List Of Vidyakosh Course Modules

Introduction to Artificial Intelligence

Introducing Natural Language Processing

AI/ML: Machine
Learning

Intro to Machine Learning & Supervised Learning

Machine Learning with TensorFlow and Cloud ML

Data Classification and Machine Learning

Artificial Neural Network & Sequence Modeling

K-Nearest Neighbor (k-NN) &
Artificial Neural Networks

Planning Artificial Intelligence Services

APIs and Machine
Learning

ML, Propensity Score, & Segmentation Modeling

TensorFlow: Introduction to
Machine Learning

Machine Learning & Visualization Tools

Python
Fundamentals

Python Data
Processing

Python
Applications

Python: Web Application Development

Python: Web2py and Test-driven Development

Python: Data Science Fundamentals

Introduction to Python for Data Science

Visualization using
python

Introduction to NumPy for multi-dimensional Data

Advanced Operations with NumPy Arrays

Basic Data Visualization Using Seaborn

Advanced Data Visualization Using Seaborn

Principles of IoT
and Python Basics

MicroPython
Board

Python: MicroPython & Security

Machine Learning & Data Analytics

Supervised, Unsupervised & Deep Learning

Deep Learning and Neural Network Implementation

Implementing ML Algorithm Using scikit-learn

Implementing Robotic Process Automation

Python
Fundamentals

Python Data
Processing

Python
Applications

Python: Web Application Development

Python: Web2py and Test-driven Development

Python: Data Science Fundamentals

Introduction to Python for Data Science

Visualization using
python

Introduction to NumPy for multi-dimensional Data

Advanced Operations with NumPy Arrays

Basic Data Visualization Using Seaborn

Advanced Data Visualization Using Seaborn

Principles of IoT
and Python Basics

MicroPython
Board

Python: MicroPython & Security

Machine Learning & Data Analytics

Supervised, Unsupervised & Deep Learning

Deep Learning and Neural Network Implementation

Implementing ML Algorithm Using scikit-learn

Implementing Robotic Process Automation

PHP : Configuring Tomcat and PHP

PHP : Perl Language Essentials

Getting Started with Java Hibernate

Java Spring: Spring Application Basics

Java SE 8 Fundamentals: Data Manipulation etc.

Java SE 8 Fundamentals: Methods etc.

