emerging technologies

DIPLOMA IN BLOCKCHAIN TECHNOLOGY AND APPLICATION

emerging technologies

Diploma in Blockchain Technology and Application

Diploma in Blockchain Technology and Applications will introduce you to Blockchain technology and its applications. It begins by clearly defining exactly what Blockchain is, how the Blockchain works as an immutable ledger of transactions and why it is said to be tamper-proof. You will learn about the consensus mechanism and also about a process called Hashing. You will learn about rules and structure of the whole Blockchain system while taking into account the system’s requirements.

You will also learn about smart contract, how they are created, and how they can be used. You will be introduced to the general concepts of cryptography and how information and data can be encrypted and decrypted. You will learn about the differences between public and private keys and how to use them to securely execute Blockchain transactions. Next, you will be introduced to the Ethereum blockchain. You will learn about how it works and how it differs from the Bitcoin blockchain. You will also learn about smart contracts and how to create and deploy them on the Ethereum Blockchain. Lastly, you will be exposed to several aspects of Blockchain security existing in the Blockchain environment today. You’ll gain a detailed overview of Blockchain security issues, including threats and risk mitigation.

Launching Soon!

Time: 0800-1600H (13 total hours)

Module Fee: P14,895

This course is an introduction to the world of blockchain and distributed ledgers. You will learn the basics, look at how blockchain works, explore cryptocurrencies, review blockchain’ s brief and fascinating history, and show you the practical usage of this technology. The objective of the course is to provide a solid foundation for those looking to gain a deeper understanding and learn how it will affect nearly all business areas. With a firm focus on, but not entirely limited to the finance industry we will look at use cases that are already in the market, as well as emerging use cases set to alter how we operate businesses, and safeguard our personal information.

Target Audience

This course is intended for non-technical business executives who are tasked with making business decisions about leveraging Blockchain technology in their businesses. This course is NOT appropriate for technology professionals seeking to gain deeper understanding of Blockchain technology implementation or programming level depth.

Module Objectives

At the end of the module, the participant will be able to:

  • Recognize the value of Blockchain application vs Traditional System.
  • Examine vital concepts on how to blockchain.
  • Analyze and Explain different uses of Blockchain.
  • Evaluate and recommend the applicability of blockchain to their company. the key issues and challenges in aligning the Marketing Mix to meet the customers’ preferences.
  • Formulate and a use case of Blockchain application.

Module Outline

Session 1:

  • Cryptocurrency and Blockchain
  • Decentralized Networks and Ledgers
  • Types of Blockchain
  • How Blocks are Created
  • Cryptography and Hashing
  • Mining a Block

Session 2:

  • Types of Consensus
  • Blockchain 2.0 and Ethereum
  • Blockchain Use Cases
  • Blockchain Adoption
  • Blockchain Implementation

Launching Soon!

Time: 0800-1500H (18.5 total hours)

Module Fee: P20,895

This course will provide you a thorough grasp of the blockchain domain as well as exposure to it. It entitles you to use your skills to make critical choices about the blockchain project and to design the rules and structure of the whole blockchain system while taking into account the system's requirements.

Target Audience

This course is intended for:

  • Top-level Management
  • Business Decision Makers
  • Business Analysts
  • Technical Solutions Architects
  • Developers and Technical Engineers
  • Sales, Marketing, and Branding
  • Professionals

Module Objectives

At the end of the module, the participant will be able to:

  • Recognize the value of Blockchain.
  • Examine Blockchain works.
  • Identify different types of Blockchains.
  • Analyze why Blockchain is different from what we have today.
  • Explain the use cases for Blockchain.
  • Evaluate what does a Blockchain app look like.
  • Evaluate how to design a Blockchain app.
  • Evaluate and understand the development process of a Blockchain app.
  • Evaluate and understand how do to test a Blockchain app.

Module Outline

Session 1:

  • What is Blockchain?
  • How does Blockchain work?
  • Types of Blockchains

Session 2:

  • How is Blockchain different from what we have today?
  • What are Use Cases for Blockchain?

