Information Technology Courses

  • latest blog post
    IT INFRASTRUCTURE & DISASTER RECOVERY PLANNING

    This course provides participants with concrete solutions, strategies and insights into the delivery of an effective IT infrastructure and disaster recovery plan with the goal of establishing resilience measures to protect their organizations’ IT. Using tested processes and procedures, participants will analyze the risks and impact to IT operations that threats might cause. A framework for building operational resilience will be provided to deliver an effective response for safeguarding the organizations technology interests and value-creating activities.

    This practical course provides participants with a framework that considers ISO 27031, ISO 20000, ITIL and ISO 22301, aligned with the Business Continuity Institute (BCI) Good Practice, Guidelines (GPG) 2013 and NCEMA 7000-2012.

    Target Audience

    IT Managers and Professionals, including Disaster Recovery (DR) Managers or anyone responsible for, or involved with, Disaster Recovery Plans (DRP), Business Continuity Plans (BCP) And/or Technology and IT Auditing.

    Target Competencies

    • IT Readiness for Business Continuity(IRBC)
    • Risk Evaluation
    • Business Impact Analysis
    • Incident and Change Management
    • Disaster Recovery Planning
    • IT Disaster Recovery Testing

    Course Methodology

    This course will be highly interactive and include group discussions, videos, case studies and syndicate work.

    Risk Evaluation, BIA and High Level IT DR Plan Templates will be applied during the course and given for use after the course. Supporting information, such as Steering Committee, Terms of Reference (ToR’s), Change Management, DR Test Strategy and testing processes and procedures will also be made available.

    It includes specific templates for carrying-out a Business Impact Analysis (BIA) as well as completion of an IT DR Plan (DRP) that participants will be able to take away for use in their own organizations.

    Course Objectives

    By the end of the course, participants will be able to:

    • Consider policies, objectives, targets, processes and procedures that are relevant to managing risk and improving IT Readiness for Business Continuity (IRBC)
    • Apply best practice to build IT infrastructure and operational sustainability, including security of the environment
    • Understand the processes and procedures to carry out a risk evaluation and identify risks, threats, hazards, vulnerabilities and weaknesses that could affect your organization
    • Review the key components of asset, human, change and supply chain management that are specific to IT
    • Understand the components of a successful IT Disaster Recovery (DR) Program, including data management and the key components that are necessary to carry out a technology
    • Business Impact Analysis (BIA)
    • Understand the Maximum Tolerable Period of Disruption (MTPD), to then identify the relationship with Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
    • Produce a High Level IT Disaster Recovery

    This course is also available as a 10 day programme

  • latest blog post
    IT INFRASTRUCTURE & DISASTER RECOVERY PLANNING

    This course provides participants with concrete solutions, strategies and insights into the delivery of an effective IT infrastructure and disaster recovery plan with the goal of establishing resilience measures to protect their organizations’ IT. Using tested processes and procedures, participants will analyze the risks and impact to IT operations that threats might cause. A framework for building operational resilience will be provided to deliver an effective response for safeguarding the organizations technology interests and value-creating activities.

    This practical course provides participants with a framework that considers ISO 27031, ISO 20000, ITIL and ISO 22301, aligned with the Business Continuity Institute (BCI) Good Practice, Guidelines (GPG) 2013 and NCEMA 7000-2012.

    Target Audience

    IT Managers and Professionals, including Disaster Recovery (DR) Managers or anyone responsible for, or involved with, Disaster Recovery Plans (DRP), Business Continuity Plans (BCP) And/or Technology and IT Auditing.

    Target Competencies

    • IT Readiness for Business Continuity(IRBC)
    • Risk Evaluation
    • Business Impact Analysis
    • Incident and Change Management
    • Disaster Recovery Planning
    • IT Disaster Recovery Testing

    Course Methodology

    This course will be highly interactive and include group discussions, videos, case studies and syndicate work.

    Risk Evaluation, BIA and High Level IT DR Plan Templates will be applied during the course and given for use after the course. Supporting information, such as Steering Committee, Terms of Reference (ToR’s), Change Management, DR Test Strategy and testing processes and procedures will also be made available.

    It includes specific templates for carrying-out a Business Impact Analysis (BIA) as well as completion of an IT DR Plan (DRP) that participants will be able to take away for use in their own organizations.

    Course Objectives

    By the end of the course, participants will be able to:

    • Consider policies, objectives, targets, processes and procedures that are relevant to managing risk and improving IT Readiness for Business Continuity (IRBC)
    • Apply best practice to build IT infrastructure and operational sustainability, including security of the environment
    • Understand the processes and procedures to carry out a risk evaluation and identify risks, threats, hazards, vulnerabilities and weaknesses that could affect your organization
    • Review the key components of asset, human, change and supply chain management that are specific to IT
    • Understand the components of a successful IT Disaster Recovery (DR) Program, including data management and the key components that are necessary to carry out a technology
    • Business Impact Analysis (BIA)
    • Understand the Maximum Tolerable Period of Disruption (MTPD), to then identify the relationship with Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
    • Produce a High Level IT Disaster Recovery

    This course is also available as a 10 day programme

  • latest blog post
    ETHICAL HACKING

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation. This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems. Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    ETHICAL HACKING

    This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

    Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation. This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Audience

    IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

    Target Competencies

    • Ethical Hacking
    • Information security systems auditing
    • Cyber security
    • Cyber attack detection
    • Vulnerability assessment
    • Penetration testing

    Course Methodology

    Participants will be provided laptops and immersed into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This lab intensive environment gives each participant the opportunity to gain in-depth knowledge and practical experience with the current essential security systems. Each participant will have access to their own workstation and will be given exercises to practice penetration testing and create simple malware-type samples. They will also work in teams to create scenarios for the use of social engineering.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand how perimeter defenses function by ethically scanning and attacking networks
    • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
    • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
    • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
    • Create policies and apply countermeasures against social engineering,
    • Distributed Denial-of Service (DDoS) attacks, buffer overflows, and virus creation
    • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

  • latest blog post
    CLOUD MANAGEMENT & SECURITY PRINCIPLES & BEST PRACTICES

    Cloud computing is a new concept using old technologies. It has quickly become a vital tool in organizations across all industries as an Internet-scale computing infrastructure. Nevertheless, despite Cloud computing’s increasing relevance and popularity, there is a lack of understanding of the security risks associated with Clouds and optimal approaches for migration into Clouds. This course covers these from a practical angle; specifically, it covers Cloud computing architecture, management services, and security challenges. It also discusses Cloud migration planning and the main requirements to move current Cloud untrusted infrastructure to a trustworthy Internet-scale Cloud critical computing infrastructure.

    Target Audience

    IT and infrastructure leaders, decision makers (CxO), risk analysts, strategic planners, architects, administrators, software and business developers, and project managers

    Target Competencies

    • Cloud management
    • Identity management
    • Access management
    • Security risks management

    Course Methodology

    This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that allow all participants to use the knowledge they gained to demonstrate their skills in cloud management and security.

    Course Objectives

    By the end of the course, participants will be able to:

    • Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
    • Explain cloud structure, properties and management services
    • Set a cloud adoption strategy
    • Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
    • Analyze the major risks associated with the different cloud services and deployment models
    • Discuss the main principles, mechanisms and best practices for treating cloud risks
    • Demonstrate the discussed concepts using practical case studies, business models and industrial tools