tgWiB
tgWiB
tgWiB
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Technical Training<br />
COMPTIA<br />
A+ CERTIFICATION (2012 OBJECTIVES)<br />
5 DAYS<br />
In this course, you will acquire the essential skills<br />
and information you will need to install, upgrade,<br />
repair, configure, troubleshoot, optimize, and perform<br />
preventative maintenance of basic personal computer<br />
hardware and operating systems. I L T O L L M L<br />
COMPTIA ADVANCED SECURITY PRACTITIONER<br />
(CASP) – 5 DAYS<br />
In this course, students will examine advanced security<br />
concepts, principles, and implementations that pertain<br />
to enterprise level security. I L T O L L<br />
COMPTIA NETWORK+ CERTIFICATION<br />
(2011 OBJECTIVES) – 5 DAYS<br />
The student will describe the major networking<br />
technologies, systems, skills, and tools in use in<br />
modern networks.Taking this course will help the<br />
student prepare for the N10-005 exam and certification.<br />
I L T O L L M L<br />
COMPTIA SECURITY+ CERTIFICATION<br />
(2011 OBJECTIVES) – 5 DAYS<br />
The CompTIA® Security+® (2011 Objectives) course<br />
is designed to help students prepare for the SY0-301<br />
exam. Students will implement and monitor security<br />
on networks, applications, and operating systems, and<br />
respond to security breaches. I L T O L L M L<br />
COMPTIA STORAGE+ CERTIFICATION – 5 DAYS<br />
Students will gain knowledge of storage concepts,<br />
components, and the ability to work on a storage<br />
networking environment. I L T O L L<br />
COMPTIA LINUX+ CERTIFICATION – 5 DAYS<br />
Students will acquire the skills needed to install and<br />
support one or more distributions of the Linux operating<br />
system and learn information and skills that will be<br />
helpful as students prepare for CompTIA® Linux+<br />
Powered by LPI exams. I L T O L L M L<br />
INFORMATION SECURITY<br />
CERTIFIED ETHICAL HACKER (CEH) – 5 DAYS<br />
This class will immerse the student into an interactive<br />
environment where they will be shown how to scan,<br />
test, hack and secure their own systems. Students then<br />
learn how intruders escalate privileges and what steps<br />
can be taken to secure a system. I L T O L L M L<br />
COMPUTER HACKING FORENSICS<br />
INVESTIGATOR (CHFI) – 5 DAYS<br />
This course will provide participants the necessary skills<br />
to identify an intruder’s footprints and to properly gather<br />
the necessary evidence to prosecute in the court of<br />
law. I L T O L L M L<br />
COMPTIA SECURITY+ CERTIFICATION (2011<br />
OBJECTIVES) – 5 DAYS<br />
The CompTIA® Security+® (2011 Objectives) course<br />
is designed to help students prepare for the SY0-301<br />
exam. Students will implement and monitor security<br />
on networks, applications, and operating systems, and<br />
respond to security breaches I L T O L L M L<br />
CERTIFIED INFORMATION SYSTEMS AUDITOR<br />
(CISA) – 5 DAYS<br />
In this course students will perform evaluations of<br />
organizational policies, procedures, and processes to<br />
ensure that an organization’s information systems align<br />
with overall business goals and objectives. I L T O L L M L<br />
CERTIFIED SOFTWARE QUALITY ENGINEER<br />
(CSQE) – 5 DAYS<br />
This course teaches to ASQ’s objectives to certify<br />
understanding of software quality development and<br />
implementation, software inspection, testing, verification<br />
and validation. I L T O L L<br />
CERTIFIED SOFTWARE TESTER (CSTE) – 5 DAYS<br />
In this course, students will describe the various<br />
testing principles and concepts with a special focus<br />
on the Certified Software Tester (CSTE) examination<br />
objectives. I L T O L L<br />
IAITAM<br />
CERTIFIED HARDWARE ASSET MANAGEMENT<br />
PROFESSIONAL - (CHAMP) – 2 DAYS<br />
Designed to address the numerous issues plaguing<br />
professionals in managing hardware assets, the IAITAM<br />
Certified Hardware Asset Management Professional<br />
(“CHAMP”) Course follows the lifecycle of IT hardware<br />
assets beyond the scope of the cradle to grave<br />
analogy and discusses the business practices that can<br />
best be used to manage those assets efficiently and<br />
cost-effectively. Emphasis is placed on identifying the<br />
policies that enhance lifecycle management. I L T O L L<br />
CERTIFIED IT ASSET DISPOSAL – (CITAD)<br />
2 DAYS<br />
The IAITAM Certified IT Asset Disposal (“CITAD”)<br />
course prepares individuals to manage the IT asset<br />
disposal process within an organization. Best practices<br />
in IT Asset Disposition (“ITAD”) are broken down<br />
from policy management, data security to chain of<br />
custody transitioning. Attendees will take away the<br />
knowledge of how to avoid risk of data loss and public<br />
exposure that surround a breakdown in ITAD process<br />
management. ITAD processes can be a profit center<br />
and area of risk mitigation for those organizations that<br />
embrace the CITAD I L T O L L<br />
COBIT 5<br />
INTRODUCTION TO COBIT 5 –1 DAY<br />
This course will provide existing practitioners and<br />
potential new COBIT® users’ excellent insight into the<br />
new framework and explain the differences between<br />
COBIT®4.1 and COBIT®5. I L T O L L<br />
COBIT 5 FOUNDATION – 3 DAYS<br />
This course provides an overview the main concepts of<br />
IT Governance according to COBIT 5, ISACA ’s latest<br />
governance framework, and how they can be applied.<br />
I L T O L L<br />
28