Computational Thinking
Emerging Technologies
Strategy Development
Course Outline
Module 1-10
- Module 1: Network Attack and Défense Strategies
- Module 2: Administrative Network Security
- Module 3: Technical Network Security
- Module 4: Network Perimeter Security
- Module 5: Endpoint Security-WindowsSystems
- Module 6: Endpoint Security-Linux Devices
- Module 7: Endpoint Security-Mobile Devices
- Module 8: Endpoint Security-IoT Devices
- Module 9: Administrative Application Security
- Module 10: Data Security
Module 11-20
- Module 11: Enterprise Virtual Network Security
- Module 12: Enterprise Cloud Network Security
- Module 13: Enterprise Wireless Network Security
- Module 14: Network Traffic Monitoring and Analysis
- Module 15: Network Logs Monitoring and Analysis
- Module 16: Incident Response and Forensic Investigation
- Module 17: Business Continuity and Disaster Recovery
- Module 18: Risk Anticipation with Risk Management
- Module 19: Administrative Application Security
- Module 20: Threat Prediction with Cyber Threat Intelligence
Anticipating the Future of Teaching and Learning
Influencing higher education teaching and learning, now and in the future.


Fun Facts
Happy Clients
Completed Projects
Office Locations
Team Members
Up Coming Courses
Our Trademarked
Process & Workflow.
Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.
All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.
Project Research
Professional development
Resources
Up to date with current issues
Expertise
Global panel of leaders
Development
Adaptive learning
Study With Us
The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.
[formidable id=2]