Information Technology
Programs | Duration | Brief | Skill Level | Request Information |
---|---|---|---|---|
Operating Systems Administration (Linux) | 5 | This program builds skills in installing, configuring and managing a Linux operating system. Covers disk management, user management, command line & GUI, process control, application/service installation & management, network management and shell scripting. Target audience: This program is for technical staff of different levels depending on job role/requirements. | Fundamental "Core" Skill | Request Info |
Database Systems & MySQL | 4 | This hands-on practical course provides participants with a practical introduction to the core components for building and managing a database environment. This includes UNIX/Linux basics, administrative functions, designing, implementing & using SQL queries. It also includes an introduction to Big Data and non-relational databases and file systems such as NoSQL and Hadoop. The learning is facilitated with many practical exercises and activities | Intermediate | Request Info |
Certified IT Engineer (CITE): Applied Information Security (Penetration Testing) | 5 | This program builds skills in securing network infrastructures & services. Covers the range of common system attacks, vulnerabilities & solutions to secure these, as well as key tools, firewall systems, IDS/IPS, NAT, logging & audit. | Intermediate | Request Info |
Certified IT Engineer (CITE): Network Security & Performance Monitoring | 5 | This hands-on practical course ensures participants have the proficiency to monitor, analyse and troubleshoot issues in networks related to security equipment, appliances, policies and processes. Participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework. Issues associated with commonly used security applications, services and devices will be discussed as well as selecting & configuring the appropriate tools to monitor, analyse and troubleshoot performance issues | Intermediate | Request Info |
Certified Information Security Engineer (CISE): Penetration Testing | 5 | This intensive hands-on practical course ensures participants are knowledgeable about the security aspects related to IT Systems and have the proficiency to secure the IT environment. It consists of 4 phases: Phase 1: participants will be introduced to the overall concepts of security, and the need for a comprehensive security framework. Phase 2: participants will become familiar with a variety of tools of the trade and be walked through various attack scenarios related to commonly used applications, services and devices on live networks & systems. Phase 3: participants will use the tools and techniques gained in Phase 2 to implement attack on a full live network. This phase ensures that participants can actually do tasks rather than simply having theoretical knowledge. The facilitator will set up the environments and act as a guide and mentor as required. Phase 4: is the assessment which consists of both a theory and a practical assessment. In this phase, there is no guidance from the facilitator and participants are expected to demonstrate their attack capabilities within a stipulated time frame. | Intermediate | Request Info |
Cloud Computing and Virtualization | 5 | This hands-on, practical program provides participants with a practical introduction virtualization and cloud computing. These are arguably two of the most significant enablers in modern computing, allowing for rapid deployment of new services and easier backup and recovery strategies. The course provides an understanding of each and builds skills in deploying and managing virtual environments and ultimately launching different types of cloud service. The learning is facilitated with many practical exercises and activities | Intermediate | Request Info |
Software Development through Java | 5 | This hands-on, practical program provides participants with a roadmap for structured software development. It will explain the processes required to plan, create and maintain software efficiently using many examples. One of the most common programming environments used today is Java and key to this is the concept of Object Oriented programming. Participants will be given a foundation in these concepts and learn to develop software in Java | Intermediate | Request Info |
Python Development for Network Engineers | 5 | This hands-on, practical program provides participants with a roadmap for structured software development. It will explain the processes required to plan, create and maintain software efficiently using many examples. One of the most common programming environments used today for networks & NFV environments is Python. Participants will be given a foundation in these concepts and learn to set up a Python environment and develop scripts and software in Python. Once participants have the core concepts & skills in Python, they will then use Python to interact with a SDN and NFV environment using OpenDaylight and OpenStack. The learning is facilitated with many practical exercises and activities, with testing/debugging & documentation throughout. | Intermediate | Request Info |
Essentials of Software Defined Networking (SDN) and Network Function Virtualization (NFV) | 2 | This program provides an overview of in Software Defined Networking (SDN) and Network Function Virtualization (NFV) from both a business and technical perspective, including service drivers, important standards and key developments as well as its application to the mobile network environment. All of the terminology and jargon is explained in a clear and precise manner. | Fundamental "Core" Skill | Request Info |
Big Data for Telecommunications | 3 | This program develops hands-on skills in big data analytics highlighting its importance for the telecommunications industry and how the outputs of analysis can be used to give competitive advantage. It describes some of the key big data solutions, identifies sources of data & describes different architectures & systems. Extensive hands-on exercises, activities and demos are included throughout to enhance learning using popular platforms including Hadoop, Cloudera, MongoDB and Apache Spark. | Fundamental "Core" Skill | Request Info |
Essentials of Agile | 3 | Agile lives in an ever-evolving world of inter-related frameworks and philosophies: Lean; SCRUM; XP; Continuous Integration; Continuous Delivery; and DevOps. In this course, you will learn what Agile is and is not, and how Agile Software Development can fit into a broader Agile Business philosophy. When properly applied and executed, Agile can drastically increase your ability to manage ever-changing business and technical requirements, reduce your overall level of risk and increase your chances of success. Applied or implemented badly, Agile can offer as much pain as it promises! | Intermediate | Request Info |
Practical SDN/NFV | 5 | This program builds skills in planning, implementing & managing a virtual environment including SDN and NFV implementation. Covers hypervisors, virtual system creation, managing a virtual environment, SDN implementation, OpenFlow, NFV and orchestration. | Intermediate | Request Info |
Practical OpenStack for NFV | 3 | This hands-on practical course provides participants with a practical introduction to virtualization via Network Function Virtualization (NFV). This enables easier backup and recovery strategies. The course provides an understanding of each and builds skills in deploying and managing both NFV in an OpenStack environment and ultimately supporting different types of service. The learning is facilitated with practical exercises and activities | Intermediate | Request Info |
Principles of API Management & Development | 2 | This hands-on, practical program provides participants with a guided approach to implementing and managing APIs, with reference to Telco. It will explain the processes required to plan, design and manage APIs efficiently using many examples, and with reference to industry best practices. The learning is facilitated with many practical exercises and activities throughout using the WSO2 Open API Management platform and associated tools. | Intermediate | Request Info |
Mobile IoT Communications | 5 | IoT/Machine to Machine (M2M) communications is an important growth area both for Telcos and for organisations that wish to communicate with or automate operations over a network. The program will examine aspects & issues related to communication over both fixed line & a variety of wireless networks. You will learn the technical skills and understanding needed to successfully implement IoT communications systems through a hands-on approach. | Intermediate | Request Info |