0% found this document useful (0 votes)
21 views62 pages

Final Final

The document is a report submitted by Tharun S for online certifications in Python programming, UI/UX design, and cybersecurity as part of his Bachelor of Computer Applications degree. It includes a declaration of originality, certificates of completion, and an acknowledgment of the transformative learning experience. The report outlines the courses taken, their durations, and the skills gained, emphasizing the importance of these skills in today's digital landscape.

Uploaded by

tharungowda295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views62 pages

Final Final

The document is a report submitted by Tharun S for online certifications in Python programming, UI/UX design, and cybersecurity as part of his Bachelor of Computer Applications degree. It includes a declaration of originality, certificates of completion, and an acknowledgment of the transformative learning experience. The report outlines the courses taken, their durations, and the skills gained, emphasizing the importance of these skills in today's digital landscape.

Uploaded by

tharungowda295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

SUMMER TERM 2024

REPORT FOR ONLINE


CERTIFICATIONS

Submitted by

THARUN S
USN: 23BCAR0342
Semester : 3rd
in partial fulfillment for the award of the degree of

BACHELOR OF COMPUTER APPLICATIONS WITH


SPECIALIZATION IN INTERNET OF THINGS (IoT)

DEPARTMENT OF COMPUTER SCIENCE & IT

JAIN KNOWLEDGE CAMPUS


JAYANAGAR 9TH BLOCK
BANGALORE - 560069

JULY - 2024

1
DEPARTMENT OF COMPUTER SCIENCE & IT

Jain Knowledge Campus


Jayanagar 9th Block Bangalore, 560069

This is to certify that the learning path titled

Python , ui/ux , Cyber security & Ehical hacking

is the bonafide record of online courses undergone by

THARUN S

USN: 23BCAR0342

BCA with Specialization in Internet of things during the summer term


July-2024

Dr.M.Santhalakshmi Dr. K.Suneetha


Faculty Mentor Head, School of CS & IT
JAIN (Deemed-to-be JAIN (Deemed-to-be
University) University)

2
3
DECLARATION

I THARUN S affirm that the report on online certifications for learning path / online courses titled
“Python programming language” , “UI/UX designing” and “Cyber security and ethical hacking”of
duration (60 hours), undergone by me from Linkedin learning resource , being submitted in partial
fulfillment for the award of BACHELOR OF COMPUTER APPLICATIONS WITH
SPECIALIZATION [Internet of things] is the original work carried out by me and has not been
submitted for award of any other degree or diploma, either in this or any other University.

(Signature of the Candidate)

THARUN S

USN : 23BCAR0342

4
CERTIFICATE

This is to certify that THARUN .S with USN: 23BCAR0342 of Bachelor of Computer Applications
in the School of Computer Science and IT, has undergone the online learning path titled “Python
programming language”,”UI/UX Designing” and “Cyber security and ethical hacking” from
Linkedln learning resource as part of summer term June- July, 2024 under my supervision. No part
of this report was submitted for the award of any degree or diploma prior to any other
university/institution till this date and is the authentic work of student.

Tharun.s
Dr.M.Santhalakshmi
JAIN (Deemed-to-be University)

5
ACKNOWLEDGEMENT

Learning Python programming language, UI/UX designing, and cybersecurity has been a transformative
journey that has equipped me with a versatile skill set crucial for today's digital landscape. Python, with
its simplicity and power, has enabled me to automate tasks, build robust applications, and analyze
complex datasets with ease. Understanding UI/UX principles has allowed me to craft engaging and
intuitive user interfaces that prioritize user experience and satisfaction. Meanwhile, diving into
cybersecurity has provided me with the knowledge and tools to implement robust security measures,
protect against cyber threats, and ensure the confidentiality and integrity of sensitive information.

Throughout this learning process, I have been fortunate to benefit from a wealth of online resources,
tutorials, and communities that have supported and guided me every step of the way. Each discipline—
Python programming, UI/UX designing, and cybersecurity not only expanded my technical proficiency
but also enhanced my problem-solving abilities and critical thinking skills.

Looking ahead, I am excited to leverage these skills to create innovative solutions, contribute
meaningfully to projects, and navigate the dynamic challenges of the tech industry. The journey of
learning Python, UI/UX designing, and cybersecurity has not only opened doors to exciting career
opportunities but has also empowered me to make a positive impact in the digital world.

Signature of student

Name of student : THARUN.S

6
TABLE OF CONTENTS

S .NO TOPIC PAGE NO

ABSTRACT

CERTIFICATES

LIST OF TABLES

1 CHAPTER 1: INTRODUCTION TO THE LEARNING Page Nos.


PATH: Start-End
2 CHAPTER 2 : PYTHON ESSENTIAL TRAINING Page No. Start-
End
2.1 CHAPTER 2.1 : LEARNING PYTHON

2.2 CHAPTER 2.2 : PYTHON FOR NON PROGRAMMERS

2.3 CHAPTER 2.3 : PYTHON DATA ANALYSIS

2.4 CHAPTER 2.4 : PYTHON IN EXCEL

2.5 CHAPTER 2.5 : PYTHON FOR DATA SCIENCE

2.6 CHAPTER 2.6 : ADVANCED PYTHON

3 CHAPTER 3 : GRAPHIC DESIGNING FOUNDATIONS

3.1 CHAPTER 3.1 : UX FOUNDATION : RESEARCH

3.2 CHAPTER 3.2 : PERSUASION IN UX

3.3 CHAPTER 3.3 : ADOBE ESSENTIAL TRAINING

3.4 CHAPTER 3.4 : FIGMA FOR UX DESIGN

7
3.5 CHAPTER 3.5 : SKETCHING FOR UX DESIGNERS

3.6 CHAPTER 3.6: PRINCIPLE OF UX DESIGNING

4 CHAPTER 4: CYBER SECURITY : FOUNDATIONS

4.1 CHAPTER 4.1: CYBER SECURITY FOUNDATIONS


GOVERNENCE , RISK AND COMPILENCE
4.2 CHAPTER 4.2: CS:CLOUD COMPUTING.

