Looking for a Tutor Near You?

Post Learning Requirement ยป
x
x

Direction

x

Ask a Question

x

Hire a Tutor

IT Training Computation Courses in Dubai

Filter

Explore a comprehensive array of IT Training Computation courses in Dubai meticulously crafted to cater to your educational requirements. Delve into accredited programs, guided by expert instructors, and take advantage of flexible learning solutions to excel in your chosen field. Enroll today and commence a transformative educational journey

1 to 25 of 45 Courses
International Brighter Career Development

By:   International Brighter Career Development

  • Location :
    Dubai
  • Fees :
    AED 2500
  • Duration :
    3 s
  • Schedule :
    Sunday to Saturday
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Our training covers all requirements for the globally-recognized Project+ management certification that identifies qualified and quality project managers. This course incorporates universal project management principles and critical soft skills such as conflict resolution, negotiation, communication, team building/leadership, and setting and managing expectations.

Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    1 Hour
  • Schedule :
    18th April 2019 to 18th April 2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

After finishing level_1 now you can go ahead on the second level_2 f or programming with Vb.net.

You will learn how to use complicated code by easy way of programming.

The easy and fun way is programming (Games) the first game is X|O game.

Basic knowledge

  • Passing and understanding the Level_1

What you will learn

  • Flowchart design
  • Variables
  • Aries
  • Loops
  • Branching
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    18th April 2019 to 18th April 2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

We are enhancing the services created with Part 1 by adding loggers, authentication and authorization mechanisms. Optimizing the server code, introducing request tagging with users, user ID, getting user information with tokens, securing the environment in multiple ways. I'm trying to enable the developer more reliable for data and access level handling. I keep focusing on robust + reliable application architecture. I hope you would like to learn this.

Basic knowledge

  • Express JS
  • Server side programming
  • Java Script
  • Routing
  • Handlers
  • Mongoose
  • DAO
  • Models and coding practices with functional programming
  • I would suggest if you new to Node JS please refer to Part 1 of this course first

What you will learn

  • Overview of previous code (Part 1)
  • Using Loggers (winston)
  • Extended Loggers
  • Auth helpers with JWT
  • Enhancing server security
  • Configure Auth Helpers
  • Creating user specific routes
  • Access helpers (route protector)
  • Attaching user identities to request
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    18th April 2019 to 18th April 2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

Web services that conform to the REST architectural style, or RESTful web services, provide interoperability between computer systems on the Internet. This course focuses on faster development of server side to write the lightweight, lightening fast server side in Node JS. We are using the MongoDB, JWT, Mongoose and related libraries for making the server side reliable and fast.

Basic knowledge

  • Javascript
  • Server side GET, PUT, POST, DELETE
  • Browser basics
  • PostMan plugin
  • Basic functional programming

What you will learn

  • Server Creation
  • Configuring servers
  • Connecting mongoDB
  • Using Helpers and DAO
  • Mongoose - a mongoDB Client
  • Routers - sub routes within server
  • Server logging
  • JWT - authorizations and authentications
  • Token Signing
  • Clone and test
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    18th April 2019 to 18th April 2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

You will get understanding of dividing the code in different module to scale at large levels. You will learn different aspects of using the different components like services, HTTP interceptors, local storage, encryption, on the fly cache, cache synchronization, Push notification systems, binding the components in single layouts, layout structuring basics and much more.

Basic knowledge

What are the requirements?

  • angular basics
  • angular 2,4 or 5
  • Basic HTML, CSS, Typescripts
  • Business applications understanding

What you will learn

  • Understand about large scale application development in angular 6
  • Can configure applications as per environment
  • Logging and Error handling in right way - exportable logging to sentry or other servers
  • Work delegation to different components to make things faster, reliable and efficient
  • System workflows, data interactions, OOPs for component level access
  • Saving the data in browser storage in right way
  • PubSub factories for observable data and cache changes
  • Recoverable cache and authentication logics
  • MQTT real-time light weight Queue interactions
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    18th April 2019 to 18th April 2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

The course is designed for the students who already use the computers or laptop and want to know how is applications and games made of.

We will start form the beginning of designed the flowchart of the program and describe how to convert the flowchart to programming code.

Next is describe the VB dot net statement and variables and efferent types the controls.

