3rd sem
3rd sem
Submitted by
THARUN S
USN: 23BCAR0342
Semester : 3rd
in partial fulfillment for the award of the degree of
JULY - 2024
DEPARTMENT OF COMPUTER SCIENCE & IT
[LEARNING PATH]
THARUN S
USN: 23BCAR0342
_______________________ ______________________________
I THARUN S affirm that the report on online certifications for learning path / online courses titled
“Python programming language” of duration (20 hours), undergone by me from Linkedin learning
resource , being submitted in partial fulfillment for the award of BACHELOR OF COMPUTER
APPLICATIONS WITH SPECIALIZATION [Internet of things] is the original work carried out by
me and has not been submitted for award of any other degree or diploma, either in this or any other
University.
THARUN S
USN : 23BCAR0342
CERTIFICATE
This is to certify that THARUN S with USN: 23BCAR0342 of Bachelor of Computer Applications
in the School of Computer Science and IT, has undergone the online learning path titled “PYTHON
PROGRAMMING LANGUAGE ” from Linkedln learning resource as part of summer term June-
July, 2024 under my supervision. No part of this report was submitted for the award of any degree
or diploma prior to any other university/institution till this date and is the authentic work of student.
______________________________
Tharun s
Dr.M.Santhalakshmi
JAIN (Deemed-to-be University)
ACKNOWLEDGEMENT
Learning Python programming language, UI/UX designing, and cybersecurity has been a transformative
journey that has equipped me with a versatile skill set crucial for today's digital landscape. Python, with
its simplicity and power, has enabled me to automate tasks, build robust applications, and analyze
complex datasets with ease. Understanding UI/UX principles has allowed me to craft engaging and
intuitive user interfaces that prioritize user experience and satisfaction. Meanwhile, diving into
cybersecurity has provided me with the knowledge and tools to implement robust security measures,
protect against cyber threats, and ensure the confidentiality and integrity of sensitive information.
Throughout this learning process, I have been fortunate to benefit from a wealth of online resources,
tutorials, and communities that have supported and guided me every step of the way. Each discipline—
Python programming, UI/UX designing, and cybersecurity not only expanded my technical proficiency
but also enhanced my problem-solving abilities and critical thinking skills.
Looking ahead, I am excited to leverage these skills to create innovative solutions, contribute
meaningfully to projects, and navigate the dynamic challenges of the tech industry. The journey of
learning Python, UI/UX designing, and cybersecurity has not only opened doors to exciting career
opportunities but has also empowered me to make a positive impact in the digital world.
Certificates
List of Tables
Python is one of the most commonly used dynamic languages for many large organizations. Supported
on all major operating systems, it comes pre-installed on Macs, as well as most Linux and Unix-based
systems. In this course, we will learn all the essentials of learning and using Python. Learn how
computers think, as well as how to install Python, pip, and Jupyter Notebook and the basics of writing a
program. Explore variables and types, operators, functions, classes, objects, and more. Go over basic data
types like ints and floats, Booleans, and strings. Deep dive into basic data structures, control flow,
functions, classes, and objects. Find out how to handle errors and exceptions, as well as threads and
processes. Plus, discover how to work with different types of files in Python, pass command-line
arguments to your Python script, and create modules and packages.
UX research helps a business by saving development or process costs, increasing customer happiness and
loyalty, and uncovering opportunities to earn more. In this course, Amanda Stockwell shows you
practical techniques to improve your UX research to better inform fast-moving projects. Get an overview
of different types of research methodologies, usability tests, and conducting interviews. Review card
sorts, eye tracking, multivariate testing, and desirability testing. Go over the best uses of expert reviews,
surveys, diary studies, participatory design workshops, and personas. Learn how to choose the right
research method for your goals, then dive into environmental considerations, such as in-house versus
external, agile versus waterfall, and more
Cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and
systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits
and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He
introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure
as a service (IaaS) and the different deployment models available. He then reviews offerings from
Microsoft Azure, Amazon Web Services, and Google Apps.
Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT
professional. In this course, we get to know how to protect data in a digital world and covers the basics
of Information security. We begin by discussing how to layer defenses and outlines the power of using
adaptive security controls.
List of Tables
Table No Title Page
Python—the popular and highly-readable object-oriented language—is both powerful and relatively easy
to learn.. Python is one of the most commonly used dynamic languages for many large organizations. In
this course Deep dive into basic data structures, control flow, functions, classes, and objects. Find out
how to handle errors and exceptions, as well as threads and processes.
