Security

Size: px
Start display at page:

Download "Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg"

Transcription

1 Security

2 About Founded in 1995, is the largest privately held provider of training, enterprise learning services, and software solutions for information technology (IT) and management professionals. provides end-to-end learning services and solutions that create a quantifiable path to improved performance and increased knowledge for enterprise customers around the globe. In 2006, we acquired Azlan Training, which established us as Europe s largest IT training provider. In 2007, we expanded our global footprint to include IT training, consulting, and services in the Middle East and Africa through the acquisition of Synergy Professional Services. Via the 2009 acquisition of Nexient Learning, we became the largest corporate training provider in Canada. IT and Business Training We offer a broad array of hands-on IT, project management, and professional skills training featuring proprietary core and custom curriculum as well as content from leading companies, including Cisco, Microsoft, Juniper, AVAYA, HP, Citrix, Blue Coat, EC-Council, ISC2, ITIL, PMI, Prometric, VUE, Riverbed and Redhat. Our IT courses include networking, infrastructure optimization, programming, operating systems, security, and telephony. Our business courses feature project management, professional skills, and business process curriculum, including ITIL. Our more than courses span foundational and specialized training and certifications. Technical Services offers wide range of professional services, which cover various products and technologies in multiple areas of specializations through a qualified technical team owning powerful skills matrix. Global Knowledge provides its customers with variety of technical ICT services; consulting services, deployment & implementation services and outsourcing services. Headquarters The corporate headquarters are located in Cary, North Carolina, USA with two international headquarters: European Headquarters: Wokingham, Berkshire in the UK Middle East & Africa Headquarters: Dubai Knowledge Village, Dubai in United Arab Emirates. Employees employs more than 1200 people worldwide, EMEA has 620 employees and MEA has 250 employees.

3 Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare you and your team to battle the latest cyber threats and attacks. Our broad cybersecurity training portfolio was developed as a result of listening to and understanding the needs and strategic goals of enterprises across countries and aligns to government and industry-issued standards and guidelines. Based on these standards and guidelines, we have created a logically organised map of high-level security disciplines, each including competencies and relevant courses to build IT security acumen. What do you have? What s coming at you? Security Disciplines Security Disciplines Who gets in? How do you handle failures? How do you manage the lifecycle? How do you plan for failures? From skills building to certification preparation, we offer training to meet every learning level and need. The corresponding competencies and sample of courses per discipline are highlighted in this document.

4 Security Disciplines What do you have? To protect your assets, you must first know where they are and understand how they are tracked and managed: How are they secured? Who has access to them? Are they tracked and managed? Do you have processes and procedures in place to respond and recover from a security breach quickly? Below is a sample of courses offered per competency and does not represent all courses available. Cloud Cloud Computing Essentials RSA Cloud Security Fundamentals Data Center Infrastructure Management VMware vcloud Director: Install, Configure & Manage VMware vcloud: Overview Business Analysis Essentials Virtualisation VMware vsphere: Install, Configure, Manage VMware vcenter Configuration Manager for Virtual Infrastructure Enterprise Virtualisation using Microsoft Hyper-V Red Hat Enterprise Virtualisation Virtualisation Essentials Virtual Project Management Public Key Infrastructure (PKI) Security+ Prep Course Implementing Active Directory Federation Services 2.0 Information Assurance CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer CSFI: Cyberspace Operations Strategist and Planning Acceptance Testing for Quality Success Cyber Security Compliance & Mobility Certification & Authorization Professional Prep Information Systems Security Engineering Professional Information Systems Security Architecture Professional Information Assurance Overview Cloud/Virtualisation Vendor Training Citrix, VMware, AppSense, Red Hat, Cisco, Microsoft, HP, IBM Secure Coding Foundstone Building Secure Software Foundstone Writing Secure Code Understanding Web Application Security Overview Secure Application Development Seminar Secure Web Application Development Seminar Secure Software Design

