses designed by SAP professionals to start and enhance their career in an SAP domain. It covers from basic to advance level of all courses across each business function. These programs are available across SAP finance, SAP Logistics, SAP HR, SAP succcessfactors, SAP Technical, SAP Sales, SAP S/4HANA and many more Check all Learning path here https://training.uplatz.com/online-it-courses.php?learning_path_courses=done

Q14. What are Premium Career tracks?
A14. Premium Career tracks are programs consisting of video courses that lead to skills required by C-suite executives such as CEO, CTO, CFO, and so on. These programs will help you gain knowledge and acumen to become a senior management executive.

Q15. How unlimited subscription works?
A15. Uplatz offers 2 types of unlimited subscription, Monthly and Yearly. Our monthly subscription give you unlimited access to our more than 300 video courses with 6000 hours of learning content. The plan renews each month. Minimum committment is for 1 year, you can cancel anytime after 1 year of enrolment. Our yearly subscription gives you unlimited access to our more than 300 video courses with 6000 hours of learning content. The plan renews every year. Minimum committment is for 1 year, you can cancel the plan anytime after 1 year. Check our monthly and yearly subscription here https://training.uplatz.com/online-it-courses.php?search=subscription

Q16. Do you provide software access with video course?
A16. Software access can be purchased seperately at an additional cost. The cost varies from course to course but is generally in between GBP 20 to GBP 40 per month.

Q17. Does your course guarantee a job?
A17. Our course is designed to provide you with a solid foundation in the subject and equip you with valuable skills. While the course is a significant step toward your career goals, its important to note that the job market can vary, and some positions might require additional certifications or experience. Remember that the job landscape is constantly evolving. We encourage you to continue learning and stay updated on industry trends even after completing the course. Many successful professionals combine formal education with ongoing self-improvement to excel in their careers. We are here to support you in your journey!

Q18. Do you provide placement services?
A18. While our course is designed to provide you with a comprehensive understanding of the subject, we currently do not offer placement services as part of the course package. Our main focus is on delivering high-quality education and equipping you with essential skills in this field. However, we understand that finding job opportunities is a crucial aspect of your career journey. We recommend exploring various avenues to enhance your job search:
a) Career Counseling: Seek guidance from career counselors who can provide personalized advice and help you tailor your job search strategy.
b) Networking: Attend industry events, workshops, and conferences to build connections with professionals in your field. Networking can often lead to job referrals and valuable insights.
c) Online Professional Network: Leverage platforms like LinkedIn, a reputable online professional network, to explore job opportunities that resonate with your skills and interests.
d) Online Job Platforms: Investigate prominent online job platforms in your region and submit applications for suitable positions considering both your prior experience and the newly acquired knowledge. e.g in UK the major job platforms are Reed, Indeed, CV library, Total Jobs, Linkedin.
While we may not offer placement services, we are here to support you in other ways. If you have any questions about the industry, job search strategies, or interview preparation, please dont hesitate to reach out. Remember that taking an active role in your job search process can lead to valuable experiences and opportunities.

Q19. How do I enrol in Uplatz video courses?
A19. To enroll, click on "Buy This Course," You will see this option at the top of the page.
a) Choose your payment method.
b) Stripe for any Credit or debit card from anywhere in the world.
c) PayPal for payments via PayPal account.
d) Choose PayUmoney if you are based in India.
e) Start learning: After payment, your course will be added to your profile in the student dashboard under "Video Courses".

Q20. How do I access my course after payment?
A20. Once you have made the payment on our website, you can access your course by clicking on the "My Courses" option in the main menu or by navigating to your profile, then the student dashboard, and finally selecting "Video Courses".

Q21. Can I get help from a tutor if I have doubts while learning from a video course?
A21. Tutor support is not available for our video course. If you believe you require assistance from a tutor, we recommend considering our live class option. Please contact our team for the most up-to-date availability. The pricing for live classes typically begins at USD 999 and may vary.



BUY THIS COURSE (USD 45 USD 139)