Session 3:

  • What does a Blockchain app look like?
  • How do I design a Blockchain app?

Session 3:

  • How do I develop a Blockchain app?
  • How do I test a Blockchain app?

Launching Soon!

Time: 0900-1600H (17 total hours)

Module Fee: P18,895

This course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.

Target Audience

This course is intended for:

  • Programmers
  • Application Developers
  • System Architects
  • Network Architects
  • Network Security Architects
  • IT Professionals w/programming experience

Module Objectives

At the end of the module, the participant will be able to:

  • Improve your understanding and knowledge in Blockchain and Ethereum.
  • Hands-on training on developing on the Ethereum platform.
  • Hands-on training on building distributed applications.
  • Formulate and a use case of Blockchain application.

Module Outline

Session 1:

  • What is Blockchain?
  • How does Blockchain work?
  • Types of Blockchains

Session 2:

  • How is Blockchain different from what we have today?
  • What are Use Cases for Blockchain?

Session 3:

  • What does a Blockchain app look like?
  • How do I design a Blockchain app?

Session 3:

  • How do I develop a Blockchain app?
  • How do I test a Blockchain app?

Launching Soon!

Time: 0900-1600H (10 total hours)

Module Fee: P11,895

This course covers all known aspects of Blockchain security existing in the Blockchain environment today. You'll gain a detailed overview of Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, and advanced Blockchain security practices.

Target Audience

This course is intended for:

  • Blockchain Architects
  • Blockchain Developers
  • Application Developers
  • Blockchain System Administrators
  • Network Security Architects
  • Cyber Security Experts
  • IT Professionals with cyber security experience

Module Objectives

At the end of the module, the participant will be able to:

  • Identifying and differentiating between security threats and attacks on a Blockchain network.
  • Blockchain security methods, best practices, risk mitigation, and more.
  • All known (to date) cyber-attack vectors on the Blockchain.
  • Performing Blockchain network security risk analysis.
  • A complete understanding of Blockchain’s inherent security features and risks.
  • An excellent knowledge of best security practices for Blockchain System/Network Administrators.
  • Demonstrating appropriate Blockchain data safeguarding techniques.

Module Outline

Session 1:

  • Fundamental Blockchain Security
  • Concensus in the Blockchain
  • Advanced Blockchain Security Mechanisms
  • Smart Contract Security
  • Blockchain Risk Assessment
  • Basic Blockchain Security
  • Blockchain for Business
  • Securely Implementing Business Blockchains

Session 2:

  • Network-Level Vulnerabilities and Attacks
  • System-Level Vulnerabilities and Attacks
  • Smart Contract Vulnerabilities and Attacks
  • Security of Alternative DLT Architectures

Dr. Amos K. Kibet. CEH, CEI, CCNA-SEC, CBE - DIT

He is currently the Chief Technology Officer and part of the Executive team which includes the Chief Executive officer, Chief financial officer, and Chief operating officer for SynTechNX Corp.

He also assists in evaluating Jaka IT systems to meet Jaka Investment corporation objectives. Primary duties include analyzing and diagnosing a company's IT infrastructure, understanding a client's business needs, and designing and implementing a technology solution.

He is a Cybersecurity & Blockchain Professional, Author of international peer-reviewed papers, Speaker & trainer.

Diploma in Blockchain Technology and Applications will introduce you to Blockchain technology and its applications. It begins by clearly defining exactly what Blockchain is, how the Blockchain works as an immutable ledger of transactions and why it is said to be tamper-proof. You will learn about the consensus mechanism and also about a process called Hashing. You will learn about rules and structure of the whole Blockchain system while taking into account the system's requirements.

You will also learn about smart contract, how they are created, and how they can be used. You will be introduced to the general concepts of cryptography and how information and data can be encrypted and decrypted. You will learn about the differences between public and private keys and how to use them to securely execute Blockchain transactions. Next, you will be introduced to the Ethereum blockchain. You will learn about how it works and how it differs from the Bitcoin blockchain. You will also learn about smart contracts and how to create and deploy them on the Ethereum Blockchain. Lastly, you will be exposed to several aspects of Blockchain security existing in the Blockchain environment today. You'll gain a detailed overview of Blockchain security issues, including threats and risk mitigation.

