Your learning session is protected by browser binding.
Secure Device Management

By Osama Waheed
0%
Rs. 15000
This course includes
Lec 1 Introduction to word Data
Lec 2 Basic Examples of word Data
Lec 3 Qualitative Type of Data
Lec 4 Quantitative Type of Data
Lec 5 Primary source of Data
Lec 6 Secondary source of Data
Lec 7 Internal and External data
Lec 8 Overview of Topics covered
Lec 9 Structured Data and Examples
Lec 10 Unstructured Data and Examples
Lec 11 Semistructured Data and Examples
Lec 12 Tags Markers and XML file
Lec 13 Sentiment analysis and NLP
Lec 14 JSON and XML
Lec 15 Importance of Data Collection
Lec 16 Ethical Considerations
Lec 17 Types of Questions expected from chapter
Lec 18 MCQs Practice and discussion
Lec 1 MCQs Practice and discussion
Lec 1 Drafting practice class Question Bank Q 1 for Finance industry
Lec 2 Drafting practice class Question Bank Q 1 for Healthcare industry
Lec 3 Drafting practice class Question Bank Q 1 for Retail industry
Lec 1 Data Classification Models
Lec 1A DATA CLASSIFICATION REVISION
Lec 2 Data Security
Lec 3 Data Integrity
Lec 4 Mapping of Data Entry
Lec 5 Data Stewardship
Lec 6 Metadata Management
Lec 7 Complaince with Data Regulation
Lec 8 Emerging Technologies in Data Governance
Lec 9 Collibra Informatica and Alation
Lec 10 What is Data Governance
Lec 11 Levels of Data Governance
LEC 12 DATA STORAGE
Lec 1 MCQs Practice
Lec 1 Drafting practice class Question Bank
Lec 1 Overview of Chapter
Lec 2 Intro to Data Analytics
Lec 3 Data Analytics Cycle Part 1
Lec 4 Data Analytics Cycle Part 2
Lec 5 Stages of Data Analytics Overview
Lec 6 Stages of Data Analytics Explained
Lec 7 Application and Implementation of Data Analytics
Lec 8 Quick Summary of Chapter
Lec 9 Assignment Understanding on Data Cycle
Lec 11 Assignment 2 Solving on Data Cycle
Lec 12 Linking Data Stages with Data Cycle
Lec 13 Revision of Chapter 3 half
Lec 14 Revision of Chapter 3 remaining
Lec 1 MCQs Discussion
Lec 1 Drafting class Practice Question 1
Lec 2 Drafting class Practice Question 2
LEC 1 DATABASE AND DATABASE MANAGEMENT SYSTEM
LEC 2 COMPONENTS OF A DBMS
LEC 3 ACID MODEL
LEC 4 ADDITIONAL FEATURES
LEC 5 TYPES OF DMBS
LEC 6 DBMS ARCHITECHTURE
LEC 7 EXTERNAL USER VIEW
LEC 8 LOGICAL VIEW
LEC 9 INTERNAL VIEW
Lec 1 MCQs practice
Lec 2 MCQs practice
Lec 1 Drafting Practice
Day 1 Practice question revision
Day 2 Practice question revision
Day 3 Practice question revision
Day 4 Practice question revision
Day 5 Practice question revision
Day 6 Practice question revision
Day 7 Practice question revision
Day 8 Practice question revision
Lec 1 Introduction to Risk Management and Strategic purpose for Risk Assessment
Lec 2 Key Components of Risk Management
Lec 3 IT Risk Treatment Strategies
Lec 4 Common IT Risk Categories
Lec 5 Types of IT Risk and Mitigation Strategies
Lec 6 Fundamental Security Concepts
Lec 7 Access and Identity management contols
Lec 8 Data Protection and Encryption
Lec 9 Threats Response and Monitoring
Lec 10 Advanced Security Technologies
Lec 11 Infrastructure level Security Controls
Lec 12 Policy Governance and Integration
Lec 13 Future Trends in IT Risk Management
Lec 1 CyberSecurity Risk
Lec 2 Operational Risk
Lec 3 Compliance Risk
Lec 4 Financial Risk
Lec 5 Stategic Risk
Lec 6 ICT Role in Risk Management
Lec 7 ICT Role in Risk Reporting
Lec 8 ICT Role in Risk Mitigation
LEC 9 MCQs and Drafting Practice of Ch 14 16 and 17 (TAKEN FROM LIVE SESSION)
Lec 1
Lec 2
Lecture 1
Chunk 1
Chunk 2
Chunk 3
CAF 03 Data System and Risks by Sir Osama Waheed
239+ students are Recommending this Course