Welcome to Everything Inc. Sites. This is your first post. Edit or delete it, then start writing!
Welcome to Everything Inc. Sites. This is your first post. Edit or delete it, then start writing!
Session No# | Session Type | Session Details | Day No. # | Duration Hrs |
1 | EL-F2F | Overview of networking concepts. | 1-1 | 1.5 |
Add New | Add New | Introduction to networking models (OSI and TCP/IP). | Add New | Add New |
Add New | Add New | Key terms and definitions. | Add New | Add New |
2 | FC-F2F | Understanding Network Infrastructure | 1-1 | 1.5 |
3 | EL-F2F | Network topologies, routers, switches, and other network devices. | 1-2 | 1.5 |
Add New | Add New | Physical and logical network design principles. | Add New | Add New |
4 | FC-F2F | Connecting Network Components | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1: Network Design Proposal | 1-3 | 3 |
6 | EL-F2F | Network Management Systems | 1-4 | 1.5 |
Add New | Add New | Monitoring network performance (bandwidth, latency, etc.). | Add New | Add New |
Add New | Add New | Tools for network monitoring and their uses | Add New | Add New |
7 | FC-F2F | Monitoring and Managing Network Operations | 1-4 | 1.5 |
8 | EL-F2F | DNS, DHCP, VPN, and other network services. | 1-5 | 1.5 |
Add New | Add New | Configuring and managing network services. | Add New | Add New |
9 | FC-F2F | Familiarize Network Services | 1-5 | 1.5 |
10 | AS-F2F | Assignment 2: Network Configuration Lab | 2-1 | 3 |
11 | EL-F2F | Wired vs. wireless networks. | 2-2 | 1.5 |
Add New | Add New | Security and performance considerations. | Add New | Add New |
Add New | Add New | Designing and deploying wired and wireless networks | Add New | Add New |
12 | FC-F2F | Understand Wired and Wireless Networks | 2-2 | 1.5 |
13 | EL-F2F | Overview of troubleshooting methodologies (top-down, bottom-up, divide and conquer) | 2-3 | 1.5 |
Add New | Add New | Tools and utilities for network troubleshooting | Add New | Add New |
Add New | Add New | Common network issues and their solutions | Add New | Add New |
14 | FC-F2F | Advanced Troubleshooting Techniques | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3: Network Monitoring and Performance Analysis | 2-4 | 3 |
16 | EL-F2F | Principles of secure network design | 2-5 | 1.5 |
Add New | Add New | Strategies for ensuring network reliability and scalability | Add New | Add New |
Add New | Add New | Best practices for network architecture | Add New | 1.5 |
17 | FC-F2F | Familiarize security, reliability, and scalability in network design | 2-5 | 1.5 |
18 | EL-F2F | Emerging trends in network infrastructure | 3-1 | 1.5 |
19 | FC-F2F | Synthesize knowledge from previous sessions to design a secure, reliable, and scalable network infrastructure | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4: Network Security and Troubleshooting | 3-2 | 3 |
21 | PM-F2F | Design a secure and efficient network topology for a small business. | 3-3 | 3 |
22 | PM-F2F | Configure IPsec policies, back up configurations, and document server information. | 3-4 | 3 |
23 | PM-F2F | Troubleshoot service and security issues, including scanning server segments. | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per Learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | EL-F2F | Identity management and its importance in cybersecurity | 1-1 | 1.5 |
2 | FC-F2F | Understanding and Implementing Identity Management | 1-1 | 1.5 |
3 | EL-F2F | Overview of access control models (Discretionary Access Control, Mandatory Access Control, Role-Based Access Control) | 1-2 | 1.5 |
Add New | Add New | Discussion on access control technologies like Multi-Factor Authentication (MFA) and biometrics. | Add New | Add New |
4 | FC-F2F | Access Control Models and Technologies | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1: Identity Management Plan | 1-3 | 3 |
6 | EL-F2F | Overview of protection strategies for different platforms (servers, workstations, mobile devices), endpoint security tools and practices. | 1-4 | 1.5 |
7 | FC-F2F | Platform Protection Strategies | 1-4 | 1.5 |
8 | EL-F2F | Overview of encryption methods (symmetric, asymmetric) and protocols (SSL/TLS, AES, RSA). | 1-5 | 1.5 |
Add New | Add New | Introduction to application security principles. | Add New | Add New |
