[go: up one dir, main page]

0% found this document useful (0 votes)
16 views56 pages

3rd sem

The document is a report submitted by Tharun S for online certifications in Python programming, UI/UX design, and cybersecurity as part of his Bachelor of Computer Applications degree. It details the courses undertaken, their durations, and the skills gained, highlighting the importance of these skills in today's digital landscape. The report includes acknowledgments, a declaration of originality, and certification from faculty mentors.

Uploaded by

tharungowda295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views56 pages

3rd sem

The document is a report submitted by Tharun S for online certifications in Python programming, UI/UX design, and cybersecurity as part of his Bachelor of Computer Applications degree. It details the courses undertaken, their durations, and the skills gained, highlighting the importance of these skills in today's digital landscape. The report includes acknowledgments, a declaration of originality, and certification from faculty mentors.

Uploaded by

tharungowda295
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

SUMMER TERM 2024

REPORT FOR ONLINE


CERTIFICATIONS

Submitted by

THARUN S
USN: 23BCAR0342
Semester : 3rd
in partial fulfillment for the award of the degree of

BACHELOR OF COMPUTER APPLICATIONS WITH


SPECIALIZATION IN INTERNET OF THINGS (IoT)

DEPARTMENT OF COMPUTER SCIENCE & IT

JAIN KNOWLEDGE CAMPUS


JAYANAGAR 9TH BLOCK
BANGALORE - 560069

JULY - 2024
DEPARTMENT OF COMPUTER SCIENCE & IT

Jain Knowledge Campus


Jayanagar 9th Block Bangalore, 560069

This is to certify that the learning path titled

[LEARNING PATH]

is the bonafide record of online courses undergone by

THARUN S

USN: 23BCAR0342

BCA with Specialization in Internet of things during the summer term


July-2024

_______________________ ______________________________

Dr.M.Santhalakshmi Dr. K.Suneetha


Faculty Mentor Head, School of CS & IT
JAIN (Deemed-to-be University) JAIN (Deemed-to-be University)
DECLARATION

I THARUN S affirm that the report on online certifications for learning path / online courses titled
“Python programming language” of duration (20 hours), undergone by me from Linkedin learning
resource , being submitted in partial fulfillment for the award of BACHELOR OF COMPUTER
APPLICATIONS WITH SPECIALIZATION [Internet of things] is the original work carried out by
me and has not been submitted for award of any other degree or diploma, either in this or any other
University.

(Signature of the Candidate)

THARUN S

USN : 23BCAR0342
CERTIFICATE

This is to certify that THARUN S with USN: 23BCAR0342 of Bachelor of Computer Applications
in the School of Computer Science and IT, has undergone the online learning path titled “PYTHON
PROGRAMMING LANGUAGE ” from Linkedln learning resource as part of summer term June-
July, 2024 under my supervision. No part of this report was submitted for the award of any degree
or diploma prior to any other university/institution till this date and is the authentic work of student.

______________________________
Tharun s
Dr.M.Santhalakshmi
JAIN (Deemed-to-be University)
ACKNOWLEDGEMENT

Learning Python programming language, UI/UX designing, and cybersecurity has been a transformative
journey that has equipped me with a versatile skill set crucial for today's digital landscape. Python, with
its simplicity and power, has enabled me to automate tasks, build robust applications, and analyze
complex datasets with ease. Understanding UI/UX principles has allowed me to craft engaging and
intuitive user interfaces that prioritize user experience and satisfaction. Meanwhile, diving into
cybersecurity has provided me with the knowledge and tools to implement robust security measures,
protect against cyber threats, and ensure the confidentiality and integrity of sensitive information.

Throughout this learning process, I have been fortunate to benefit from a wealth of online resources,
tutorials, and communities that have supported and guided me every step of the way. Each discipline—
Python programming, UI/UX designing, and cybersecurity not only expanded my technical proficiency
but also enhanced my problem-solving abilities and critical thinking skills.

Looking ahead, I am excited to leverage these skills to create innovative solutions, contribute
meaningfully to projects, and navigate the dynamic challenges of the tech industry. The journey of
learning Python, UI/UX designing, and cybersecurity has not only opened doors to exciting career
opportunities but has also empowered me to make a positive impact in the digital world.

Signature of student ____________

Name of student : THARUN.S


TABLE OF CONTENTS

S .NO TOPIC PAGE


NO
Abstract

Certificates

List of Tables

1 CHAPTER 1: INTRODUCTION TO THE LEARNING Page Nos.


PATH: This chapter should give a brief introduction about Start-End
the learning path, courses in the learning path, reason for
choosing it and overall learning outcomes from the learning
path.

