Computational Thinking
Emerging Technologies
Strategy Development
Course Outline
Module 1-5
- Module 1: Information Security Fundamentals
- Module 2: Networking Fundamentals
- Module 3: Secure Network Protocol
- Module 4: Information Security Threats & Attacks
- Module 5: Social Engineering
Module 11-15
- Module 11: Data Backup
- Module 12: Virtual Private Network
- Module 13: Wireless Network Security
- Module 14: Web Security
- Module 15: Ethical Hacking & Pen Testing
Module 21-25
- Module 21: Network Forensics & Investigating Network Traffic
- Module 22: Steganography
- Module 23: Analysing Logs
- Module 24: Email Crime & Computer Forensics
- Module 25: Writing Investigative Reports
Module 6-10
- Module 6: Hacking Cycle
- Module 7: Identification, Authentication & Authorization
- Module 8: Cryptography
- Module 9: Firewalls
- Module 10: Intrusion Detection System
Module 16-20
- Module 16: Incident Response
- Module 17: Computer Forensics Fundamentals
- Module 18: Digital Evidence
- Module 19: Understanding File Systems
- Module 20: Windows Forensics
Anticipating the Future of Teaching and Learning
Influencing higher education teaching and learning, now and in the future.


Fun Facts
Happy Clients
Completed Projects
Office Locations
Team Members
Up Coming Courses
Our Trademarked
Process & Workflow.
Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.
All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.
Project Research
Professional development
Resources
Up to date with current issues
Expertise
Global panel of leaders
Development
Adaptive learning
Study With Us
The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.
[formidable id=2]