4.3 CHAPTER 4.3: PRACTICLE CS FOR IT PROFFESIONAL

4.4 CHAPTER 4.4: RISK MANAGAMENT TRAINING

4.5 CHAPTER 4.5: ETHICAL HACKING : INTRODUCTION

5 CONCLUSIION AND FUTURE ENHANCEMENT Page No. Start-


End
6 REFERENCES

8
ABSTRACT

Python is one of the most commonly used dynamic languages for many large organizations. Supported
on all major operating systems, it comes pre-installed on Macs, as well as most Linux and Unix-based
systems. In this course, we will learn all the essentials of learning and using Python. Learn how
computers think, as well as how to install Python, pip, and Jupyter Notebook and the basics of writing a
program. Explore variables and types, operators, functions, classes, objects, and more. Go over basic data
types like ints and floats, Booleans, and strings. Deep dive into basic data structures, control flow,
functions, classes, and objects. Find out how to handle errors and exceptions, as well as threads and
processes. Plus, discover how to work with different types of files in Python, pass command-line
arguments to your Python script, and create modules and packages.

UX research helps a business by saving development or process costs, increasing customer happiness and
loyalty, and uncovering opportunities to earn more. In this course, Amanda Stockwell shows you
practical techniques to improve your UX research to better inform fast-moving projects. Get an overview
of different types of research methodologies, usability tests, and conducting interviews. Review card
sorts, eye tracking, multivariate testing, and desirability testing. Go over the best uses of expert reviews,
surveys, diary studies, participatory design workshops, and personas. Learn how to choose the right
research method for your goals, then dive into environmental considerations, such as in-house versus
external, agile versus waterfall, and more

Cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and
systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits
and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He
introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure
as a service (IaaS) and the different deployment models available. He then reviews offerings from
Microsoft Azure, Amazon Web Services, and Google Apps.

Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT
professional. In this course, we get to know how to protect data in a digital world and covers the basics
of Information security. We begin by discussing how to layer defenses and outlines the power of using
adaptive security controls.

9
List of Tables
Table No Title Page

Table 1.1 Courses covered 11

Table 1.2 Courses covered 11

Table 1.3 Courses covered 12

10
11
CHAPTER 1

INTRODUCTION TO THE LEARNING PATH:

Python—the popular and highly-readable object-oriented language—is both powerful and relatively easy
to learn.. Python is one of the most commonly used dynamic languages for many large organizations. In
this course Deep dive into basic data structures, control flow, functions, classes, and objects. Find out
how to handle errors and exceptions, as well as threads and processes.
1.1 Courses covered :-
1. Python essential training : (4h 22m).
2. Learning python : (3h 5m).
3. Python for non-programmers : (2h 11m).
4. Python data analysis : (2h 30m).
5. Python in excel : (1h 40m) , Python functions fro data science (1h 30m).
6. Advanced python : (2h 27m).
7. Python essential librearies : (2h 15m).

UI/UX-- Layout and composition are the building blocks of graphic design This course tells about the
elements, principles, and tools is needed to create a successful composition and layout and teaches how
tools like grids, proportions, and color can lead to more compelling compositions and also tought me how
to use the designing apps like adobe,figma and gave me the basic necessity foundations for ui ux
designing.Transitioning the Photoshop-based web design process to a more UX-based workflow by
adding Adobe XD. Vector-based XD allows for faster design revisions, easy adaptability to a variety of
device sizes, and quicker development of prototypes to get customer buy-in before the development
process begins.
1.2 Courses covered :-
1. Graphic designing foundations : (2h 3m) , Principle of UX designing : (3h 13m)
2. UX Foundation : research : (1h 37m)
3. Persuasion in UX : (3h 52m)
4. Adobe essential training : (3h 12m)+Web designing process from Adobe : (1h 41m)
5. Figma for UX design : (1h 35m) , Sketching for UX designers : (1h 35m)

12
Cloud computing (cyber security)-- is a shared responsibility, especially when it comes to keeping your
data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud
technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to
mitigate those risks. He introduces concepts such as software as a service , platform as a service and
infrastructure as a service and the different deployment models available. He then reviews offerings
from Microsoft Azure, Amazon Web Services, and Google Apps.
1.3 Course covered:-
1. Cyber security : foundations : (2h 3m)

2. Cyber security foundations : governence risk and complaince : (1h 14m)

3. Cyber security with cloud computing : (2h 27m)

4. Practicle Cyber security for IT professinoals : (2h 26m)

5. Risk managment esstential training : (1h 38m)

6. Ethical hacking : Introduction to ethical hacking : (2h)

Cybersecurity, Python programming, and UI/UX design are all crucial in today's digital landscape for
several reasons. Python is a powerful and versatile programming language used extensively in
cybersecurity for scripting, automation, and developing security tools. Enhances usability and satisfaction
by focusing on the interaction between users and products. In cybersecurity tools, good UX design
ensures that security features are intuitive and effectively utilized by users.Cyber security It helps protect
systems, networks, and data from cyber threats like hacking, malware, and phishing attacks.