2 CHAPTER 2 onwards: Course title Page No.


Prepare One chapter for each course under the learning Start-End
path.
3 CONCLUSIION AND FUTURE ENHANCEMENT Page No.
Start-End
REFERENCES
ABSTRACT

Python is one of the most commonly used dynamic languages for many large organizations. Supported
on all major operating systems, it comes pre-installed on Macs, as well as most Linux and Unix-based
systems. In this course, we will learn all the essentials of learning and using Python. Learn how
computers think, as well as how to install Python, pip, and Jupyter Notebook and the basics of writing a
program. Explore variables and types, operators, functions, classes, objects, and more. Go over basic data
types like ints and floats, Booleans, and strings. Deep dive into basic data structures, control flow,
functions, classes, and objects. Find out how to handle errors and exceptions, as well as threads and
processes. Plus, discover how to work with different types of files in Python, pass command-line
arguments to your Python script, and create modules and packages.

UX research helps a business by saving development or process costs, increasing customer happiness and
loyalty, and uncovering opportunities to earn more. In this course, Amanda Stockwell shows you
practical techniques to improve your UX research to better inform fast-moving projects. Get an overview
of different types of research methodologies, usability tests, and conducting interviews. Review card
sorts, eye tracking, multivariate testing, and desirability testing. Go over the best uses of expert reviews,
surveys, diary studies, participatory design workshops, and personas. Learn how to choose the right
research method for your goals, then dive into environmental considerations, such as in-house versus
external, agile versus waterfall, and more

Cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and
systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits
and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He
introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure
as a service (IaaS) and the different deployment models available. He then reviews offerings from
Microsoft Azure, Amazon Web Services, and Google Apps.

Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT
professional. In this course, we get to know how to protect data in a digital world and covers the basics
of Information security. We begin by discussing how to layer defenses and outlines the power of using
adaptive security controls.
List of Tables
Table No Title Page

Table 1.1 Courses covered

Table 2.1 Courses covered

Table 7.1 Courses covered


CHAPTER 1

INTRODUCTION TO THE LEARNING PATH:

Python—the popular and highly-readable object-oriented language—is both powerful and relatively easy
to learn.. Python is one of the most commonly used dynamic languages for many large organizations. In
this course Deep dive into basic data structures, control flow, functions, classes, and objects. Find out
how to handle errors and exceptions, as well as threads and processes.
1.1 Courses covered :-
1. Python essential training : (4h 22m).
2. Learning python : (3h 5m).
3. Python for non-programmers : (2h 11m).
4. Python data analysis : (2h 30m).
5. Python in excel : (1h 40m) , Python functions fro data science (1h 30m).
6. Advanced python : (2h 27m).
7. Python essential librearies : (2h 15m).

UI/UX-- Layout and composition are the building blocks of graphic design This course tells about the
elements, principles, and tools is needed to create a successful composition and layout and teaches how
tools like grids, proportions, and color can lead to more compelling compositions and also tought me how
to use the designing apps like adobe,figma and gave me the basic necessity foundations for ui ux
designing.Transitioning the Photoshop-based web design process to a more UX-based workflow by
adding Adobe XD. Vector-based XD allows for faster design revisions, easy adaptability to a variety of
device sizes, and quicker development of prototypes to get customer buy-in before the development
process begins.
1.2 Courses covered :-
1. Graphic designing foundations : (2h 3m) , Principle of UX designing : (3h 13m)
2. UX Foundation : research : (1h 37m)
3. Persuasion in UX : (3h 52m)
4. Adobe essential training : (3h 12m)+Web designing process from Adobe : (1h 41m)
5. Figma for UX design : (1h 35m) , Sketching for UX designers : (1h 35m)
Cloud computing (cyber security)-- is a shared responsibility, especially when it comes to keeping your
data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud
technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to
mitigate those risks. He introduces concepts such as software as a service , platform as a service and
infrastructure as a service and the different deployment models available. He then reviews offerings
from Microsoft Azure, Amazon Web Services, and Google Apps.
1.3 Course covered:-
1. Cyber security : foundations : (2h 3m)

2. Cyber security foundations : governence risk and complaince : (1h 14m)

3. Cyber security with cloud computing : (2h 27m)

4. Practicle Cyber security for IT professinoals : (2h 26m)

5. Risk managment esstential training : (1h 38m)

6. Ethical hacking : Introduction to ethical hacking : (2h)

Cybersecurity, Python programming, and UI/UX design are all crucial in today's digital landscape for
several reasons. Python is a powerful and versatile programming language used extensively in
cybersecurity for scripting, automation, and developing security tools. Enhances usability and satisfaction
by focusing on the interaction between users and products. In cybersecurity tools, good UX design
ensures that security features are intuitive and effectively utilized by users.Cyber security It helps protect
systems, networks, and data from cyber threats like hacking, malware, and phishing attacks.
Chapter 2

PYTHON ESSENTIAL TRAINING

S. No. Heading Value

1. Course title Python essential training

2. Course duration 4hrs . 22minutes

3. Course start date 16-06-2024

4. Course end date 16-06-2024

5. Names of authors/ creators 1. Ryan Mitchell.

6. Skills gained 1.Functions and operator

2.Variables and types.