Add New | Add New | Discussion on securing applications at different stages of the software development lifecycle. | Add New | Add New |
9 | FC-F2F | Data Encryption and Application Security | 1-5 | 1.5 |
10 | AS-F2F | Assignment 2: Access Control Implementation | 2-1 | 3 |
11 | EL-F2F | Security operations centers (SOCs) and their role. | 2-2 | 1.5 |
Add New | Add New | Overview of incident response phases (preparation, identification, containment, eradication, recovery, lessons learned). | Add New | Add New |
Add New | Add New | Best practices for incident management and recovery. | Add New | Add New |
12 | FC-F2F | Security Operations and Incident Response | 2-2 | 1.5 |
13 | EL-F2F | Overview of GRC concepts and their significance in security management. | 2-3 | 1.5 |
Add New | Add New | Strategies for implementing GRC within an organization. | Add New | Add New |
14 | FC-F2F | Governance, Risk, and Compliance (GRC) in Security Management | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3: Platform Protection through Threat Modeling and Risk Assessment | 2-4 | 3 |
16 | EL-F2F | Integration strategies for identity management and access control, interoperability and security during integration | 2-5 | 1.5 |
17 | FC-F2F | Integrating Identity Management with Access Control | 2-5 | 1.5 |
18 | EL-F2F | Emerging trends in identity management, access control, and security management | 3-1 | 1.5 |
19 | FC-F2F | Synthesize knowledge from previous sessions to implement Identity Management, Access Control and Security Management | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4: Data Encryption and Application Security | 3-2 | 3 |
21 | PM-F2F | Implement a Network Access Control System for managing identity | 3-3 | 3 |
22 | PM-F2F | Configure role-based access control to manage access across the network | 3-4 | 3 |
23 | PM-F2F | Design and deploy platform protection measure for network security | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per Learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration
Hrs |
1 | EL-F2F | Introduction to Data Analytics, Roles in Data, Power BI Essentials, Overview Power BI Features | 1-1 | 1.5 |
2 | FC-F2F | Introduction to Data Analytics, Data connections in Power BI | 1-1 | 1.5 |
3 | EL-F2F | Get data from files, Get data from NoSQL databases, Get data from online services. | 1-2 | 1.5 |
4 | FC-F2F | Introduction to Data Analytics, Data connections in Power BI | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1a: Explore fundamentals of data visualisation with Power BI. | 1-3 | 3 |
Add New | Add New | Assignment 1b: Get Data in Power BI Desktop. | Add New | Add New |
6 | EL-F2F | Clean, transform, and load data, Change data types and remove null values | 1-4 | 1.5 |
7 | FC-F2F | Data transformations and data modelling using Power BI | 1-4 | 1.5 |
8 | EL-F2F | Model data, Star schema design, Fact and Dimension Tables | 1-5 | 1.5 |
9 | FC-F2F | Data transformations and data modelling using Power BI | 1-5 | 1.5 |
10 | AS-F2F | Assignment 2a: Load Transformed Data in Power BI Desktop | 2-1 | 3 |
Add New | Add New | Assignment 2b: Design a Data Model in Power BI | Add New | Add New |
11 | EL-F2F | Introduction to DAX, DAX data types | 2-2 | 1.5 |
12 | FC-F2F | Data modelling with DAX | 2-2 | 1.5 |
13 | EL-F2F | DAX operators, Measures | 2-3 | 1.5 |
14 | FC-F2F | Data modelling with DAX | 2-3 | 1.5 |
15 | AS-F2F | Assignment-3: Create DAX Calculations in Power BI Desktop | 2-4 | 3 |
16 | EL-F2F | Data Visualizations, Tables and matrix visualization in Power BI reports, Card visualizations. Data slicers and filters. | 2-5 | 1.5 |
17 | FC-F2F | Power BI reports and visualizations. | 2-5 | 1.5 |
18 | EL-F2F | Dashboard Interactions, Drill down, Conditional formatting, and featured dashboards | 3-1 | 1.5 |
19 | FC-F2F | Power BI reports and visualizations. | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4a: Design a Report in Power BI Desktop. | 3-2 | 3 |
Add New | Add New | Assignment 4b: Enhance a Report in Power BI Desktop. | Add New | Add New |
21 | PM-F2F | Transform and clean data using Power BI for analysis | 3-3 | 3 |
Add New | Add New | Create data models to establish relationships and hierarchies in Power BI. | Add New | Add New |
22 | PM-F2F | Generate informative reports to present data insights in Power BI. | 3-4 | 3 |