There are many advantages to using blockchain technology compared to other traditional technologies:

  • With blockchain, your business process will be better protected with the help of a high level of security.
  • The hacking threats against your business will also be reduced to a greater extent.
  • As blockchain offers a decentralized platform, there is no need to pay for centralized entities or intermediaries’ services.
  • Enterprise blockchain technology enables organizations to use different levels of accessibility.
  • Organizations can do faster transactions with the help of blockchain.
  • Account reconciliation can be automated.
  • The transactions done are transparent and hence, easy to track.

1. Security purposes

  • The digital world is filled with hackers looking to breach information or steal data from sources. With blockchain technology, the information stored has robust security making it impossible for one to hack.

2. Transparency

  • Since everything is displayed on the network, there are very fewer chances that there would be any kind of discrepancy that can be created.

3. It is inexpensive

  • Most of the traditional financial models that are available in the market are expensive, however, with blockchain it is inexpensive.

4. Less transaction time

  • An individual can send, receive money and financial documents within a couple of minutes, this reduces the burden of waiting for hours together.

5. Financial efficiency is increased

  • Decentralized blockchain allows one to make transactions from individual to individual without the involvement of the third party. This help saves a lot of money while making transactions, unlike traditional banks.

6. Protect businesses from fraud

  • The blockchain is open source ledgers which is why it is very easy to identify if fraud has taken place since every transaction is recorded on them.

7. The industries disrupted by blockchain

  • The banking sector isn’t the only industry that has been impacted by blockchain technology. Other sectors like law firms or law enforcement are other industries that can be disrupted by blockchain technologies.

  • The banking sector - blockchain is said to be the safest way to store banking records and probably the easiest and cheapest means in transferring funds through the decentralization provided by blockchain.

  • Voting - voting irregularities could be minimized with the help of blockchain technology. Everything can be secured through blockchain, from casting votes to tallying the votes, the system is said to be indisputable.

  • Healthcare - managing records of patients could be a pain during the past, but this isn’t the case today. Today, doctors can easily access patient's health records and track them regardless of how many times you have changed the doctors.

  • Real Estate - buying and selling land requires a lot of paperwork but with blockchain, the process is much easier and simpler.

  • The Legal Industry - storing legal documents, retrieving them and verifying are the key functions that include in the legal industry. And the questions raised over the legality of wills and other important documents can be eliminated by implementing blockchain secured documents.

  • The Government - in a government sector, corruption can be eliminated using blockchain technologies. For instance, employment, welfare, and disability benefits can be distinguished and distributed in a much easier manner.

Over the next decade, there will be new blockchain ideas that would emerge, few might be a success and a failure. But during the process, there will also be some great problems that will be solved with the emergence of new models.

Dr. Amos K. Kibet. CEH, CEI, CCNA-SEC, CBE - DIT

He is currently the Chief Technology Officer and part of the Executive team which includes the Chief Executive officer, Chief financial officer, and Chief operating officer for SynTechNX Corp.

He also assists in evaluating Jaka IT systems to meet Jaka Investment corporation objectives. Primary duties include analyzing and diagnosing a company's IT infrastructure, understanding a client's business needs, and designing and implementing a technology solution.

He is a Cybersecurity & Blockchain Professional, Author of international peer-reviewed papers, Speaker & trainer.

2022 1st Run: TBA

2022 2nd Run: TBA

Time: 0800-1600H (13 total hours)

Module Fee: P14,895

This course is an introduction to the world of blockchain and distributed ledgers. You will learn the basics, look at how blockchain works, explore cryptocurrencies, review blockchain’ s brief and fascinating history, and show you the practical usage of this technology. The objective of the course is to provide a solid foundation for those looking to gain a deeper understanding and learn how it will affect nearly all business areas. With a firm focus on, but not entirely limited to the finance industry we will look at use cases that are already in the market, as well as emerging use cases set to alter how we operate businesses, and safeguard our personal information.

