• info@orbitage.com
  • +603 2202 1850

Information Technology

Information Technology

Programs Duration Who should attend Brief Skill Level Outline
Operating Systems Administration (Linux) 5 Applicable to all staff who need an understanding of operating systems This program builds skills in installing, configuring and managing a Linux operating system. Covers disk management, user management, command line & GUI, process control, application/service installation & management, network management and shell scripting.
Target audience: This program is for technical staff of different levels depending on job role/requirements.
Fundamental “Core” Skill Operating Systems Administration (Linux)
Database Systems & MySQL 4 Network administrators, software developers and other technical users that need to be familiar with the environment for deploying services This hands-on practical course provides participants with a practical introduction to the core components for building and managing a database environment. This includes UNIX/Linux basics, administrative functions, designing, implementing & using SQL queries. It also includes an introduction to “Big Data” and non-relational databases and file systems such as NoSQL and Hadoop. The learning is facilitated with many practical exercises and activities Intermediate Database Systems & MySQL
Certified IS Engineer (CISE): Applied Information Security 5 Personnel from network planning, operations, field technicians, rollout, radio access, transmission, core, VAS, IT & services platforms This program builds skills in securing network infrastructures & services. Covers the range of common system attacks, vulnerabilities & solutions to secure these, as well as key tools, firewall systems, IDS/IPS, NAT, logging & audit. Intermediate Certified IS Engineer (CISE): Applied Information Security
Certified IS Engineer (CISE): Network Security & Performance Monitoring 5 Personnel from network planning, operations, field technicians, rollout, radio access, transmission, core, VAS, IT & services platforms This hands-on practical course ensures participants have the proficiency to monitor, analyse and troubleshoot issues in networks related to security equipment, appliances, policies and processes. Participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework. Issues associated with commonly used security applications, services and devices will be discussed as well as selecting & configuring the appropriate tools to monitor, analyse and troubleshoot performance issues Intermediate Certified IS Engineer (CISE): Network Security & Performance Monitoring
Certified IS Engineer (CISE): (PenTest) Practical Hacker 5 This course has been designed to be applicable to a number of industry/service sectors. It is suitable for a wide range of personnel that work on systems or networks.
This includes Penetration Testers, System administrators, IT systems personnel and engineers (Access, Core, IoT, Web, VAS, etc.)
This intensive hands-on practical course ensures participants are knowledgeable about the security aspects related to IT Systems and have the proficiency to secure the IT environment. It consists of 4 phases:
Phase 1: participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework.
Phase 2: participants will become familiar with a variety of “tools of the trade” and be ‘walked through’ various attack scenarios related to commonly used applications, services and devices on “live” networks & systems.
Phase 3: participants will use the tools and techniques gained in Phase 2 to implement attack on a full “live” network. This phase ensures that participants “can actually do” tasks rather than simply having theoretical knowledge. The facilitator will set up the environments and act as a guide and mentor as required.
Phase 4: is the assessment which consists of both a theory and a practical assessment. In this phase, there is no guidance from the facilitator and participants are expected to demonstrate their “attack” capabilities within a stipulated time frame.
Intermediate Certified IS Engineer (CISE): (PenTest) Practical Hacker
Cloud Computing and Virtualization 5 All those who need to be familiar with cloud services & virtualization This hands-on, practical program provides participants with a practical introduction virtualization and cloud computing. These are arguably two of the most significant enablers in modern computing, allowing for rapid deployment of new services and easier backup and recovery strategies. The course provides an understanding of each and builds skills in deploying and managing virtual environments and ultimately launching different types of cloud service. The learning is facilitated with many practical exercises and activities Intermediate Cloud Computing and Virtualization
Software Development through Java 5 All those who need to be familiar with software development & testing This hands-on, practical program provides participants with a roadmap for structured software development. It will explain the processes required to plan, create and maintain software efficiently using many examples. One of the most common programming environments used today is Java and key to this is the concept of Object Oriented programming. Participants will be given a foundation in these concepts and learn to develop software in Java Intermediate Software Development through Java
Python Development for Network Engineers 5 This course has been designed for network & IT engineers that need to upskill in programming and scripting to be able to automate tasks in virtualized network environments, such as SDN and NFV contexts. This includes System administrators, IT systems personnel and engineers (Access, Core, IoT, Web, VAS, etc.) This hands-on, practical program provides participants with a roadmap for structured software development. It will explain the processes required to plan, create and maintain software efficiently using many examples. One of the most common programming environments used today for networks & NFV environments is Python. Participants will be given a foundation in these concepts and learn to set up a Python environment and develop scripts and software in Python. Once participants have the core concepts & skills in Python, they will then use Python to interact with a SDN and NFV environment using OpenDaylight and OpenStack. The learning is facilitated with many practical exercises and activities, with testing/debugging & documentation throughout. Intermediate Python Development for Network Engineers
Essentials of Software Defined Networking (SDN) and Network Function Virtualization (NFV) 2 Applicable to all staff who need an overview of the technology from a business perspective This program provides an overview of in Software Defined Networking (SDN) and Network Function Virtualization (NFV) from both a business and technical perspective, including service drivers, important standards and key developments as well as its application to the mobile network environment. All of the terminology and jargon is explained in a clear and precise manner. Fundamental “Core” Skill Essentials of Software Defined Networking (SDN) and Network Function Virtualization (NFV)
Essentials of Big Data for Telecoms 2 Applicable to all staff who need an overview of the technology from a business perspective This program provides an overview of big data analytics highlighting its importance for the telecommunications industry. It describes some of the key big data solutions, identifies sources of data & describes different architectures & systems. Hands-on exercises, activities and demos are included throughout to enhance learning. Fundamental “Core” Skill Essentials of Big Data for Telecoms
Essentials of Agile 3 This workshop is designed for those decision makers working in industry where you need to have a grounding “in context” of what Agile is and how it can add value to your business.
The practical aspects of the program are simply to provide awareness of some common tools that technical teams will use and what these tools provide to give you some exposure to “real world” implementation of Agile.
Agile lives in an ever-evolving world of inter-related frameworks and philosophies: Lean; SCRUM; XP; Continuous Integration; Continuous Delivery; and DevOps. In this course, you will learn what Agile is and is not, and how Agile Software Development can fit into a broader Agile Business philosophy.
When properly applied and executed, Agile can drastically increase your ability to manage ever-changing business and technical requirements, reduce your overall level of risk and increase your chances of success. Applied or implemented badly, Agile can offer as much pain as it promises!
Intermediate Essentials of Agile
Practical SDN/NFV 5 Personnel from network planning, operations, field technicians, rollout, radio access, transmission, core, VAS, IT & services platforms This program builds skills in planning, implementing & managing a virtual environment including SDN and NFV implementation. Covers hypervisors, virtual system creation, managing a virtual environment, SDN implementation, OpenFlow, NFV and orchestration. Intermediate Practical SDN/NFV
Practical OpenStack for NFV 3 Personnel from network planning, operations, field technicians, rollout, radio access, transmission, core, VAS, IT & services platforms This hands-on practical course provides participants with a practical introduction to virtualization via Network Function Virtualization (NFV). This enables easier backup and recovery strategies. The course provides an understanding of each and builds skills in deploying and managing both NFV in an OpenStack environment and ultimately supporting different types of service. The learning is facilitated with practical exercises and activities Fundamental “Core” Skill Practical OpenStack for NFV