5 Top IT Security Courses to enroll - August 2015 Classes: Morning, Evening & Weekend
- Ethical Hacking ( Mon-Fri, 8am-12pm, 4months)
- Linux System Administration (Mon-Fri, 1-5pm, 4months)
- Network Information Security (Mon-Fri, 5:30pm -8:00pm or 8am-3pm Saturdays only, 4/6months)
- Certified Information Systems Auditor - CISA (9am-2pm, Saturdays only orMon-Fri, 5:30pm -8:00pm, 14 Sessions)
- Postgraduate Diploma in IT Infrastructure, Systems and Security (Mon-Fri, 8am-5pm, 6 months)
Simply visit www.aiti-kace.com.gh/courses register. See brief on courses below or visit site for a comprehensive information.
Please note: Date of payment will determine your batch and actual start date.
We hope you can finally enroll for the course you have been waiting to take.
Thank you
Prince kpasra
See more...
---------------------------------
1. Ethical Hacking
- Fundamental of Computer Networks
- Concepts of Operating System and Administration
- Auditing, Securing Standards and Best practice
- IT Infrastructure management
- Java Programming with Crypto API
- Security Concepts
- Network Defense and Countermeasures (NDC)
- Auditing, Securing standards and Best Practices
- PKI
- Project
2. Linux System Administration
- Installing Linux
- Devices and Drives in Linux File system Hierarchy
- GNOME Basics
- The command-line
- GNU screen, ssh, su, sudo
- Installing webmin
- Fundamentals of Networking
- LAN,WAN,DAN,MAN
- Network Hardware Devices
- IP addressing, IPv6, Sub-netting
- System Administration
- logfiles, permissions,
- Apache, MySQL and PHP scripting
- PHPMyAdmin
- Windows Integration
- Automation
- Customizing your user environment
- Management Development Program
- Project
3. Network Information Security
- Information Security Fundamentals
- Addressing Threats
- Backdoors, Virus, and Worms
- Virtualization
- Password Cracking , Cryptography
- Web Servers and web applications
- Authentication
- Intrusion Detection Systems
- Firewalls and Honeypots
- Hacking Cycle
- Introduction to Ethical Hacking
- Networking Revisited
- Secure Network Protocols , Network Attacks
- Bastion Hosts and DMZ
- Proxy Servers , Virtual Private Network
- Wireless Networks & Security
4. Certified Information Systems Auditor-CISA
- Domain 1 — The Process of Auditing Information Systems
- Domain 2 — Governance and Management of IT
- Domain 3 — Information Systems Acquisition, Development and Implementation
- Domain 4 — Information Systems Operations, Maintenance and Support
- Domain 5 — Protection of Information Assets
5. Postgraduate Diploma in IT Infrastructure, Systems and Security
- Fundamental of Computer Networks
- Concepts of Operating System and Administration
- Auditing, Securing Standards and Best practice
- IT Infrastructure management
- Java Programming with Crypto API
- Security Concepts
- Network Defense and Countermeasures (NDC)
- Auditing, Securing standards and Best Practices
- PKI
- Project
To request for invoice, group or corporate registration forms send email to bdu@aiti-kace.com.gh or call 0302679542 -6 or SMS,Viber, Whatsapp, cordinator on0244441219
visit www.aiti-kace.com.gh/courses register
Thank you.