Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-5

  • Module 1: Information Security Fundamentals
  • Module 2: Networking Fundamentals
  • Module 3: Secure Network Protocol
  • Module 4: Information Security Threats & Attacks
  • Module 5: Social Engineering

Module 11-15

  • Module 11: Data Backup
  • Module 12: Virtual Private Network
  • Module 13: Wireless Network Security
  • Module 14: Web Security
  • Module 15: Ethical Hacking & Pen Testing

Module 21-25

  • Module 21: Network Forensics & Investigating Network Traffic
  • Module 22: Steganography
  • Module 23: Analysing Logs
  • Module 24: Email Crime & Computer Forensics
  • Module 25: Writing Investigative Reports

Module 6-10

  • Module 6: Hacking Cycle
  • Module 7: Identification, Authentication & Authorization
  • Module 8: Cryptography
  • Module 9: Firewalls
  • Module 10: Intrusion Detection System

 

Module 16-20

  • Module 16: Incident Response
  • Module 17: Computer Forensics Fundamentals
  • Module 18: Digital Evidence
  • Module 19: Understanding File Systems
  • Module 20: Windows Forensics

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]