Learn Basic of Emerging Trends in Computer

Emerging Trends in Computer & Information Technology
New
Rating: 4.9 out of 5 (3 ratings)
254 students
English
English [Auto]
Emerging Trends in Computer & Information technology Field

Requirements

  • Be able to identify the concepts of Computer Sciences.

Description

The aim of this course is to  help students to attain the industry identified competency through various teaching learning experience: acquire knowledge of emerging trends. Advancements and applications of Computer Engineering and Information Technology are ever changing. Emerging trends aims at creating awareness about major trends that will define technological disruption in the  upcoming years in the field of Computer Engineering and Information Technology. These are some emerging areas expected to generated revenue, increasing demand as IT professionals and open avenues of entrepreneurship. The Objectives of the course are Differentiate between Machine Learning & Deep Learning, State IoT issues & Challenges in deployment, Describe the given model of Digital Forensics Investigation, Describe the given evidence handling, Describe the need to hack your own systems, Describe Database Vulnerabilities. The outcomes of the course are Describe Artificial Intelligence, Machine Learning & Deep Learning: Describe the concept of AI, State the components of AI, Differentiate between Machine Learning & Deep Learning, Interpret IoT Concepts: Describe IoT Systems in which information and knowledge are inferred from data, State IoT issues and challenges in deployment, Compare Model of Digital Forensic Investigation: Describe the given model of Digital Forensics Investigation, State the ethical and unethical issues in Digital Forensics, Describe Evidence Handling Procedures: List the rules of digital evidence, Describe the given evidence handling procedures, Describe Ethical Hacking Process: Describe the need to hack your own system, Detect Network, Operating System & Application vulnerabilities: Network Infrastructure vulnerabilities (Wired/Wireless),Describe Messaging Systems vulnerabilities.

Who this course is for:

  • Beginners of Software developers, Under graduates in Computer Science

Course content

5 sections15 lectures1h 44m total length
  • Introduction & History of Artificial Intelligence
    06:20
  • Goal & Importance of AI
    04:38
  • Types of AI based on Capabilities
    05:32
  • Types of AI based on Functionality
    03:48
  • Application of AI, Machine Learning & Deep Learning
    11:19

Instructor

Abdul Aziz Patel Khan
  • 4.6 Instructor Rating
  • 5 Reviews
  • 493 Students
  • 2 Courses

My self Mr. Abdul Aziz Patel Khan Lecturer in Department of Computer Technology in the institute  Karmaveer Kakasaheb Wagh Polytechnic, Nashik, Maharashtra, India. I am having more than 12 years of teaching experience.  Polytechnic Institutes are the Post SSC (After 10th) program with the duration of 3 years. Conducted under the guidance of Maharashtra State Board of Technical education and affiliated by DTE & AICTE India.