The using of branches in simple way.

First :Example is creating a simple application about traffic signs.

Second: Example is how to create your own calculator.

Third: A simple board game X&O. and simple puzzle Game.

Conclusion :How to use programming to converts you ideas to be real and create your own games.

Think what? You can also seal your products to costumers in future.  

Basic knowledge

  • Basic mathimatics & english
  • Basic computer knowledge

What you will learn

  • Princibale of programming
  • How Start thinking using flowchart
  • Converting flowchart to code
  • Calculator application design
  • Games application design
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    3 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

Cyber threats are one of the most clear and present danger looming over organisation in the current digital world. Cyber security is an area where technology, people, process and control work together hand-in-gloves to thwart any information leak and hence saving organisation from financial and reputational loss. Information security is fundamental to cyber security as it prepares the organisation to defend the breach of information assets. Any organisation’s cyber security programs is a combination of security of IT and telecom infrastructure, application, data and people. This is the data, also called as Information, that is vital for organisation’s survival. Hence, Information security management is of fundamental importance in any cyber security initiative adopted my organisations. 

In the new age of digital economy, organisations are struggling to protect their digital asset also called as Information. The Information security management system a.k.a ISMS is one of the framework for organisations to adopt to become proactive to the internal as well as external threat to information security. The risk of information security breach is far-fetched than the old days phenomenon. These RISKs are not only monetary but also brand image, collapse of a business, property damage etc.

The five axes of digital technology viz. Social, Mobility, Analytics, Cloud and Internet of Everything(IOE) are disrupting the conventional method of doing business. Not adopting these technologies is questioning the basic survivability of organisation. As these technologies are getting adopted, the threat surface for information security breach has multiplied many folds. However, only technology does not lead to a super cyber defense mechanism. As high as, 90% of the information security breach has been attributed to employee or partners and their awareness of information security.

Hence, a good information security management system does not have technology as the only facet, but it has people, process, policy and guidelines as the governing principles with ever evolving strategy tuned to the emerging threat vectors in cyber world.

As a matter of fact, a new employee is required to sign information security non-disclosure and compliance document when they join an organisation. But is that effective? Do organisations see the informal chit-chat among employee a threat? Why can’t they create a work culture where information security become a habit of employees like the personal and family security engrained in their habits.

This course is all about understanding the components of information security management systems. It will bring clarity to technical person about the importance of people, process, policy and controls that governs the information security management in an organisation. This is a must course for all seeking a corporate career and being a good corporate citizen. Also, this is the first step for seeking a career in information security management with a gradual rise to the top position in Information security domain in corporate also called as Chief Information Security Officer(CISO).

This course dissects the information security myth from enterprise architect's point of view with the course name titled ‘Constructs of Information Security Management System’. It systematically builds from information to information security to all elements of ISMS starting with fundamental of information characteristics also called as Confidentiality, Integrity, Availability(CIA). As you know information security is the major building block toward a step toward cyber security, learning ISMS basics is a must for all. 

As a bonus lecture, three lectures has been add for the professionals who wants to understand the Enterprise Security Architecture from a technology deployment perspective. This will help the working professional to decide which all technology elements to be implemented in order to secure the enterprise information and be ready to response to a cyber attack. The Chief Enterprise Security Officer (CISO) will have a refresher on technology elements.

Basic knowledge

  • The course requires students to know a brief about digital world like PC, internet and an appreciation of 'Business'.The students should have basic idea of hacking and impacts on organisation. You should appreciate the management aspect of cyber security

What you will learn

  • At the end of course, Students will start believing in policy, process and control aspects of information security management system and they will change their attitude toward cyber security casual to serious. An employed or aspiring to be employed person will change their attitude and will appreciate organisation's information security policy.The students will be able to clearly understand the Confidentiality, Availability and Integrity aspect of Information asset.The information security professions will clearly understand the meaning of Vulnerability, RISK, Policy, Process, Control, guidelines with ample example. Know the Information security standards and frameworks.This course will guide in implementing all elements of Information security management system.The existing cyber security professional will be able to understand and implement enterprise security architecture elements with context to business.
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course the viewer will learn step by step Implementation of DMVPN using multiple phases, in this lecture the author will demonstrate the implementation of DMVPN and configuration of DMVPN required for successful connectivity between remote sites. The process of achieving DMVPN using Phase I,II - static and Dynamic tunnels , Phase III using Dynamic Tunnel with IGP routing protocol is included.

