Showing 361-369 of 435 results
Free

Cryptography

This course by Academy Europe covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption,…
7216
Free

Computer Programming

Computer programming is the act of writing computer programs, which are a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer. Computer Programming is fun and easy to learn provided you adopt a proper approach. This course by Academy Europe attempts to…
12762
Free

IEC/PAS 62180

IEC/PAS 62180 describes Electrostatic discharge (ESD) sensitivity testing machine model (MM). This method establishes a standard procedure for testing and classifiying microcircuits according to their susceptibility to damage or degradation by exposure to a defined Machine Model (MM) electrostatic discharge (ESD). The objective is to provide reliable, repeatable MM ESD…
126
Free

Business Sales

Sales training is an integral and fundamental part of any business operational cycle. The most important role of a Sales Manager is to provide Sales Training to the members in his team, so that they can achieve their targets and prove their productivity. Improperly trained salespersons often end up providing…
2116
Free

Barefoot Skiing Sport

Barefoot Skiing is a sport in which a skier has to ski on shallow water. The skier clutches the holder of the rope which is attached on the bottom of the boat. The skier has to balance on the water surface by standing on the skis and the motorist has…
474
Free

Digital Marketing

Marketing of products and services through the use of digital technologies, mainly through the internet, including mobile phones and other digital medium falls under the umbrella of digital marketing. This course by Academy Europe explains how you can use popular social media platforms such as Facebook, Twitter, LinkedIn, and Google+…
7785
Free

ISO IEC 27001:2013 Information Technology

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013…
2039
Free

Agra Fort History

Agra Fort is one of the largest forts in India. The fort was under Rajputs, Mughals, Suris, Marathas, and British. It was renovated by Mughal dynasty and in this period many structures were built inside the fort. The fort consists of many attractions like mosques, public and private halls, palaces,…
154
Free

Computer Logical Organization

Computer Logical Organization refers to the level of abstraction above the digital logic level, but below the operating system level. At this level, the major components are functional units or subsystems that correspond to specific pieces of hardware built from the lower level building blocks. This course by Academy Europe…
9474