Free online courses for IT professional from world's leading institutes

Hi Friends,

Thanks a lot for showing interest in my earlier post related to management certification.

On my blog, I was constantly getting request about validity of online management courses, executive MBA and I suggested people to do it from a quality institute or should opt such online programme. Then requests for courses related to healthcare and IT came.
I thought these online free courses are much better than the diploma mill's useless paper (the diploma mills are SCDL, NMIMS (distance edu), Welingkar (distance edu), SMU, ICFAI, ADTU, MGU, CMJ, EIILM and many such other degree/ diploma mills.

These courses are rich in content, true learning and despite of being from top instructor/ institute, it is free of cost.
Having one such certificate name in your resume is much more valuable than other useless degree.

In this post, I am focussing on course related to IT and in my next post I will post about courses related to healthcare. Please write me back with your feedback so I can improve in my next post.






Course: Creative Programming for Digital Media & Mobile Apps (Coursera)

Awarding institute: University of London International Programmes

About the course:
This course will teach you how to develop and apply programming skills to creative work. This is an important skill within the development of creative mobile applications, digital music and video games. It will teach technical skills needed to write software that make use of images, audio and graphics, and will concentrate on the application of these skills to creative projects. Additional resources will be provided for students with no programming background.

Duration: 6 weeks

Course starts from: already started in June 2013 still you can view and participate in the course



Course:   Malicious Software and its Underground Economy: Two Sides to Every Story



Awarding institute:  University of London International Programmes

About the course:  
Cybercrime has become both more widespread and harder to battle. Researchers and anecdotal experience show that the cybercrime scene is becoming increasingly organized and consolidated, with strong links also to traditional criminal networks. Modern attacks are indeed stealthy and often profit oriented.

Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage.

Duration:  6 weeks

Course starts from: already started in June 2013





Course:  Introduction to Enterprise Architecture (Open2Study)

Awarding institute: Enterprise Architects

About the course:
Businesses today are fast moving and in a constant cycle of change and adaptation. One of the key disciplines to support you in this change journey is the discipline of "architecting" a business.

Commonly referred to as enterprise architecture, the discipline will help you understand:

WHY you should change
WHAT needs to change
HOW you should change

You’ll begin with an overview of the architecture discipline and be introduced to one of the more common frameworks to help you with architecting your business - The Open Group Architecture Framework (TOGAF®). You will also be introduced to techniques for building an effective architecture team.

The course is highly relevant to those of you who are looking to increases your skills in designing businesses for the future. If you are looking to design your business to be more effective, part of an architecture team looking to improvement opportunities, or an individual looking to increase your skills to make you more marketable, this course is relevant for you.

Duration:  4 weeks

Course starts from:  August 05, 2013



Building an Information Risk Management Toolkit

Barbara Endicott-Popovsky

In this course, you will explore several structured, risk management approaches that guide information security decision-making. 
Workload: 4-6 hours/week 

Sessions:
Aug 28th 2013 (10 weeks long)

Institute: University of Washington

About the Course

In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.


Consider upgrading to an enhanced, more rigorous version of this course offered online at the University of Washington. You’ll gain access to meaningful interaction with instructors and additional assignments, readings and multimedia material, as well as earn a valuable University of Washington credential.




Designing and Executing Information Security Strategies

This course provides you with opportunities to integrate and apply your information security knowledge.
Workload: 4-6 hours/week 


Institute: University of Washington

Sessions: Aug 28th 2013 (10 weeks long)

About the Course

This course provides you with opportunities to integrate and apply your information security knowledge.
This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.
Topics explored include: 
Analysis and problem solving using cases contracted from real world problems in Information Assurance including:
·         Selection and application of controls
·         Construction of security policies
·         Understanding and application of regulatory requirements
·         Understanding and application of business constraints 
·         Communication of risk to non-information assurance professionals
·         Identification and remediation of new threats
·         Analysis and performance of incident response
·         Communication of Information Assurance principles and concepts
·         Peer reviewed analysis of each case
·         Reading and class explanation of good and bad examples (from news and public sources)
·         Reading and peer discussion of current events in Information Assurance


Strategic Information Technology

n this course you will focus on the allocation and use of technology resources across an entire firm as part of the larger organizational strategy. Because firms do not have an unlimited supply of capital, they must decide when and where to deploy new information technology. Firms must not only focus on when to deploy IT, but also if they should deploy IT at all! This brings up the bigger question about technology: Can the use of IT bring a sustainable competitive advantage to an organization? There are those who say, “No”; and others who say, “Of course!”  You will explore the differing opinions out there on this topic in unit 1.
In unit 2 you will delve into how IT might manage business processes and take a look at Enterprise Resource Planning (ERP) systems, Business Process Management (BPM) systems, and business process reengineering. You will then move on to how technology can inform decision making in unit 3 by studying business intelligence, data warehousing, and data mining. Unit 4 introduces you to the world of e-commerce and examines such important topics as intellectual property and online marketing. In unit 5 you will explore major trends in technology today like cloud computing, Web 2.0, and mobile technologies. Units 1 through 5 lay the groundwork for understanding how IT can be used in business strategy, which you will put to practical use in unit 6 where you will focus on how to actually write a strategy.