The author will design the Topology and complete the configuration step by step.

Basic knowledge

  • CCNA, GNS simulator, Cisco Routers 1800, 1900, 2800

What you will learn

  • The students will learn how to implement DMVPN between Remote offices
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course the author explains the facts needed to design and implement route redistribution between different networks running different routing protocols. The author shows different topologies and does step by step configuration and applies route redistribution.

The skill to know how to do route redistribution is very essential for any network engineer at any level, this skill helps the student know how to integrate networks during business acquisitions.

Basic knowledge

  • CCENT, CCNA, Cisco routers 1800, 2600, GNS OR VIRL simulator

What you will learn

  • The students will learn how to redistribute routes from one network to another network
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    4 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course the author introduces Border Gateway Protocol -BGP , its concepts and clarifies the concepts using practical scenarios with topology configuration. The author shows step by step configuration to implement BGP and complete the configuration during the lesson. The course is very important to anyone who wants to master BGP concept and also get the practical experience that the author has shared in his designs.

Basic knowledge

  • CCNA, Cisco Routers 1800, 2600, 2900, VIRL Or GNS simulator

What you will learn

  • Student will learn how to manage and administer BGP in the real world
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    1 Hour
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course the student will learn important skill of how to filter unwanted routes from the routing tables. This skill will also help the student to keep the routing tables clean in an organization, thus keeping the network safe from malicious injected networks.

          Follow the author as he goes through the steps below

           1. Building Topology to simulate a routing map.

          2. Four cases are created that will show step by step filtering of the routes using Prefix-lists.

Basic knowledge

  • CCNA, Cisco Routers 1800, 1900, 2900, GNS AND VIRL SIMULATOR

What you will learn

  • The student will learn how to build the topology and filter unwanted networks from the routing tables from the core routers
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    1 Hour
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

The correct TCP data handling solution using C++

In C/C++, socket programming is one of the most challenging subjects to every developer. Not only the theory of the socket is quite tricky, and there are a lot of things to learn, but we also need much experience and guidance in various cases.

To parse and handle TCP data is that very case. We can recognize the necessity and make sure the solution is correct, only by experience.

With my 16 yrs experience in developing financial trading platforms with Visual C++, I'm sure that you need to learn and utilize this lecture.

Basic knowledge

  • Understanding of socket programming, especially TCP
  • Basic knowledge of C/C++

What you will learn

  • They would be able to build applications communicating through sockets, in their own network or the Internet
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    1 Hour
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course, you’ll learn about socket programming. It is the most fundamental and practical knowledge in every IT communications field. It provides an overview of socket communication fundamentals such as UDP, TCP, and its functions. It aims to reduce significant "gotcha" moments the developers may encounter during socket applications development.

Basic knowledge

  • Basic programming concepts is required

What you will learn

  • The students would understand the concepts of Sockets in C++ and develop their Socket applications in the mode most suitable to their requirements
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

Learn How to Provision Internet Access for an Organization. In this course the author will teach students how to apply different types of NAT, the author will gradually build the student knowledge towards how to apply NAT Overload for an organization. The course will teach the student about the communication model - OSI Model, TCP/IP MODEL and IPv4 classes that are used by Internet and Private organizations.

The author will implement topology designs and configure the network topology step by step and verify the results.

Join now!

Basic knowledge

  • The student should know basic networking concepts, recommended to have already done Subnetting and understands basic routing

What you will learn

  • The student will learn how to provision Internet access for any organization practically
  • The student will learn how to design and configure different types of NAT
  • The student will learn how to apply Static Route, Access-lists and Routemap
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    9 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

Welcome to Ethical Hacking Course ! In this course, you will start as a beginner and leave the course with an expert . The course purely focused on Practicals.

Course is divided in 2 parts: -

  • 1. Network Pentesting 
  • 2. Web Pentesting

The course is structured in a way that will take you through the basics of computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level - by the time you finish, you will have knowledge about most penetration testing fields.