Add New | Add New | Develop interactive dashboards for data visualization and exploration. | Add New | Add New |
23 | PM-F2F | Utilize Power BI features to showcase key metrics and trends effectively. | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per Learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | PM-F2F | Mentoring Support Project Kickoff and Planning | 1-1 | 2 |
Add New | Add New | Introduction to the capstone project goals, requirements, and timeline. | Add New | Add New |
Add New | Add New | Discussion of project scope, deliverables, and constraints. | Add New | Add New |
2 | PI-F2F | Q & A to understand more the Project and its deliverables | 1-1 | 1 |
3 | PM-F2F | Mentoring Support Project Kickoff and Planning | 1-2 | 2 |
Add New | Add New | Introduction to the capstone project goals, requirements, and timeline. | Add New | Add New |
Add New | Add New | Discussion of project scope, deliverables, and constraints. | Add New | Add New |
4 | PI-F2F | Q & A to understand more the Project and its deliverables | 1-2 | 1 |
5 | PM-F2F | Mentoring Support Design and Architecture | 1-3 | 2 |
Add New | Add New | Creation of project wireframes, mock ups, and prototypes. | Add New | Add New |
Add New | Add New | Discussion of system architecture and technology stack selection. | Add New | Add New |
6 | PI-F2F | Project implementation of the milestone tasks and submit | 1-3 | 1 |
7 | PM-F2F | Mentoring Support Design and Architecture | 1-4 | 2 |
Add New | Add New | Planning for database design, API endpoints, and user authentication. | Add New | Add New |
Add New | Add New | Review of design decisions and adjustments based on feedback. | Add New | Add New |
8 | PI-F2F | Project implementation of the milestone tasks and submit | 1-4 | 1 |
9 | PM-F2F | Mentoring Support Development Phase | 1-5 | 2 |
Add New | Add New | Project setup and implementation of application | Add New | Add New |
Add New | Add New | Follow coding standards and documentation practices | Add New | Add New |
10 | PI-F2F | Project implementation of the milestone tasks and submit | 1-5 | 1 |
11 | PM-F2F | Mentoring Support Development Phase | 2-1 | 2 |
Add New | Add New | Project setup and implementation of application | Add New | Add New |
Add New | Add New | Follow coding standards and documentation practices | Add New | Add New |
12 | PI-F2F | Project implementation of the milestone tasks and submit | 2-1 | 2 |
13 | PM-F2F | Mentoring Support Development Phase | 2-2 | 1 |
Add New | Add New | Project setup and implementation of application | Add New | Add New |
Add New | PM-F2F | Follow coding standards and documentation practices | Add New | Add New |
14 | PI-F2F | Project implementation of the milestone tasks and submit | 2-2 | 2 |
15 | PM-F2F | Mentoring Support Development Phase | 2-3 | 1 |
Add New | Add New | Project setup and implementation of application | Add New | Add New |
Add New | Add New | Follow coding standards and documentation practices | 2-3 Add New Add New | Add New |
16 | PI-F2F | Project implementation of the milestone tasks and submit | 2-3 | 2 |
17 | PM-F2F | Mentoring Support Development Phase | 2-4 | 1 |
Add New | Add New | Review of project setup, coding standards, documentation practices, and implementation | Add New | Add New |
18 | PI-F2F | Project implementation of the milestone tasks and submit | 2-4 | 2 |
19 | PM-F2F | Mentoring Support Development Phase | 2-5 | 1 |
Add New | Add New | Review of user interface and user experience | Add New | Add New |
20 | PI-F2F | Project implementation of the milestone tasks and submit | 2-5 | 2 |
21 | PM-F2F | Mentoring Support Development Phase | 3-1 | 1 |
Add New | Add New | Validating the backend design | Add New | Add New |
22 | PI-F2F | Project implementation of the milestone tasks and submit | 3-1 | 2 |
23 | PM-F2F | Mentoring Support Testing Phase | 3-2 | 1 |
Add New | Add New | Validating the implemented functionalities | Add New | Add New |
24 | PI-F2F | Project implementation of the milestone tasks and submit | 3-2 | 2 |
25 | PM-F2F | Mentoring Support Testing Phase | 3-3 | 1 |
Add New | Add New | Validating the implemented functionalities | Add New | Add New |
26 | PI-F2F | Project implementation of the milestone tasks and submit | 3-3 | 2 |
