I-Net Security
2-year career course in Advance Hardware, Networking, Software coding and development,Cyber Security and Forensic Investigation with International certification approach
MODULE 1: ADVANCE HARDWARE ENGINEER:
Computer Hardware Components & Tools, Assembling & Disassembling of Desktops, Laptops & Server PCs, Operating System Installations (Windows 7, Windows 8.1, Windows Server 2012, Linux, Suse, etc.), Various kinds of Drivers Installations like VGA, Sound, LAN, Various Add-0n Cards etc. Application Software Installation, Understand and Concept of Boot Process of Windows Operating Systems, Identification and diagnose various problem caused by Virus, Worms, Spyware, Malicious Codes, Trojan Horse and their types, Data Recovery from Hard Disk, Pen Drives and other any removable devices, how to secure PC from threats, troubleshoot various problems related to Operating Systems and Boot process.Basic & Digital Electronics, Fault Finding and Repairing of Desktop, Laptop and Server’s Motherboard through BGA Machine, Troubleshoot and repairing of various components like all kinds of power supply and adaptors, system units, notebooks, ultra-books, laser printer. Analyze all kinds of technical issues related to computer hardware and operating systems, also resolve such technical issues as soon as possible, increase the uptime of machines upto 100%. Development of analytical, problem solving, decision making, team building skills in such a way that a hardware engineer in such a way that he can be able to increase the productivity of the organization.
MODULE 2: ADVANCE NETWORK ENGINEER:
Computer Networking, Uses of Networks and its types, Range, Structure and Media, Networking Cables, Hardware, Network Topologies, Planning, Network Operating System & Protocols, Resources Sharing, Both versions of IP Address IPv.4 & IPv.6, Project 802, Use of various Networking Tools, Introduction of Wi-Fi Network, Troubleshooting of Cables & configured Protocols, Fault Finding on Network, Troubleshooting of Protocols, Implementation of Wi-Fi, Important Networking Commands, Troubleshooting related to Network Operating System (NOS), Cabling, LAN Adapters, IP Address, Software Firewall, Services, Secure Network from threats.
MCSA (Microsoft Certified Solutions Associate)(Windows Server 2012)
- 70-410: Installing & Configuring Windows Server 2012
- 70-411: Administering Windows Server 2012
- 70-412: Configuring Advance Windows Server 2012 Services
MCSE(Microsoft Certified Solutions Expert) along with MCSA
(Windows Server 2012: Server Infrastructure)
- 70-413: Designing & Implementing a Server Infrastructure
- 70-414: Implementing an Advance Server Infrastructure
OR
(Windows Server 2012: Private Cloud)
- 70-246: Monitoring & Operating a Private Cloud with System Center 2012
- 70-247: Configuring & Deploying a Private Cloud with System Center 2012
OR
(Windows Server 2012: Messaging)
- 70-341: Core Solutions of Microsoft Exchange Server 2013
- 70-342: Advance Solutions of Microsoft Exchange Server 2013
High level Troubleshooting related to Active Directory of Windows Servers 2012, Virtualization, Remote Administration, Virtual Private Network
CCNA Security (210-260 IINS)
- Security Concepts
- Secure Access
- VPN
- Secure Routing and Switching
- Cisco Firewall Technologies
- IPS
- Content and Endpoint Security
Networking Services and protocols, Network Devices like Routers, Switches, WAN, Wireless Routers, etc.
RHCE - Red Hat Certified Engineer
- Red Hat System Administration I (RH124)
- Red Hat System Administration II (RH134/135)
- Red Hat System Administration III (RH254/255)
MODULE 3: ADVANCE SOFTWARE ENGINEER
Introduction of C & C++
- Intro to Computers and Programming
- Introduction to C/C++
- Data types
- Expressions and Interactivity
- Making Decisions
- Loops and Files
- Spring break
- Functions
- Arrays
- Structures
- Searching and Sorting Arrays
- Pointers
- Expression & Statements
- OPPs Concept
- Operator Overloading
- Derives Class/s
- Encapsulation
- Inheritance
- Data Abstraction
OCA Java SE 8 Programmer I (1Z0-808)
Java Basics
- Define the scope of variables
- Create executable Java applications with a main method; run a Java program from the command line; including console output.