Target Audience

This course is intended for non-technical business executives who are tasked with making business decisions about leveraging Blockchain technology in their businesses. This course is NOT appropriate for technology professionals seeking to gain deeper understanding of Blockchain technology implementation or programming level depth.

Module Objectives

At the end of the module, the participant will be able to:

  • Recognize the value of Blockchain application vs Traditional System.
  • Examine vital concepts on how to blockchain.
  • Analyze and Explain different uses of Blockchain.
  • Evaluate and recommend the applicability of blockchain to their company. the key issues and challenges in aligning the Marketing Mix to meet the customers’ preferences.
  • Formulate and a use case of Blockchain application.

Module Outline

Session 1:

  • Cryptocurrency and Blockchain
  • Decentralized Networks and Ledgers
  • Types of Blockchain
  • How Blocks are Created
  • Cryptography and Hashing
  • Mining a Block

Session 2:

  • Types of Consensus
  • Blockchain 2.0 and Ethereum
  • Blockchain Use Cases
  • Blockchain Adoption
  • Blockchain Implementation

2022 1st Run: TBA

2022 2nd Run: TBA

Time: 0800-1500H (18.5 total hours)

Module Fee: P20,895

This course will provide you a thorough grasp of the blockchain domain as well as exposure to it. It entitles you to use your skills to make critical choices about the blockchain project and to design the rules and structure of the whole blockchain system while taking into account the system's requirements.

Target Audience

This course is intended for:

  • Top-level Management
  • Business Decision Makers
  • Business Analysts
  • Technical Solutions Architects
  • Developers and Technical Engineers
  • Sales, Marketing, and Branding
  • Professionals

Module Objectives

At the end of the module, the participant will be able to:

  • Recognize the value of Blockchain.
  • Examine Blockchain works.
  • Identify different types of Blockchains.
  • Analyze why Blockchain is different from what we have today.
  • Explain the use cases for Blockchain.
  • Evaluate what does a Blockchain app look like.
  • Evaluate how to design a Blockchain app.
  • Evaluate and understand the development process of a Blockchain app.
  • Evaluate and understand how do to test a Blockchain app.

Module Outline

Session 1:

  • What is Blockchain?
  • How does Blockchain work?
  • Types of Blockchains

Session 2:

  • How is Blockchain different from what we have today?
  • What are Use Cases for Blockchain?

Session 3:

  • What does a Blockchain app look like?
  • How do I design a Blockchain app?

Session 3:

  • How do I develop a Blockchain app?
  • How do I test a Blockchain app?

2022 1st Run: TBA

2022 2nd Run: TBA

Time: 0900-1600H (17 total hours)

Module Fee: P18,895

This course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.

Target Audience

This course is intended for:

  • Programmers
  • Application Developers
  • System Architects
  • Network Architects
  • Network Security Architects
  • IT Professionals w/programming experience

Module Objectives

At the end of the module, the participant will be able to:

  • Improve your understanding and knowledge in Blockchain and Ethereum.
  • Hands-on training on developing on the Ethereum platform.
  • Hands-on training on building distributed applications.
  • Formulate and a use case of Blockchain application.

Module Outline

Session 1:

  • What is Blockchain?
  • How does Blockchain work?
  • Types of Blockchains

Session 2:

  • How is Blockchain different from what we have today?
  • What are Use Cases for Blockchain?

Session 3:

  • What does a Blockchain app look like?
  • How do I design a Blockchain app?

Session 3:

  • How do I develop a Blockchain app?
  • How do I test a Blockchain app?

2022 1st Run: TBA

2022 2nd Run: TBA

Time: 0900-1600H (10 total hours)

Module Fee: P11,895

This course covers all known aspects of Blockchain security existing in the Blockchain environment today. You'll gain a detailed overview of Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, and advanced Blockchain security practices.

