By the end of this course, you will:
✅ Understand the core principles of DevOps.
✅ Learn about CI/CD pipelines and how to implement them using GitHubActions.
✅ Work with containerization tools (Docker).
✅ Explore infrastructure as code (IaC) with Terraform.
✅ Implement monitoring and logging using Prometheus as tool
- Teacher: Nawel Bayar

This course introduces micro-service based applications as well as docker and kubernetes. The course objectives are to understand how to create containers for an application, how to orchestrate containers using kubernetes, and how to deploy apps to kubernetes using Helm.
- Teacher: Mohamed Mohamed

This course is a Template, please add your description and change the course photo.
- Teacher: CHOUAIB KHALFALLAH

This course is a Template, please add your description and change the course photo.
- Teacher: Raouia Bouabdellah

This course is a Template, please add your description and change the course photo.
- Teacher: Ahmed Jalali

This course is a Template, please add your description and change the course photo.
- Teacher: Rania Yangui

This course is a Template, please add your description and change the course photo.
- Teacher: MAROUEN BEN MOUSSA

This course provides an introduction to the fundamental concepts of IT security, covering key principles such as confidentiality, integrity, and availability. Students will learn about risk management, security technologies, incident response, and legal considerations in cybersecurity. The course also explores cryptography, access control mechanisms, intrusion detection systems, and best practices for securing IT infrastructures. By the end of the course, students will have a foundational understanding of how to protect information assets and respond to security challenges in real-world scenarios.
🎯 Learning Outcomes:
- Understand the importance of IT security and risk management
- Identify common threats and vulnerabilities in information systems
- Learn security governance, legal, and ethical considerations
- Explore security technologies such as firewalls, VPNs, and IDS/IPS
- Grasp the basics of cryptography and secure implementation strategies
📌 Prerequisites: Basic knowledge of IT systems is recommended but not required.
- Teacher: Mohamed Amine Marzouk

This course is a Template, please add your description and change the course photo.
- Teacher: Imen Ben Abdelwahed

This course provides an overall understanding of cloud computing concepts, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS core services, security, architecture, pricing, and support. This course helps you to prepare for the AWS Certified Cloud Practitioner.
After completing this course, you should be able to:
- Explain the AWS pricing philosophy.
- Identify the global infrastructure components of AWS.
- Describe security and compliance measures of the AWS Cloud including AWS Identity and Access Management (IAM).
- Create an AWS Virtual Private Cloud (Amazon VPC).
- Demonstrate when to use Amazon Elastic Compute Cloud (EC2), AWS Lambda and AWS Elastic Beanstalk.
- Differentiate between Amazon S3, Amazon EBS, Amazon EFS and Amazon S3 Glacier.
- Demonstrate when to use AWS Database services including Amazon Relational Database Service (RDS), Amazon DynamoDB, Amazon Redshift, and Amazon Aurora.
- Explain AWS Cloud architectural principles.
- Explore key concepts related to Elastic Load Balancing (ELB), Amazon CloudWatch, and Auto Scaling.
- Teacher: Sami Bhiri