Creating Web Applications Using Spring MVC

.NET Overview: Windows, Web, and the Cloud

User Interfaces, Controls, and Fragments

The Main Components of Android

Android For .Net
Developers

Designing, Creating, Manipulating Android DB

The Development of Android Applications

UI/UX: Ajax
Basics

UI/UX: HTML5 and
CSS3

UI/UX: Beginning
AngularJS

UI/UX: Bootstrap
Introduction

Ajax Requesting Data and Retrieving Responses

Classes, Functions, and Object-oriented Programming

Beginning Object Oriented Design

REST
API

Fundamental of Apache Web Services

JSON
Essentials

Web API
Essentials

Tableau Interface
and Sharing

Tableau
Visualization Design

Tableau
Charts

Tableau Data
Connections

Tableau Dashboards and Data Organization

Tableau Time
Dimensions

Tableau
Maps

Tableau Advanced Visualizations

Tableau
Calculations

Tableau
Scripting

Storytelling with Data: Tableau & PowerBI

Data Visualization and Predictive Analytics

Importing and Manipulating Data

Modifying and Summarizing Data

Regression
Analysis

Decision Tree and Classification Analysis

Cluster Analysis and Ensemble Learning

Data Visualization: Essentials

Delivering Dashboards: Management Patterns

Delivering Dashboards: Exploration & Analytics

Data Analytics using Power BI: Concepts

Data Sourcing and Preparation

Data Modeling and Visualization

Base SAS 9 Programming: The SAS Environment

Base SAS 9 Programming: Introduction to Data Sets

Base SAS 9 Programming: Working with Data Sets

Base SAS 9 Programming: Creating Reports

Base SAS 9 Programming: Inputs and Outputs

Base SAS 9 Programming: Data Structures

Business Intelligence with QlikView

Data
Modeling

Macros and
Properties

Data Governance and Metadata Management

Dashboards and Comparative Analysis

Scripting and
Designing

Application Deployment and Performance

Business Intelligence With
Qlik view:Server

SQL Server Database Fundamentals: Design Principles and Data Manipulation

SQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases

Microsoft SQL Server 2016: Backing Up Databases

Microsoft SQL Server 2016: Restoring Databases

Microsoft SQL Server 2016: Managing Database Integrity

Microsoft SQL Server 2016: Managing Indexes and Statistics

SQL Server 2016 Database Objects

SQL Server 2016 Indexes and Views

Microsoft SQL Server 2014: Design and Install Analysis Services and Tools

Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources

Microsoft SQL Server 2014: Design and Implement Dimensions

Microsoft SQL Server: Implement Partitions and Custom Logic

Microsoft SQL Server 2014: MDX Queries, Process Models, and Deploy Databases

Microsoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSAS

Microsoft SQL Server 2014: Create and Manage Tabular Data Models

Microsoft SQL Server 2016: Monitoring Database Activity and Queries

Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets

Microsoft SQL Server 2014: Report Formatting and Interactivity

Microsoft SQL Server 2014: Manage Reporting Services

Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules

Microsoft SQL Server 2016: Data Access and Permissions

PostgreSQL Database Fundamentals Part #1

PostgreSQL Database Fundamentals Part #2

MongoDB:
Installation Overview

MongoDB: Concepts, Installation, & Querying

MongoDB:
Integration with Python

MongoDB: Write, Read & Aggregate Data

MongoDB:Indexes & Query Optimization

MongoDB: Indexing, Replication, and Security

MongoDB:
Replication and Security

MongoDB:
User Management

MongoDB:
System Management

MongoDB: Cloud and Hadoop Deployments

MongoDB: Integration with Spark

MongoDB for Data Wrangling:
Querying

MongoDB for Data Wrangling:
Aggregation

MongoDB: Backups, Monitoring, & Stats

Map Reduce, Atomic Counters, & Binary Data

MongoDB:
Java REST and GridFS

MySQL: Database Concepts, Design & Installation

MySQL Database Development: Introduction

MySQL: Database Design Fundamentals

MySQL Database : DDL Statements

MySQL Database: Manipulating Data

MySQL: SELECT Statement & Operators

MySQL Database: Working with Functions

Stored Routines, Triggers, & InnoDB memcached Plugin

Query and Performance Optimization

GIS, Cloud, & Connectors for MySQL

MySQL: MySQL as a
Datastore

Building Dynamic Web Sites with MySQL & PHP

NoSQL: NoSQL
Concepts

NoSQL Models and Applications

NoSQL: Programming with
NoSQL

NoSQL: In Depth with
NoSQL

Transaction Management & Rollbacks in NoSQL

Generic Database Fundamentals

Getting Started with Hadoop: Fundamentals & MapReduce

Getting Started with Hadoop: Developing a Basic MapReduce Application

Getting Started with Hadoop: Filtering Data Using MapReduce

Getting Started with Hadoop: MapReduce Applications With Combiners

Introduction to Hadoop

Introduction to Data Modeling in Hadoop

Hadoop Distributed File System

Hadoop : Hadoop
Clusters

Apache Hadoop on Amazon EMR

Hadoop Ranger

Hadoop Maintenance and Distributions

Ecosystem for
Hadoop

Installation of
Hadoop

Data Flow for the Hadoop Ecosystem

Apache Hadoop

Designing Hadoop Clusters

Hadoop in the Cloud

Deploying Hadoop Clusters

Hadoop Cluster Availability

Securing Hadoop Clusters

Operating Hadoop Clusters

Stabilizing Hadoop Clusters

Capacity Management for Hadoop Clusters

Performance Tuning of Hadoop Clusters

Cloudera Manager and Hadoop Clusters

Hadoop HDFS: Introduction

Hadoop HDFS: Introduction to the Shell

Hadoop HDFS: Working with Files

Hadoop HDFS: File Permissions

Oracle Database: Using Structured Query Language

Data Manipulation & Transaction Control Lang.

