• info@orbitage.com

Information Security

Information Security

ProgramsDurationBriefSkill LevelRequest Information
Certified IP Associate (CIPA)5CIPA builds your skills and capabilities in computer networking. A multi-vendor approach is used (e.g. Cisco®, Huawei®, HP®, ZTE® etc) so that you will be able to work on a variety of different types of equipment. We will lead you through a range of practical "hands on" exercises on "live" networks to build your understanding of how computer networks actually work in practice. In addition, you will learn to use the WireShark analyser as part of this course.Fundamental
"Core" Skill
Request Info
Operating Systems Administration (Linux)5This program builds skills in installing, configuring and managing a Linux operating system. Covers disk management, user management, command line & GUI, process control, application/service installation & management, network management and shell scripting.
Target audience: This program is for technical staff of different levels depending on job role/requirements.
Fundamental
"Core" Skill
Request Info
Essentials of Information Security2This program provides an introduction to the area of information security, covering both attack and defence aspects. It covers the need for security in organisations, common threats and vulnerabilities as well as best practices in security implementationTechnology PrimerRequest Info
Certified IS Engineer (CISE): Applied Information Security (Penetration Testing)5This program builds skills in securing network infrastructures & services. Covers the range of common system attacks, vulnerabilities & solutions to secure these, as well as key tools, firewall systems, IDS/IPS, NAT, logging & audit.IntermediateRequest Info
Certified IS Engineer (CISE): Network Security & Performance Monitoring5This hands-on practical course ensures participants have the proficiency to monitor, analyse and troubleshoot issues in networks related to security equipment, appliances, policies and processes. Participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework. Issues associated with commonly used security applications, services and devices will be discussed as well as selecting & configuring the appropriate tools to monitor, analyse and troubleshoot performance issuesIntermediateRequest Info