- Import other Java packages to make them accessible in your code
- Compare and contrast the features and components of Java such as: platform independence, object orientation, encapsulation, etc.
Working with Java Data Types
- Declare and initialize variables (including casting of primitive data types)
- Differentiate between object reference variables and primitive variables
- Know how to read or write to object fields
- Explain an Object’s Lifecycle (creation, “dereference by reassignment” and garbage collection)
- Develop code that uses wrapper classes such as Boolean, Double, and Integer.
Using Operators and Decision Constructs
- Use Java operators; including parentheses to override operator precedence
- Test equality between Strings and other objects using == and equals ()
- Create if and if/else and ternary constructs
- Use a switch statement
Creating and Using Arrays
- Declare, instantiate, initialize and use a one-dimensional array
- Declare, instantiate, initialize and use multi-dimensional array
Using Loop Constructs
- Create and use while loops
- Create and use for loops including the enhanced for loop
- Create and use do/while loops
- Compare loop constructs
- Use break and continue
Working with Methods and Encapsulation
- Create methods with arguments and return values; including overloaded methods
- Apply the static keyword to methods and fields
- Create and overload constructors; including impact on default constructors
- Apply access modifiers
- Apply encapsulation principles to a class
- Determine the effect upon object references and primitive values when they are passed into methods that change the values
Working with Inheritance
- Describe inheritance and its benefits
- Develop code that demonstrates the use of polymorphism; including overriding and object type versus reference type
- Determine when casting is necessary
- Use super and this to access objects and constructors
- Use abstract classes and interfaces
Handling Exceptions
- Differentiate among checked exceptions, unchecked exceptions, and Errors
- Create a try-catch block and determine how exceptions alter normal program flow
- Describe the advantages of Exception handling
- Create and invoke a method that throws an exception
- “Recognize common exception classes (such as Null Pointer Exception, Arithmetic Excpetion, Array Index Out of Bounds Exception, Class Cast Exception)”
Working with Selected classes from the Java API
- Manipulate data using the String Builder class and its methods
- Creating and manipulating Strings
- Declare and use an Array List of given type
- Write a simple Lambda expression that consumes a Lambda Predicate expression
OCP Java SE 8 Programmer II (1Z0-809)
Java Class Design
- Implement encapsulation
- Implement inheritance including visibility modifiers and composition
- Implement polymorphism
- Override hashCode, equals, and toString methods from Object class
- Create and use singleton classes and immutable classes
- Develop code that uses static keyword on initialize blocks, variables, methods, and classes
Advanced Java Class Design
- Develop code that uses abstract classes and methods
- Develop code that uses the final keyword
- Create inner classes including static inner class, local class, nested class, and anonymous inner class
- Use enumerated types including methods, and constructors in an enum type
- Develop code that declares, implements and/or extends interfaces and use the @Override annotation.