13
Chapter 2

PYTHON ESSENTIAL TRAINING

S. No. Heading Value

1. Course title Python essential training

2. Course duration 4hrs . 22minutes

3. Course start date 16-06-2024

4. Course end date 16-06-2024

5. Names of authors/ creators 1. Ryan Mitchell.

6. Skills gained 1. Functions and operator

2. Variables and types.

3. Data structure.

7. Unique learning outcomes (at least 3) 1. Threads and process.

2. Control flow,multithreading

3. Handling exceptions and errors.

14
c

Course content:-

THREADS

MULTITHREADING

EXCEPTION HANDLING

ERRORS

Detailed description of course:

Python is one of the most commonly used dynamic languages for many large organizations, including Google,
Yahoo, and IBM. Supported on all major operating systems, it comes pre-installed on Macs, as well as most
Linux and Unix-based systems. In this course, senior software engineer Ryan Mitchell guides you through all
the essentials of learning and using Python. Learn how computers think, as well as how to install Python, pip,
and Jupyter Notebook and the basics of writing a program. Explore variables and types, operators, functions,
classes, objects, and more. Go over basic data types like ints and floats, Booleans, and strings. Deep dive into
basic data structures, control flow, functions, classes, and objects. Find out how to handle errors and exceptions,
as well as threads and processes. Plus, discover how to work with different types of files in Python, pass
command-line arguments to your Python script, and create modules and packages.

15
Chapter:-2.1

LEARNING PYTHON

S. No. Heading Value

1. Course title Learning python

2. Course duration 3hrs . 5minutes

3. Course start date 17-06-2024

4. Course end date 17-06-2024

5. Names of authors/ creators 1. Joe Marini

6. Skills gained 1.Functions and operator

2.Variables and expression.

3.Loops

7. Unique learning outcomes (at least 3) 1. Working with files

2. Control flow,multithreading

3. Fetching internet data

16
Course content:-

WORKING WITH FILES

WORKING WITH CALENDE

EXCEPTION HANDLING

USING MODULES

Detailed description of course:-

Python—the popular and highly-readable object-oriented language—is both powerful and relatively easy to
learn. Whether you're new to programming or an experienced developer, this course can help you get started
with Python. Joe Marini provides an overview of the installation process, basic Python syntax, and an example
of how to construct and run a simple Python program. Learn to work with dates and times, read and write files,
and retrieve and parse HTML, JSON, and XML data from the web.This course includes Code Challenges
powered by CoderPad. Code Challenges are interactive coding exercises with real-time feedback, so you can
get hands-on coding practice alongside the course content to advance your programming skills.

17
Chapter:-2.2

PYTHON FOR NON-PROGRAMMERS

S. No. Heading Value

1. Course title Python for non-programmers

2. Course duration 2hrs . 11minutes

3. Course start date 18-06-2024

4. Course end date 18-06-2024

5. Names of authors/ creators 1.Nick walter

6. Skills gained 1.Data types:-ints and floats

2.Variables(using in strings)

3. For Loops

7. Unique learning outcomes (at least 3) 1. Splitting a string

2. Functions

3. Lists

18
Course content:-

WORKING WITH LISTS

DATA TYPES

FOR LOOPS

LISTS

Detailed description of course:


Python is one of the easiest ways to learn to code? It’s true. And in this course you can avoid the jargon and
make learning how to code a lot more fun. You don’t have to be an expert technician, either. Join instructor
Nick Walter and find out what you need to get started now.In this course, Nick teaches the fundamentals of
Python to you: a non-programmer, a user with little to no coding experience. Learn more about what Python is,
and what it is and isn’t used for. Explore how Python works with numbers and how you can interact with simple
programs such as a simple number-guessing game. Find out how to work with text in Python by building a
reusable function to count the words in a block of text. And along the way, tackle quick challenges and other
games that allow you to put your new skills to the test.

19
Chapter:-2.3

PYTHON—DATA ANALYSIS

S. No. Heading Value

1. Course title Python data analysis

2. Course duration 2hrs . 30minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1. Michele Vallisneri

6. Skills gained 1.Using python in clouds

2.Anagrams

3. For Loops

7. Unique learning outcomes (at least 3) 1.Strings

2.Arrays

3.Solving programms

20
Course content:-

ANAGRAMS

STRINGS

FOR LOOPS

ARRAYS

Detailed description of course:

Data science is transforming the way that government and industry leaders look at both specific problems and
the world at large. Curious about how data analysis actually works in practice? In this course, instructor
Michele Vallisneri shows you how, explaining what it takes to get started with data science using Python.
Michele demonstrates how to set up your analysis environment and provides a refresher on the basics of
working with data structures in Python. Then, he jumps into the big stuff: the power of arrays, indexing, and
tables in NumPy and pandas—two popular third-party packages designed specifically for data analysis. He also
walks through two sample big-data projects: using NumPy to identify and visualize weather patterns and using
pandas to analyze the popularity of baby names over the last century. Challenges issued along the way help you
practice what you've learned.

21
Chapter:-2.4

PYTHON IN EXCEL AND DATA SCIENCE

S. No. Heading Value

1. Course title Python in excel & data science

2. Course duration 3hrs . 10minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1. Joe marini


2. Lavanya vijayan

6. Skills gained 1. Built in functions

2. Advance functions, map(),zip(),filter

3. Airithmetic operations

7. Unique learning outcomes (at least 3) 1. Debugging

2. Data frames

3. Working with data frames

22
Course content:-

FUNCTIONS

OPERATORS

DATA FRAMES

DEBUGGING

Detailed description of course:

Python in Excel including data structures, DataFrames, functions, and more. Join instructor and industry expert
Joe Marini as he prepares you to get more out of these two leading technologies by wielding their respective
strengths in tandem. Along the way, test out your new skills and technical know-how in the exercise challenges
at the end of each section. Throughout the course, Joe highlights a handful of practical Python-in-Excel
examples such as fixing dates with dateutil, generating a random sequence, creating a scatter plot with Seaborn,
creating a Gantt chart, and extracting data using regular expressions.

Functions are a core building block of programming and working with data and an essential approach to making
code more readable and reusable. In this course, discover how to save time and enhance your code using
common functions for data science projects. Explore fundamental built-in Python functions for data science, as
well as more advanced built-in functions such as the filter function in Python. Learn how to leverage functions
from the NumPy and SciPy libraries to manipulate numerical data and perform statistical operations. Learn how
to store, modify, and group data efficiently using functions from the pandas library. Get tips on using functions
from the Matplotlib and Seaborn libraries for data visualization. Plus, get insights into common pitfalls and
mistakes developers make when using functions as part of a data science initiative.