Target Audience

This course is intended for:

  • Blockchain Architects
  • Blockchain Developers
  • Application Developers
  • Blockchain System Administrators
  • Network Security Architects
  • Cyber Security Experts
  • IT Professionals with cyber security experience

Module Objectives

At the end of the module, the participant will be able to:

  • Identifying and differentiating between security threats and attacks on a Blockchain network.
  • Blockchain security methods, best practices, risk mitigation, and more.
  • All known (to date) cyber-attack vectors on the Blockchain.
  • Performing Blockchain network security risk analysis.
  • A complete understanding of Blockchain’s inherent security features and risks.
  • An excellent knowledge of best security practices for Blockchain System/Network Administrators.
  • Demonstrating appropriate Blockchain data safeguarding techniques.

Module Outline

Session 1:

  • Fundamental Blockchain Security
  • Concensus in the Blockchain
  • Advanced Blockchain Security Mechanisms
  • Smart Contract Security
  • Blockchain Risk Assessment
  • Basic Blockchain Security
  • Blockchain for Business
  • Securely Implementing Business Blockchains

Session 2:

  • Network-Level Vulnerabilities and Attacks
  • System-Level Vulnerabilities and Attacks
  • Smart Contract Vulnerabilities and Attacks
  • Security of Alternative DLT Architectures

2024 Run: TBA

Time: 8 Total Hours

Module Fee: P3,895

The Fundamentals of Internet of Things (IoT) course is a one-day program designed for college students and working professionals with no prior knowledge of IoT. This course thoroughly introduces the subject, concept, applications, and principles of IoT. By participating, individuals will develop a strong comprehension of the subject matter, underlying technologies, components, and challenges of IoT, as well as explore the potential impact of IoT on various industries and society.

Module Objectives

At the end of the module, the participant will be able to:

  • Define and explain the concept of the Internet of Things (IoT).
  • Identify the key components and technologies that enable IoT.
  • Understand IoT's various applications and domains, such as smart homes, healthcare, transportation, and industrial systems.
  • Recognize the potential benefits and challenges of implementing IoT solutions.
  • Discuss IoT's ethical, privacy, and security considerations.

Module Outline

  • Introduction to IoT
  • IoT Technologies and Components
  • Applications of IoT
  • Benefits and Challenges of IoT
  • Ethics, Privacy, and Security in IoT
  • Research-Based Home Assignment

Lecturer: Art Rebultan

Art Rebultan is a highly experienced cybersecurity professional with over 20 years of combined experience in various industries (semiconductor, isp, retail corp, fintech, bpo, renewable energy, data center, academe, and security company). He has successfully built and operationalized Incident Response and Cyber Threat Intelligence programs twice in his career. Has served as a technical CERT manager for IT and ICS/OT, managing DFIR, CTI, and TVM.

He holds a master's degree in IT with a concentration in E-Commerce Security and a Professional Graduate Diploma in Digital Forensics and Cyber Security. These academic credentials and real-world experience demonstrate his commitment to staying at the forefront of his field and providing clients with the highest level of expertise.

Throughout his career, Art has established himself as a seasoned expert in computer forensics, network intrusion, data breach, cybercrime investigation, malware analysis, and reverse engineering. He has a passion for public speaking, technical writing, and vlogging.

Art has successfully handled 11 unique breaches, demonstrating his ability to manage complex incidents and effectively mitigate the risks involved. His technical expertise extends to building SOC programs from scratch, including establishing a SIEM and SOAR to hiring analysts for 24x7 operations.

He worked as an expatriate in Singapore for 13 years and is now based in Canada as a part- time professor in Cybersecurity postgraduate program at a reputable institution and holding a full-time DFIR role in a cybersecurity consultancy service.

Launching Soon!

Please standby for the official release of the program information.

Launching Soon!

Please standby for the official release of the program information.