- Create and use Lambda expressions
Generics and Collections
- Create and use a generic class
- Create and use ArrayList, TreeSet, TreeMap, and ArrayDeque objects
- Use java.util.Comparator and java.lang.Comparable interfaces
- Collections Streams and Filters
- Iterate using forEach methods of Streams and List
- Describe Stream interface and Stream pipeline
- Filter a collection by using lambda expressions
- Use method references with Streams
Lambda Built-in Functional Interfaces
- Use the built-in interfaces included in the java.util.function package such as Predicate, Consumer, Function, and Supplier
- Develop code that uses primitive versions of functional interfaces
- Develop code that uses binary versions of functional interfaces
- Develop code that uses the Unary Operator interface
Java Stream API
- Develop code to extract data from an object using peek() and map() methods including primitive versions of the map() method
- Search for data by using search methods of the Stream classes including findFirst, findAny, anyMatch, allMatch, noneMatch
- Develop code that uses the Optional class
- Develop code that uses Stream data methods and calculation methods
- Sort a collection using Stream API
- Save results to a collection using the collect method and group/partition data using the Collectors class
- Use flatMap() methods in the Stream API
Exceptions and Assertions
- Use try-catch and throw statements
- Use catch, multi-catch, and finally clauses
- Use Autoclose resources with a try-with-resources statement
- Create custom exceptions and Auto-closeable resources
- Test invariants by using assertions
Use Java SE 8 Date/Time API
- Create and manage date-based and time-based events including a combination of date and time into a single object using LocalDate, LocalTime, LocalDateTime, Instant, Period, and Duration
- Work with dates and times across timezones and manage changes resulting from daylight savings including Format date and times values
- Define and create and manage date-based and time-based events using Instant, Period, Duration, and TemporalUnit
Java I/O Fundamentals
- Read and write data from the console
- Use BufferedReader, BufferedWriter, File, FileReader, FileWriter, FileInputStream, FileOutputStream, ObjectOutputStream, ObjectInputStream, and PrintWriter in the java.io package.
Java File I/O (NIO.2)
- Use Path interface to operate on file and directory paths
- Use Files class to check, read, delete, copy, move, manage metadata of a file or directory
- Use Stream API with NIO.2
Java Concurrency
- Create worker threads using Runnable, Callable and use an ExecutorService to concurrently execute tasks
- Identify potential threading problems among deadlock, starvation, livelock, and race conditions
- Use synchronized keyword and java.util.concurrent.atomic package to control the order of thread execution
- Use java.util.concurrent collections and classes including CyclicBarrier and CopyOnWriteArrayList
- Use parallel Fork/Join Framework
- Use parallel Streams including reduction, decomposition, merging processes, pipelines and performance.
Building Database Applications with JDBC
- Describe the interfaces that make up the core of the JDBC API including the Driver, Connection, Statement, and ResultSet interfaces and their relationship to provider implementations
- Identify the components required to connect to a database using the DriverManager class including the JDBC URL
- Submit queries and read results from the database including creating statements, returning result sets, iterating through the results, and properly closing result sets, statements, and connections
Localization
- Read and set the locale by using the Locale object
- Create and read a Properties file
- Build a resource bundle for each locale and load a resource bundle in an application
PYTHON
- Introduction to Python
- Sequences and File Operations
- Deep Dive – Functions, Sorting, Errors and Exception, Regular Expressions and Packages
- Object Oriented Programming in Python
- Debugging, Databases and Project Skeletons
- Statistics - Machine Learning Prerequisites
- Machine Learning using Python – Essentials
- Data Analysis and Machine Learning - Deep Dive
- Scalable Machine Learning using Spark
- Web Scraping in Python and Project Work
PHP
- PHP Basic
- Functions
- Data Format & Type
- Web Features
- OOP Security
- I/O
- String & Patterns
- Database & SQL
- Array
ANDROID APP DEVELOPMENT
- Android App Development
- Development Tools
