Certified Secure Computer User

Certified Secure Computer User

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Content

 

  • Module 1: Introduction to Security
  • Module 2: Securing Operating Systems
  • Module 3: Malware and Antivirus
  • Module 4: Internet Security
  • Module 5: Security on Social Networking Sites
  • Module 6: Securing Email Communications
  • Module 7: Securing Mobile Devices
  • Module 8: Securing the Cloud
  • Module 9: Securing Network Connections
  • Module 10: Data Backup and Disaster Recovery

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.
Project Research
Professional development
Resources
Up to date with current issues
Expertise
Global panel of leaders
Development
Adaptive learning

Study With Us

The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified Security Specialist

Certified Security Specialist

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-5

  • Module 1: Information Security Fundamentals
  • Module 2: Networking Fundamentals
  • Module 3: Secure Network Protocol
  • Module 4: Information Security Threats & Attacks
  • Module 5: Social Engineering

Module 11-15

  • Module 11: Data Backup
  • Module 12: Virtual Private Network
  • Module 13: Wireless Network Security
  • Module 14: Web Security
  • Module 15: Ethical Hacking & Pen Testing

Module 21-25

  • Module 21: Network Forensics & Investigating Network Traffic
  • Module 22: Steganography
  • Module 23: Analysing Logs
  • Module 24: Email Crime & Computer Forensics
  • Module 25: Writing Investigative Reports

Module 6-10

  • Module 6: Hacking Cycle
  • Module 7: Identification, Authentication & Authorization
  • Module 8: Cryptography
  • Module 9: Firewalls
  • Module 10: Intrusion Detection System

 

Module 16-20

  • Module 16: Incident Response
  • Module 17: Computer Forensics Fundamentals
  • Module 18: Digital Evidence
  • Module 19: Understanding File Systems
  • Module 20: Windows Forensics

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Disaster Recovery Professional

Disaster Recovery Professional

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Key Service Management and ITIL 4 Concepts

  • Defining Value and its relationship with stakeholders
  • Service relationships and co-creation of value
  • Understanding Service Offerings and Products
  • Balancing Outcomes, Value, Costs and Risks
  • The 4 Dimensions of Service Management
    o Organisations and People
    o Information and Technology
    o Partners and Suppliers
    o Value Streams and Processes

Lesson 3

ITIL 4 Service Management Practices

  • Introducing the 3 areas of Practice
  • Key practices in ITIL4
    o Incident Management
    o Problem Management
    o Change Control
    o Service Request Management
    o Service Level Management
    o Service Desk
    o Continual Improvement
  • Overview of other practices in ITIL4

Lesson 2

The ITIL 4 Guiding Principles

  • Introduction to the Guiding Principles
  • Understand and apply each of the 7 Guiding Principles

Lesson 4

The ITIL 4 Service Value System (SVS)

  • Understanding the role of the Service Value System
  • Elements of the ITIL4 SVS
    o Guiding Principles
    o Governance
    o Service Value Chain
    o Practices
    o Continual Improvement
  • Service Value Chain
    o Understanding the Elements of the Service Value Chain
    o Practices and their role in the Service Value Chain
    o Using the Service Value Chain to identify and map Value Streams

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Licensed Penetration Tester (LPT)

Licensed Penetration Tester (LPT)

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-5

  • Module 1: Introduction to Penetration Testing
  • Module 2: Penetration Testing Scoping and Engagement
  • Module 3: Open-Source Intelligence
  • Module 4: Social Engineering Penetration Testing
  • Module 5: Network Penetration Testing

Module 11-14

  • Module 11: OT/SCADA Penetration Testing
  • Module 12: Cloud Penetration Testing
  • Module 13: Binary Analysis and Exploitation
  • Module 14: Report Writing and Post Testing Actions

Module 6-10

  • Module 6: Network Penetration Testing – Internal
  • Module 7: Network Penetration Testing – Perimeter Devices
  • Module 8: Web Application Penetration Testing
  • Module 9: Wireless Penetration Testing
  • Module 10: IoT Penetration Testing

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Computer Hacking Forensic Investigator

Computer Hacking Forensic Investigator

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-8

  • Module 1: Computer Forensics in Today’s World
  • Module 2: Computer Forensics Investigation Process
  • Module 3: Understanding Hard Disks and File Systems
  • Module 4: Data Acquisition and Duplication
  • Module 5: Defeating Anti-Forensics Techniques
  • Module 6: Windows Forensics
  • Module 7: Linux and Mac Forensics
  • Module 8: Network Forensics

Module 9-10

  • Module 9: Investigating Web Attacks
  • Module 10: Dark Web Forensics
  • Module 11: Database Forensics
  • Module 12: Cloud Forensics
  • Module 13: Investigating Email Crimes
  • Module 14: Malware Forensics
  • Module 15: Mobile Forensics
  • Module 16: IoT Forensics

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified Security Operation Center Analyst (CSA)

Certified Security Operation Center Analyst (CSA)

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Modules

  • Module 1: Security operations and Management
  • Module 2: Understanding Cyber Threats, IoCs and Attack Methodology
  • Module 3: Incidents, Events and Logging
  • Module 4: Incident Detection with Security Information and Event Management (SIEM)
  • Module 5: Enhanced Incident Detection with Threat Intelligence
  • Module 6: Incident Response

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]