Network Penetration Testing - In this section you will learn major and minor attacks on networks .it can be divided in 3 sections : -

  • Pre-connection: in this section, we still don't know much about penetration testing - all we have is a computer with a wireless card. You will learn how gather information about the networks and computers around you and launch a number of attacks without a password, such as controlling the connections around you (ie: deny/allow any device from connecting to any network). You will also learn how to create a fake access point, attract users to connect to it and capture any important information they enter
  • Gaining Access: Now that you have gathered information about the networks around you and found your target, you will learn how to crack the key and gain access to your target network. In this section you will learn a number of methods to crack WEP/WPA/WPA2 encryption
  • Post Connection: Now you have the key to your target network and you can connect to it. In this section you will learn a number of powerful attacks that can be launched against the network and connected clients. These attacks will allow you to gain access to any account accessed by any device connected to your network and read all the traffic used by these devices (images, videos, audio, passwords ...etc)
  • Gaining Access - In this section you will learn how to gain full control over any computer system
  • Server Side Attacks: In this approach you will learn how to gain full access to systems without the need for user interaction. You will learn how to gather information about a target computer system such as its operating system, open ports, installed services and discover weaknesses and vulnerabilities. You will also learn how to exploit these weaknesses to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries
  • Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the user. In this approach you will learn how to launch a number of powerful attacks to fool the target user and get them to install a backdoor on their device. This is done by creating fake updates and serving them to the user or by backdooring downloaded files on the fly. You will also learn how to gather information about the target person and use social engineering to deliver a backdoor to them as an image or any other file type.Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems

Web Application Penetration Testing - In this section you will learn how webistes actually works . you will learn various web application attacks like sql injection attack , xss attack , csrf attack , shell upload attack , buffer overflow attack , local file inclusion attack etc . we have covered all major attacks on web applications. 

Summary

In this course, you will perform test to carry out and exploit hidden vulnerability within your network and systems, not only you will be exposing those but you will also provide ways and methods to fix and secure and hardening your system security preventing it from any other attacks. You will learn how to test your network against various types of attacks & develop a network-testing environment that can be used totest scanning tools and techniques. Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network, select and configure the most effective tools from Kali Linux to test network security, employ stealth to avoid detection in the network being tested, recognize when stealthy attacks are being used against your network.Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems & learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the network—the end users. Port scanning for UDP scanning, stealth scanning, connect & zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.By the end of this course you will become a pro with the tools that Kali Linux offers to perform some advanced penetration testing, how to exploit the vulnerable systems and how to patch them.

NOTE: This course is created for educational purposes only .

NOTE: This course is a product of Sunil Gupta and no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Simpliv.

Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    8 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

12+ Hours of Video Instruction

CCNP Routing and Switching ROUTE 300-101 Complete Video Course is a comprehensive training course that brings Cisco CCNP R&S ROUTE exam topics to life through the use of real-world demonstrations, animations, live instruction, and configurations, making learning these foundational networking topics easy and fun.

Best-selling author, expert instructor, and double CCIE Kevin Wallace walks you through the full range of topics on the CCNP Routing and Switching ROUTE 300-101 exam, including fundamental routing concepts; IGP routing protocols, including RIPng, EIGRP, and OSPF; route distribution and selection; BGP; IPv6 Internet connectivity; router security; and routing protocol authentication. This unique product contains multiple types of video presentations, including live instructor whiteboarding, real world demonstrations, animations of network activity, dynamic KeyNote presentations, doodle videos, and hands-on router and switch CLI configuration and troubleshooting in real lab environments, allowing you to both learn the concepts and the hands-on application.

The 149 videos contained in this product provide you more than 12 hours of instruction. Modules are divided into easy to digest lessons and conclude with summaries and interactive module and glossary quizzes to help assess your knowledge. In addition to the review quizzes, the product also contains interactive exercises to help you truly learn the topics in each module. The product concludes with a series of lessons that give you valuable advice to help prepare for the actual exam.

Designed to take you inside CCNP routing concepts in a unique and interactive way, CCNP Routing and Switching ROUTE 300-101 Complete Video Course is guaranteed to help you master the foundational networking topics that will help you succeed on the exam and on the job.

Who Should Take This Course?