- Fundamental Application Components
- User Interface (UI) and User Experience (UX)
- Testing and Debugging
- Persistent Data
- Extended Application Experiences
- Building Capstone Project
MODULE 4: ADVANCE CYBER SECURITY AND DIGITAL FORENSIC CERTIFICATION
ADVANCE CYBER SECURITY
- Introduction of Cyber Security: Info Security Overview, Security Phase, Types of Attacks, Vulnerability
- Foot printing and Reconnaissance: Concept, Threats, Methodology, Tool, Countermeasures, Pen Testing
- Scanning Networks
- Enumeration: Concepts, Enumerations (NetBIOS, SNMP, UNIX/Linux, LDAP, SMTP, DNS) & Pen Testing
- System Securing
- Trojans and Backdoors: Trojan Concepts, Infections, Detection, Types of Trojans, Countermeasures, Anti-Trojan Software, Penetration Testing
- Virus and Worms: Concept, Types, Malware Analysis, Countermeasures, Penetration Testing
- Sniffers: Concept, MAC Attack and Tools, ARP & DNS Poisoning and spoofing Attack and Tools
- Social Engineering: Concept, Techniques, Impersonation of Social Networking Sites, Identity Theft, Countermeasures, Penetration Testing
- Denial of Service: Concept & Attack Techniques Botnets. DDoS Case Study, Attack Tools, Countermeasures, Protection Tools, Penetration Testing
- Session Security: Concept, Application & Network Level Session Security, Tools, Countermeasures, Pen Testing
- Securing Webservers: Concepts, Threats, Attack Tools & Methodology, Countermeasures, Patch Security Tools
- Security Web Applications: Web App Concept & Threats, Securing Methodology, Tools, Countermeasures, Web App Pen Testing
- SQL Injection: Concept, Testing, Type Tools, Blind Methodology, Advance SQL Injection, Evasion Techniques, Countermeasures
- Securing Wireless Networks: Concept, EncryptionThreats, Securing Methodology, Security Tools, Bluetooth Security, Countermeasures, Wi-Fi Pen Testing
- Evading IDS, Firewall & Honeypots: Concepts, System, Evading IDS, Firewall, Detecting Honeypots, Firewall Evading Tools,Countermeasures, Security Tools, Pen Testing
- Buffer Overflow: Concept, Methodology, Examples, Detections, Countermeasures, Security Tools, Pen Testing
- Cryptography: Concept, Encryption Algorithms Tool, Public Key Infrastructure, Email Encryption, Cryptoanalysis Tool
- Penetration Testing: Concept, Types, techniques, Phase, Roadmap, Outsourcing Pen Testing services and Tools
DIGITAL FORENSIC CERTIFICATION
- Introduction to Computer Forensics
- Computer Forensics Invitation Process
- Searching and Seizing Computers
- Digital Evidence
- First Responder Procedures
- Setting up a Computer Forensics Lab
- Understand Hard Disk and File Systems
- Windows Forensics
- Data Acquisitions and Duplication
- Recovering Deleted Files and Deleted Partitions
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Steganography and Image Files Forensic
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Investing Web Attacks
- Tracking Emails and Investigating Emails Crimes
- Mobile Forensics
- Investigating Reports
- Becoming an Expert witness
ADVANCE HARDWARE & NETWORKING
1-year advance 100% Practical training to become a proficient IT expert
MODULE 1: ADVANCE HARDWARE ENGINEER:
Computer Hardware Components & Tools, Assembling & Disassembling of Desktops, Laptops & Server PCs, Operating System Installations (Windows 7, Windows 8.1, Windows Server 2012, Linux, Suse, etc.), and various kinds of Drivers Installations like VGA, Sound, LAN, Various Add-0n Cards etc. Application Software Installation, Understand and Concept of Boot Process of Windows Operating Systems, Identification and diagnose various problem caused by Virus, Worms, Spyware, Malicious Codes, Trojan Horse and their types, Data Recovery from Hard Disk, Pen Drives and other any removable devices, how to secure PC from threats, troubleshoot various problems related to Operating Systems and Boot process.Basic & Digital Electronics, Fault Finding and Repairing of Desktop, Laptop and Server’s Motherboard through BGA Machine, Troubleshoot and repairing of various components like all kinds of power supply and adaptors, system units, notebooks, ultra-books, laser printer. Analyze all kinds of technical issues related to computer hardware and operating systems, also resolve such technical issues as soon as possible, increase the uptime of machines up to 100%. Development of analytical, problem solving, decision making, team building skills in such a way that a hardware engineer in such a way that he can be able to increase the productivity of the organization.