5 Security Disciplines What s coming at you? Assess your vulnerabilities, threats and risks. Work to mitigate this risk and use auditing and analysis to confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay one step ahead of the attack. Below is a sample of courses offered per competency and does not represent all courses available. Audit & Analysis Troubleshooting TCP/IP Networks with Wireshark CISA Prep Course CISM Prep Course Information Systems Security Engineering Professional Visualise, Prioritise and Secure your Network Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic ITIL Service Capability: Operational Support and Analysis Risk Assessment and Mitigation Certified Authorization Professional Information Systems Security Engineering Professional Information Systems Security Architecture Professional RSA Archer Administration Risk Management Deploying Cisco ASA Firewall Solutions Implementing Cisco Intrusion Prevention System Cyber Security Compliance & Mobility Foundstone Risk Assessment Principles and Practices Threat Assessment CEH - Certified Ethical Hacker CHFI - Computer Hacking Forensic Investigator CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Data Modeling Vulnerability Assessment CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer Wireless LAN Security and Analysis Advanced VoIP: Securing UC Networks Foundstone Building Secure Software Foundstone Writing Secure Code Social Engineering Social Media Security Professional Social Media Engineering & Forensics Professional Social Media Management & Governance Professional Security+ Prep Course Cybersecurity Foundations Cyber Security Compliance & Mobility

6 Security Disciplines Who gets in? Control who has access by locking down your systems, including hosts, networks, applications and data flows. Below is a sample of courses offered per competency and does not represent all courses available. Communication Security Advanced VoIP: Securing UC Networks Wireless LAN Security and Analysis Troubleshooting TCP/IP Networks with Wireshark SIP Protocol Essentials Cisco Secure System Deploying Cisco ASA VPN Solutions Cisco Advanced SSL VPN Dell SonicWALL Secure Remote Access Basic Administrator (SRABA) IPv6 Security Migration HDI Knowledge Management Foundations: KCS Principles Cybersecurity Compliance & Mobility ITIL Service Lifecycle: Planning, Protection, and Optimisation Global Communications Remote Access Cisco Secure System Implementing Cisco IOS Network Security Deploying Cisco ASA VPN Solutions Check Point Security Expert R75 Junos Security Communication and Remote Access Vendors Cisco, Juniper,Blue Coat, F5, Checkpoint, Dell SonicWall, Citrix, Microsoft Logging and Monitoring Requirements Validation and Testing Unix Fundamentals ITIL Service Capability: Release, Control, and Validation Penetration Testing Certified Ethical Hacker Advanced VoIP: Securing UC Networks Data Modeling Foundstone Ultimate Hacking Cryptography Security+ Prep Course CISSP Foundstone Writing Secure Code Information Systems Security Architecture Professional IDS/IPS/IDP Implementing Cisco Intrusion Prevention System

7 Security Disciplines How do you handle failures? Perform continuous monitoring with event management tools and maximise your ability to provide an immediate response. Use strong policies that are well communicated for a consistent and uniform reaction. Below is a sample of courses offered per competency and does not represent all courses available. Continuous Monitoring/Security Incident and Event Management (SIEM) CSFI - Cyberspace Operations Strategist and Planning CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer Agile Project Management Data Modeling ITIL Service Capability: Operational Support and Analysis Leading Complex Projects Forensics Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Troubleshooting TCP/IP Networks with Wireshark Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Incident Response Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Kepner Tregoe Foundation (Enterprise only) ITIL Service Capability: Operational Support and Analysis Enterprise Incident Response Management Advanced Memory Forensics in Incident Response Reverse Engineering Foundstone Forensic and Incident Response CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer Hacking & Cyber Warfare CSFI: Introduction to Cyber Warfare CSFI: Defensive Cyber Operations Engineer Certified Ethical Hacker Foundstone Ultimate Hacking Database Hacking and Security Training: Securing Databases

