SCITI Training Schedule for January

ITIL Training
Course Objectives
• Identify the key principles and concepts of IT Service Management. • Identify the benefits of implementing ITIL in an organization. • Identify Service Management processes and understands how they map to the Service Lifecycle. • Identify the basic concepts and definitions related to the Service Lifecycle. • Identify the activities and roles involved with the Service Lifecycle. • Identify the relationships among the components of the Service Lifecycle and understand how they map to other components. • Identify the factors that affect the effectiveness of the Service Lifecycle.


Core Solutions of Microsoft SharePoint Server 2013

About this Course
This course will provide you with the knowledge and skills to configure and manage a Microsoft SharePoint Server 2013 environment. This course will teach you how to configure SharePoint Server 2013, as well as provide guidelines, best practices, and considerations that will help you optimize your SharePoint server deployment.

Core Solutions of Microsoft Exchange Server 2013

About this Course
This course will provide you with the knowledge and skills to plan, deploy, manage, secure, and support Microsoft Exchange Server 2013. This course will teach you how to configure Exchange Server 2013 and supply you with the information you will need to monitor, maintain, and troubleshoot Exchange Server 2013. This course will also provide guidelines, best practices, and considerations that will help you optimize performance and minimize errors and security threats in Exchange Server 2013.

CISSP Training
Course Description:
This course trains students in all areas of the security Common Body of Knowledge. They will learn 1) Access Control, 2) Telecommunications and Network Security, 3) Information Security Governance and Risk Management, 4) Software Development Security, 5) Cryptography, 6) Security Architecture and Design, 7) Operations Security, Business Continuity and Disaster Recovery Planning, 9) Legal, Regulations, Investigations and Compliance, 10) Physical (Environmental) Security, and more. There are four processes a candidate must successfully complete to become a certified CISSP. To sit for an exam, a candidate must assert that he or she possesses a minimum of five years of professional experience in the information security field or four years of experience plus a college degree. Professional experience has to be in two or more of these 10 (ISC)² CISSP domains listed above.

Certified Ethical Hacker

Course Description
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks, no real network is harmed. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Certified Information System Auditor

About this course
The field of information systems is growing and changing at an increasingly fast pace. Organizations are investing in and relying on a secure and efficient IT infrastructure to maintain business and meet business goals and objectives. Information systems auditing plays a crucial role in developing and maintaining this business environment. The information systems auditor is responsible for evaluating security in all aspects of the infrastructure and to also guide business leaders in maintaining a secure organization. This course can enable you to evaluate the security and controls of the organization's business structure and governance methods; the policies, procedures, and guidelines used; and the overall security of the business environment. In addition, this course will help you in your preparation if you plan to pursue the ISACA® CISA® certification examination. The intended audience for this course is information systems security professionals and
internal review auditors and other individuals who have an interest in aspects of information systems audit, controls, and security. While this course will help prepare candidates for the CISA exam, it is not the only preparation that should be used. ISACA requires that the successful CISA candidate have at least five years of professional experience; because of this, the CISA exam will draw on material and experience that is beyond the scope of any single training course, most notably covering database administration, network components and theory, software and operating systems, and hardware devices. Candidates who wish to solidify their understanding of this material might choose to take additional training in these areas if they don't feel their professional experience is sufficient.

Certified Information Security Manager -CISM Course

About this Course
This course has been prepared specifically to cover all of ISACA's 2010 CISM® exam objectives and more. Let us give you everything you need to thoroughly prepare you for one of the toughest exams you will ever see. A brand new addition to our courses this year is a comprehensive e-learning package that each delegate will get for free as part of their course booking.
Students will gain the knowledge of the core competencies required of a world class information security professional whether planning to sit for the examination or not, they will have gained this in a structured learning environment. They will have gained the knowledge required for, and have thoroughly prepared for the certification examination in systematic way.

Training Venue –29bOlogun Agbaje off Adeola Odeku, Victoria Island Lagos

Training Duration –5 days (Weekend Schedule available)Starting January.

Email [email protected] more course information and details