27 | PM-F2F | Mentoring Support Deployment Phase | 3-4 | 1 |
Add New | Add New | Discussion of deployment options and deployment process. | Add New | Add New |
28 | PI-F2F | Project implementation of the milestone tasks and submit | 3-4 | 2 |
29 | PM-F2F | Mentoring Support Project Closure | 3-5 | 1 |
Add New | Add New | Documentation and Sign-off | Add New | Add New |
30 | PI-F2F | Project implementation and submit final report | 3-5 | 2 |
31 | SA-F2F | Summative Assessment (Per learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | EL-F2F | Application development frameworks, tools, and methodologies. | 1-1 | 1.5 |
Add New | Add New | Range of server, scripting, and mark-up languages and their effectiveness for development. | Add New | Add New |
2 | FC-F2F | Familiarization of software development process and technical design in line with requirements using various tools and methodologies. | 1-1 | 1.5 |
3 | EL-F2F | Application development frameworks, tools, and methodologies. | 1-2 | 1.5 |
Add New | Add New | Range of server, scripting, and mark-up languages and their effectiveness for development. | Add New | Add New |
4 | FC-F2F | Familiarization of software development process and technical design in line with requirements using various tools and methodologies. | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1 - Application Design: Create a project proposal with the design of components and system architecture | 1-3 | 3 |
6 | EL-F2F | Internal and external quality, safety, and security requirements and standards for applications. | 1-4 | 1.5 |
Add New | Add New | Quality assurance practices for application development review. | Add New | Add New |
7 | FC-F2F | Applying internal and external quality, safety, and security standards to ensure the quality of the application while developing the components | 1-4 | 1.5 |
8 | EL-F2F | Internal and external quality, safety, and security requirements and standards for applications. | 1-5 | 1.5 |
Add New | Add New | Quality assurance practices for application development review. | Add New | Add New |
9 | FC-F2F | Applying internal and external quality, safety, and security standards to ensure the quality of the application while developing the components | 1-5 | 1.5 |
10 | AS-F2F | Assignment 2 - Application Development: Create the application components and web pages based on the functionality | 2-1 | 3 |
11 | EL-F2F | Guidelines and features for software and applications security of applications. | 2-2 | 1.5 |
12 | FC-F2F | Ensuring security of applications | 2-2 | 1.5 |
13 | EL-F2F | Guidelines and features for software and applications security of applications. | 2-3 | 1.5 |
14 | FC-F2F | Ensuring security of applications | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3 - Testing - Functional and Non-Functional Testing | 2-4 | 3 |
16 | EL-F2F | Virtual machines and containerization of application code set-up for deployment and utilization. | 2-5 | 1.5 |
17 | FC-F2F | Deploying the application in virtual machines and containerization | 2-5 | 1.5 |
18 | EL-F2F | Virtual machines and containerization of application code set-up for deployment and utilization. | 3-1 | 1.5 |
19 | FC-F2F | Deploying the application in virtual machines and containerization | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4 - Deployment - Deployment and utilization of the application code across multiple infrastructures. | 3-2 | 3 |
21 | PM-F2F | Translate business requirements and design the application | 3-3 | 3 |
22 | PM-F2F | Implement business logic and integrate front-end and back-end | 3-4 | 3 |
Add New | Add New | Integration of components | Add New | Add New |
23 | PM-F2F | Review the application for performance and effectiveness | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per Learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | EL-F2F | Adapt to Complexity using Empiricism and Scrum | 1-1 | 1.5 |
Add New | Add New | Manage Agile Teams and Organizations Effectively | Add New | Add New |
2 | FC-F2F | Complexity Mapping & Empirical Loop in Scrum | 1-1 | 1.5 |
3 | EL-F2F | Create Efficient Workflows and Plan a Product Release | 1-2 | 1.5 |
4 | FC-F2F | Defining Scrum Ecosystem & Agile Metrics | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1 - Complexity Mapping & Scrum Framework | 1-3 | 3 |
