IT Management Training

IT Infrastructure Library (ITIL) for IT Managers

Duration:24 Hour Training

Training Outline

Introduction to ITSM/ ITIL Configuration Management – with Exercise Service Desk Incident Management Problem Management Change Management – with Case Study Release Management Service Level Management – with Exercise Availability Management – with Case Study Capacity Management – with Case Study IT Service Continuity Management Security Management Financial Management Wrap Up / Review of Sample Exam

Faculty: .

Project Management

Duration: 40 Hour Training

Training Outline

Overview of Project Management terminology  jargon busting! Introduction to the PRINCE methodology Review of key documentation  such as the Project Brief & PID The importance of identifying stakeholders and key role players (such as customers, suppliers, users and project executives) Forming tasks into a Work-Breakdown-Structure, (WBS) The importance of risk analysis (and when you should do it) Using a Gantt chart and identifying the Critical Path Monitoring progress and what to do if its going badly! Bringing the project to a close and reviewing the lessons learnt

Faculty: .

Leadership

Duration:16 Hour Training

Training Outline

Implement practical steps for self-improvement Master the fundamentals of leadership Build confidence Set long-term/visionary goals Understand how leadership styles affect team members and how to adjust those styles to gain commitment Build trust and reduce resistance to change Impact productivity and team effectiveness through sharpening your communication and interpersonal skills

Faculty: .

Information Security Management

Duration:40 Hour Training

Training Outline

Information Security Governance Key information security concepts and components Information security strategy development Relevant information security policies, standards, frameworks, & issuing bodies

Information Risk Management Risk management concepts and frameworks Threat & vulnerability identification Risk assessment analysis, methodologies, & risk treatment options Systematic & structured information risk assessment processes Information security controls & countermeasures Risk, threat, & vulnerability identification & management life cycle

Information Security Program Development & Management Key elements of an effective information security program Information security architecture Constructing an information security program Design, develop, & implement an information security awareness program Establishing metrics to evaluate the effectiveness of information security programs Develop & manage key security controls for networks, operating systems, & application systems Monitor, test, & report on the effectiveness & efficiency of information security controls & compliance with information security policies & standards Define the core processes of systems development & life cycle (SDLC) Providing information security consultation & guidance through reporting & communication

Information Security Incident Management & Response Identifying & analyzing security incidents Develop a security incident response plan Integrating incident response plans with the disaster recovery & business continuity plan (BCP/DR) Identify causes of information security incidents & develop corrective actions Information security emerging issues o Cyber security Regulation & compliance requirements Monitor, identify, & respond to emerging threats & evolving regulatory requirements Requirements for forensic investigations

Faculty: .

Introduction to IT Auditing

Duration:40 Hour Training

Training Outline

IT Audit Overview IT overview IT risks General computer controls overview

Frameworks COSO COBIT ISO17799

Conducting the IT Audit IT audit planning Develop the audit program Conduct fieldwork Wrap-up, conclude, and report

Information Security Overview Key risks Main audit steps

Information Systems Strategy and Planning Overview Key risks Main audit steps

Database Implementation and Support Overview Key risks Main audit steps

Business Continuity Planning Overview Key risks Main audit steps

Information Systems Operations Overview Key risks Main audit steps

Application Systems Implementation and Maintenance Overview Key risks Main audit steps

Relationships with Outsourced Providers Overview Key risks Main audit steps

Business Process Controls Testing Application security controls Input controls Processing controls Output controls

Network Support Overview Key risks Main audit steps

System Software Support Overview Key risks Main audit steps

Hardware Support Overview Key risks Main audit steps

Faculty: .

Introduction to IT Security for Internal Audit

Duration: 40 Hour Training

Training Outline

Security Terms / Concepts & Overview Information Security Defined Why Care? The need for Information Security within the Organization The Information Security Policy and its Importance Finding the Point – What is Driving IT and what are you trying to protect? The Threats  Internal & External Security Incidents.

Case Studies  External & Internal Attacks

Implications of Internet Access How should an Organization approach security?

Primary Personal IT Security Points Anti-Virus Asset Management Physical Security Contingency Planning

Incident Response Detecting an Incident Types of Incidents Who Does it? The Forensic Response Process Validate the Incident Is there a need for Formal Analysis? Identifying Potential Evidence Where to look for Evidence

Legal Issues Irish Legislation Who is responsible for Compliance? Confidentiality Criminal Damages Act & Copyright

Faculty: .

