en English ar Arabic fr French pt Portuguese

Computing and ICT

The course is designed to equip the participants with a comprehensive toolbox of relevant knowledge needed to use the computers and the software involved in the work environment. The course also expose the participants to digital technologies because they have come to dominate virtually every aspect of the modern business world. The course also provide participants with significant on virtual working, data security and online safety. Basic computer hardware, networking and security is also taught to such an extent that the computer user will have the ability to troubleshoot and identify any unsafe online content whether to access it or not. The course also enables the participants manage paperless offices without any challenges.
This introductory program is designed to give business professionals the operational knowledge on Information Technology (IT) to let them get the best and exhibit a better understanding in any IT related activities at work. The course will enhance participants to have the ability to troubleshoot minor errors and installation of software / hardware to get work done. The participants will also learn the essentials of computer usage and basic IT security to safeguard organisational information.
This course is designed to equip senior executives the knowledge and skills to understand and manage IT risks, threats and vulnerabilities, to safeguard business continuity and reputation. The course also provide the senior executives with the essential knowledge on cyber risk prevention methodologies that enhance and transform organizations’ risk management capabilities. The course also enhance knowledge about the relationship between cyber security risk and business value, articulate business consequences for identified risks and develop essential skills to communicate a clear and concise message.
This course is designed to equip participants with skills, knowledge of cyber resilience controls and procedures such that the participants will have the ability to manage and operate effectively in a challenging cyber centric business environment. The course will address all the weaknesses of the conventional cyber security controls that are implemented to combat any relevant cyber-attacks. The course will also introduce modern and innovative approaches to foster effective decisions that prevents, detects, responds, and are resilient to any form of cyber-threats.
This course is designed to equip participants with the skills and abilities to understand the compliance and governance – related work in the field of data protection such as creating compliance programs, developing appropriate internal policies, liaising with regulators and product teams to develop appropriate processes. The course also provides the participants with the coverage of the types of work that is done within the domain of risk management in data protection such as conducting data protection impact assessments. This course also enlighten participants with the significant areas of obtaining, using, storing, managing and deleting personal data, and represents a substantial regulatory expansion of personal data protection rules, regulations and requirements.
The course equips the participants with fundamental database concepts including database types, database languages, and database designs. The course also provides participants with skills and knowledge on how to integrate the querying methods and more to help satisfy their business information extraction needs. This course also focuses on the creation of database objects which includes views, stored procedures, along with parameters, and functions. Other common aspects of procedure coding, such as indexes, concurrency, error handling, and triggers are also covered in this course.
This Advanced Linux System and Network Administration is a very competitive course that is very intense because it teaches the delegates to become powerful system administrators that are looking forward to become Linux Foundation Certified Engineers. The course will provide participants with the skills and knowledge on how to effectively design, deploy and maintain a network running under Linux and to administer the network services. This course will also equip participants with in – depth explanation of networking protocols, Inter – Process Communication, network configuration and tools for internet connectivity, overview of Linux network security and firewall, and installation of a LAMP server. Performance tuning, virtualization, containers, software management, security, and backup solutions are covered in detail.
This course is designed to equip participants with enterprise perspective functionality of Linux as the world is now running on Linux. The course will also equip the participants with the processes and procedures of configuring Linux systems. Participants will also taught how effectively harden a Linux system and add users to a Linux machine and secure them from any cyber threats. Finally, the course will provide participants with the knowledge to classify and differentiate technologies to secure Linux and differentiate access control methods for Linux applications.
The advanced cloud computing management course equips participants with knowledge and skills that will assist them to explore cloud computing services, applications, and use case studies to get work done. The course also provide the participants with the knowledge to develop a global infrastructure to support use case at scale while also developing and inventing innovative technologies that stores data in the space.
This course is designed to equip the participants with the skills and knowledge to have the ability to examine and analyse text, graphics, multimedia, and digital images and conduct thorough examinations of computer hard disk drives, and other electronic data storage media. The course also provide the participants with forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files. The course also assist the participants with advanced skills to collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents.