  • Anyone interested in obtaining their CCNP Routing and Switching certification or anyone interested in learning fundamental routing concepts and configuration skills

Basic knowledge

Course Requirements

  • While this complete video training product does not assume any prior knowledge of network administration or configuration, you should understand the fundamental purposes of a network and be comfortable working with a computer

What you will learn

  • Characteristics of routing protocols, including traffic and network types, IGP and EGP comparison, categories of routing protocols, convergence times, route summarization, scalability and Cisco easy virtual networking theory
  • Remote site connectivity, including GRE tunnel theory and configuration, DMVPN, multipoint GRE , next-hop resolution protocol, and IPsec
  • RIPng fundamentals, configuration, and verification
  • EIGRP fundamental and advanced concepts and EIGRP IPv6 and named EIGRP configuration
  • OSPF fundamental and advanced concepts, the OSPF link-state database, and OSPFv3 configuration
  • Route redistribution including seed metrics, redistribution of IPv4 and IPv6 routes into EIGRP and OSPF, manual route redistribution, distribution list configuration with ACLs and prefix lists, route maps, and administrative distance manipulation
  • Route selection including packet switching architecture, CEF configuration and verification, policy-based routing fundamentals and configuration, and Cisco IP SLA fundamentals and configuration
  • Internet connectivity with BGP and advanced BGP concepts
  • IPv6 Internet connectivity including provider assignment of IPv6 addresses, IPv6 static address and default route, traffic filtering, route filtering, and IPv6 over IPv4 and IPV6 BGP sessions.
  • Router and routing security
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

In this course you will learn how to set up a Nagios 4 server on both Red Hat based and Ubuntu based Linux servers. For Red Hat and CentOS you will learn to install from both source and from packages. With Ubuntu you will learn how to install from source (there are no packages available for Nagios 4 for Debian based systems).

You will also learn how to connect your Nagios server to both Linux and Windows servers for basic monitoring.

Basic knowledge

  • You should have a solid understanding of the basics of Linux and Windows server administration. You should also have a basic understanding of networking and opening ports in firewalls if needed on your network.

What you will learn

  • You will learn to install Nagios 4 monitoring server on both RedHat/Centos Linux and Debian/Ubuntu based systems. You will learn the basics of setting up monitoring of remote Linux and Windows servers. Once you complete the course you will have a monitoring console that will show health of multiple remote servers.
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    2 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

WordPress is well known for its content management capabilities, plugins, themes, and has great use in online marketing.

In fact it is the #1 platform in the world for setting up blogs and sites.

However, Is is often overlooked that with the right combination of plugins, WordPress can be used for other tasks as well, including "offline" businesses, and workflow automation.

This course takes you, the student, from having no WordPress site at all to owning a fully automated forms, and workflow approval system. 

By the end of the course you will have a working WordPress site, you'll know how to setup forms and email notifications and, how to automatically process and approve requests.

By the time you complete this course you should have at least 3 workflows automated!

Basic knowledge

Are there any prerequisites?

There is only one - You need to own, or to be able to purchase a single site license for Gravity Forms plugin ($39), in order to complete the course.

  • If you don't already own a WordPress site - Don't worry, This course shows how to setup one in less than 10 minutes
  • If you don't know how to write code - Don't worry you can complete this course without writing a single line of code!

Course materials includes form resource files, to help you complete course objectives and interactive practice sessions so you can implement what you have learned.

What you will learn

What's the course about?

  • The course is about forms and workflows automation with WordPress

What does it mean?

  • It means that by the end of this course you'll learn how to turn any WordPress site into an automation system for forms and approval workflows

What can you use it for?

  • Anything from job application forms and vacation approvals to daily checklists and change management
  • You are only limited by your imagination!

Why did I make this course?

  • Simple - I am using the same techniques myself on a daily basis with my team
  • They are cost-effective, they work, and I love sharing my experience and knowledge with others

Who should enroll?

  • This course is targeted to anyone who is looking to add automation to his daily "office" tasks without spending a lot of money on workflows and approval tools
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
  • Duration :
    4 Hours
  • Schedule :
    03/06/2019 to 03/06/2023
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

About this Course

Ruby on Rails can seem overwhelming at first, but it doesn’t have to be! In this course I’ll walk you through it step by step and you’ll be building your first web app in MINUTES. You’ll be amazed how quick and easy it is to create very professional looking websites,

even if you have no programming or web design experience at all.