Certified Information Systems Auditor (CISA)

Duration: 40 Hour Training

Training Outline

The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems.

Governance and Management of IT Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organizations strategy.

Information Systems Acquisition, Development and Implementation Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organizations strategies and objectives.

Information Systems Operations, Maintenance and Support Provide assurance that the processes for information systems operations, maintenance and support meet the organizations strategies and objectives.

Protection of Information Assets Provide assurance that the organizations security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Faculty: .

Certified CompTIA Network+

Duration: 40 Hour Training

Training Outline

Basic Network Knowledge Network and Internetwork Concepts Network Topologies Networking Strategies

Servers and Clients Network Operating System Basics Network Clients Directory Services

Introduction to the OSI Model Introduction to the OSI Model Families of Protocols

The Physical Media Data-transmission Media Unbounded Media Signaling Signal Transmissions

The Data Link Layer Data Link Layer Considerations Media Access Control (MAC) and Logical Link Control (LLC) IEEE 802 Specifications

Data Transmission Introduction to Network Connection Devices Network Adapters Putting Data on the Cable Network Topologies Bridges

The Network Layer Addresses Internetwork Connection Devices Routers

The Transport Layer Transport Layer Addressing Issues The Transport Layer Segmenting Process Transport Layer Connection Services

The Session Layer Dialog Control Modes Managing the Session

TCP/IP Fundamentals What is TCP/IP? The TCP/IP Protocol Suite

IP Addressing, Subnetting and Supernetting IP Addressing Interior Gateway Protocols Introduction to Subnetting Supernetting

Accessing and Using a TCP/IP Network Configuring Clients for TCP/IP Networks TCP/IP Suite Utilities Using TCP/IP Suite Utilities to Check Network Connectivity

Remote Access Protocols Remote Access Protocols Examining Remote Connection Options Dial-up Networking

Network Security and Fault Tolerance Security Models Password Security Data Encryption Firewalls and Proxy Servers System Fault Tolerance Backing Up Data

Preparing for Network Installation Planning and Gathering Information Environmental Issues Networking Components and Connectors Compatibility Issues

Maintaining the Network Network Documentation Backup Strategies Virus Protection Patches and other Software Updates

Troubleshooting the Network Exploring Troubleshooting Models Identifying Troubleshooting Tools

Faculty: .

Windows Server 2008 Network Infrastructure, Configuring

Duration: 40 Hour Training

Training Outline

Configuring addressing and services Configuring names resolution Configuring network access Configuring file and print services Monitoring and managing a network infrastructure

Faculty: .

Introducing Cisco Data Center Networking

Duration: 40 Hour Training

Training Outline

Building a Simple Network Implementing a Switched Network IP Addressing Routing on the Cisco Nexus Switch

Faculty: .

Introducing Cisco Data Center Technologies

Duration: 40 Hour Training

Training Outline

Cisco Data Center Fundamentals Concepts Data Center Unified Fabric Storage Networking DC Virtualization Unified Computing

Faculty: .

Implementing Cisco IP Switched Networks

Duration: 40 Hour Training

Training Outline

Analyzing Campus Network Designs Implementing VLANs in Campus Networks Implementing Spanning Tree Implementing Inter-VLAN Routing Implementing First Hop Redundancy in a Campus Environment Implementing a Highly Available Network Minimizing Service Loss and Data Theft in a Campus Network Integrating Wireless LANs into a Campus Network Accommodating Voice and Video in Campus Networks

Faculty: .

Certified Information Systems Security Professional (CISSP)

Duration: 40 Hour Training

Training Outline

Access Control Telecommunications and Network Security Information Security Governance and Risk Management Software Development Security Cryptography Security Architecture and Design Operations Security Business Continuity and Disaster Recovery Planning Legal, Regulations, Investigations and Compliance Physical (Environmental) Security

Faculty: .

Iraq Uzbekistan Central Asia Kyrgystan Vietnam E-Gov China Ghana Niger Rwanda EL SALVADOR: Interconnection Policy Mexico Lighting Africa Pakistan