MODULE 2: ADVANCE NETWORK ENGINEER:
Computer Networking, Uses of Networks and its types, Range, Structure and Media, Networking Cables, Hardware, Network Topologies, Planning, Network Operating System & Protocols, Resources Sharing, Both versions of IP Address IPv.4 & IPv.6, Project 802, Use of various Networking Tools, Introduction of Wi-Fi Network, Troubleshooting of Cables & configured Protocols, Fault Finding on Network, Troubleshooting of Protocols, Implementation of Wi-Fi, Important Networking Commands, Troubleshooting related to Network Operating System (NOS), Cabling, LAN Adapters, IP Address, Software Firewall, Services, Secure Network from threats.
MCSA (Microsoft Certified Solutions Associate) (Windows Server 2012)
- 70-410: Installing & Configuring Windows Server 2012
- 70-411: Administering Windows Server 2012
- 70-412: Configuring Advance Windows Server 2012 Services
MCSE(Microsoft Certified Solutions Expert) along with MCSA
(Windows Server 2012: Server Infrastructure)
- 70-413: Designing & Implementing a Server Infrastructure
- 70-414: Implementing an Advance Server Infrastructure
OR
(Windows Server 2012: Private Cloud)
- 70-246: Monitoring & Operating a Private Cloud with System Center 2012
- 70-247: Configuring & Deploying a Private Cloud with System Center 2012
OR
(Windows Server 2012: Messaging)
High level Troubleshooting related to Active Directory of Windows Servers 2012, Virtualization, Remote Administration, Virtual Private Network
CCNA Security (210-260 IINS)
- Security Concepts
- Secure Access
- VPN
- Secure Routing and Switching
- Cisco Firewall Technologies
- IPS
- Content and Endpoint Security
Networking Services and protocols, Network Devices like Routers, Switches, WAN, Wireless Routers, etc.
RHCE - Red Hat Certified Engineer
- Red Hat System Administration I (RH124)
- Red Hat System Administration II (RH134/135)
- Red Hat System Administration III (RH254/255)
BACK OFFICE MANAGEMENT (BOM)
(6-month professional training in business management for college going student’s house wife, part-time job seekers and freelancers)
Module 1: Advance project based training on MS Office 2016
- MS Word 2016
- MS Excel 2016
- MS PowerPoint 2016
- MS Outlook 2016
- MS Publisher 2016
Module 2: implementing and managing Online Sales
- Understand the concept of online sales
- Online Ad/Post Publishing
- Online Purchasing
- Understand Buyer Need
- Understand the context of Online advertisement
Module 3: Tally ERP 9 with GST
- Basic of Accounting
- Fundamental of Tally Erp9
- Creating Accounting Master
- Creating Inventory Masters
- Voucher Entry
- Advanced Accounting
- Advance Inventory
- Vat, CST, POS
- Job Costing
- Multilingual Capabilities
- Technological Advantages
- Tally.Net
- Control Center
- Support Center
- Service Tax
- TDS, TCS
- Payroll System
- Final Account Statements
- GST
Module 4 DIGITAL MARKETING
(2-month project-based training for working and business professional or college going students to move the business at new edge of success
- Digital Marketing Overview
- Website Planning & Creation
- Search Engine Optimization
- Search Engine Advertising
- Social Media Marketing
- Mobile Marketing
- Google Analytics
- Online Display Advertising
- Ecommerce Marketing
- Email Marketing
- Lead Generation for Business
- Content Marketing
- Creating Internet Marketing Strategy
- Affiliate Marketing
- Making Money Via AdSense & Blogging
- Online Reputation Management
- How to Grab Freelancing Projects\Online Media Production
INTERNATIONAL CERTIFICATION COURSE
CISCO Certifications
CCNA Security (210-260 IINS)
- Security Concepts
- Secure Access
- VPN
- Secure Routing and Switching
- Cisco Firewall Technologies
- IPS
- Content and Endpoint Security
CCNP Security
- Implementing Cisco Secure Access Solutions (300-208 SISAS)
- Implementing Cisco Edge Network Security Solutions (300-206 SENSS)
- Implementing Cisco Secure Mobility Solutions (300-209 SIMOS)
- Implementing Cisco Threat Control Solutions (300-210 SITCS)
CCIE Security (400-101 Routing & SwitchingWritten Exam)
- Network Principles
- Layer 2 Technologies
- Layer 3 Technologies
- VPN Technologies
- Infrastructure Security
- Infrastructure Services