6 | EL-F2F | Build an Effective Scrum Team and Prioritize Valuable Business Outcomes | 1-4 | 1.5 |
7 | FC-F2F | Workflow Strategies & Scrum Team Agreements | 1-4 | 1.5 |
Add New | Add New | Preparing Scrum Ecosystem, Roles, and Product Backlog | Add New | Add New |
8 | EL-F2F | Implement Continuous Growth and Development | 1-5 | 1.5 |
9 | FC-F2F | Importance of continuous improvement in Scrum | 1-5 | 1.5 |
Add New | Add New | Fostering a culture of learning and development within teams | Add New | Add New |
10 | AS-F2F | Assignment 2 - Scrum support & Agility Metrics | 2-1 | 3 |
11 | EL-F2F | Conduct Effective Scrum Events for High Performing Teams | 2-2 | 1.5 |
12 | FC-F2F | Analyze the key Scrum events and their role in maintaining high team performance | 2-2 | 1.5 |
13 | EL-F2F | Building Scrum Teams & Product Backlog Case Study | 2-3 | 1.5 |
14 | FC-F2F | Review a case study focused on building Scrum teams | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3 - Workflow, Scrum Team Management, Scrum Roles & Product Backlog | 2-4 | 3 |
16 | EL-F2F | Sprint Planning, Workshop & Daily Scrum Case Study | 2-5 | 1.5 |
17 | FC-F2F | Examine a case study on Sprint Planning | 2-5 | 1.5 |
18 | EL-F2F | Learning Loop & Agile Ecosystem Case Study | 3-1 | 1.5 |
19 | FC-F2F | Learn Effective Sprint Review and Sprint Retrospective Practices | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4 - Sprint Planning Event & Artifacts | 3-2 | 3 |
21 | PM-F2F | Contextualizing Scrum Implementation | 3-3 | 3 |
22 | PM-F2F | Scrum Team Design, Ecosystem Prep & Facilitation Techniques | 3-4 | 3 |
23 | PM-F2F | Conducting Scrum Events Effectively | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | EL-F2F | Understanding Generative AI Models & Tools | 1-1 | 1.5 |
Add New | Add New | Fundamentals of Prompt Engineering | Add New | Add New |
Add New | Add New | Exploring Diverse Prompt Strategies for Effective AI Interactions | Add New | Add New |
2 | FC-F2F | The Future of Generative AI for Enterprises - Case Study | 1-1 | 1.5 |
3 | EL-F2F | Understanding Generative AI Models & Tools | 1-2 | 1.5 |
Add New | Add New | Fundamentals of Prompt Engineering | Add New | Add New |
Add New | Add New | Exploring Diverse Prompt Strategies for Effective AI Interactions | Add New | Add New |
4 | FC-F2F | The Future of Generative AI for Enterprises - Case Study | 1-2 | 1.5 |
5 | AS-F2F | Assignment 1: Investigate best practices for crafting effective prompts to achieve desired outcomes. | 1-3 | 3 |
6 | EL-F2F | Exploring case studies and examples of personalized web applications | 1-4 | 1.5 |
Add New | Add New | Responsible use of generative AI techniques in designing web applications | Add New | Add New |
7 | FC-F2F | Utilizing Prompts to Enhance Business Processes - Case Study | 1-4 | 1.5 |
8 | EL-F2F | Exploring case studies and examples of personalized web applications | 1-5 | 1.5 |
Add New | Add New | Responsible use of generative AI techniques in designing web applications | Add New | Add New |
9 | FC-F2F | Utilizing Prompts to Enhance Business Processes - Case Study | 1-5 | 1.5 |
10 | AS-F2F | Assignment 2: Analyze how these applications leverage AI to create personalized and engaging user experiences | 2-1 | 3 |
11 | EL-F2F | Exploring dynamic and interactive web applications using generative AI techniques | 2-2 | 1.5 |
12 | FC-F2F | Boosting Productivity with ChatGPT: Content Planning | 2-2 | 1.5 |
13 | EL-F2F | Exploring dynamic and interactive web applications using generative AI techniques | 2-3 | 1.5 |
14 | FC-F2F | Boosting Productivity with ChatGPT: Content Planning | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3: Research and analyze case studies of personalized web applications that leverage AI techniques | 2-4 | 3 |
16 | EL-F2F | Exploring the possibilities to integrate the front-end and back-end Testing and documentation | 2-5 | 1.5 |
17 | FC-F2F | Reinventing Web Development with GenAI - Case Study | 2-5 | 1.5 |
18 | EL-F2F | Exploring the possibilities to integrate the front-end and back-end Testing and documentation | 3-1 | 1.5 |
19 | FC-F2F | Reinventing Web Development with GenAI - Case Study | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4: Experiment with frameworks and libraries for building full-stack web applications | 3-2 | 3 |