8 Security Disciplines How do you manage the lifecycle? Continuously managing changes to the IT landscape of your organisation requires due diligence to ensure your systems are optimally organised and interconnected. Below is a sample of courses offered per competency and does not represent all courses available. Architecture & Design Information Systems Security Architecture Professional RSA Archer Administration Introduction to IPv6: Protocols, Services, and Migration Advanced IPv6 Migration IPv6 Security Migration IPv6 Fundamentals, Design, and Deployment Acceptance Testing for Quality Success ITIL Foundations ITIL Service Lifecycle: Service Design Application Security & Development Secure Software Design Building Secure Software Building a Quality Software Architecture Creating the Systems Architecture Understanding Secure SOA: A Technical Overview Change Management Schedules and Costs Controls Business Analysis Essentials Certification & Authorisation Professional Prep ITIL Service Lifecycle: Service Transition Operations Planning CSFI: Cyberspace Operations Strategist and Planning ITIL Foundations ITIL Service Capability: Service Offerings and Agreements CISSP Prep Course ITIL Service Lifecycle: Service Transition Security Testing Certified Ethical Hacker Acceptance Testing for Quality Success CISA Prep Course Adopting Agile Software Development Practices Business Alignment Data Modeling ITIL Service Lifecycle: Continual Service Improvement Business Process Analysis CISM Prep Course

9 Security Disciplines How do you plan for failures? Ensure your organisation has planned for continuity after an attack. Failures happen; how best do you respond? Below is a sample of courses offered per competency and does not represent all courses available. Business Impact Analysis Data Modeling Schedules and Cost Control Business Analysis Essentials ITIL Service Lifecycle: Service Design Communication Plan Disaster Recovery Data Domain System Administration Symantec Backup Exec 12.x for Windows Servers:Administration Performance Analysis on Data ONTAP Cybersecurity Foundations CISSP Prep Course ITIL Service Lifecycle: Continual Service Improvement Continuity of Operations Information Systems Security Architecture Professional Business Analysis Essentials Agile Project Management Certification Workshop ITIL Service Cabability: Planning, Protection, and Optimisation The courses listed are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually add premium content to our curriculum. Contact us today to learn more. Conclusion The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. Our security curriculum is constantly evolving to keep pace with the threat landscape and the needs of organisations big or small. We are your source for IT security skills building and offer a robust security curriculum ranging from novice to expert. Couple this with premium content, expert instruction and training for every learning style and budget. Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow. Learn More

10 Cybersecurity Portfolio Security Awareness Disciplines Asset Protection Threat Management Access Control Incident Management Configuration Management Contingency Planning Cloud Audit and Analysis Communications Security Audit and Log Analysis Architecture and Design Business Impact Analysis Identity Management Risk Assessment and Mitigation Cryptography Continuous Monitoring/ SIEM Business Alignment Communication Plan Competencies Information Assurance Public Key Infrastructure Social Engineering Threat Assessment IDS/IPS/IDP Logging and Monitoring Forensics Hacking/Cyber Warfare Change Management Operations Planning Continuity of Operations Plan Disaster Recovery Plan Secure Coding Vulnerability Assessment Penetration Testing Incident Response Security Testing Virtualisation Remote Access Reverse Engineering Certification and Accreditation Conclusion The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. With our premium content, expert instruction, flexible and scalable training approach and comprehensive security curriculum, you ll develop a team of cyber warriors who are prepared for battle. More Information Contact your local training advisor for more information about our Security Learning Solutions or send an to info@globalknowledge.net