- Evolving Technologies
CCIE Security (400-101 Routing & Switching Lab Exam)
- Layer 2 Technologies
- Layer 3 Technologies
- VPN Technologies
- Infrastructure Security
- Infrastructure Services
Microsoft Certification
MTA (Microsoft Technology Associate)
- Exam 98-349: Windows Operating System Fundamentals
- Exam 98-365: Windows Server Administration Fundamentals
- Exam 98-366: Networking Fundamentals
- Exam 98-367: Security Fundamentals
MCSA (Microsoft Certified Solutions Associate)
- 70-687: Configuring Windows 8.1
- 70-688: Supporting Windows 8.1
(Windows Server 2012)
- 70-410: Installing & Configuring Windows Server 2012
- 70-411: Administering Windows Server 2012
- 70-412: Configuring Advance Windows Server 2012 Services
MCSE(Microsoft Certified Solutions Expert) along with MCSA
(Windows Server 2012: Server Infrastructure)
- 70-413: Designing & Implementing a Server Infrastructure
- 70-414: Implementing an Advance Server Infrastructure
(Windows Server 2012: Private Cloud)
- 70-246: Monitoring & Operating a Private Cloud with SystemCenter 2012
- 70-247: Configuring & Deploying a Private Cloud with SystemCenter 2012
(Windows Server 2012: Messaging)
- 70-341: Core Solutions of Microsoft Exchange Server 2013
- 70-342: Advance Solutions of Microsoft Exchange Server 2013
Red Hat Certification
RHCSA
Windows system administrators
- Red Hat System Administration I (RH124)
- Red Hat System Administration II (RH134/135)
Linux or UNIX administrators
- RHCSA Rapid Track Course (RH199)
RHCE
- Red Hat System Administration III (RH254/255)
VMWARE CERTIFICATIONS
- VMware Certified Associate 6 – Data Center Virtualization Fundamentals (VCA6-DCV)
- VMware Certified Professional 6 – Data Center Virtualization (VCP6-DCV)
1V0-601 Exam
2V0-621 Exam
Android App Development
- Development Tools
- Fundamental Application Components
- User Interface (UI) and User Experience (UX)
- Testing and Debugging
- Persistent Data
- Extended Application Experiences
- Building Capstone Project
GOOGLE CERTIFICATION
G Suite Administrator
A G Suite Administrator configures and manages all aspects of a G Suite domain. This includes administering users, organizational units, groups, and access to services. The G Suite Administrator also manages security of the G Suite domain as well as mobile policies.
The Google Cloud Certified - G Suite Administrator exam measures an individual’s ability to:
- Create, delete and administer users for a domain
- Configure and manage organization unity access to and settings for G Suite services
- Configure and manage mail delivery, routing, and filtering
- Manage mobile and Chrome devices with Device Management
- Use reports to monitor, troubleshoot and optimize G Suite
- Configure and manage security and privacy settings
- Configure and manage domains connected to your G Suite account
- Manage data migration
Google AdWords Certification
Demonstrate increased product performance and expertise in that product area, including:
- Search advertising
- Mobile advertising
- Video advertising
- Display advertising
- Shopping advertising
Google IT Support Professional Certificate:
- Course 1: Technical Support Fundamental
- Course 2: The Bits and Bytes of Computer Networking
- Course 3: Operating System and You: Become a Power User
- Course 4: System Administration and IT Infrastructure Services
- Course 5: IT Automation: It’s not that scary
- Course 6: IT Security: Defense against the digital dark arts
Python Certification
- Introduction to Python
- Sequences and File Operations
- Deep Dive – Functions, Sorting, Errors and Exception, Regular Expressions and Packages
- Object Oriented Programming in Python
- Debugging, Databases and Project Skeletons
- Statistics - Machine Learning Prerequisites
- Machine Learning using Python – Essentials
- Data Analysis and Machine Learning - Deep Dive
- Scalable Machine Learning using Spark
- Web Scraping in Python and Project Work
Oracle Java certification
OCA Java SE 8 Programmer I (1Z0-808)
OCA Syllabus
Java Basics
- Define the scope of variables
- Create executable Java applications with a main method; run a Java program from the command line; including console output.
