
By Ali Imran
0%
Rs. 15000
This course includes
1. What is data
2. Data Explained with Real Life Example
3 Types of Data
4 Categories Of Data
5 Sources of Data
6 Remaining Sources of Data and Importance of Data Collection
7. Data Explained with Further Examples
8. Ethical Consideration in Data Collection
Class Activity
Test 1 chapter 1
1.intro Data governance
2.Key objectives of data governance
3.1 key components of data governance
3.2 key components of data governance
3.3 key components of data governance
3.4 key components of data governance
4.1 level of data governance
4.2 level of data governance
4.3 level of data governance
5. Common data clasifaciation
6. data classification frame work
7. Data storage
8.Emerging trends
9.Data integrity
10. data security
11. Complince and stewerd ship
12. Meta data
13.Emerging Technologies in Data Governance
1. Introduction to Data Analytics(vvs)
2. Data Analytics cycle(vvs)
3. Real life example Of Data Analytics(vvs)
4. Another example Of Data Analytics(vvs)
5. Stages Of Data Analytics
6. Real life example of Qurshi Industries(vvs)
7. Aplication of data Analytics(vvs)
1. Big Data intro(VVS)
2. Charactersitcs of big data(VVS)
3. Sources of big data(VVS)
4.Method of big data
5.Application of big data
6.Challanges of big data
1.intro to DBMS
2.Components of DBMS
3.Data base components&Atomicity
4.consistancy
5.isolation
6.durability
7.Additional charactersitcs of DBMS
8.DBMS Arthitecture external level
9.Conceptual level
10.internal level
11.key benefits of three architecture
12.types of data independance
13.physical independance
1.Data wreahousing
2.online transaction process
3.Eaxtract,transform,load process
4.Data mart
5.1Data normalization
5.2 Data normalization
5.3 Data normalization
1.intro to it system Architecture
2.1 key components of it system architecture,hardware
2.2.soft ware
2.3. network
2.4. storage
3. scalability&flexibilty
4. it system interaction & dependence
5.1 best practices for desienging it system architecture
5.2 best practices for desienging it system architecture
6.1. intro to programing language,types of language
6.2 papular language
1. intro to ERP system
2. key components of ERP system
2.1 key components of ERP system
3. Real life Example
4.ERP implimentation
5.benefits of ERP system
6.types of ERP system
1.intro Emerging technologies And AI &ML
2.key features of AI and ML
3. Application of AI and ML
4. IOT devices
5.components of IOT
6.Application of IOT
7. Challanges in IOT
8. 5G technologies
9. Edge Computing
10. intro to AR and VR
11. key features of AR and VR
12. Benefits
13.1 Quantum computing
13.2 Quantum computing
14. Robotics process
15. Benifits of PRA
16. MCQS
intro to AI ,learning cycle
1.1 types of AI
1.2 TYPES OF AI
1.3 TYPES OF AI
1.4 TYPES OF AI
1.5 TYPES OF AI
2.Agenting AI
1. intro cloud computing
4.2 cloud computing servies model
5.4 community cloud
2. what is cloud computing
3.Famous Cloud Computing
4.1 cloud computing servies model
4.3 cloud computing servies model
5.1 cloud develpment model ,public cloud
5.2 private cloud
5.3 hybrid cloud
6. benefits of cloud computing
7. challanges in cloud computing
8.1 Application of cloud computing
8.2 Application of cloud computing
9. pakistan cloud first policy
1.1 intro block chain ,what is block chain
1.2 what is block chain
1.3 how block chain works
1.4 consenses machanisiem
1.5 nodes
1.6 HAshing
2. key components
3. broadcast to network , block creation , chain program
4. use block chain
5. distributed leadger technologies
6.1 fintech
6.2 key areas fintech
6.3. key Areas fintech
7. benefits of fintech
1. understanding digital disruption
2. drivers of digital disruption
3.1 impact of digital disruption
3.2 impact of digital disruption
4.1 integrating it and data management into business
4.2 integrating it and data management into business
5. it governance frame work
6. best practices for it governance framework
7. adecucy and improvement
8. impact od digital disruption in accounting and finance
1. understanding it system risk
2. what is risk managment
3.1 key components ,identifecation risk
3.2 Risk assesment
3.3 Risk mitigation and response ,four risk identifecation risk
3.4 Risk monitring
4. strategic importance of it system risk
5. incident response planing
6.1 scope of it risk
6.2 scope of it risk
7. physical risk
8.digital risk
9. human risk
10. Envoriment risk
11. third party risk
12. compliance and regulatory risk
13. technologies role in regulatory risk
14.1 the role of it security risk
14.2 the role of it security risk
1. foumdation of cyber security
2. Mallicious sortware
3. cybercrime cariety ,sophisticated attack ,insider and external threats
4. preventive measure
5.1 detection and monitering
5.2 detection and monitering
6. incident response
7. automated security
8. Managed security server provider
9. advance technologies in cybersecurity
10. best practices of cyber security
11. shortage of cybersecurity resources
12. Emerging cyber security
INTRO , KEY OBJECTIVES , IMPORTance of it general control
key components
implementing it general control
challanges in manageing it general control
ict's role in risk mangement
ict's role risk identification
ict's role in risk reporting
ict's role in mangement and mitigation
best practices for intrgration ict's into risk mangement
CAF 03 Data System and Risks by Sir Ali Imran 1
CHATER 6 (11 JAN)
CHATER 1 (10 JAN)
CHATER 2 (10 JAN)
CHATER 3 (10 JAN)
CHATER 4 (11 JAN)
CHATER 5 (11 JAN)
CAF 03 Data System and Risks (Classroom Mode) by Sir Ali Imran
29+ students are Recommending this Course