This course is designed to equip participants with the skills and knowledge for planning, configuring, and managing the advanced SharePoint 2016 features, creating and managing new web pages. The course also provides skills and knowledge in implementing high availability, disaster recovery, service application architecture, and Microsoft Business Connectivity Services. This course also focuses on social computing features, productivity, and collaboration platforms and features. Participants will also learn about business intelligence solutions, Enterprise Content Management, web content management infrastructure, solutions, and apps. This course also covers how to develop and implement a governance plan, and how to perform an upgrade or a migration to SharePoint
This course is designed to equip participants with an in-depth experience in implementing and maintaining Cisco UCS servers which will help the participants to accelerate and provide robust UCS deployments and gaining knowledge and skills through Cisco’s unique combination of theory and hands – on practice using enterprise – grade Cisco learning technologies, data center equipment, and software. The course also provides participants with the knowledge to deploy, secure, operate and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade server, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex product family, for use in data centers.
This course is designed to equip participants with skills and knowledge that will provides them with the background they require to understand the key cyber security compliance and industry standards. Participants will learn how to analyse an organisation’s system in terms of IT vulnerability and solutions they can employ to safeguard the information of the organisation. The participants will also learn intensive skills around cryptography and encryption to understand how these concepts affect software within organisations and further knowledge on security frameworks, compliance, endpoint management, and encryption. Important data security measures that are used to protect sensitive data and PI are extensively discussed.
This course designed to equip participants with knowledge and skills to safeguard the organisational information from both internal and external threats. Therefore, the participants will learn the nature of risks they may experience during the course of doing their work and the controls and countermeasures that are at their disposal to secure information and technology within an effective management framework. Overally the course will cover security from a managerial perspective with regards to design, implementation, maintenance, and disaster recovery.
This course is designed to equip participants with cyber security – analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course also provide participants with an deep understanding of the types of the security threats that face computer systems and the type of information that is stored on digital devices and how it can be extracted from them. The course focus on developing participants abilities to evaluate existing and emerging Cyber Forensics technologies, apply knowledge, understanding and analytical and investigative skills in support of the construction of their solutions and investigative approaches.
This course is designed to equip participants with skills and knowledge to effectively manage Information Technology projects, it will encompass both theory and real – world examples that will be applied to practical information technology project management principles to successfully take a project from planning phase until implementation. The course includes the use of project management tools, techniques and methodologies and software. The course will project the step – by – step processes that are involved in information technology projects management while managing risk by employing risk minimisation measures
This course is designed to equip participants with skills and knowledge in the core security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. The course also provide participants with the techniques to monitor alerts and breaches, and how to follow established procedures for response to alerts converted to incidents. This course helps participants to identify and analyze threats and malicious activities, correlate events, conduct security investigations, use incident playbooks, and learn SOC operations and procedures.
This course is designed to equip participants with in – depth understanding on security architecture, because it allows you to segregate differing trust domains via security devices. The course further explore other aspects of security like; anti-virus software, malware protection, cryptographic techniques and applications, intrusion detection systems configuration, testing and maintaining firewalls, access control, network hardening and Wi-Fi security.
This course is designed to equip participants with skills and knowledge to leverage cloud services to streamline computing resources, deploy enterprise applications, improve user access and system reliability, and utilize advanced computing capabilities. The course also provide participants with significant cloud concepts includes; virtualization, multi – tenant architecture, and software defined networking. Participants will also learn concepts and techniques necessary for designing, developing, and evaluating Enterprise Information System (EIS) that are distributed, interoperable, intelligent, and adaptive to change.
This course is designed to equip participants with the skills and knowledge to develop, design, administer and manage the heterogeneous corporate network with security emphasis. The courses also scrutinises network security aspects with various industry – leading network operating systems. The course also provide participants with the fundamental significance of computer, network, and communication system security for an organisation and involve both the management and the user in the process of awareness, decision and implementation with regard to computer and network security. The course also discuss how to make a functional security design for a communication system and implement it successfully.
This course is designed to equip participants with advanced computer troubleshooting and repair skills using various operating systems – basic hardware components, motherboards, form factors, hard drives, USBs, CD/DVD drives, memory, and more– skills related to troubleshooting computers such as testing power supplies and any of the hardware components mentioned above for failure. The course also covers a wide variety of the latest up to date software, which can be used for virus protection and troubleshooting.