23
Chapter:-2.5

ADVANCED PYTHON

S. No. Heading Value

1. Course title Advanced Python

2. Course duration 2hrs . 27minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1. Nick walter

6. Skills gained 1. Built in functions

2. Advance functions, map(),zip(),filter

3. Airithmetic operations

7. Unique learning outcomes (at least 3) 1. Debugging

2. Data frames

3. Working with data frames

24
Course content:-

OPERATORS

DATA FRAMES

DEBUGGING

STRINGS

Detailed description of course:

In addition to the Python standard library, there are thousands of third-party modules available to download and
use. These libraries expand the power and proficiency of your code. In this course, instructor Joe Marini
introduces four essential libraries that every Python developer should consider that address common
development challenges. Learn how to format, calculate, and compare dates and times with Pendulum and
retrieve remote data with the Requests library, which also offers advanced features such as timeouts and
sessions. Then find out how to perform batch file operations, including reading and writing data, and directory
operations, such as searching, with PyFilesystem. Finally, discover how to manipulate and edit images with
Pillow. Each chapter includes challenges to help you test your newfound Python prowess.

25
Chapter:-2.6

PYTHON ESSENTIAL LIBRERIES

S. No. Heading Value

1. Course title Python essential libreries

2. Course duration 2hrs . 15minutes

3. Course start date 20-06-2024

4. Course end date 20-06-2024

5. Names of authors/ creators 1. Joe Marini

6. Skills gained 1. Introduction to pendulum

2. Creating requets

3. Working with responses

7. Unique learning outcomes (at least 3) 1. Files

2. Working with files

3. Creayting and deleting files

26
Course content:-

PENDULUM

REQUESTS

DEBUGGING

FILES

Detailed description of course:

Develop your Python programming skills. Python is a great choice for building all kinds of applications, but to
fully take advantage of its power and flexibility, you need to master all its advanced functionality. In this
course, you can learn how to leverage next-level Python features such as object-oriented special class methods,
use logging to track performance and user activity, see how to port code from Python 2 to 3, and make your
code more efficient and easier to read and maintain. Instructor Joe Marini also shows how to manipulate data,
build custom classes and functions, create lists, and write more elegant, optimized code.

27
Chapter:-3

GRAPHICS DESIGNING : FOUNDATIONS

S. No. Heading Value

1. Course title Graphic designing : foundations

2. Course duration 3hrs . 13minutes

3. Course start date 24-06-2024

4. Course end date 24-06-2024

5. Names of authors/ creators 1.Sean Adams

6. Skills gained 1.Introduction to layout elements

2.Contrast

3. creating harmony

7. Unique learning outcomes (at least 3) 1.Symmetry

2.Grids

3.Attributes

28
Course content:-

CONTRAST

GRIDS

COMBINING WORDS WITH

IMAGES

PROPORTION

Detailed description of course:

Layout and composition are the building blocks of graphic design. A strong composition will attract attention,
clarify understanding, and engage the viewer whether the project is a print- or screen-based project, a still or
motion graphic, a 3D or 2D graphic. This course explains the elements, principles, and tools you will need to
create a successful composition and layout. Author Sean Adams explains the elements of layout (from shapes to
space), how to use principles such as scale and hierarchy, and teaches how tools like grids, proportions, and
color can lead to more compelling compositions.

29
Chapter :- 3.1

PRINCIPLE OF UX DESIGNING

S. No. Heading Value

1. Course title Principle of ux designing

2. Course duration 3hrs . 13minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1. Amanda stockwell

6. Skills gained 1. Basic of ux

2. Working of ux

3. Basic of figma

7. Unique learning outcomes (at least 3) 1. Using adobe basic

2.Introduction to adobe

3.Handling ux projects

30
Course content:-

BASIC ADOBE

DESIGNING

UX FOUNDATIONS

BASIC FIGMA

Detailed description of course:

Principle for Mac is a Mac-based UX prototyping tool designed to bring your design ideas to life. In this course,
join instructor Tom Green as he shows how to create interactive prototypes for smartphones, tablets, and
desktop computers with Principle. The techniques go beyond static wireframes or blueprints; with Principle,
your prototypes become more dynamic, with motion and interactivity. Along the way, learn how to import
assets, crop and mask layers, and use the Principle timeline and drivers. The final chapter of the course includes
examples of real-world prototyping projects, including a preloader animation, a card animation, a video player,
and an Apple Watch alert.

31
Chapter 3.2

PERSUASION IN UX DESIGNING

S. No. Heading Value

1. Course title Persuasion in ux designing

2. Course duration 3hrs . 52minutes

3. Course start date 29-06-2024

4. Course end date 29-06-2024

5. Names of authors/ creators 1.Chris nodder

6. Skills gained 1.Creating anchors

2.Harnessing illogical reactions

3. Dark patterns vs persuasive design

7. Unique learning outcomes (at least 3) 1. Ethics of persuasion designing

2. Creating credibility in UX

3. Limits of acceptable persuasion

32
Course content:-

ANCHORS

PERSUASIVE DESIGN

CREDIBILITY IN UX

Detailed description of course:

Design is communication. But a thoughtfully designed UI can do more than communicate options. It can also
persuade users, nudging them down whatever path the designer had in mind. This persuasive power can be used
for both good and nefarious purposes. In this course, based on his book Evil by Design, Chris Nodder discusses
the ethical ramifications of persuasion in user experience design. Chris delves into the science of human
behavior, the history of persuasive design, and how design can appeal to emotions. He explains different types
of persuasive design and explores the limits of acceptable persuasion. Chris goes over several methods for
influencing behavior patterns and shows you how to harness illogical reactions, create credibility, gain user
commitment, and much more. Plus, Chris digs into how dark patterns differ from persuasive design and how to
use persuasive design responsibly.