Watch over my shoulder as I build a cool Stock Market app step by step right in front of you. You’ll follow along and build your own copy. By the time we’re finished, you’ll have a solid understanding of Ruby on Rails and how to use it to build awesome web apps.

The course contains 42 videos – and is just over 3 hours long. Watch the videos at your own pace, and post questions along the way if you get stuck. You don’t need any special knowledge or software to take this course, though any experience with HTML or CSS is a plus. You don’t even need to know the Ruby programming language. I’ll walk you through EVERYTHING.

Ruby on Rails is a great web development tool and learning it has never been this easy.

What We'll Build...

  • We'll build a cool Stock Market app that let's you look up stock quotes and financial information and save it to a database.
  • Users can create an account and sign up to your website, log in, add stocks, check stock prices and all kinds of other cool financial information.  
  • We'll style the website using the popular Bootstrap CSS framework (I'll show you how to use it!)
  • Sign up today and I'll see you on the inside!

Basic knowledge

  • You just need a computer with Internet access, and nothing else

What you will learn

  • Build Web Apps With Ruby On Rails
  • Build Your Own Stock Market Website
  • Understand the Bootstrap CSS Framework
  • Use Databases with Ruby on Rails
Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
    AED 519
  • Duration :
    30 Hours
  • Schedule :
    11th Feb 2019 End Date : 22nd Feb 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Want to learn all the elements of Tableau Desktop 10? You have come to the right place. Simpliv’s Tableau Certification Training will familiarize you with everything about Tableau, including visualizing, data organization and dashboard designing. Our course will ensure that you also don’t get left out of other concepts of Tableau, such as mapping, data connection and statistics. Ideal for system administrators, business intelligence professionals and software developers, Simpliv is all geared to put you on the road to Tableau Desktop 10 Qualified Associate certification.

Who is the target audience?

 All the professionals who are passionate about business intelligence, data visualization, and data analytics.

Basic knowledge:

 There are no prerequisites for taking up this certification training course.

Curriculam

Visualization with Tableau

  • Tableau - An Introduction   
  • Aggregation and Granularity   
  • Action Filters and Action Highlights   
  • Customer Segmentation Dashboard   
  • Data Blending   
  • Find top 10 Gems   
  • Table Calculations (Explaining various Table calculations )   
  • Difference between Table calculations and Calculated fields  
  • LOD Functions   
  • How to connect to databases (Video based)   
  • How to integrate Tableau with R (Video based)   
  • Dashboarding Techniques   
  • Other Charts   
  • Tableau Server   
  • Interview Preparation   
  • Certification Preparation (Optional)  

New Batch starts from 11th Feb 2019 Days: Mon-Fri (10 Days) 07:00 PM - 10:00 PM (IST)

Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
    AED 519
  • Duration :
    8 Hours
  • Schedule :
    : 04 Feb 2019 End Date : 07 Feb 2019 Days: Mon-Thu (4 Days) 10:30 AM - 12:30 PM (IST)
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Version control is an essential skill for developers to master, and Git is by far the most popular version control system on the web. Our Expert trainer will show you how to install Git and use the fundamental commands you need to work with Git projects: moving files, managing logs, and working with branches. Plus, you'll learn how to work with the popular GitHub website to explore existing projects, clone them to your local hard drive, and use them as templates for your new projects.

Who is the target audience?

Programmers, Developers, Technical Leads, Architects, Freshers,Data Scientists, Data Analysts,Business Intelligence Managers.

Basic knowledge:

 A person attending this training should have good knowledge of the Windows basic Command line. Knowledge of Selenium Automation would be an added advantage (Sample projects will be used).

Curriculam:

Module 1

  • What is Version Control system
  • Benefits of Version control system
  • Types of VCS   
  • Distributed Version Control System

Module 2

  • What is Git   
  • What is GitHub   
  • Distributed Version Control System Terminologies
  • Installation and Configuration of Git

Module 3

  • Hands-on with Git and GitHub   

 

Event Type - Online Classroom Training

Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
    AED 519
  • Duration :
    30 Hours
  • Schedule :
    : 4th Feb 2019 End Date : 22nd Feb 2019 Days: Mon-Fri (15 Days) 08:00 PM - 10:00 PM (IST)
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Simpliv’s Blockchain Online Course will provide an overview of the structure and mechanism of Bitcoin, Ethereum, Hyperledger and Multichain Blockchain platforms. You will learn to setup your own private Blockchain and deploy smart contracts on Ethereum. You’ll learn the use the latest tools to build Blockchain applications, set up your own private Blockchain, deploy smart contracts on Ethereum and gain practical experience with real-world projects.