11 An easier way to manage your training As a professional education company providing learning solutions in over 30 countries worldwide we know how important it is for busy training departments to have at their fingertips accurate and relevant information on their organization s Learning methods training status. Our managed services and online booking and reporting capability simplify access to that information and the overall management of your training. Choose when and how you want your training Classroom Training Managed services: Located in Dubai Knowledge The value of opting for a managed service cannot be underestimated, especially Our expert instructors, the globe with over $4M in when training is just one of many functions you are responsible for. By entrusting hands-on all labs, provides and superior the capacity of runni Different learning styles, training objectives, student locations, and of your learning to, you ll benefit from our business consulting week and serving all Synergy s content provide excellent, budgets demand expertise different ensuring learning your methods. training Experience reflects your has enterprise taught us where it is now, and America regions. SGPS Remo results-oriented training in that a combination where of instructor-led it wants to be tomorrow. and self-paced Importantly, learning we give tends you to a single point of contact to experience in addition to rein the classroom. achieve the best results. ensure consistency and the very highest level of service. and organization also use SGP Reduced cost and administration are measurable benefits that can be reported back upgrades and proofing concep s Collaborative Learning provides an effective to the board, but there are also less tangible and equally as important benefits of knowledge solution with minimum business disruption and maximum On-Site Learning managed services. For example, our Connect program allows us to deliver consistent business benefit. Incorporating learning, no matter a number who is providing of different it, or learning where it tools, is provided. This is because We your bring expert Worldwide instruction Coverage such as remote labs, dedicated podcasts, Global e-learning, Knowledge virtual managed classrooms, service team evening works to agreed Service and Levels comprehensive Global - Knowledge even provides it surgeries, classroom and training, insists on pre-course quality and reading, service across support every forums, aspect of your training, no custom matter - curriculum the EMEA directly (Europe, Middle Ea instructor tutor sessions, what the reference subject or material whether it and is e-learning assessment or materials instructor-led it training delivered to your to facility, countries saving you and has affiliate offi allows the delegates any location to chose throughout where and the when world. they study to achieve both time and EMEA money. region making it the on their desired training Learning objectives. Management Solution: whole EMEA, North America a This fully hosted enterprise learning services solution is built on industry standard In addition, the company work We have found that technology this new for innovative web applications approach and with not only full Oracle aides LMS in the capability. It is easy for company to grow its geograph Virtual Classroom e-learning delegates knowledge you to transfer buy and and gives success us the rate ability but to it scale also to encourages the needs of our worldwide clients them to remain together as a community during the learning process, allowing them to share their knowledge and experiences with each other as well as the instructors. It offers different learning methods to suit each individual s needs and learning style. Choose the right delivery method for you or your team, or talk to our training advisors about a custom, collaborative solution that best meets your needs. Our Virtual Classroom e-learning is just like our facility-based classrooms, featuring live, instructor-led training delivered via the Internet. while providing you with stabl You gain centralized managem activity and budget as well as on individual company promot The Largest Remote Lab Training Locations We set the standards in IT training through our very well equipped classrooms. All of our training centres are equipped to the highest standard and enjoy a continuous programme of refurbishment and renewal to ensure our delegates are comfortable and at ease for the duration of their course. Training Locations across EMEA: Austria Belgium Denmark France Germany Ireland Luxemburg Netherlands Norway Spain Sweden Switzerland United Kingdom Egypt Saudi Arabia United Arab Emirates

12 EMEA HQ - UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0) F +44 (0) E info@globalknowledge.net Egypt: 16 Moustafa Refaat St. Block 1137, Sheraton Heliopolis, Cairo T or F E training@globalknowledge.com.eg Saudi Arabia - Dammam Corniche Plaza Tower (Centre Point Building), Al Corniche Road, Al Jawhara Area Office 103 3rd Floor, Dammam P.O. BOX T or 7737 F E training@globalknowledge.com.sa Austria: Gutheil-Schoder-Gasse 7a A-1101 Vienna T +43 (1) F +43 (1) E info@globalknowledge.at Abu Dhabi: Office 606A, Park Rotana Office Complex, Khalifa Park, Sector E-48, PO Box , Abu Dhabi T /19 F E training@globalknowledge.ae France: 100, Avenue Albert 1er Rueil-Malmaison T +33 (0) F +33 (0) E info@globalknowledge.fr Ireland: 3rd Floor Jervis House Millennium Walkway Dublin 1 T +353 (0) F +353 (0) E info@globalknowledge.ie Saudi Arabia - Riyadh: Al Oruba street, Bldg,# 393, Al Worood, Riyadh P.O. Box Riyadh T F Ext: 3323 E training@globalknowledge.com.sa Spain: Edificio Indocentro Calle de la Retama 7, 6a planta Madrid, ES T F E info.cursos@globalknowledge.es Belgium: Zandvoortstraat Mechelen T F E info@globalknowledge.be Netherlands: Iepenhoeve MR Nieuwegein T +31 (0) F +31 (0) E info@globalknowledge.nl Sweden: Vretenvägen 13, plan 3 Box Solna (Stockholm) T F E info@globalknowledge.se Denmark: Stamholmen 110, 2650 Hvidovre T F E training@globalknowledge.dk Dubai: Dubai Knowledge Village Block 2A, first floor, Office F-68, PO Box T /72 F E training@globalknowledge.ae Norway: Grenseveien 97, N-0663 Oslo, Postboks 6256 Etterstad, N-0603 Oslo, Norway T F E info@globalknowledge.no UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0) F +44 (0) E info@globalknowledge.co.uk Copyright 2014 Training LLC. All rights reserved. reserves the right to change pricing, registration terms and conditions, course content, products or program, course events or cancel a course at any time without notice or liability. Whilst every effort has been made to ensure the accuracy of the information contained within the publication will not accept responsibility for any inadvertent errors. For complete terms and conditions, visit and the logo are trademarks of Training LLC. All other trademarks mentioned are the property of their respective owners.

