
By Ali Imran
Rs. 6000
This course includes
All About DSR
1. What is data
2. Data Explained with Real Life Example
3. types of data &catageries of data
4. Structured data
5. Unstructured data
6. Revision And Semi Structured Data
7. Sources of Data
8. Remaining Sources of Data and Importance of Data Collection
9. Data Explained with Further Examples
10. Ethical Consideration in Data Collection
11. MCQs
Class Activity
1. Introduction to Data Analytics(vvs)
2. Data Analytics cycle(vvs)
3. Real life example Of Data Analytics(vvs)
4. Another example Of Data Analytics(vvs)
5. Data analytics stage intro & Descriptive Analytics(vvs)
5.1 Diagnostic Analytics(vvs)
5.2 predictive Analytics(vvs)
5.3 prescreptive Analytics(vvs)
6. Real life example of Qurshi Industries(vvs)
7. Aplication of data Analytics(vvs)
8.Chapter 3 Mcqs(vvs)
1. Big Data intro(VVS)
2. Charactersitcs of big data(VVS)
3. Sources of big data(VVS)
4.Method of big data
5.Application of big data
6.Challanges of big data
7. Emerging trends(VVS)
8. Chapter 4 Mcqs(VVS)
1.intro Data governance
2.Key objectives of data governance
3.1 key components of data governance
3.2 key components of data governance
3.3 key components of data governance
3.4 key components of data governance
4.1 level of data governance
4.2 level of data governance
4.3 level of data governance
5. Common data clasifaciation
6. data classification frame work
7. Data storage
8.Emerging trends
9.Data integrity
10. data security
11. Complince and stewerd ship
12. Meta data
13.Emerging Technologies in Data Governance
14.Drivers of Data Governance
15.Data governance chanllenges
16.data governance best practices and implimentation stages
17.Chapter 2 overview
18.MCQS
1.Data wreahousing
2.online transaction process
3.Eaxtract,transform,load process
4.Data whaerehouse Architecture
5.Schema in data whaerhouse
6.Snowflake schema
7.Data mart
8.1Data normalization
8.2 Data normalization
8.3 Data normalization
1.intro to it system Architecture
2.1 key components of it system architecture,hardware
2.2.soft ware
2.3. network
2.4. storage
3. scalability&flexibilty
4.1. it system layyers
4.2 it system layyers
5. it system interaction & dependence
6.1 best practices for desienging it system architecture
6.2 best practices for desienging it system architecture
7.1. intro to programing language,types of language
7.2 papular language
8. key consideration for chosing programing languages
9. Emerging trends in programing languages
1. intro to ERP system
2. key components of ERP system
2.1 key components of ERP system
3. Real life Example
4.ERP implimentation
5.benefits of ERP system
6.types of ERP system
1.intro Emerging technologies And AI &ML
2.key features of AI and ML
3. Application of AI and ML
4. IOT devices
5.components of IOT
6.Application of IOT
7. Challanges in IOT
8. 5G technologies
9. Edge Computing
10. intro to AR and VR
11. key features of AR and VR
12. Benefits
13.1 Quantum computing
13.2 Quantum computing
14. Robotics process
15. Benifits of PRA
16. MCQS
intro to AI ,learning cycle
1.1 types of AI
1.2 TYPES OF AI
1.3 TYPES OF AI
1.4 TYPES OF AI
1.5 TYPES OF AI
2.1 SUB FIELD OF AI ,MACHINE LAERNING
2.2 DEEP LEARNING
2.3 NATURAL LANGUAGE PROCESSING
2.4 COMPUTER VISION ,SUMMARY OF SUBFIELD
3.1 COMMON MACHINE LEARNING, SUPERVISED LEARNING ALGORITHEM
3.2 Unsupervised learning
3.3 reenforcement leaning
4.custom machine learning off the shelf solution
5.inteligent Automation
6.Agenting AI
7.MCQS
CHATER 1 (10 JAN)
CHATER 2 (10 JAN)
CHATER 3 (10 JAN)
CHATER 4 (11 JAN)
CHATER 5 (11 JAN)
CHATER 6 (11 JAN)
1. understanding it system risk
2. what is risk managment
3.1 key components ,identifecation risk
3.2 Risk assesment
3.3 Risk mitigation and response ,four risk identifecation risk
3.4 Risk monitring
4. strategic importance of it system risk
5. incident response planing
6.1 scope of it risk
6.2 scope of it risk
7. physical risk
8.digital risk
9. human risk
10. Envoriment risk
11. third party risk
12. compliance and regulatory risk
13. technologies role in regulatory risk
14.1 the role of it security risk
14.2 the role of it security risk
1. iso 27001
2. iso 27002
3. iso 27005
4. Enterrise technologies governance & risk mangment frame work 2017
electronic transction ordinance 2002
prevention of cyber security investigation rule
prevention of eletronic crime acrt 2016
national cyber security risk ordinance 2021
insitutional frame work
cobit
ict's role risk identification
ict's role in risk mangement
ict's role in risk reporting
ict's role in mangement and mitigation
best practices for intrgration ict's into risk mangement
INTRO , KEY OBJECTIVES , IMPORTance of it general control
key components
implementing it general control
challanges in manageing it general control
9. pakistan cloud first policy
10. MCQS
1. intro cloud computing
3.famous cloud computing
8.1 Application of cloud computing
8.2 Application of cloud computing
4.3 cloud computing servies model
5.1 cloud develpment model ,public cloud
5.2 private cloud
5.3 hybrid cloud
5.4 community cloud
6. benefits of cloud computing
7. challanges in cloud computing
2. what is cloud computing
4.1 cloud computing servies model
1.1 intro block chain ,what is block chain
1.2 what is block chain
1.3 how block chain works
1.4 consenses machanisiem
1.5 nodes
1.6 HAshing
2. key components
3. broadcast to network , block creation , chain program
4. use block chain
5. distributed leadger technologies
6.1 fintech
6.2 key areas fintech
6.3. key Areas fintech
7. benefits of fintech
8.1 .block chain and fintech synerges
8.2 . block chain and fintech synerges
9. MCQS
1. understanding digital disruption
2. drivers of digital disruption
3.1 impact of digital disruption
3.2 impact of digital disruption
4.1 integrating it and data management into business
4.2 integrating it and data management into business
5. it governance frame work
6. best practices for it governance framework
7. adecucy and improvement
8. impact od digital disruption in accounting and finance
1. foumdation of cyber security
2. Mallicious sortware
3. cybercrime cariety ,sophisticated attack ,insider and external threats
4. preventive measure
5.1 detection and monitering
5.2 detection and monitering
6. incident response
7. automated security
8. Managed security server provider
9. advance technologies in cybersecurity
10. best practices of cyber security
11. shortage of cybersecurity resources
12. Emerging cyber security
CAF 03 DSR Last Month Exam Saviour Batch (Class Room Mode) by Sir Ali Imran
32+ students are Recommending this Course