Contract Management Courses

  • latest blog post
    NEGOTIATING CONTRACTS SUCCESSFULLY

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

    This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT Professionals, Security Professionals, Auditors, Site Administrators, Management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems.

    Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of  Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    NEGOTIATING CONTRACTS SUCCESSFULLY

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

    This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT Professionals, Security Professionals, Auditors, Site Administrators, Management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems.

    Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of  Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    NEGOTIATING CONTRACTS SUCCESSFULLY

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

    This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT Professionals, Security Professionals, Auditors, Site Administrators, Management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems.

    Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of  Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    NEGOTIATING CONTRACTS SUCCESSFULLY

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

    This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT Professionals, Security Professionals, Auditors, Site Administrators, Management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems.

    Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of  Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    TENDERING PROCEDURES & BID EVALUATION

    The overall aim of this course is to provide participants with the knowledge, concepts and skills needed to perform all tendering process tasks and activities. The course covers each step of the tendering process and procedures as well as the different techniques and approaches used in evaluating the bids.

    Participants in this interactive course will learn essential tools and techniques used in analyzing submitted bids, including establishing scoring protocol, preliminary examination, technical evaluation and commercial evaluation.

    Target Audience

    All those involved in the early stages of contracting in order for them to review and have a full understanding of the tendering process as well as the different approaches to tender evaluation and assessment.

    Target Competencies

    • Contract preparation
    • Writing scope of work
    • Planning
    • Tendering
    • Technical terms and conditions
    • Bid evaluation

    Course Methodology

    This course relies on the use of individual and group exercises aimed at helping participants learn all key activities in contract management. The course also features the use of a number of case studies and presentations by participants followed by plenary discussions. In addition, this course incorporates pre and post testing.

    Course Objectives

    By the end of the course, participants will be able to:

    • Identify the contracting stages from setting the scope of work to awarding the contract
    • Outline the main objectives for the tendering process and recognize other alternative contracting methods
    • Prepare the scope of work and specifications as well as plan the evaluation process
    • Evaluate in-depth the process of preparing tenders and selecting potential suppliers
    • Apply several approaches to bid evaluation using criteria, weights and scoring measures