2024 Run: TBA

Time: 32 Total Hours

Module Fee: P15,895

This course provides a comprehensive overview of IoT security and its implications in cybersecurity. The course is designed for busy professionals learning IoT security and cybersecurity concepts and skills in a compressed schedule. The course will cover the fundamental principles and practices of IoT security and cybersecurity, including risk assessment and management, security architecture and design, IoT security standards and best practices, emerging technologies for IoT security, legal and ethical issues, and the future of IoT security.

Module Objectives

At the end of the module, the participant will be able to:

  • Understand the fundamental principles and practices of IoT security and cybersecurity
  • Conduct risk assessments and develop mitigation plans for securing IoT devices and systems
  • Design and implement secure IoT communication protocols
  • Implement IoT security best practices and standards
  • Use emerging technologies such as AI, machine learning, and blockchain for IoT security
  • Address legal and ethical issues related to IoT security and cybersecurity
  • Evaluate the future of IoT security and cybersecurity

Module Outline

Session 1:

  • Introduction to IoT Security
  • Current and emerging IoT security challenges and risks 

Session 2:

  • IoT Security Architecture
  • Secure IoT communication protocols and encryption techniques

Session 3:

  • IoT Security Standards and Best Practices
  • IoT Security Case Studies

Session 4:

  • IoT Security Incident Response Plan
  • IoT Security Policy and Governance Framework
  • Future of IoT Security and Cybersecurity
  • Final Project Presentation

Lecturer: Art Rebultan

Art Rebultan is a highly experienced cybersecurity professional with over 20 years of combined experience in various industries (semiconductor, isp, retail corp, fintech, bpo, renewable energy, data center, academe, and security company). He has successfully built and operationalized Incident Response and Cyber Threat Intelligence programs twice in his career. Has served as a technical CERT manager for IT and ICS/OT, managing DFIR, CTI, and TVM.

He holds a master's degree in IT with a concentration in E-Commerce Security and a Professional Graduate Diploma in Digital Forensics and Cyber Security. These academic credentials and real-world experience demonstrate his commitment to staying at the forefront of his field and providing clients with the highest level of expertise.

Throughout his career, Art has established himself as a seasoned expert in computer forensics, network intrusion, data breach, cybercrime investigation, malware analysis, and reverse engineering. He has a passion for public speaking, technical writing, and vlogging.

Art has successfully handled 11 unique breaches, demonstrating his ability to manage complex incidents and effectively mitigate the risks involved. His technical expertise extends to building SOC programs from scratch, including establishing a SIEM and SOAR to hiring analysts for 24x7 operations.

He worked as an expatriate in Singapore for 13 years and is now based in Canada as a part- time professor in Cybersecurity postgraduate program at a reputable institution and holding a full-time DFIR role in a cybersecurity consultancy service.

PROFESSIONAL CERTIFICATE IN IOT MANAGEMENT

short courses

Launching Soon!

Time: 1100-1900H (49 total hours)

Module Fee: P17,495

With its unprecedented power and usefulness, Python has become of the hottest and fastest growing programming language since it was launched and is become one of the buzzwords in Digital Transformations together with other domains in the Pantheon of Technology – Data Science and Big Data.

Data Science is a multi-disciplinary skill in Statistics/ Data Mining, Computer Science and Business Management. Data Science was regarded as the solution to provide scalable insights based on Big Data. The advancement in Technology makes these domains and areas visible to almost all big industries today. Big enterprises invested huge amount of money to install Data Science team in their organization to take care and manage Big Data infrastructures and architecture.

Prior to Pandemic Outbreak, these companies are continuously reaping success and not being swayed down because of the successful deployment of Artificial Intelligence Technology, Machine Learning, Automation, Internet of Things (IoT), Blockchain and other areas of Data Science.

Skills in Statistics, Data Mining or Data Wrangling was successfully used and applied to these companies and areas because of the Computer Programming Language such as Python. Business Models was carefully curated by experts in Business Management. Thus, Data Science was regarded as the sexiest job in the 20th Century because it encapsulated a wide spectrum of knowledge, skills, and expertise.