Oracle Database: Using Basic SELECT statements

Conversion Functions & Conditional Expressions

Oracle Database: Displaying Data from Multiple Tables

Oracle Database : Using the Set Operators

Oracle: Managing Objects with Data Dictionary Views

Oracle Database: Managing Schema Objects

Oracle Database SQL: Data Definition Language

Oracle Database 12c R2 SQL: SQL*Plus

Oracle Database: Restricting and Sorting Data

Using Single-Row Functions to Customize Output

Reporting Aggregated Data Using the Group Functions

Oracle Database: Using Subqueries to Solve Queries

Oracle Database: Creating Other Schema Objects

Oracle Database: Controlling User Access

Manipulating Data Using Advanced Queries

Data Integration: Data
Integration

Working with Data Mapping, Jobs, and Automation

Data Integration: Data
Transformation

Troubleshooting Data Integration

NoSQL Models and Applications

Attack Vectors and
Mitigations

Vulnerabilities and
Exploits

The Present Threat Landscape

Types of
Malware

Cryptographic and Wireless Attacks

CompTIA Security+ SY0-501: Cryptography

Troubleshooting Common Security Issues

Ports and Protocols and the OSI Model

Routing, Switching, & IP Addressing

Network Topologies & Technologies

Cloud Concepts, N/w Services, & Cabling Sol.