1.1 Courses covered :-
1. Python essential training : (4h 22m).
2. Learning python : (3h 5m).
3. Python for non-programmers : (2h 11m).
4. Python data analysis : (2h 30m).
5. Python in excel : (1h 40m) , Python functions fro data science (1h 30m).
6. Advanced python : (2h 27m).
7. Python essential librearies : (2h 15m).
UI/UX-- Layout and composition are the building blocks of graphic design This course tells about the
elements, principles, and tools is needed to create a successful composition and layout and teaches how
tools like grids, proportions, and color can lead to more compelling compositions and also tought me how
to use the designing apps like adobe,figma and gave me the basic necessity foundations for ui ux
designing.Transitioning the Photoshop-based web design process to a more UX-based workflow by
adding Adobe XD. Vector-based XD allows for faster design revisions, easy adaptability to a variety of
device sizes, and quicker development of prototypes to get customer buy-in before the development
process begins.
1.2 Courses covered :-
1. Graphic designing foundations : (2h 3m) , Principle of UX designing : (3h 13m)
2. UX Foundation : research : (1h 37m)
3. Persuasion in UX : (3h 52m)
4. Adobe essential training : (3h 12m)+Web designing process from Adobe : (1h 41m)
5. Figma for UX design : (1h 35m) , Sketching for UX designers : (1h 35m)
Cloud computing (cyber security)-- is a shared responsibility, especially when it comes to keeping your
data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud
technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to
mitigate those risks. He introduces concepts such as software as a service , platform as a service and
infrastructure as a service and the different deployment models available. He then reviews offerings
from Microsoft Azure, Amazon Web Services, and Google Apps.
1.3 Course covered:-
1. Cyber security : foundations : (2h 3m)
Cybersecurity, Python programming, and UI/UX design are all crucial in today's digital landscape for
several reasons. Python is a powerful and versatile programming language used extensively in
cybersecurity for scripting, automation, and developing security tools. Enhances usability and satisfaction
by focusing on the interaction between users and products. In cybersecurity tools, good UX design
ensures that security features are intuitive and effectively utilized by users.Cyber security It helps protect
systems, networks, and data from cyber threats like hacking, malware, and phishing attacks.
Chapter 2
3.Data structure.
2.Control flow,multithreading
THREADS
MULTITHREADING
EXCEPTION HANDLING
ERRORS
LEARNING PYTHON
3.Loops
2.Control flow,multithreading
EXCEPTION HANDLING
USING MODULES
2.Variables(using in strings)
3. For Loops
2.Functions
3.Lists
Course contents:
DATA TYPES
FOR LOOPS
LISTS
PYTHON—DATA ANALYSIS
2.Anagrams
3. For Loops
2.Arrays
3.Solving programms
Course contents:
ANAGRAMS
STRINGS
FOR LOOPS
ARRAYS
3. Airithmetic operations
2.Data frames
FUNCTIONS
OPERATORS
DATA FRAMES
DEBUGGING
ADVANCED PYTHON
3. Airithmetic operations
2.Data frames
OPERATORS
DATA FRAMES
DEBUGGING
STRINGS
2.Creating requets
PENDULUM
REQUESTS
DEBUGGING
FILES
2.Contrast
3. creating harmony
2.Grids
3.Attributes
Course contents:
CONTRAST
GRIDS
IMAGES
PROPORTION
PRINCIPLE OF UX DESIGNING
2.Working of ux
3. Basic of figma
2.Introduction to adobe
3.Handling ux projects
Course contents:
BASIC ADOBE
DESIGNING
UX FOUNDATIONS
BASIC FIGMA
PERSUASION IN UX DESIGNING
2.Creating credibility in UX
ANCHORS
PERSUASIVE DESIGN
CREDIBILITY IN UX
2.3D transforms
3.Layout tecqniques
Course contents:
2.Creating prototypes
3.Editing graphics in XD
Course contents:
BASIC XD
GRAPHICS IN XD
3.Using Layouts
DESIGNING FILES
2.Sketching
3.Digital tools
UX DESIGNING
SKETCHING
DIGITAL TOOL
incidnts
Course contents:
WORK
CRYPTO MINING
COMPILENCE
3.frameworks
UNDERSTANDING GRC
3.Cloud resilience
2.Cryptography
CLOUD SERVICES
RISK
DATA SECURITY
incidnts
Course contents:
WORK
CRYPTO MINING
3.Managing risks
AI/ML
HACKING
PROTECTING DATA
CYBER LAWS
2.Implementing controls
Course contents:
IT RISKS
HANDLING THREATS
TYPES OF RISKS
● Format as shown for chapter 2 need to be followed for each chapter i.e. each course of learning
path.
● All the chapter heading should be written in 16 pts bold, all capital letters.
● The font type should be Times New Roman. The font size should be 14 for headings and 12 for
normal text.
● All the headings should be in bold and all the other content should be normal.
● The text should be justified throughout the report except for headings for figures, tables etc.
● The line spacing should be fixed at 1.15 for the entire report.
● The page numbers should be mentioned at bottom middle position of every page.
● The hard copy of the report should be spiral bound with first page as thick cover.