Information Technology Courses

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

  • latest blog post
    IT MANAGEMENT EXCELLENCE

    Why Attend

    Managing an IT function is very different from developing or supporting technical IT solutions. General management skills are helpful to the IT manager, but results from this course demonstrate that a management course designed specifically for the IT professional is invaluable.

    The IT Management Excellence course is first and foremost a practical and interactive course. It combines trainer experience with that of over 2,000 past participants and has identified the most valuable lessons on the road to delivering exceptional IT management and business results. The course delivers a proven combination of models and guidelines, supported by carefully designed, enjoyable and interactive role plays, case studies and team exercises.

    There are five key modules covering IT strategy, project excellence, communicating technology, operational and crisis management and commercial acumen. These are the 5 management skills that have been identified as consistently enabling business results and career success for all IT managers.  

     

    Course Methodology

    This course uses a mixture of presentations, discussions, case studies, videos, role-plays and interactive exercises to transform participants’ knowledge into hands-on practice.

     

    Course Objectives

    By the end of the course, participants will be able to:

    • Develop an effective IT strategy
    • Increase project delivery rates and manage a portfolio of projects
    • Improve operational efficiency using different operational models
    • Lead effectively in a technical crisis
    • Create effective sourcing plans
    • Set clear IT contract objectives
    • Effectively negotiate technical agreements
     

    Target Audience

    The IT Management Excellence course is targeted at IT managers and team leaders who are looking to develop their career in management and leadership. Job titles often include IT Manager, IT Team Leader, Project Manager, Systems Architect, Head of (IT) Department and more.

     

    Target Competencies

    • Business and IT strategy
    • Project, program and portfolio management
    • Advanced communication and presentation skills
    • IT operational excellence
    • Planning and managing a crisis event
    •  

     

  • latest blog post
    IT MANAGEMENT EXCELLENCE

    Why Attend

    Managing an IT function is very different from developing or supporting technical IT solutions. General management skills are helpful to the IT manager, but results from this course demonstrate that a management course designed specifically for the IT professional is invaluable.

    The IT Management Excellence course is first and foremost a practical and interactive course. It combines trainer experience with that of over 2,000 past participants and has identified the most valuable lessons on the road to delivering exceptional IT management and business results. The course delivers a proven combination of models and guidelines, supported by carefully designed, enjoyable and interactive role plays, case studies and team exercises.

    There are five key modules covering IT strategy, project excellence, communicating technology, operational and crisis management and commercial acumen. These are the 5 management skills that have been identified as consistently enabling business results and career success for all IT managers.  

     

    Course Methodology

    This course uses a mixture of presentations, discussions, case studies, videos, role-plays and interactive exercises to transform participants’ knowledge into hands-on practice.

     

    Course Objectives

    By the end of the course, participants will be able to:

    • Develop an effective IT strategy
    • Increase project delivery rates and manage a portfolio of projects
    • Improve operational efficiency using different operational models
    • Lead effectively in a technical crisis
    • Create effective sourcing plans
    • Set clear IT contract objectives
    • Effectively negotiate technical agreements
     

    Target Audience

    The IT Management Excellence course is targeted at IT managers and team leaders who are looking to develop their career in management and leadership. Job titles often include IT Manager, IT Team Leader, Project Manager, Systems Architect, Head of (IT) Department and more.

     

    Target Competencies

    • Business and IT strategy
    • Project, program and portfolio management
    • Advanced communication and presentation skills
    • IT operational excellence
    • Planning and managing a crisis event
    •