33
Chapter 3.3

ADOBE ESSENTIAL TRAINING : DESIGN

S. No. Heading Value

1. Course title Adobe essential training : design

2. Course duration 3hrs . 12minutes

3. Course start date 30-06-2024

4. Course end date 30-06-2024

5. Names of authors/ creators 1. Dani Beaumont

6. Skills gained 1. Basic of UI

2. Learning gradients,shapesand lines

3. Placing and masking images

7. Unique learning outcomes (at least 3) 1. Learning text controls

2.3D transforms

3.Layout tecqniques

34
Course content:-

BASIC USER INTERFACE

DEALING WITH IMAGES

GRADIENTS AND EFFECTS

LAYOUTS AND TOOLS

Detailed description of course:

Adobe XD—a UX design platform for creating experiences using an iterative design process—was designed to
help make it easier to collaborate on and share your ideas. In this course, part one in the three part series, you’ll
learn how to create a variety of screen layouts using native tools within the application, or by importing content
from other applications like Photoshop and Adobe Illustrator. Instructor Dani Beaumont, a principal product
manager on the Adobe XD team, shows you how to set up a design project and use the workspace layouts and
tools. Dani walks you through all the basics of designing with Adobe XD, then highlights the asset types and
text controls that you will need to use. She goes over transformations, techniques you can use for a great layout,
and content-aware tools like padding, stacks, and the responsive resize. Dani covers ways to add effects and
introduces components and states. Plus, she presents useful advice on organizing your assets.

35
Chapter 3.4

ADOBE PHOTOSHOP XD : WEB DESIGNING PROCESS

S. No. Heading Value

1. Course title Adobe photoshop:web designing


process
2. Course duration 1hrs . 41minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1. Sue Jenkins

6. Skills gained 1. Basic of XD

2. Creating elements in adobe

3. Web designing stratergies

7. Unique learning outcomes (at least 3) 1. Designing desktop

2. Creating prototypes

3. Editing graphics in XD

36
Course content:-

BASIC XD

BASIC ADOBE USAGE

BASIC WEB DESIGNING

GRAPHICS IN XD

Detailed description of course:

Transition your Photoshop-based web design process to a more UX-based workflow by adding Adobe XD.
Vector-based XD allows for faster design revisions, easy adaptability to a variety of device sizes, and quicker
development of prototypes to get customer buy-in before the development process begins. In this course, you’ll
learn how to set up XD, prototype and collaborate your UX designs with clients and stakeholders, leverage
cross-product workflows between Photoshop and XD, and export web-ready assets for developers.

37
Chapter 3.5

FIGMA FOR UX DESIGNING : INTRODUCTION

S. No. Heading Value

1. Course title Figma for ux designing

2. Course duration 1hrs . 35minutes

3. Course start date 30-06-2024

4. Course end date 30-06-2024

5. Names of authors/ creators 1. Eric Nordquist

6. Skills gained 1. Creating project

2. Prototyping with smart animations

3. Using Layouts

7. Unique learning outcomes (at least 3) 1. Designing a file

2. Applying auto layout

3. Figma for designing

38
Course content:-

DESIGNING FILES

BASIC FIGMA USING

Detailed description of course:

Do you use Figma for review and collaboration, use it for interaction design, or just need a quick introduction to
this tool? In this course, instructor Eric Nordquist steps through creating projects in Figma, then shows you how
to use prototyping, collaborate with other designers, and export your files. Eric begins by introducing you to
Figma, explaining the differences between the online and desktop versions, as well as how to design a file. Then
he covers all the main steps in creating a project, such as creating the hero section, applying Auto Layout, using
masks, and more. Eric explains prototyping and how to use interactions and Smart Animate. After going over
how to use Figma to work with other designers, he finishes up with useful tips on how to export your files.

This course introduces the features and concepts you’ll need to know to start your first user experience (UX)
design project in Figma. Find out how to create new files, segment your project for multiple screens and
devices, and start adding content, including shapes, images, drawing, effects, and text. Instructor Brian Wood
then shows how to work smarter—not harder—using Figma features like layers, reusable formatting, and
components. In the final chapters, you can add interactions to the mix to build functional prototypes that really
tell the whole story of your design to collaborators and clients.

39
Chapter 3.6

SKETCHING FOR UX DESIGNERS

S. No. Heading Value

1. Course title Sketching for UX designers

2. Course duration 1hrs . 35minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1. Matt Corrall

6. Skills gained 1. UX Designing

2. Sketching

3. Digital tools

7. Unique learning outcomes (at least 3) 1. Sketching formats

2. Annotations and label

3. Hatching and shading

40
Course content:-

UX DESIGNING

SKETCHING

DIGITAL TOOL

Detailed description of course:

When you think of UX design, you probably think of the digital aspects. But one key skill that’s often
underestimated in UX design is sketching by hand. Sketching can often reveal aspects of your ideas that will
make your designs more engaging and help you explore and communicate new ideas that yield real benefits.
This course with UX designer Matt Corrall is for anyone working in or simply interested in honing skills in UX
design. He starts with the very basics of sketching, so you don’t need to be an experienced sketcher or have any
special artistic talent. Matt guides you through his own workflow of sketching in his work, breaks down
different sketching techniques, and explains why and when to use them. He also provides some design and
sketching exercises so you can practice on your own. If you’re looking to unlock some new skills to broaden,
inspire, and enhance your UX design projects and workflow, grab some pens and paper and join Matt in this
course.If you’re a UX designer or researcher, you’re probably already wondering about the best way to adapt to
the new wave of AI-powered tools and workflows. In this course, UX expert Tetiana Gulei shows you how to
take a basic design and apply AI to it to streamline the design process and improve your outcomes along the
way.Learn how to use generative AI to assist in product discovery and ideation, such as analyzing user data,
creating personas, storyboarding, idea generation, and more. Find out how AI can extend the visual design
process when it comes to creating mood boards, generating images, and working with colors, fonts, and styles.
By the end of this course, you’ll be prepared to start using cutting-edge generative AI tools to streamline your
design process, from initial user research to product creation, while also contributing to long-term design
strategy validation.

