SOCIAL ENGINEERING

course code : 214-4-102

...

class description...



Introduction to scrum

course code : 214-4-106

...

This course is  provided by our experienced facilitators with extensive knowledge of Scrum/Agile methodology with innovative methods of course delivery to provide a practical understanding of Scrum/Agile concepts.

Successful candidates will be awarded the Scrum Master Certified (SMC™) certification by SCRUM study after passing the certification exam.



IT RISK MANAGEMENT

course code : 214-4-110

...

In this course, student's will learn about how to apply the risk management methods to information technology to IT risk i.e The business risk with use, ownership, operation, involvement, influence and adoption if IT within an enterprise or organisation.

Student's will also learn about the different methodologies that have been proposed to manage IT risks divided into processes and steps.

At the end of the course, student's should be skillfull and confident enough to get a job as an IT Risk Manager



INTRODUCTION TO CLOUD COMPUTING

course code : 214-4-109

...
 
Cloud Computing is the most common and preferable method of computing in which, various resources like storage, data processing applications and services, and web servers can be used and easily accessed with the help of the internet. Resources that are stored in numerous data centers across the globe can be made available to anyone or to any devices that have a stable internet connection. 
 This course will teach you how to design, implement and manage complete cloud computing systems. Learn how to design distributed cloud computing applications, learn about efficient cloud architecture and understand how to implement important cloud security features to protect against hackers.

Gaining the skills necessary will help you be on the rapidly growing and changing career path of cloud computing. Most organizations have already transferred their data and resources to the cloud while the other half of the companies are in the process of doing so. This has led to the creation of numerous job opportunities for cloud computing professionals all around the world. 



INTRO TO SQL

course code : 214-4-113

...

There's a lot of buzz in the tech world about data–but of course, raw data isn't very useful on its own.

What Is SQL?

Data is a core part of many web applications and mobile apps. For example, an application like Facebook holds a user’s profile information, including data about their friends and posts. To hold this data, a database system is used. SQL is a programming language that enables programmers to work with that data. 

What Does SQL Stand For?

SQL stands for Structured Query Language. Essentially, it's a language that allows communication with databases in order to manage all the data they contain. 

 

How to Use SQL 

While an application might be programmed in a language like Python, PHP or Ruby, databases are not configured to understand these. Historically, databases understand only SQL (though this has changed sig

 

What to learn from the Training.
  • Types of Database Management Software
    • Relational database management system (RDBMS program)
    • None relational database management system
  • Light-weight databases
  • Centralized databases
  • Rules for creating database name, table name or column name
  • MySQL Database Management System
  • Conclusion


INFORMATION SYSTEM AUDIT

course code : 214-4-112

...

In this course, you will learn how to examine the management controls of an informati on technology infrastructure to determine if they are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organisations goals and objectives.



INFORMATION SYSTEM ASSURANCE AND SECURITY

course code : 214-4-114

...

Information assurance and security is the management and protection of knowledge, information, and data. It combines two fields: Information assurance, which focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems



INFORMATION SECURITY & ASSURANCE PROGRAM

course code : 214-4-108

...

Information Security and  Assurance (ISA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. ... In turn, ISA trained security personnel help bolster information integrity and availability through controls, risk assessment, and management.

What Is the Difference Between Information Assurance and Information Security?

In short, information assurance focuses on gathering data. Information security is about keeping that data safe. In most organizations, these two jobs are combined into one department or even one worker.

This course teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.

More so ,This course helps in the assessment of internal controls, also in assuring and reporting the validity, adequacy, reliability, and security of information systems.

Participants will gain the knowledge and confidence to plan and perform an effective audit, as well as reporting and recommending corrective actions where necessary.

You will also develop the necessary skills to audit controls, monitor and assess information technology and report on the conformance and implementation of processes based on management systems.

Finally, you will learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities.



Excel mastery

course code : 214-4-107

...

With Excel training course, you gain the knowledge and skills to create and edit worksheets, use formulas and functions, sort and filter detail data visually and present summary information in a consumable and professional format.n...



Cobit 5 masterclass

course code : 214-4-103

...

Become COBIT® qualified with our three-day training course. Understand the key principles of COBIT 5 and how it aligns IT goals with strategy objectives. Instructor has over 10 years experience and licensed by ISACA to train COBIT 5.

This is the official three-day COBIT 5 Foundation Course using content with the permission of ISACA. It includes the official certified COBIT 5 Foundation exam from APMG.  It is an interactive classroom-based training course based on the latest version, COBIT 5.



Business continuity masterclass

course code : 214-4-104

...

This BCP training provides you with the practical insight to build a mature , comprehensive and reliable business continuity plan with significant value added materials to assist you long after the course is over.

 



Introduction to Information security

course code : 214-4-105

...

This course teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.



I.T GOVERNANCE AND COMPLIANCE

course code : 214-4-111

...

In this course, student's will learn about the strategies for managing an organisation's overall governance, enterprise risk management and compliance with regulations, including how to align IT with business objectives while effectively managing risks and meeting compliance requirements.