Awarding institute: Saylor.org

Duration:  84.25 hours

Course starts from: Throughout the year


Management Information Systems

Today, the management of information systems is mostly associated with databases, the Internet, and server rooms.  However, “information management” has been around since before the invention of these tools.  It is as old as commerce itself, as traders, bankers, and merchants have always had reason to track sales and inventory.  Creditors must be aware of how much capital has been lent to borrowers and how much money has been deposited at banks.  Long before humans harnessed electricity, there was a need for information systems.  But currently almost all management of information systems is done electronically.
Management Information Systems (MIS) is a formal discipline within business education that bridges the gap between computer science and the well-known business disciplines of finance, marketing, and management.  However, most students will only take one or two MIS courses in their undergraduate programs.
You may not know it, but you use MIS every day.  If you use email, you are using MIS, as email is an information system (you just only see one end of it).  If you log into a computer every morning and access or edit data in corporate systems and databases, you are using information systems.  In its most general terms, information systems encompass any interactions between organized data and people.  MIS can be the means by which information is transmitted (such as the Internet), the software that displays the information (such as Microsoft Excel), or the systems that manage the data.  In this course, you will learn about the various components of information systems and how to leverage them in business.
Awarding institute: Saylor.org

Duration:  96 hours

Course starts from: Throughout the year


Social Network Analysis

Lada Adamic

This course will use social network analysis, both its theory and computational tools, to make sense of the social and information networks that have been fueled and rendered accessible by the internet.
Workload: 5-7 hours/week (8-10 if completing additional programming exercises) 

Sessions:
Oct 7th 2013 (9 weeks long)

Awarding institute: University of Michigan

About the Course

Everything is connected: people, information, events and places, all the more so with the advent of online social media. A practical way of making sense of the tangle of connections is to analyze them as networks. In this course you will learn about the structure and evolution of networks, drawing on knowledge from disciplines as diverse as sociology, mathematics, computer science, economics, and physics. Online interactive demonstrations and hands-on analysis of real-world data sets will focus on a range of tasks: from identifying important nodes in the network, to detecting communities, to tracing information diffusion and opinion formation.



Pattern-Oriented Software Architectures for Concurrent and Networked Software

Douglas C. Schmidt

In this course we will learn how to apply patterns, pattern languages, and frameworks to alleviate the complexity of developing concurrent and networked software.

Awarding institute: Vanderbilt University


Sessions:
Mar 10th 2014 (8 weeks long)

About the Course

The advent of multi-core and distributed-core processors, coupled with ubiquitous wireless and wired connectivity, is driving the need for software engineers and programmers who understand how to develop concurrent and networked software. Despite many improvements in processors and networks, however, developing concurrent and networked software remains hard and developing high quality reusable concurrent and networked software is even harder.  The principles, methods, and skills required to develop such software are best learned by understanding patterns, pattern languages, and frameworks.
A pattern is general reusable solution to a commonly occurring problem within a given context in software design. When related patterns are woven together they form a pattern language that provides a process for the orderly resolution of software development problems. Frameworks can be viewed as concrete realizations of pattern languages that facilitate direct reuse of design and code.
This course describes how to apply patterns, pattern languages, and frameworks to alleviate the complexity of developing concurrent and networked software via the use of object-oriented design techniques and programming language features, distribution middleware, and advanced operating system mechanisms.  Case studies from the domains of mobile apps, web servers, communication middleware, and avionics systems will be used to showcase pattern-oriented software architecture design and programming techniques for concurrent and networked software.



HTML5 Game Development


Awarding institute: Udacity

About the course: This course will walk you through the major components of building GRITS, an HTML5 game. We'll talk about how to take standard game development techniques, and use them to create high performance HTML5 applications.

Duration:  Not defined

Course starts from: Throughout the year


Mobile Applications Development

Technology continues to evolve and provide us with increasingly powerful mobile devices.  As a result, applications that can run on a browser must also be written such that they are compatible with mobile devices, the majority of which are now web-enabled.  Meanwhile, there is an increasing demand for native applications that can be downloaded to and run on mobile devices.  This course will address these trends, teaching you to think about the unique design and deployment issues that must be taken into consideration when developing applications for mobile devices.

Time duration:  105 hours

Awarding institute: Saylor.org

Course starts from: Throughout the year


That’s all for today

2 comments:

  1. hello sir how to give exam for these courses

    ReplyDelete
    Replies
    1. Hi Homi

      I have given link for each course. You can click on that and enroll. Your classes will start. After completing each session there will be quiz and questions. When you complete the full course, they award the certification.

      Delete

Thanks for your comment on blog.simplycareer.net. Please search for required information through tags, keywords on this blog as I have already added lot of required information. If you still do not find it, I'll revert you shortly.