21 | PM-F2F | Understanding the purpose and scope of the project. | 3-3 | 3 |
Add New | Add New | Identifying functional and non-functional requirements such as performance, security, and scalability. | Add New | Add New |
Add New | Add New | Creating user personas to understand your target audience. | Add New | Add New |
22 | PM-F2F | Developing a content strategy aligned with the project goals and target audience. | 3-4 | 3 |
Add New | Add New | Creating compelling copy, visuals, and multimedia content. | Add New | Add New |
23 | PM-F2F | Integrating AI-generated designs into the design workflow for efficiency. | 3-5 | 3 |
24 | SA-F2F | Summative Assessment (Per Learner) | 4-1 | 30 min |
Session No# | Session Type | Session Details | Day No. # | Duration |
1 | EL-F2F | SDLC & Technical Design - Phases in SDLC, System Requirements Specifications, UML Diagrams | 1-1 | 1.5 |
2 | FC-F2F | Familiarization of software development process and technical design | 1-1 | 1.5 |
3 | EL-F2F | SDLC & Technical Design - Phases in SDLC, System Requirements Specifications, UML Diagrams | 1-2 | 1.5 |
4 | FC-F2F | Back-end development | 1-2 | 1.5 |
Add New | Add New | - Handling of HTTP requests and responses, connecting with the database | Add New | Add New |
Add New | Add New | - Building responses, managing the request lifecycle | Add New | Add New |
5 | AS-F2F | Assignment 1 - Application Design: Develop system block diagram and UML diagrams | 1-3 | 3 |
6 | EL-F2F | Back-end development | 1-4 | 1.5 |
Add New | Add New | - Handling of HTTP requests and responses, connecting with the database | Add New | Add New |
Add New | Add New | - Building responses, managing the request lifecycle | Add New | Add New |
Add New | Add New | Development using MVC pattern | Add New | Add New |
Add New | Add New | - Backend framework overview, developing presentation layer, data layer, web layer & application logic layer | Add New | Add New |
7 | FC-F2F | Development using MVC pattern | 1-4 | 1.5 |
Add New | Add New | - Backend framework overview, developing presentation layer, data layer, web layer & application logic layer | Add New | Add New |
8 | EL-F2F | Back-end development | 1-5 | 1.5 |
Add New | Add New | - Handling of HTTP requests and responses, connecting with the database | Add New | Add New |
Add New | Add New | - Building responses, managing the request lifecycle | Add New | Add New |
Add New | Add New | Development using MVC pattern | Add New | Add New |
Add New | Add New | - Backend framework overview, developing presentation layer, data layer, web layer & application logic layer | Add New | Add New |
9 | FC-F2F | Development using MVC pattern | 1-5 | 1.5 |
Add New | - Backend framework overview, developing presentation layer, data layer, web layer & application logic layer | Add New | Add New | |
10 | AS-F2F | Assignment 2 - Application Development: Create the application components and web pages based on the functionality | 2-1 | 3 |
11 | EL-F2F | Application creation with insert, update, and delete records from a database | 2-2 | 1.5 |
12 | FC-F2F | Application creation with insert, update, and delete records from a database | 2-2 | 1.5 |
13 | EL-F2F | Application creation with insert, update, and delete records from a database | 2-3 | 1.5 |
14 | FC-F2F | Application creation with insert, update, and delete records from a database | 2-3 | 1.5 |
15 | AS-F2F | Assignment 3 - Application Development: Implement business logics and test | 2-4 | 3 |
16 | EL-F2F | Login, exception handling | 2-5 | 1.5 |
Add New | Add New | Unit Testing, Integration Testing, User Acceptance Testing | Add New | Add New |
17 | FC-F2F | Login, exception handling | 2-5 | 1.5 |
18 | EL-F2F | Login, exception handling | 3-1 | 1.5 |
Add New | Add New | Unit Testing, Integration Testing, User Acceptance Testing | Add New | Add New |
19 | FC-F2F | Unit Testing, Integration Testing, User Acceptance Testing | 3-1 | 1.5 |
20 | AS-F2F | Assignment 4 - Test Report Review and Bug Fixing | 3-2 | 3 |
21 | PM-F2F | Translate business requirements and design the application | 3-3 | 3 |
22 | PM-F2F | Develop application components as per the design | 3-4 | 3 |
23 | PM-F2F | Implement business logic | 3-5 | 3 |
24 |