Networking
Device

N/W Storage,Virtualization, & WAN Technologies

Network Monitoring & Remote Access Methods

Policies and Best
Practices

Social Engineering and Related Attacks

Application and Service Attacks

Penetration Testing and Vulnerability Scanning

Impacts from Vulnerability Types

Components Supporting Organizational Security

Security Assessment Using Software Tools

Public Key Infrastructure/p>

Wireless Security Settings

Analyzing Output from Security Technologies

Deploying Mobile Devices Securely

Implementing Secure Protocols

Identity Concepts and Access Services

Identity and Access Management Controls

Common Account Management Practices

Frameworks, Guidelines, and Physical Security

Implement Secure Network Architecture Concepts

Secure System and Application Design and Deployment

Cloud, Virtualization, and Resiliency Concepts

Policies, Plans, and Procedures

Incident Response, Forensics, and Disaster Recovery

Documentation and Diagrams & Business Continuity

Security Devices, Wireless Security, & Access Control

Network Attacks & Device Hardening

Mitigation Techniques

Troubleshooting Methodology & Tools

Troubleshooting Connectivity & Performance Issues

Troubleshooting Common Network Service Issues

Additional Network Services

Business Impact Analysis & Risk Management

OWASP
Overview

OWASP Top 10: List Item
Overview

Introduction to OWASP and the Top 10

OWASP A8 and A3: Cross-Site Attacks

OWASP A7 and A6: Leaky and Unprepared Applications

OWASP A4 and A2: Broken Applications

OWASP A5 and A1: Security and Injection

OWASP A10 and A9: API and Component Attacks

Tips and Tricks for Developing Secure Mobile Apps

Securing Mobile Devices in the Enterprise:Mobile Security Threats

Securing Mobile Devices in the Enterprise:Mobile Security Technologies

Securing Mobile Devices in the Enterprise:Mobile Security Threat Mitigation

Securing Mobile Devices in the Enterprise:Configuring Enterprise-level Security

Defensive Programming in Java: Advance

Defensive Programming in Java: Fundamentals

Software Programming Fundamentals

CSSLP: Secure Software Implementation and Coding

Systems Security Certified Practitioner

CompTIA Linux+ 2014:LX0-103: Installation and Package Management

CompTIA Linux+ 2014 Powered By LPI: GNU and Unix Commands

CompTIA Linux+ 2014: LX0-103: Advanced GNU and Unix Commands

CompTIA Linux+ 2014 Powered By LPI: Devices and Filesystems

CompTIA Linux+ 2014: System
Architecture

CompTIA Linux+ 2014: Installation and Package Management

CompTIA Linux+ 2014: GNU and Unix
Commands

CompTIA Linux+ 2014: Networking
Fundamentals

Red Hat Certified System Administrator: The Environment

Red Hat Certified System Administrator: The Command Line

Red Hat Certified System Administrator: Administration and Permissions

Red Hat Certified System Administrator: Scripting and Scheduling

Red Hat Certified System Administrator: Processes, Networking, and Logging

Red Hat Certified System Administrator: Advanced Networking

Red Hat Certified System Administrator: Remote Connections and Access

Red Hat Certified System Administrator: File Systems and Device Management

Red Hat Certified System Administrator: Boot Process and Installation

Red Hat Certified System Administrator: Introduction to Virtualization

CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands

CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems

CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks

CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services

CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility

Red Hat Certified System Administrator: SELinux and Troubleshooting

Installing Unix

The Unix Command Line and GUI

Creating and Managing Unix File Systems

Users, Groups, and Authentication

Securing Unix Systems

Unix Software Management

Configuring Network Services

Shell Scripting

Unix Hardening and Maintenance

Overview & Prerequisite Setup for System Center Configuration Manager

Basic SCCM Maintenance and Managing Operating System Deployment

Microsoft SCCM: Deploying Applications and Software Updates

Administering System Center Configuration Manager 2012 R2

Microsoft SCCM: SCCM 2012 R2 Performance and Health Monitoring

Microsoft SCCM: SCCM 2012 R2 Boundaries and Security Considerations

SCCM 2012 R2 Compliance Settings and Managing Clients

Microsoft SCCM: Managing Inventory and
Reporting

Troubleshooting & Manipulating Output

Miscellaneous Troubleshooting

Layer 2 Troubleshooting Part 1

Network Traffic Viewing, Reporting, & Monitoring

Routing Troubleshooting Part 2

VRRP Troubleshooting

EIGRP Troubleshooting Part 1

EtherChannel & Spanning Tree Troubleshooting

Troubleshooting Basics

EIGRP Troubleshooting Part 2

Routing Troubleshooting Part 1

HSRP Troubleshooting

Layer 2 Troubleshooting Part 3

BGP Troubleshooting Part 2

OSPF Troubleshooting Part 1

Layer 3 Troubleshooting

BGP Troubleshooting Part 1

OSPF Troubleshooting Part 2

OSPF Troubleshooting Part 3

Layer 2 Troubleshooting Part 2

Logging & Path Verification

BGP IPv6 Troubleshooting

Response Automation & Backups

EIGRP Troubleshooting Part 3

Business User: Concepts & Moving to the Cloud

Cloud Computing Fundamentals: Overview

Virtualization and Data Centers

Storing and Managing Cloud Data

Cloud Computing: Migrating to the Cloud

Cloud Computing: Identity, Presence, and Privacy

Cloud Computing: Cloud Security

CCENT: DHCP
Configuration

SENSS 1.0: DHCP Snooping & IP Source Guard

Server 2016: Networking: DHCP Configuration

Server 2016: Networking: DHCP Management

Networking: DNS & DHCP Management Using IPAM

CCENT: TCP/IP
Model

ROUTE 2.0: TCP and UDP Operations

CompTIA A+ 220-1001: TCP and UDP ports

CompTIA : Ports and Protocols and the OSI Model

CCENT: OSI
Model

CCENT: VLAN
Configuration

CCENT: InterVLAN
Routing

Google G Suite Admin: User Management

G Suite: Group and OU Management

G Suite: E-mail and Calendar Management

G Suite: Security, Service, and Mobile Device Management

CISA 2019: Information System Auditing

CISA 2019: IT Management Frameworks

CISA 2019: Data Privacy and Risk

CISA 2019: PKI and Data Protection

CISA: The Process of Auditing Information Systems - Part 1

CISA: The Process of Auditing Information Systems - Part 2

AWS: Cloud Primer

AWS: Management Tools

AWS: Storage

AWS: Networking

AWS: WorkDocs

Azure Fundamentals: Cloud Computing

Azure Fundamentals: The Ecosystem

Azure Fundamentals: Storage Components

Azure Fundamentals: Network Components

Juniper Networks Junos Essentials: Networking Fundamentals

Juniper Networks Junos Essentials: Junos OS Fundamentals

Juniper Networks Junos Essentials: Configuration Basics

Juniper Networks Junos Essentials: Monitoring and Maintenance

Juniper Networks Junos Essentials: Routing Policy & Firewall Filters

OpenStack: Implementing OpenStack

OpenStack: Configuring OpenStack