- Import other Java packages to make them accessible in your code
- Compare and contrast the features and components of Java such as: platform independence, object orientation, encapsulation, etc.
Working with Java Data Types
- Declare and initialize variables (including casting of primitive data types)
- Differentiate between object reference variables and primitive variables
- Know how to read or write to object fields
- Explain an Object’s Lifecycle (creation, “dereference by reassignment” and garbage collection)
- Develop code that uses wrapper classes such as Boolean, Double, and Integer.
Using Operators and Decision Constructs
- Use Java operators; including parentheses to override operator precedence
- Test equality between Strings and other objects using == and equals ()
- Create if and if/else and ternary constructs
- Use a switch statement
Creating and Using Arrays
- Declare, instantiate, initialize and use a one-dimensional array
- Declare, instantiate, initialize and use multi-dimensional array
Using Loop Constructs
- Create and use while loops
- Create and use for loops including the enhanced for loop
- Create and use do/while loops
- Compare loop constructs
- Use break and continue
Working with Methods and Encapsulation
- Create methods with arguments and return values; including overloaded methods
- Apply the static keyword to methods and fields
- Create and overload constructors; including impact on default constructors
- Apply access modifiers
- Apply encapsulation principles to a class
- Determine the effect upon object references and primitive values when they are passed into methods that change the values
Working with Inheritance
- Describe inheritance and its benefits
- Develop code that demonstrates the use of polymorphism; including overriding and object type versus reference type
- Determine when casting is necessary
- Use super and this to access objects and constructors
- Use abstract classes and interfaces
Handling Exceptions
- Differentiate among checked exceptions, unchecked exceptions, and Errors
- Create a try-catch block and determine how exceptions alter normal program flow
- Describe the advantages of Exception handling
- Create and invoke a method that throws an exception
- “Recognize common exception classes (such as NullPointerException, ArithmeticExcpetion, ArrayIndexOutofBoundsException, ClassCastException)”
Working with Selected classes from the Java API
- Manipulate data using the StringBuilder class and its methods
- Creating and manipulating Strings
- Declare and use an ArrayList of given type
- Write a simple Lambda expression that consumes a Lambda Predicate expression
OCP Java SE 8 Programmer II (1Z0-809)
Java Class Design
- Implement encapsulation
- Implement inheritance including visibility modifiers and composition
- Implement polymorphism
- Override hashCode, equals, and toString methods from Object class
- Create and use singleton classes and immutable classes
- Develop code that uses static keyword on initialize blocks, variables, methods, and classes
Advanced Java Class Design
- Develop code that uses abstract classes and methods
- Develop code that uses the final keyword
- Create inner classes including static inner class, local class, nested class, and anonymous inner class
- Use enumerated types including methods, and constructors in an enum type
- Develop code that declares, implements and/or extends interfaces and use the @Override annotation.
