jagomart
digital resources
picture1_Advanced Python Programming Pdf 190320 | Call For Applications On Ict Training Program Round Iv To Be Published


 142x       Filetype PDF       File size 1.30 MB       Source: ictkosovo.eu


File: Advanced Python Programming Pdf 190320 | Call For Applications On Ict Training Program Round Iv To Be Published
ict for kosovo s funded by the european union growth call for applications on ict training program training modules cyber security offensive 1 practitioner cyber security 2 ethical hacker web ...

icon picture PDF Filetype PDF | Posted on 03 Feb 2023 | 2 years ago
Partial capture of text on file.
                                                                                               ICT for 
                                                                                               KOSOVO'S
          Funded by
       the European Union                                                                      Growth
          Call for Applications on ICT Training Program 
             Training
             Modules: 
                               CYBER SECURITY                        OFFENSIVE 
                 1               PRACTITIONER                     CYBER SECURITY               2
                                                                   ETHICAL HACKER
                             WEB APPLICATION                    WEB APPLICATION
                  3             DEVELOPMENT                       DEVELOPMENT                  4
                                 PROFESSIONAL                       PRACTITIONER
                              JAVA AND MOBILE                    ENTERPRISE JAVA 
                  5             APPLICATION                        APPLICATION                 6
                                  DEVELOPER                          DEVELOPER
                                                                        BIG DATA 
                  7  PYTHON                                           ANALYTICS /               8
                                                                      DATA SCIENCE
                                             Application Period:  
                                        17 JAN 2022 -  3 FEB 2022 
                                                                                            implementuar nga:
                                                                                                           ICT for 
                                                                                                           KOSOVO'S
        Funded by
     the European Union                                                                                    Growth
             CRITERIA FOR APPLICATION                               SHOULD HAVE 
             Education                                                                              
                                                                    ICT Related studies 
                                                                    University Degree relevant to field 
             Degree                                                 BS 
                                                                    High School Diploma 
                                                                    Undergraduate 
                                                                    BA 
                                                                    MA, MSC 
             Skill level in programming languages                   Up to 1 year 
                                                                    Between 1 and 2 years 
                                                                    More than 2 years 
             Experience  in  the  programming  Fundamental awareness (basic) 
             languages 
                                                                    Novice (limited experience) 
                                                                    Intermediate (Practical application) 
                                                                    Advanced (Applied theory) 
                                                                    Expert (Recognized Authority) 
             Experience in Cyber Security                           Up to 1 year 
             (Only for CyberSecurity applicants)                    Between 1 and 2 years 
                                                                    More than 2 years 
             Experience in IT PM                                    Up to 1 year 
                                                                    Between 1 and 2 years 
                                                                    More than 2 years 
             English Language Ability                               Good English language abil ity
                                                                    Understanding ability 
             Language                                               English 
                                                                    Shqip 
                                                                    Serbian 
             
       Selec�on Criteria
       Modules                                      Technical Criteria             Essen�al Criteria   Desired Criteria
       Java and Mobile Applica�on Developer            So�ware Development 
       Enterprise Java Applica�on Developer                   Experience
       Web Applica�on Developer Professional         So�ware/Web Development 
       Web Applica�on Development Prac��oner                  Experience
       Python Programming                                                           English Language       Albanian and/or 
       Cybersecurity Prac��oner                      IT/Cyber Security Experience    Understanding        Serbian Language
       Offensive Cyber Security - Ethical Hacker
                                                    Basic Knowledge on Sta�s�cs                          University Diploma
       Big Data Analy�cs / Data Science             Fundamental Knowledge on 
                                                    Python Programming
                                                                                                       implementuar nga:
                                                                                              ICT for 
                                                                                              KOSOVO'S
         Funded by
      the European Union                                                                      Growth
          • Considering the essential criteria: 100% should be met
          • Desired criteria shall be used by the TAT to make a final decision
           Short description, What Learns, or Benefits will be produced from course outline 
          1. Module# 1: Cyber Security Practitioner 
          DESCRIPTION
          This Training module aims for the training of individuals who want to under-
          stand the general Cyber Security features and get practised in the main 
          aspects of cybersecurity as in the outline. This training  module more focuses 
          on the protection of organisational assets and upon completion of this module 
          of training, you will be able to understand the details of cybersecurity mea-
          sures and can get employed or initiate business activity in the fields of 
          IT Security. 
          TARGET AUDIENCE
          Individuals who have the basic IT Systems, Operating Systems, Networking, It 
          Security, Scripting, Programming, and database knowledge. One year of experi-
          ence in the field of IT is preferred.
          TRAINING CONTENT
                 Infrastructure security and configuration management
                 Credential management, authentication, and authorization mechanisms
                 SQL injection and defense mechanisms
                 Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF/XSRF) pro-
                 tective, and HTTP headers
                 Digital deception
                 Introduction and Information Gathering
                 Vulnerabilities and configuration, identity, and authentication testing
                 Injection attacks
                 Exploitation
                 Password Attacks and post-exploitation
                 Artificial Intelligence in Cyber Security
                                                                                           implementuar nga:
                                                                                             ICT for 
                                                                                             KOSOVO'S
       Funded by
     the European Union                                                                      Growth
         2. Module# 2: Offensive Cyber Security Ethical Hacker
         DESCRIPTION
         This Training module aims for the training of individuals who want to specialise 
         in Offensive and Defensive Security -Ethical Hacking. Upon completion of this 
         module of training, you will be able to know the defensive and offensive mea-
         sures of cybersecurity and work as an ethical hacker to protect the valuable 
         assets of the entities and organisations, whereas to discover and compromise 
         the criminal activity in the systems.
         TARGET AUDIENCE
         Individuals who have the fundamental IT Systems, Operating Systems, Net-
         working, It Security, Scripting, Programming, and database knowledge. Because 
         the deep-dive activity will exist in the module applicant should have the funda-
         mental background for the IT Systems. You should have at least one year of 
         cybersecurity experience.
         TRAINING CONTENT
                Information Security Fundamentals
                INFORMATION GATHERING – Pen-testing Phase I
                ENUMERATION - Pen-testing Phase II
                EXPLOITATION – Pen-testing Phase III
                WEB Pen-testing and Post Exploitation
                                                                                         implementuar nga:
The words contained in this file might help you see if this file matches what you are looking for:

...Ict for kosovo s funded by the european union growth call applications on training program modules cyber security offensive practitioner ethical hacker web application development professional java and mobile enterprise developer big data python analytics science period jan feb implementuar nga criteria should have education related studies university degree relevant to field bs high school diploma undergraduate ba ma msc skill level in programming languages up year between years more than experience fundamental awareness basic novice limited intermediate practical advanced applied theory expert recognized authority only cybersecurity applicants it pm english language ability good abil ity understanding shqip serbian selecon technical essenal desired applicaon soware praconer albanian or oensive knowledge stascs analycs considering essential be met shall used tat make a nal decision short description what learns benets will produced from course outline module this aims of individuals w...

no reviews yet
Please Login to review.