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence... July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae

More information

www.globalknowledge.net

www.globalknowledge.net www.globalknowledge.net HP training Contents Page About 2 The new HP ExpertOne program 2 HP ExpertOne networking certifications 3 Accredited Integration Specialist (AIS) 5 Accredited Systems Expert (ASE)

More information

Juniper training. www.globalknowledge.net

Juniper training. www.globalknowledge.net Juniper training www.globalknowledge.net Authorised Juniper Networks Training 4 5 Junos-based Certification 6 Additional Support Tracks 6 Additional Juniper Certification Tracks 10 Learning Delivery Methods

More information

www.globalknowledge.no

www.globalknowledge.no www.globalknowledge.no Contents 3 Certification Roadmap 4 Certification Details 9 Program Overview 10 Competencies / Roles 12 Locations has been providing IT training, business skills and consultancy services

More information

www.globalknowledge.se

www.globalknowledge.se www.globalknowledge.se Contents 3 Certification Roadmap 4 Certification Details 9 Program Overview 10 Competencies / Roles 12 Locations has been providing IT training, business skills and consultancy services

More information

Formally known as: Cisco Advanced Services Education (ASE) www.globalknowledge.net

Formally known as: Cisco Advanced Services Education (ASE) www.globalknowledge.net Formally known as: Cisco Advanced Services Education (ASE) Cisco EMEAR Learning Partner of the Year Cisco EMEAR Collaboration Partner of the Year Contents 02 Cisco High-Touch Delivery Learning Services

More information

July 2014 - December 2014. Citrix Course Schedule

July 2014 - December 2014. Citrix Course Schedule July 2014 - December 2014 Citrix Course Schedule 2014 www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae Citrix Certifications Citrix credentials distinguish an elite set of IT

More information

Content. Class-Connect HD. See page 15 for more information

Content. Class-Connect HD. See page 15 for more information Content Cisco TelePresence Portfolio 03 Video Express 04 Video Advanced 05 Video Advanced Plus 06 Video Master 07 Course Overviews 08-09 Career Certifications 10-12 Specialist Courses 13-14 Class-Connect

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

How To Manage An Ip Telephony Service For A Business

How To Manage An Ip Telephony Service For A Business Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,

More information

Optimised Managed IT Services, Hosting and Infrastructure. Keep your business running at peak performance

Optimised Managed IT Services, Hosting and Infrastructure. Keep your business running at peak performance Optimised Managed IT Services, Hosting and Infrastructure Keep your business running at peak performance Managed Services from your Trusted Advisor Looking for comprehensive, expert support? As a trusted

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Head Office: 0118 912 3456. Northern Office: 0113 234 4747. www.globalknowledge.co.uk

Head Office: 0118 912 3456. Northern Office: 0113 234 4747. www.globalknowledge.co.uk Head Office: 0118 912 3456 www.globalknowledge.co.uk Contents 4 MCSA SQL Server 2012 4 MCSE: Data Platform 5 MCSE: Business Intelligence 5 Advanced Certification MCSM 6 Frequently Asked Questions 7 Learning

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Enterprise Class IT Solutions and Services

Enterprise Class IT Solutions and Services Enterprise Class IT Solutions and Services Our success is not simply about what we can do for our customers it s about how we do it Consultancy & sales teams providing a response within two hours Expertise

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Networking Service Offerings

Networking Service Offerings Networking Service Offerings Corporate Fact sheet Incorporated in 1996 Headquartered in Bangalore, with presence in Middle East and the US Clients across the globe India, Middle East, and the US Key Verticals:

More information

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of? As the world becomes a more competitive place, businesses need to respond at lightning speed to take advantage of new opportunities or avoid risks. To enable this, the data centre needs to be a dynamic

More information

Arrow ECS Training Services. Technology training. for the real world

Arrow ECS Training Services. Technology training. for the real world Arrow ECS Training Services Technology training for the real world Arrow ECS Training Services aims to ensure that our end user customers gain maximum return on their technology investments and that our

More information

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,

More information

CLOUD COMPUTING WE VE GOT CLOUD COVERED.