3.Data structure.

7. Unique learning outcomes (at least 3) 1.Threads and process.

2.Control flow,multithreading

3.Handling exceptions and errors.


Course contents:

THREADS

MULTITHREADING

EXCEPTION HANDLING

ERRORS

Detailed description of course:


Chapter 2.1

LEARNING PYTHON

S. No. Heading Value

1. Course title Learning python

2. Course duration 3hrs . 5minutes

3. Course start date 17-06-2024

4. Course end date 17-06-2024

5. Names of authors/ creators 1.Joe Marini

6. Skills gained 1.Functions and operator

2.Variables and expression.

3.Loops

7. Unique learning outcomes (at least 3) 1.Working with files

2.Control flow,multithreading

3.Fetching internet data


Course contents:

WORKING WITH FILES

WORKING WITH CALENDE

EXCEPTION HANDLING

USING MODULES

Detailed description of course:


Chapter 2.2

PYTHON FOR NON-PROGRAMMERS

S. No. Heading Value

1. Course title Python for non-programmers

2. Course duration 2hrs . 11minutes

3. Course start date 18-06-2024

4. Course end date 18-06-2024

5. Names of authors/ creators 1.Nick walter

6. Skills gained 1.Data types:-ints and floats

2.Variables(using in strings)

3. For Loops

7. Unique learning outcomes (at least 3) 1.Splitting a string

2.Functions

3.Lists
Course contents:

WORKING WITH LISTS

DATA TYPES

FOR LOOPS

LISTS

Detailed description of course:


Chapter 2.3

PYTHON—DATA ANALYSIS

S. No. Heading Value

1. Course title Python data analysis

2. Course duration 2hrs . 30minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1. Michele Vallisneri

6. Skills gained 1.Using python in clouds

2.Anagrams

3. For Loops

7. Unique learning outcomes (at least 3) 1.Strings

2.Arrays

3.Solving programms
Course contents:

ANAGRAMS

STRINGS

FOR LOOPS

ARRAYS

Detailed description of course:


Chapter 2.4

PYTHON IN EXCEL AND DATA SCIENCE

S. No. Heading Value

1. Course title Python in excel & data science

2. Course duration 3hrs . 10minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1. Joe marini


2.Lavanya vijayan

6. Skills gained 1.Built in functions

2.Advance functions, map(),zip(),filter

3. Airithmetic operations

7. Unique learning outcomes (at least 3) 1.Debugging

2.Data frames

3.Working with data frames


Course contents:

FUNCTIONS

OPERATORS

DATA FRAMES

DEBUGGING

Detailed description of course:


Chapter 2.5

ADVANCED PYTHON

S. No. Heading Value

1. Course title Advanced Python

2. Course duration 2hrs . 27minutes

3. Course start date 19-06-2024

4. Course end date 19-06-2024

5. Names of authors/ creators 1.Nick walter

6. Skills gained 1.Built in functions

2.Advance functions, map(),zip(),filter

3. Airithmetic operations

7. Unique learning outcomes (at least 3) 1.Debugging

2.Data frames

3.Working with data frames


Course contents:

OPERATORS

DATA FRAMES

DEBUGGING

STRINGS

Detailed description of course:


Chapter 2.6

PYTHON ESSENTIAL LIBRERIES

S. No. Heading Value

1. Course title Python essential libreries

2. Course duration 2hrs . 15minutes

3. Course start date 20-06-2024

4. Course end date 20-06-2024

5. Names of authors/ creators 1.Joe Marini

6. Skills gained 1.Introduction to pendulum

2.Creating requets

3. Working with responses

7. Unique learning outcomes (at least 3) 1.Files

2.Working with files

3.Creayting and deleting files


Course contents:

PENDULUM

REQUESTS

DEBUGGING

FILES

Detailed description of course:


Chapter 3

GRAPHICS DESIGNING : FOUNDATIONS

S. No. Heading Value

1. Course title Graphic designing : foundations

2. Course duration 3hrs . 13minutes

3. Course start date 24-06-2024

4. Course end date 24-06-2024

5. Names of authors/ creators 1.Sean Adams

6. Skills gained 1.Introduction to layout elements

2.Contrast

3. creating harmony

7. Unique learning outcomes (at least 3) 1.Symmetry

2.Grids

3.Attributes
Course contents:

CONTRAST

GRIDS

COMBINING WORDS WITH

IMAGES

PROPORTION

Detailed description of course:


Chapter 3.1

PRINCIPLE OF UX DESIGNING

S. No. Heading Value

1. Course title Principle of ux designing

2. Course duration 3hrs . 13minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1.Amanda stockwell

6. Skills gained 1.Basic of ux

2.Working of ux

3. Basic of figma

7. Unique learning outcomes (at least 3) 1.Using adobe basic

2.Introduction to adobe

3.Handling ux projects
Course contents:

BASIC ADOBE

DESIGNING

UX FOUNDATIONS

BASIC FIGMA

Detailed description of course:


Chapter 3.2

PERSUASION IN UX DESIGNING

S. No. Heading Value

1. Course title Persuasion in ux designing

2. Course duration 3hrs . 52minutes

3. Course start date 29-06-2024

4. Course end date 29-06-2024

5. Names of authors/ creators 1.Chris nodder

6. Skills gained 1.Creating anchors

2.Harnessing illogical reactions

3. Dark patterns vs persuasive design

7. Unique learning outcomes (at least 3) 1.Ethics of persuasion designing

2.Creating credibility in UX

3.Limits of acceptable persuasion


Course contents:

ANCHORS

PERSUASIVE DESIGN

CREDIBILITY IN UX

Detailed description of course:


Chapter 3.3

ADOBE ESSENTIAL TRAINING : DESIGN

S. No. Heading Value

1. Course title Adobe essential training : design

2. Course duration 3hrs . 12minutes

3. Course start date 30-06-2024

4. Course end date 30-06-2024

5. Names of authors/ creators 1.Dani Beaumont

6. Skills gained 1.Basic of UI

2. Learning gradients,shapesand lines

3. Placing and masking images

7. Unique learning outcomes (at least 3) 1.Learning text controls

2.3D transforms

3.Layout tecqniques
Course contents:

BASIC USER INTERFACE

DEALING WITH IMAGES

GRADIENTS AND EFFECTS

LAYOUTS AND TOOLS

Detailed description of course:


Chapter 3.4

ADOBE PHOTOSHOP XD : WEB DESIGNING PROCESS

S. No. Heading Value

1. Course title Adobe photoshop:web designing


process
2. Course duration 1hrs . 41minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1.Sue Jenkins

6. Skills gained 1.Basic of XD

2.Creating elements in adobe

3.Web designing stratergies

7. Unique learning outcomes (at least 3) 1.Designing desktop

2.Creating prototypes

3.Editing graphics in XD
Course contents:

BASIC XD

BASIC ADOBE USAGE

BASIC WEB DESIGNING

GRAPHICS IN XD

Detailed description of course:


Chapter 3.5

FIGMA FOR UX DESIGNING : INTRODUCTION

S. No. Heading Value

1. Course title Figma for ux designing

2. Course duration 1hrs . 35minutes

3. Course start date 30-06-2024

4. Course end date 30-06-2024

5. Names of authors/ creators 1. Eric Nordquist

6. Skills gained 1.Creating project

2.Prototyping with smart animations

3.Using Layouts

7. Unique learning outcomes (at least 3) 1.Designing a file

2.Applying auto layout

3.Figma for designing


Course contents:

DESIGNING FILES

BASIC FIGMA USING

Detailed description of course:


Chapter 3.6

SKETCHING FOR UX DESIGNERS

S. No. Heading Value

1. Course title Sketching for UX designers

2. Course duration 1hrs . 35minutes

3. Course start date 04-07-2024

4. Course end date 04-07-2024

5. Names of authors/ creators 1.Matt Corrall

6. Skills gained 1.UX Designing

2.Sketching

3.Digital tools

7. Unique learning outcomes (at least 3) 1.Sketching formats

2.Annotations and label

3.Hatching and shading


Course contents:

UX DESIGNING

SKETCHING

DIGITAL TOOL

Detailed description of course:


Chapter 4

CYBER SECURITY : FOUNDATIONS

S. No. Heading Value

1. Course title Cyber security : foundations

2. Course duration 2hrs . 3minutes

3. Course start date 07-07-2024

4. Course end date 07-07-2024

5. Names of authors/ creators 1.Malcolm Shore

6. Skills gained 1. Understanding cyber kill chains

2.Understanding pre cyber threats

3.Analyzing cyber threats and controls

7. Unique learning outcomes (at least 3) 1.Protecting payment card data

2.Securing things on internet

3.Managaing and detecting cyber

incidnts
Course contents:

CYBER KILL CHAINS

HANDLING RISK FRAME

WORK

HUNTING FOR THREATS

CRYPTO MINING

Detailed description of course:


Chapter 4.1

CYBER SECURITY FOUNDATIONS : GOVERNENCE , RISK AND

COMPILENCE

S. No. Heading Value

1. Course title Cyber security foundations


governence , risk
2. Course duration 1hrs . 14minutes

3. Course start date 07-07-2024

4. Course end date 07-07-2024

5. Names of authors/ creators 1.AJ Yawn

6. Skills gained 1. Understanding GRC

2.GRC tips and stratergies

3.frameworks

7. Unique learning outcomes (at least 3) 1.Understading everything about GRC


Course contents:

UNDERSTANDING GRC

Detailed description of course:


Chapter 4.2

CYBER SECURITY : CLOUD COMPUTING

S. No. Heading Value

1. Course title Cyber security : Cloud computing

2. Course duration 2hrs . 27minutes

3. Course start date 09-07-2024

4. Course end date 09-07-2024

5. Names of authors/ creators 1.Malcolm Shore

6. Skills gained 1. Cloud foundations and services

2.Understanding google apps

3.Cloud resilience

7. Unique learning outcomes (at least 3) 1.Cloud security management

2.Cryptography

3.Data security and encryption


Course contents:

CLOUD SERVICES

ANATOMY OF SERVICE FAILOURE

ARCHITECTING GOVERNENCE AND

RISK

DATA SECURITY

Detailed description of course:


Chapter 4.3

PRACTICLE CYBER SECURITY FOR IT PROFESSIONALS

S. No. Heading Value

1. Course title Practicle cyber security for it


professionals
2. Course duration 2hrs . 26minutes

3. Course start date 10-07-2024

4. Course end date 10-07-2024

5. Names of authors/ creators 1.Malcolm Shore

6. Skills gained 1. Understanding cyber kill chains

2.Protecting network from cyber attacks

3.Analyzing cyber threats and controls

7. Unique learning outcomes (at least 3) 1.Protecting payment card data

2.Securing things on internet

3.Managaing and detecting cyber

incidnts
Course contents:

CYBER KILL CHAINS

HANDLING RISK FRAME

WORK

HUNTING FOR THREATS

CRYPTO MINING

Detailed description of course:


Chapter 4.4

ETHICAL HACKING : INTRODUCTION

S. No. Heading Value

1. Course title Ethical hacking : introduction

2. Course duration 2hrs

3. Course start date 19-07-2024

4. Course end date 19-07-2024

5. Names of authors/ creators 1.Lisa Bock

6. Skills gained 1.Using AI/ML in hacking

2.Modeling threats and handling

3.Managing risks

7. Unique learning outcomes (at least 3) 1.Outlining the type of hackers

2.Analization of ethical hacker

3.understanding cyber laws


Course contents:

AI/ML

HACKING

PROTECTING DATA

CYBER LAWS

Detailed description of course:


Chapter 4.5

RISK MANAGEMENT ESSENTIAL TRAINING

S. No. Heading Value

1. Course title Risk management essential training

2. Course duration 1hrs . 38minutes

3. Course start date 10-07-2024

4. Course end date 10-07-2024

5. Names of authors/ creators 1.Kip Boyle

6. Skills gained 1.Understanding IT Risks

2.Handling the risks and threats

3.Types of risks & management

7. Unique learning outcomes (at least 3) 1.IT risk management technique

2.Implementing controls
Course contents:

IT RISKS

HANDLING THREATS

TYPES OF RISKS

IMPLIMENTING OPERATING AND


VALIDATING CONTROLS

Detailed description of course:


Report Preparation Guidelines:

● The report should be prepared on A4 letter page size.

● Format as shown for chapter 2 need to be followed for each chapter i.e. each course of learning

path.

● All the chapter heading should be written in 16 pts bold, all capital letters.

● The font type should be Times New Roman. The font size should be 14 for headings and 12 for

normal text.

● All the headings should be in bold and all the other content should be normal.
● The text should be justified throughout the report except for headings for figures, tables etc.

● The line spacing should be fixed at 1.15 for the entire report.

● The page numbers should be mentioned at bottom middle position of every page.

● The hard copy of the report should be spiral bound with first page as thick cover.

You might also like