- Create and use Lambda expressions
Generics and Collections
- Create and use a generic class
- Create and use ArrayList, TreeSet, TreeMap, and ArrayDeque objects
- Use java.util.Comparator and java.lang.Comparable interfaces
- Collections Streams and Filters
- Iterate using forEach methods of Streams and List
- Describe Stream interface and Stream pipeline
- Filter a collection by using lambda expressions
- Use method references with Streams
Lambda Built-in Functional Interfaces
- Use the built-in interfaces included in the java.util.function package such as Predicate, Consumer, Function, and Supplier
- Develop code that uses primitive versions of functional interfaces
- Develop code that uses binary versions of functional interfaces
- Develop code that uses the UnaryOperator interface
Java Stream API
- Develop code to extract data from an object using peek() and map() methods including primitive versions of the map() method
- Search for data by using search methods of the Stream classes including findFirst, findAny, anyMatch, allMatch, noneMatch
- Develop code that uses the Optional class
- Develop code that uses Stream data methods and calculation methods
- Sort a collection using Stream API
- Save results to a collection using the collect method and group/partition data using the Collectors class
- Use flatMap() methods in the Stream API
Exceptions and Assertions
- Use try-catch and throw statements
- Use catch, multi-catch, and finally clauses
- Use Autoclose resources with a try-with-resources statement
- Create custom exceptions and Auto-closeable resources
- Test invariants by using assertions
Use Java SE 8 Date/Time API
- Create and manage date-based and time-based events including a combination of date and time into a single object using LocalDate, LocalTime, LocalDateTime, Instant, Period, and Duration
- Work with dates and times across timezones and manage changes resulting from daylight savings including Format date and times values
- Define and create and manage date-based and time-based events using Instant, Period, Duration, and TemporalUnit
Java I/O Fundamentals
- Read and write data from the console
- Use BufferedReader, BufferedWriter, File, FileReader, FileWriter, FileInputStream, FileOutputStream, ObjectOutputStream, ObjectInputStream, and PrintWriter in the java.io package.
Java File I/O (NIO.2)
- Use Path interface to operate on file and directory paths
- Use Files class to check, read, delete, copy, move, manage metadata of a file or directory
- Use Stream API with NIO.2
Java Concurrency
- Create worker threads using Runnable, Callable and use an ExecutorService to concurrently execute tasks
- Identify potential threading problems among deadlock, starvation, livelock, and race conditions
- Use synchronized keyword and java.util.concurrent.atomic package to control the order of thread execution
- Use java.util.concurrent collections and classes including CyclicBarrier and CopyOnWriteArrayList
- Use parallel Fork/Join Framework
- Use parallel Streams including reduction, decomposition, merging processes, pipelines and performance.
Building Database Applications with JDBC
- Describe the interfaces that make up the core of the JDBC API including the Driver, Connection, Statement, and ResultSet interfaces and their relationship to provider implementations
- Identify the components required to connect to a database using the DriverManager class including the JDBC URL
- Submit queries and read results from the database including creating statements, returning result sets, iterating through the results, and properly closing result sets, statements, and connections
Localization
- Read and set the locale by using the Locale object
- Create and read a Properties file
- Build a resource bundle for each locale and load a resource bundle in an application
Big data certification
- Big Data introduction / Module 1 - What is Big Data?
- The Hadoop ecosystem / Module 2 - Big Data - Beyond the Hype
- Querying big data with Hive / Module 3 - The Big Data and Data Science
- Querying big data with Hive / Module 4 - BDUse Cases
- Big data & Machine learning Module 5 - Processing Big Data
- Big data & Machine learning
Data mining certification
- Introduction to Data Mining
- Data Warehouse and OLAP
- Data preprocessing
- Data mining knowledge representation
- Attribute-oriented analysis
- Data mining algorithms: Association rules
- Data mining algorithms: Classification
- Data mining algorithms: Prediction
- Evaluating what's been learned
- Mining real data
- Clustering
- Advanced techniques, Data Mining software and applications
Machine language certification
- Introduction
- Linear Regression with Multiple Variables
- Neural Networks: Representation
- Neural Networks: Learning
- Advice for Applying Machine Learning
- Support Vector Machines
- Unsupervised Learning
- Anomaly Detection
- Large Scale Machine Learning
- Application Example: Photo OCR
Artificial intelligence certification
- Introduction
- Machine Learning – The Foundation of AI
- Text and Speech – Understanding Language
- Computer Vision – Seeing the World Through AI
- Bots – Conversation as a Platform
- Next Steps