41
Chapter:-4

CYBER SECURITY : FOUNDATIONS

S. No. Heading Value

1. Course title Cyber security : foundations

2. Course duration 2hrs . 3minutes

3. Course start date 07-07-2024

4. Course end date 07-07-2024

5. Names of authors/ creators 1. Malcolm Shore

6. Skills gained 1. Understanding cyber kill chains

2. Understanding pre cyber threats

3. Analyzing cyber threats and controls

7. Unique learning outcomes (at least 3) 1. Protecting payment card data

2. Securing things on internet

3. Managaing and detecting cyber

incidnts

42
Course content:-

CYBER KILL CHAINS

HANDLING RISK FRAME

WORK

HUNTING FOR THREATS

CRYPTO MINING

Detailed description of course:


Set a rock-solid foundation for your network, users, and data by learning about the basics of cybersecurity. Join
security expert Malcolm Shore as he describes how to assess and mitigate risks using various cybersecurity
frameworks and control standards, such as NIST and COBIT.

Malcolm details pertinent cyber threats and how they operate, including how cyber criminals hide their attacks,
how advanced persistent threats work, and even how to determine what's real and what's merely cyber fear,
uncertainty, and doubt (FUD). He also covers the way in which cyber risk is managed and the lifecycle of
cybersecurity—from managing defense through to preparing for and responding to an incident. And since
cybersecurity has taken on an increasingly visible global dimension, Malcolm concludes the course with a
discussion of international cyber norms and protocols.

Learning objectives

 Differentiate between the phases of the Cyber Kill Chain.


 Describe the several types of cyberattacks.
 Explain what the NIST Cybersecurity Framework is.
 Interpret basic practices of cyber risk.
 Determine which elements are used in developing a secure architecture.
 Articulate the best approach to respond to an incident.
 Describe the seven principles for global cybersecurity users.

43
Chapter:-4.1

CYBER SECURITY FOUNDATIONS : GOVERNENCE , RISK AND

COMPILENCE

S. No. Heading Value

1. Course title Cyber security foundations


governence , risk
2. Course duration 1hrs . 14minutes

3. Course start date 07-07-2024

4. Course end date 07-07-2024

5. Names of authors/ creators 1. AJ Yawn

6. Skills gained 1. Understanding GRC

2. GRC tips and stratergies

3. frameworks

7. Unique learning outcomes (at least 3) 1. Understading everything about GRC

44
Course content:-

UNDERSTANDING GRC

Detailed description of course:


Even as protection against cyber threats becomes increasingly more critical, millions of cybersecurity positions
continue to remain unfilled. If you’re interested in landing a role in this booming industry—but aren’t currently
in a technical field—consider using governance, risk, and compliance (GRC) as your entry point.

GRC,as defined by OCEG, involves using a set of integrated capabilities to collaborate with stakeholders across
an organization in order to ". . . achieve objectives, address uncertainty, and act with integrity.” In this course,
AJ Yawn draws upon his 10+ years in the GRC industry to illuminate the fundamental skills and best practices
of GRC, so you can determine if it’s a fit for you.

45
Chapter:-4.2

CYBER SECURITY : CLOUD COMPUTING

S. No. Heading Value

1. Course title Cyber security : Cloud computing

2. Course duration 2hrs . 27minutes

3. Course start date 09-07-2024

4. Course end date 09-07-2024

5. Names of authors/ creators 1. Malcolm Shore

6. Skills gained 1. Cloud foundations and services

2. Understanding google apps

3. Cloud resilience

7. Unique learning outcomes (at least 3) 1. Cloud security management

2. Cryptography

3. Data security and encryption

46
Course content:-

CLOUD SERVICES

ANATOMY OF SERVICE FAILOURE

ARCHITECTING GOVERNENCE AND

RISK

DATA SECURITY

Detailed description of course:

More and more companies are migrating their applications and infrastructure to the cloud, shifting operational
aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared
responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm
Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and
body of knowledge required to mitigate those risks. He introduces concepts such as software as a service
(SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models
available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm
also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify
unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.

One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or
service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and
systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To
prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test
their systems for exposure.This course teaches you what session hijacking is, and how black-hat hackers use it
to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them.
Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed
Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm
Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.

47
Chapter:-4.3

PRACTICLE CYBER SECURITY FOR IT PROFESSIONALS

S. No. Heading Value

1. Course title Practicle cyber security for it


professionals
2. Course duration 2hrs . 26minutes

3. Course start date 10-07-2024

4. Course end date 10-07-2024

5. Names of authors/ creators 1. Malcolm Shore

6. Skills gained 1. Understanding cyber kill chains

2. Protecting network from cyber attacks

3. Analyzing cyber threats and controls

7. Unique learning outcomes (at least 3) 1. Protecting payment card data

2. Securing things on internet

3. Managaing and detecting cyber

incidnts

48
Course content:-
CYBER KILL CHAINS

HANDLING RISK FRAME

WORK

HUNTING FOR THREATS

CRYPTO MINING

Detailed description of course:

Learn how to protect your network from cyberattacks through practical, hands-on demonstrations. In this
course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and
snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as
well as the two most common types of protection you can build into your system: Antivirus protection and
firewalls. Then, learn how to scan your network for suspicious files, check what services are exposed on your
systems, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to combat
application-level threats, identify weak points in your web applications, and monitor packet-level activity on
your network.
Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of
cyberattacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information
security professionals alike. In this course, find out about existing and emerging web protocols and how to test
your sites and applications for weaknesses. Cybersecurity expert Malcolm Shore examines the various parts of a
web application and introduces the Open Web Application Security Project (OWASP), which provides
documentation, tools, and forums for web developers and testers. He also provides an overview of popular
testing tools, including Burp Suite and OWASP ZAP. Learn how to use these utilities to run basic and advanced
tests, and protect sites against common attacks.

