Showing 1-7 of 7 results
Academy Europe Security Courses
Certified Ethical Hacker
Certified Ethical Hacker Course is based on textbook learning material by Academy Europe. Dear Students, The textbook courses by Academy Europe are targeted at providing the students with the most important aspects of the theoretical and methodical materials. In addition, the textbook courses will also focus on the philosophical background…
Virtualization 2.0
Virtualization 2.0 is a technology that helps users to install different Operating Systems on a hardware. They are completely separated and independent from each other. Virtualization hides the physical characteristics of computing resources from their users, their applications, or end users. This is an introductory tutorial, which covers the basics…
Programming Methodologies
When programs are developed to solve real-life problems like inventory management, payroll processing, student admissions, examination result processing, etc., they tend to be huge and complex. Programming Methodology is the approach to analyzing such complex problems by planning the software development and controlling the development process. In this course, we…
Hypertext Transfer Protocol (HTTP)
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. This is the foundation for data communication for the World Wide Web (i.e. internet) since 1990. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of…
Software Engineering
Software engineering concerns methods and techniques to develop large software systems. The engineering metaphor is used to emphasize a systematic approach to develop systems that satisfy organizational requirements and constraints. This chapter gives a brief overview of the field and points at emerging trends that influence the way software is…
Cryptography
This course by Academy Europe covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption,…