Who is the target audience?

 Students and Professionals aspiring to make a career in the Blockchain technology.

Basic knowledge:

 Anyone with a technical background and fair understanding of programming concepts can take this course. There are no prerequisites for this course.

Curriculam

Course Index

  • Cryptocurrencies and Blockchain   
  • Bitcoin and Blockchain   
  • Ethereum   
  • Solidity   
  • Overview of Web3.JS   
  • Creating DApps   
  • Hyperledger   
  • Multichain   
  • Prospects of Blockchain and Use Cases   

 

New Batch starts from 04th FEB, 2019 Days: Mon-Fri (15 Days) 08:00 PM - 10:00 PM (IST)

Simpliv Llc

By:   Simpliv Llc

  • Location :
    Dubai
  • Fees :
    AED 519
  • Duration :
    30 Hours
  • Schedule :
    04th Feb 2019 End Date : 15th Feb 2019 Days: Mon-Fri (10 Days) 09:30 AM - 12:30 PM (IST)
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

The course provides an overview of Blockchain technology including its history, evolution and the future. Students learn about bitcoin, which is powered by blockchain technology, bitcoin mining, and other blockchain platforms like Ethereum, Hyperledger and Multichain.

Who is the target audience?

Anyone aspiring to learn new technology or having an interest in pursuing a career in Blockchain technology can take this the course. This course caters to students and professionals from all background including, but not limited to, technology, management, finance, etc.

Basic knowledge:

 There are no pre-requisites for this course, however, a basic understanding of object-oriented programming would be helpful.

Curriculam

Course Objective

  • Introduction   
  • Blockchain   
  • Bitcoin   
  • Mining   
  • Ethereum Basics   
  • Smart Contracts & Solidity   
  • Hyperledger Basics   
  • Chaincode and Composer   
  • Multichain Basics   
  • Blockchain Industry Applications and Job Prospects   

New Batch starts from 04th Feb to 15th Feb 2019 Days: Mon-Fri (10 Days) 09:30 AM - 12:30 PM (IST)

2nd Batch starts from 09th Feb to 09th Mar.2019 Days: SAT-SUN(5WKs) 10:30AM to 01:30PM (IST)

Oscar Cultural Institute

By:   Oscar Cultural Institute

  • Location :
    Dubai
  • Fees :
  • Duration :
  • Schedule :
    2 Hours
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Tally ERP Modular Training is available here for the interested students. Tally is used by all type of business houses like Proprietor firm, Partnership firm, Non-profit making Organizations, MNC companies. Course covers:

  • Creating Groups
  • Accounting Heads/Cost Codes
  • Voucher Entry (Sales/Purchase/Receipts/Payments)
  • Journal Entries Cash/Bank Book entries
  • Bank Reconciliation Statement
  • Report Printing (Sales/Purchase)
  • Debtors/Creditors Ageing Analysis
  • Inventory Details
  • Printing Ledger Accounts
  • Preparation of Final Accounts 
  • (P&L, Balance Sheet)
  • Management Ratios
Oscar Cultural Institute

By:   Oscar Cultural Institute

  • Location :
    Dubai
  • Fees :
  • Duration :
  • Schedule :
    2 Hours
  • Segment :
    IT Training
  • Subject :
    Computation

Course Details

Peachtree is used by all type of business houses like Proprietor firm, Partnership firm, Non-profit making Organizations, MNC companies. In our course following topics are included:

  • Creating Groups
  • Accounting Heads/Cost Codes
  • Voucher Entry (Sales/Purchase/Receipts/Payments)
  • Journal Entries Cash/Bank Book entries
  • Bank Reconciliation Statement
  • Report Printing (Sales/Purchase)
  • Debtors/Creditors Ageing Analysis
  • Inventory Details
  • Printing Ledger Accounts
  • Preparation of Final Accounts 
  • (P&L, Balance Sheet)
  • Management Ratios