49
Chapter:-4.4

ETHICAL HACKING : INTRODUCTION

S. No. Heading Value

1. Course title Ethical hacking : introduction

2. Course duration 2hrs

3. Course start date 19-07-2024

4. Course end date 19-07-2024

5. Names of authors/ creators 1. Lisa Bock

6. Skills gained 1. Using AI/ML in hacking

2. Modeling threats and handling

3. Managing risks

7. Unique learning outcomes (at least 3) 1. Outlining the type of hackers

2. Analization of ethical hacker

3. understanding cyber laws

50
Course content:-
AI/ML

HACKING

PROTECTING DATA

CYBER LAWS

Detailed description of course:

Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT professional. In
this course, security expert Lisa Bock explains how to protect data in a digital world and covers the basics of
Information security. She begins by discussing how to layer defenses and outlines the power of using adaptive
security controls. Lisa describes how artificial intelligence can help early threat detection and explains the
benefits of MITRE ATT&CK, which provides tools and techniques specific to the ethical hacking process. She
then stresses the need to maintain a vigilant posture, by using threat modeling and cyber threat intelligence. Lisa
also provides an overview of the various hacker frameworks and reviews the laws and standards that define best
practice behavior. She concludes by covering why it’s essential to perform ethical hacking, examines attack
types and motives, lists the main hacking phases, and outlines the desired skills of an ethical hacker.

51
Chapter :- 4.5

RISK MANAGEMENT ESSENTIAL TRAINING

S. No. Heading Value

1. Course title Risk management essential training

2. Course duration 1hrs . 38minutes

3. Course start date 10-07-2024

4. Course end date 10-07-2024

5. Names of authors/ creators 1. Kip Boyle

6. Skills gained 1. Understanding IT Risks

2. Handling the risks and threats

3. Types of risks & management

7. Unique learning outcomes (at least 3) 1. IT risk management technique

2. Implementing controls

52
Course content:-
IT RISKS

HANDLING THREATS

TYPES OF RISKS

IMPLIMENTING OPERATING AND


VALIDATING CONTROLS

Detailed description of course:

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But
they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals
need to know how to close the gaps and protect devices, data, and users from attacks. Join cybersecurity expert
Malcolm Shore as he explores the two dominant mobile operating systems, Android and iOS, and shows ways
to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the
toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws.
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn
system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of
system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the
countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers
steganography, spyware on a cell phone, and tactics for hiding files and tools.

53
CONCLUSION AND FUTURE ENHACEMENT OF PYTHON

In conclusion, this Python project has successfully achieved its objectives of briefly summarize the main
objectives and goals of the project. Through meticulous development and testing, we have implemented key
functionalities such as mention specific functionalities or features developed. The project has been
instrumental in describe any positive outcomes or impacts achieved.

Throughout the development process, we encountered challenges such as briefly mention any significant
challenges faced but overcame them by briefly describe how challenges were addressed, e.g. through
research, collaboration, or innovation.

FUTURE ENHANCEMENTS OF PYTHON

1. User Interface (UI) Improvements:


o Enhance the user interface to make it more intuitive and user-friendly.
o Implement responsive design principles to ensure compatibility across various devices.
2. Performance Optimization:
o Identify and optimize any bottlenecks in the code for improved performance.
o Implement caching mechanisms or optimize database queries where applicable.
3. Feature Expansion:
o Introduce additional features that have been requested by users or stakeholders.
o Explore integration with other systems or APIs to enhance functionality.
4. Security Enhancements:
o Conduct thorough security audits and implement best practices to protect user data.
o Ensure compliance with relevant data protection regulations and standards.
5. Documentation and Support:
o Improve documentation to make it comprehensive and easy to understand for developers and
users.
o Establish a support system to promptly address user inquiries and issues.

54
CONCLUSION AND FUTURE ENHACEMENT OF UI/UX

In Conclusion the UI/UX design of this Python project has played a crucial role in shaping a positive user
experience and achieving our goals of [briefly summarize the main objectives related to UI/UX]. We have
emphasized intuitive design principles to ensure usability and accessibility, resulting in a seamless interaction
flow for our users.

 User-Centric Approach: We prioritized user needs and preferences throughout the design process,
resulting in an interface that is intuitive and easy to navigate.
 Visual Design: The visual elements such as color scheme, typography, and layout have been carefully
chosen to enhance readability and usability.
 Interaction Design: We focused on creating meaningful interactions that guide users through tasks
efficiently, promoting engagement and satisfaction.
 Responsive Design: The interface is designed to be responsive, ensuring a consistent experience
across different devices and screen sizes.

FUTURE ENHANCEMENTS FOR UI/UX

Looking forward, there are several opportunities to further enhance the UI/UX :

1. Enhanced Visual Design:


o Continuously refine the visual elements to maintain a modern and appealing aesthetic.
o Conduct usability testing to gather feedback on visual clarity and appeal.
2. Improved Navigation and Information Architecture:
o Conduct user research to identify potential improvements in navigation and content
organization.
o Implement features such as breadcrumbs, filters, or search functionalities to enhance
navigation efficiency.
3. Accessibility:
o Ensure compliance with accessibility standards (e.g., WCAG) to make the application
accessible to users with disabilities.
o Conduct accessibility audits and implement improvements based on findings.
4. Personalization and Customization:
o Explore ways to allow users to personalize their experience (e.g., customizable dashboards,
preferences settings).
o Implement features that remember user preferences and adapt the interface accordingly.

55
CONCLUSION AND FUTURE ENHACEMENT OF CS&EH

The cybersecurity and ethical hacking aspects of this Python project have been pivotal in ensuring robust
defenses against potential threats and vulnerabilities. Our primary objectives included [briefly summarize the
main objectives related to cybersecurity and ethical hacking]. Through diligent implementation and testing,
we have incorporated essential security measures to safeguard sensitive data and maintain the integrity of our
systems.