CLOUD COMPUTING WE VE GOT CLOUD COVERED. CLOUD COMPUTING WE VE GOT CLOUD COVERED. Training to maximise your cloud solution We know the development and adoption of Cloud Computing technologies has been rapid. And that fast paced technological

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER SECURITY STORAGE BUSINESS CONTINUITY INFRASTRUCTURE MANAGEMENT Simplify and strengthen information

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

INFRASTRUCTURE SOLUTIONS OVERVIEW

INFRASTRUCTURE SOLUTIONS OVERVIEW INFRASTRUCTURE SOLUTIONS OVERVIEW CONTACT US Head Office Comtec House Albert Road North Reigate Surrey RH2 9EL T: 0800 008 7599 E: infrastructure@comtec.com www.comtec.com infrastructure datacentre communications

More information

F R O N T I E R B U S I N E S S S Y S T E M S

F R O N T I E R B U S I N E S S S Y S T E M S Engineering Comprehensive IT Infrastructure Solutions and Ser vices With its experience and expertise garnered over 14 years, in multiple technologies and domains, Frontier can efficiently design and execute

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

COMPUTACENTER AND NETAPP: TRANSFORMING DATA CENTRES AS ONE

COMPUTACENTER AND NETAPP: TRANSFORMING DATA CENTRES AS ONE COMPUTACENTER AND NETAPP: TRANSFORMING DATA CENTRES AS ONE TRANSFORMING THE DATA CENTRE TO MEET INCREASING BUSINESS DEMAND The demands on IT are growing. Business heads want to provision new services,

More information

Security Assessment and Compliance Services

Security Assessment and Compliance Services Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

HP Security Solutions for Microsoft

HP Security Solutions for Microsoft HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

Application management services that power business transformation

Application management services that power business transformation SOLUTION MAP Application management services that power business transformation Protecting business reputation and revenue through superior application performance Application management for IT and business

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO. Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Citrix XenApp Design & Implementation Service

Citrix XenApp Design & Implementation Service Citrix XenApp Design & Implementation Service G-Cloud 7 November 2015 Citrix XenApp Design and Implementation Service Service Overview RealServe IT s XenApp Design and Implementation Service aims to analyse

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

BUYER S GUIDE. flexible service delivery. Top 5 reasons for adopting SAP Managed Services. Remixing SLA s! Managing the post merger IT landscape

BUYER S GUIDE. flexible service delivery. Top 5 reasons for adopting SAP Managed Services. Remixing SLA s! Managing the post merger IT landscape BUYER S GUIDE IT Managed Services Buyer s Guide for SAP customers May 2012 flexible service delivery Moving to the beat of IT innovation with SAP Managed Services to control costs and harmonise IT landscapes.

More information

Why You Need a Schneider Electric IT Consulting and Integration Service

Why You Need a Schneider Electric IT Consulting and Integration Service IT Consulting and Integration Technology is the foundation of your business. Keep it strong and stable throughout its life cycle with support from Schneider Electric IT Consulting and Integration Services

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CCNA certification by Global Knowledge helps you climb the top!

CCNA certification by Global Knowledge helps you climb the top! CCNA certification by Global Knowledge helps you climb the top! www.globalknowledge.be/ccna info@globalknowledge.be www.globalknowledge.be Cisco Certified Network Associate (CCNA) certification: The starting

More information

EARTHLINK BUSINESS. Simplify the Complex

EARTHLINK BUSINESS. Simplify the Complex EARTHLINK BUSINESS IT Simplify the Complex IS YOUR IT VENDOR A TRUSTED BUSINESS PARTNER? With all of the hype surrounding virtualization, cloud computing, and managed services, how do you assess the best

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

Professional Services

Professional Services Professional Services convergence portfolio of services Introduction Today, the mission of the convergence team is to continually evaluate emerging technologies, evolve our skill sets and offerings, and