This course is designed to equip participants with skills and knowledge on Cloud Computing, virtualization, legacy hardware and software considerations and approaches to transitioning information technology from legacy systems to a shared managed service model. Through practical exercises the course provides, hands-on activities that will explore the technical infrastructure and administrative requirements of server – based computing utilising both open source and proprietary virtualization software. This course presents the knowledge and skills needed to develop and implement virtualisation and cloud computing systems and infrastructure for business and industry.
This course is designed to equip participants with skills and knowledge to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration.
This course is designed to equip participants with skills and knowledge to install, configure, maintain a multi-user networked operating system and apply the principles of resolving problems for single - user and multi-user computer operating systems. The course also provide participants with knowledge on how to effectively maintain, repair scanning systems and create database access for a computer application using structured query language. Finally, the course discusses critical issues that affect the management of a local area computer network (LAN), and different computer network architectures and standards.
This course is designed to equip participants with skills and knowledge in organisational data protection and security which enhance them to have an in – depth understanding of organisational data and information protection and issues of compliance. The participants will also learn about the consequences of not complying with the rules and regulations of regional and international data protection. The course also provides the participants with the coverage of the types of work that is done within the domain of risk management in data protection such as conducting data protection impact assessments.
This course is designed to equip participants with the skills and knowledge in routing and switching which enables the professional to plan, implement, verify and troubleshoot local and wide area enterprise networks and advanced network security. The routing and switching protocol knowledge from this course will provide an everlasting foundation as these skills are equally relevant in the physical networks of the work environment and the anticipated future virtualised network functions.
This course is designed to equip participants with skills and knowledge in the overview of all aspects of project management functions, with emphasis on planning and controlling of Information Technology projects. The course also covers topics like; project scope definition, the work breakdown structure, project management process, importance of communication and team building, project management strategies, and role of a project manager. The course provides the participants with hands – on experience in using project management software (MS Project), and using the software they will be able to create and organize project plans, schedule tasks, assign resources to the tasks, determine the critical path, evaluate and adjust schedules, and prepare progress reports.
This course is designed to equip participants with skills and knowledge have the ability to analyse software problems, plans, and solutions to design a logical plan for program requirements. The course also provides participants with implementation of software solutions and communicate effectively in writing and orally regarding the solutions; demonstrate collaborative skills in team settings to plan and accomplish software solutions; and apply ethical concepts to design solutions. The course also discuss aspects of programming and an understanding of general software development, web, desktop, and database applications.
This course is designed to equip participants with the skills and knowledge on aspects of operation, configuration, and troubleshooting of current operating systems, mobile devices, and a variety of enterprise PC hardware. The course also provide development of skills in installing, configuring and troubleshooting of business applications, fundamental network concepts, printers, cabling, software, iOS, Android and others. The course also extensively discuss these desktop and mobile support technologies, but is not limited to, communication, leadership skills, human relations, employability skills, and safe and efficient work practices.
This course is designed to equip participants with advanced MS – SQL and Windows PowerShell – two powerful tools that can open up a data – driven approach to technology audit delivery. The course also provides participants with a hands – on aspects of applying auditing techniques based on these tools, across all phases of the IT audit lifecycle. IT Auditors will learn intermediate SQL and PowerShell scripting through this course and would be equipped to apply their new acquired skills and techniques upon course completion.
This course is designed to equip participants with skills and knowledge to grasp the key concepts of archiving and indexing technology by using computer and realise the significance of archiving and indexing technology in today’s work environment. The course also provides participants with the ability to maintain a well – controlled computerised archiving and indexing system, together with the knowledge of how to link documents and records management implementation across the organisation. Implications of an Enterprise Content Management (ECM) strategy in conjunction with document and records management will be discussed extensively.
This course is designed to equip participants with skills and knowledge on how to effectively install, configure, and troubleshoot a computer network. This course also orients the participants on building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. The course is also made up of significant concepts of this programme which consists of concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security. Participants will have the ability to build a network from scratch and maintain, upgrade, and troubleshoot an existing network after successfully complete this course.
SASEH

Facebook