{"id":7405,"date":"2021-08-26T18:05:47","date_gmt":"2021-08-26T18:05:47","guid":{"rendered":"https:\/\/aju.ac.zw\/newaju2021\/?page_id=7405"},"modified":"2021-09-14T08:51:31","modified_gmt":"2021-09-14T08:51:31","slug":"ict-executive-certificates","status":"publish","type":"page","link":"https:\/\/aju.ac.zw\/newaju2021\/ict-executive-certificates\/","title":{"rendered":"ICT Executive Certificates"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text]<\/p>\n<h4>Courses<\/h4>\n<p>[\/vc_column_text][vc_tta_accordion style=&#8221;modern&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Cyber Security and Forensics&#8221; tab_id=&#8221;1630001332609-0de9d58e-ca0b&#8221;][vc_column_text]In the digital age, hackers and cyber-terrorists have endless opportunities to exploit individuals, government institutions, NGOs and even large companies. As such, the skills of cybersecurity and computer forensics professionals are in high demand. This executive certificate equips students with skills to implement and maintain a robust information security system, with the intention of defending an organisation from cyberattacks. Students also learn to deal with the flip side of the coin, the event that their efforts fail, and a breach is made; they learn to identify the hacks, understand the source and recover compromised data.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Big Data and Artificial Intelligence&#8221; tab_id=&#8221;1630001332625-e95bc8c0-f9f4&#8243;][vc_column_text]The digital universe is growing at a phenomenal rate and, along with it, data is expanding too. Data comes from everywhere \u2013 social media posts, mobile phone signals, digital libraries, blogs, remote sensing, online network transmissions, your online footprints, etc. This data has come to be known as &#8220;big data&#8221;.\u00a0 By its nature, big data is a collection of structured, semi-structured and unstructured data. Some may describe big data as \u201cchaotic\u201d. Be that as it may, hidden within big data lies valuable information that can be extrapolated to reveal critical patterns and behaviours such as emerging market preferences and opinions in social networks. It is not surprising therefore that data has become the most treasured resource in the world today as organisations are becoming more and more dependent on professionals who can effectively and efficiently interpret big data for accurate and profitable decision making.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Digital Innovation&#8221; tab_id=&#8221;1630001419266-2cfcc74f-111a&#8221;][vc_column_text]The fast paced digital world and the fierce nature of global competition demands that businesses not only adopt and fully embrace technology, but continue to apply emerging digital technologies in new products and services to survive. This executive certificate centres on the impact of digital technologies on society in general and modern companies in particular. It is designed to equip students to confidently conceive, lead and execute digital innovations and develop new models for existing and insurgent businesses. The student gains an understanding of the strategic use of digital technologies for innovation and business transformation purposes.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Object Oriented Programming and mobile Applications&#8221; tab_id=&#8221;1630001465634-da20b9c3-0009&#8243;][vc_column_text]The course focuses on hiring the popular Python and Java programming languages. \u00a0Both are open source and provide an excellent foundation to object oriented programming. Python, in particular, offers versatility for diverse fields from web and game development to machine learning, AI, scientific computing and academic research. Students are also introduced to elementary mobile application programming using Android software development. The combination of Java, Python and Android programming is a valuable skillset to have in any programmer&#8217;s stack because of the combinational diverse usage.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Mobile Data Collection and Analysis (ODK)&#8221; tab_id=&#8221;1630001508638-68e8b304-5cf6&#8243;][vc_column_text]Modern technology now allows the data capturing process to be done in real-time using mobile devices that enumerators use to enter data whilst in the field. This data is exported directly into a centralised database for processing and analysis.<\/p>\n<p>Open Data Kit (ODK) is an open-source suite of tools that allows data collection using Android mobile devices and data submission to an online server. This training will equip the participants with skills to author, field and manage mobile data collection platform using ODK.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_btn title=&#8221;Register for program&#8221; color=&#8221;success&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;stm-lnr-check&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Ftest2.trikotecdev.xyz%2Fwp%2Fapplications%2F|title:apply%20online&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][stm_portfolio_information posts_per_row=&#8221;1&#8243; facebook=&#8221;https:\/\/www.facebook.com\/arrupejesuituniversity&#8221; twitter=&#8221;https:\/\/twitter.com\/aju2018?s=11&#8243; instagram=&#8221;https:\/\/instagram.com\/arrupejesuituniversity?utm_medium=copy_link&#8221;][vc_single_image image=&#8221;7993&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text] Courses [\/vc_column_text][vc_tta_accordion style=&#8221;modern&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Cyber Security and Forensics&#8221; tab_id=&#8221;1630001332609-0de9d58e-ca0b&#8221;][vc_column_text]In the digital age, hackers and cyber-terrorists have endless opportunities to exploit individuals, government institutions, NGOs and even large companies. As such, the skills of cybersecurity and computer forensics professionals are in high demand.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7405","page","type-page","status-publish","hentry"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","consulting-image-350x204-croped":"","consulting-image-350x250-croped":"","consulting-image-1110x550-croped":"","consulting-image-50x50-croped":"","consulting-image-320x320-croped":"","consulting-image-255x182-croped":"","consulting-image-350x195-croped":"","consulting-image-900x640-croped":"","consulting-image-900w":"","consulting-image-358x250-cropped":""},"post_excerpt_stackable":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text] Courses [\/vc_column_text][vc_tta_accordion style=&#8221;modern&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Cyber Security and Forensics&#8221; tab_id=&#8221;1630001332609-0de9d58e-ca0b&#8221;][vc_column_text]In the digital age, hackers and cyber-terrorists have endless opportunities to exploit individuals, government institutions, NGOs and even large companies. As such, the skills of cybersecurity and computer forensics professionals are in high demand. This executive certificate equips students with skills to implement and maintain a robust information security system, with the intention of defending an organisation from cyberattacks. Students also learn to deal with the flip side of the coin, the event that their efforts fail, and a&hellip;<\/p>\n","category_list":"","author_info":{"name":"admin","url":"https:\/\/aju.ac.zw\/newaju2021\/author\/admin\/"},"comments_num":"0 comments","_links":{"self":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/comments?post=7405"}],"version-history":[{"count":8,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7405\/revisions"}],"predecessor-version":[{"id":8033,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7405\/revisions\/8033"}],"wp:attachment":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/media?parent=7405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}