Key aspects of our cybersecurity and ethical hacking approach include:

 Vulnerability Assessments: Conducting thorough assessments to identify and prioritize potential


vulnerabilities within the system.
 Penetration Testing: Simulating attacks to evaluate the effectiveness of our defenses and identify
areas for improvement.
 Secure Coding Practices: Implementing secure coding practices to mitigate common vulnerabilities
such as SQL injection, XSS, and CSRF.
 Encryption and Data Protection: Ensuring sensitive data is encrypted both at rest and in transit to
prevent unauthorized access.
 User Awareness and Training: Educating users and stakeholders about cybersecurity best practices
to foster a culture of security awareness.

FUTURE ENHANCEMENTS FOR CS&EH


Looking ahead, there are several opportunities to further enhance the cybersecurity and ethical hacking
aspects of our Python project:

1. Advanced Threat Detection:


o Implement machine learning algorithms or AI-driven approaches to detect and respond to
sophisticated threats in real-time.
o Integrate threat intelligence feeds to stay updated on emerging threats and attack vectors.
2. Continuous Monitoring and Incident Response:
o Establish a robust incident response plan and implement continuous monitoring mechanisms to
detect and respond to security incidents promptly.
o Conduct tabletop exercises and simulations to test the effectiveness of our incident response
procedures.
3. Enhanced Access Control:
o Implement role-based access control (RBAC) and principle of least privilege (PoLP) across the
application to limit unauthorized access.
o Integrate multi-factor authentication (MFA) for sensitive accounts and operations.

56
REFRENCE

PYTHON

Day 1 CERTIFICATE-1
https://www.linkedin.com/learning/python-essential-training-
18764650?trk=share_android_course_learning&shareId=QD47uVZpRHeUghI
ZESd2%2Fg%3D%3D

Day 2 CERTIFICATE-2
https://www.linkedin.com/learning/learning-python-
14393370?trk=share_android_course_learning&shareId=qQ0CUkUPRhaO6a%
2BxCsxq8A%3D%3D

Day 3 CERTIFICATE-3
https://www.linkedin.com/learning/python-for-non-
programmers?trk=share_android_course_learning&shareId=H2NAhNA4TBqs
UTtUjwf%2BZA%3D%3D

Day 4 CERTIFICATE-4
https://www.linkedin.com/learning/python-data-analysis-
2?trk=share_android_course_learning&shareId=GzdDIc%2B4SRa7RmbHw1r
hOQ%3D%3D

Day 5 CERTIFICATE-5
https://www.linkedin.com/learning/python-in-excel-quick-
start?trk=share_android_course_learning&shareId=xBYoHEDgSj2YsStIJWfe
Xg%3D%3D

Day 6 CERTIFICATE-6
https://www.linkedin.com/learning/python-functions-for-data-
science?trk=share_android_course_learning&shareId=IrZZoRGjTtS2RBaI38u
JtA%3D%3D

Day 7 CERTIFICATE-7
https://www.linkedin.com/learning/python-essential-
libraries?trk=share_android_course_learning&shareId=gvu5YBjlTj6oGrXSDt
B6eg%3D%3D

57
CYBER SECURITY & ETHICAL HACKING

Day 1
CERTIFICATE-1
https://www.linkedin.com/learning/cybersecurity-
foundations22006082?trk=share_android_course_learning&shareId=I%2BA

Day 2
CERTIFICATE-2
https://www.linkedin.com/learning/cybersecurity-foundations-governance-risk-
andcompliance-
grc?trk=share_android_course_learning&shareId=3aksnI%2FVQZ2sHtnvu49EKg%3D
%3 D

Day 3 CERTIFICATE-3
https://www.linkedin.com/learning/cybersecurity-with-cloud-computing-
2?trk=share_android_course_learning&shareId=DMBZHXdAR%2FWtUMBixaPeAA%
3D %3D

Day 4
CERTIFICATE-4
https://www.linkedin.com/learning/practical-cybersecurity-for-it-
professionals?trk=share_android_course_learning&shareId=79oubUX2RyyXJqpN7kvsk
A%3D%3D

Day 5
CERTIFICATE-5
https://www.linkedin.com/learning/it-and-cybersecurity-risk-management-essential-
training?trk=share_android_course_learning&shareId=OZZZ6E3cT8KJ3znpn4RsMA%
3D %3D

59
UI/UX DESIGNING

Day 1 CERTIFICATE-1
https://www.linkedin.com/learning/graphic-design-foundations-layout-
andcomposition?trk=share_android_course_learning&shareId=iKyH0CftQKmdMUHlP
qXv4w%3D%3D
https://www.linkedin.com/learning/principle-for-ux-design-
22683376?trk=share_android_course_learning&shareId=5KXy%2BKIGTMK7Y2iRN
203hw%3D%3D

Day 2 CERTIFICATE-2
https://www.linkedin.com/learning/ux-foundations-research-
19417883?trk=share_android_course_learning&shareId=S0uVVuXLQFGuX%2Bgw
OfIzNw%3D%3D

Day 3 CERTIFICATE-3
https://www.linkedin.com/learning/evil-by-design-persuasion-in-ux-
14253964?trk=share_android_course_learning&shareId=%2Fkh8EcDQQTu38ngICg
zSvw%3D%3D

Day 4 CERTIFICATE-4
https://www.linkedin.com/learning/adobe-xd-essential-training-design-
14363201?trk=share_android_course_learning&shareId=rHx0%2B5giQ6e%2BqcLZ
FrYRXw%3D%3D
https://www.linkedin.com/learning/adobe-xd-essential-training-
prototype?trk=share_android_course_learning&shareId=pAKlDGviT3%2BhO1aWF
SqQIA%3D%3D

60
61

You might also like