More information

Managed Secure Infrastructure Service

Managed Secure Infrastructure Service Managed Secure Infrastructure Service A constantly evolving security threat landscape, increased pressure around compliance and the potentially devastating impact of a security breach means that businesses

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cloud Services for Microsoft

Cloud Services for Microsoft The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation

More information

Reasons Enterprises. Prefer Juniper Wireless

Reasons Enterprises. Prefer Juniper Wireless Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise Consulting and Professional Services Strategic, architectural, operational and implementation expertise How do you ensure the seamless integration of new and existing technologies and services not just

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Training Course ECSA/LPT

Training Course ECSA/LPT Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Get more value from virtualisation

Get more value from virtualisation Get more value from virtualisation Computacenter enables organisations to realise the full benefits of a virtual enterprise with integrated management tools and automated processes GET MORE VALUE FROM

More information

HYBRID CLOUD SERVICES HYBRID CLOUD

HYBRID CLOUD SERVICES HYBRID CLOUD SERVICES SOLUTION SUMMARY SEIZE THE ADVANTAGE From the workplace to the datacenter, the enterprise cloud footprint is growing. It delivers on-demand development resources. It accommodates new digital workloads.

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

Your Infrastructure. Our Responsibility.

Your Infrastructure. Our Responsibility. Know Us The SRM group is four decades old multi-million dollar business house currently operational in 15 cities worldwide. SRM group has made its presence felt in education, training, Electronics, Technology,

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Amr Khalil Amin. Curriculum Vitae. Objective:

Amr Khalil Amin. Curriculum Vitae. Objective: Amr Khalil Amin Address: Dubai, United Arab of Emirates Mobile: +971555955390 Home: +97144562504 Email: eng_akhalil@hotmail.com Curriculum Vitae Objective: Seeking a challenging position within a global

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Customer Learning Catalog

Customer Learning Catalog Hitachi Data Systems Academy Customer Learning Catalog All Regions Release 15.7 Welcome to the HDS Academy Learning Catalog. This valuable tool guides you through your HDS learning roadmap. All learning

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM. DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM. Symantec Technical Services 2015 Symantec Corporation. All rights reserved. Go ahead, you ve got There s More to Protect By

More information

Product Overview. UNIFIED COMPUTING Managed Hosting Compute

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP

More information

Telephony Telephony a platform to connect, communicate and collaborate with confidence

Telephony Telephony a platform to connect, communicate and collaborate with confidence Telephony a platform to connect, communicate and collaborate with confidence Your business needs reliable, flexible and secure communication tools to interact with your employees, customers and business

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Cloud Readiness Consulting Services

Cloud Readiness Consulting Services Cloud Readiness Consulting Services Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping

More information

AVANTGARD Private Cloud and Managed Services

AVANTGARD Private Cloud and Managed Services AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and

More information

Symantec Managed PKI Service Deployment Options

Symantec Managed PKI Service Deployment Options WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains

More information

Tata Communications Data Protection Services. Fully integrated and comprehensive solution for agile, efficient future-proof businesses

Tata Communications Data Protection Services. Fully integrated and comprehensive solution for agile, efficient future-proof businesses Data Protection Services Fully integrated and comprehensive solution for agile, efficient future-proof businesses www.tatacommunications.com/enterprise/datacenter The loss of critical data puts businesses

More information

IBM AND COMPUTACENTER: POWERING AHEAD TOGETHER

IBM AND COMPUTACENTER: POWERING AHEAD TOGETHER IBM AND COMPUTACENTER: POWERING AHEAD TOGETHER DELIVERING BETTER VALUE AND BETTER OUTCOMES Greater globalisation, digitisation and mobilisation can represent both an obstacle and an opportunity. At Computacenter,

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

How to Choose a Managed Network Services Provider

How to Choose a Managed Network Services Provider How to Choose a Managed Network Services Provider 6 Best Practices to Ensure a Thorough Evaluation Get Started Now: 877.611.6342 to learn more. www.megapath.com Could Managed Network Services Be Right

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Cloud Readiness Workshop

Cloud Readiness Workshop Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping costs down. In addition, for many

More information