Based on Stack Overflow Developer’s Survey in 2019, Python was regarded as the second and the most preferred language with 73% of the developers are choosing it over other programming languages and is expected to dominate the Marketplace for Programming Languages.

This course is intended for everyone who are aiming to upskills their programming skills. This is intended for all type of users from Novice to Expert. Anyone who have no prior experience in programming can take this course and for anyone who would like to learn the Python Programming Language for upskilling purposes.

Why Do We Need to Learn Python?

Python is very useful in general aside from being an open-source programming language. It was used by Amazon, Google, Reddit, Instagram, and all other big companies around the world.

  • Python is user-friendly programming language – Python was able to simplify coding process just like transforming complicated coding to make it simpler and more straightforward. This what makes Python easy to learn and understand that even kids can able to understand and use.
  • Python makes us more Productive– Instead of us taking further education to know the old school programming languages, Python makes everything simple. It makes the Programming task a lot easier compared with other programming languages.
  • Python is very Dangerous in a Positive way – It can used for anything. It is very powerful as you can generate insights based from actual sentiments of the people, It can replicate things through machine learning algorithms, It can automate things through automation, It can replicate human through the development of virtual agents and the like. Because of its powers, it comes with great responsibility. It can be dangerous if you will use its powers to connive with evil who have a lot of destruction activities which includes all forms of fraud.
  • Python is a language for creating a script – You can directly type your script to its interpretation environment such as IDLE and many other. It does not require compilation like any other languages. You can easily detect and identify errors in your scripts. This makes a programming a fan activity.
  • Python is a Cross-Platform Programming Language – Anyone can use it if you have the motivation and purpose of using it. If you are in non-analytics field but you want to learn this because you have a goal and motivation, you can easily use it. You can use and install Python on Windows, Mac, Linux and from other platform like Raspberry Pi. You can also run Python on Android and IOS tablets.
  • Python uses dynamic typing of variables – When you start programming, you do not actually need to explain the machine what the variables is supposed to be. You can just write your variables as it is.
  • Python is very collaborative language – there are so many experts have written libraries. You do not need to build and create your own library as there are available libraries in place. All you can do is to install.
  • Python is Open-Source Programming Language – It does not require you to pay for licenses. You can download and run python from different distribution channels like such as Anaconda.

Instructional Tools

Synchronous Teaching Strategies:

  • Online Lecture & Discussion
  • Video Presentations

Asynchronous Teaching Strategies:

  • Assigned Exercises
  • Capstone Project
  • Review Exercises

Where to Use Python

Python can be use everywhere and anywhere. You can use Python to whatever you plan to do or interested to work on.

  • In Space – Python was used for the Central Command System at the International Space Station’s Robonaut 2. The European Mission to Mars was planning to use Python to collect and study soil samples.
  • In Laboratories – Python was used to generate insights from the atom smashing experiments at the CERN Large Hadron Collider.
  • In Astronomy – Python was used to control and monitor system of the MeerKat Radio Telescope Array
  • In Movie Studios – The Star Wars experts uses Python to automate movie productions. Effects Software’s computer-generated imagery program Houdini uses Python for the Programming interface and to script the engine.
  • In Games – Activision uses Python for building games, testing, and analyzing stuffs. They are also using Python to detect people cheating in game activity.
  • In the Video and Music Industry – Spotify, Netflix, and other streaming services uses Python for the recommendation engine. It understands the people’s preference when it comes to music, movies and therefore, automatically generate recommendations.
  • In Search Engines – Google uses Python all over in its early development stage. Google uses ElasticSearch
  • In Medicine – Other Medical Institution, Drugs Manufacturing company uses Python to develop and analyze the efficacy of the medicine.
  • In Virtual Agents and Robots – Python was used to developed applications for robots.
  • Internet-of-things (IoT) – You can use Python to developed application for automation and for other integrated systems in the Internet-of-things.

