|Programs||Duration||Brief||Skill Level||Request Information|
|Certified IP Associate (CIPA)||5||CIPA builds your skills and capabilities in computer networking. A multi-vendor approach is used (e.g. Cisco®, Huawei®, HP®, ZTE® etc) so that you will be able to work on a variety of different types of equipment. We will lead you through a range of practical "hands on" exercises on "live" networks to build your understanding of how computer networks actually work in practice. In addition, you will learn to use the WireShark analyser as part of this course.||Fundamental|
|Operating Systems Administration (Linux)||5||This program builds skills in installing, configuring and managing a Linux operating system. Covers disk management, user management, command line & GUI, process control, application/service installation & management, network management and shell scripting.|
Target audience: This program is for technical staff of different levels depending on job role/requirements.
|Essentials of Information Security||2||This program provides an introduction to the area of information security, covering both attack and defence aspects. It covers the need for security in organisations, common threats and vulnerabilities as well as best practices in security implementation||Technology Primer||Request Info|
|Certified IT Engineer (CITE): Applied Information Security (Penetration Testing)||5||This program builds skills in securing network infrastructures & services. Covers the range of common system attacks, vulnerabilities & solutions to secure these, as well as key tools, firewall systems, IDS/IPS, NAT, logging & audit.||Intermediate||Request Info|
|Certified IT Engineer (CITE): Network Security & Performance Monitoring||5||This hands-on practical course ensures participants have the proficiency to monitor, analyse and troubleshoot issues in networks related to security equipment, appliances, policies and processes. Participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework. Issues associated with commonly used security applications, services and devices will be discussed as well as selecting & configuring the appropriate tools to monitor, analyse and troubleshoot performance issues||Intermediate||Request Info|