Module Objectives

At the end of the module the participant will be able to:

  • Have greater appreciation about learning Data Science where they can use Python Programming to solve real complex problem.
  • Build Programs, Applications, and Dashboards (including Artificial Intelligence applications).
  • Build Machine-Learning Algorithms, build a Model, Robotic Process Automation, IoT and other Advanced Analytics.

Target Audience

At the end of the module the participant will be able to:

  • This course is intended for everybody with or without prior programming language experience.
  • This course is also intended for programmers who wanted to improve their programming skills and discover new libraries needed by the industries as it boosts their curiosity on what other applications can do with Python.
  • Anyone looking to build Programs, Applications, Dashboards including Artificial Intelligence applications, Build Machine Learning Algorithms, Build a Model, Robotic Process Automation, IoT and other Advanced Analytics.

Module Outline

Session 1:

  • What is Python?
  • Basics of Python
  • Python Data Structures I

Session 2:

  • Python Data Structures II
  • Comparison Operators

Session 3:

  • Python Statements I
  • Python Statements II

Session 4:

  • Methods and Functions
  • Python Expressions

Session 5:

  • Object Oriented Programming

Session 6:

  • Module and Packages
  • Advanced Python Functions

Session 7:

  • Advanced Python Libraries

Lecturer: Vincent Bongolan

Vincent Torre Bongolan is a Data Scientist by profession with more than 17 years of experience in Technology and Analytics.

He was the Sr. Data Scientist and AI Lead for Innovation at Asian Development Bank. He was also previously attached at Accenture Philippines as Sr. Data Science Associate Manager, Sr. Investment Research Analyst at Integreon Managed Solutions, Sr. Data Science Executive at the Nielsen Company and Sr. Business Intelligence Manager at ServiceSeeking Australia.

He was a lecturer at Polytechnic University of the Philippines, Arellano University and De La Salle - College of Saint Benilde. He was also a Book Author and Contributing Author of E-Learning Platforms.

2023 1st Run: Mar. 4, 11, 18, 25

Time: 32 total hours

Module Fee: P29,895

In this course, you will learn to identify, evaluate, and capture business analytic opportunities that create value. Toward this end, you will learn basic analytic methods and analyze case studies on organizations that successfully deployed these techniques.

The first part of the module will focus on how to use data to develop insights. The second part will focus on the predictive capabilities using forecasting techniques. The third part will focus on the use of spreadsheet modeling to support decision-making in the presence of a large number of alternatives. Lastly, throughout the course, it explores the challenges that can arise in implementing analytical approaches within an organization.

Module Objectives

At the end of the module the participant will be able to:

  • To train individuals to extract valuable information from raw data.
  • To emphasis, the use of Forecasting and Time Series Analysis to facilitate the prediction of potential results based on historical patterns.
  • To utilize techniques like statistical and quantitative analysis of data, predictive and descriptive modeling, and reality-based management to steer decision-making.

Module Outline

Session 1:

  • DESCRIPTIVE ANALYSIS (Tabular & Graphical Method, Numerical Measures)

Session 2:

  • PREDICTIVE ANALYSIS (Forecasting)

Session 3:

  • PRESCRIPTIVE ANALYSIS (Spreadsheet Modeling)

Session 4:

  • Final Project Presentation

Lecturer: John Elvin Lim

John Elvin Lim is a Lecturer of Business Analytics and Research at De La Salle-College of Saint Benilde (CSB).

Prior to joining CSB, John also lectures on Operations Management, and Business Analytics at De La Salle University and is responsible for handling an advisory role on OJT and Thesis.

Previous to his work at CSB, John was the Department Chairperson of Finance at St. Scholastica’s College.

He earned his PhD in Business Management at Philippine Christian University, and an MBA at De La Salle University, and a Bachelor of Science degree in Business Administration at University of Santo Tomas.

for inquiries

Look for: Jhune Tavera – rodolfo.tavera@benilde.edu.ph

 4/F Design + Arts Campus
950 Pablo Ocampo Street, Malate, Manila, Philippines
✆  (+63) 8230-5100 local 3801 & 3802
✉  space@benilde.edu.ph

Do you need help?