Computer Domain focuses on the delivery of high quality ICT and Business education

Similar documents
Bridges To Opportunity

Brandman University. School of CCNA

Get Qualified. Approved Courses.

Get Qualified. Approved Courses.

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

LINUX / INFORMATION SECURITY

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T:

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

Technology Approved Certifications

Information Technology Cluster

Australian Computer Society ANZSCO ICT Code descriptions v Further updates will be issued in

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Get Qualified. Approved Courses

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Information Technology 2015 Programmes

Field of Study Area of Expertise Certification Vendor Course

Academic Programs INFORMATION TECHNOLOGY

Select IT Consulting Services RFP Technical and Network Support Specialist Services (Lot Group C)

COMPUTER CERTIFICATIONS

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure

Careers in Computers and Certification

EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation. Placeholder for licensee logo

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

The College of Information and Computer Technology

School of Management (University Degree Programmes)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Our instructor-led classroom training courses are delivered by Microsoft Certified Trainers (MCTs) industry-recognized experts

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

School of Management (University Degree Programmes)


Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Connecting PTE to Careers in Idaho

Headquarters: 1 W. Elm St., Suite 125 Conshohocken, Pennsylvania 19428, USA &

IT courses For Senior Managers

NC DIGITAL MEDIA COMPUTING

Recommended Programs Per School

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

IT Technical and Business Applications. Training Catalogue 2011

Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007

INFORMATION TECHNOLOGY IT SPECIALIST PROGRAMS

Principles of Information Assurance Syllabus

CCNA Networking for Home and Small Business (Discovery 1)

Microsoft : : : : Kuala Lumpur Petaling Jaya Penang Johor Bahru

E M P I R E C O L L E G E

Information Systems Security Certificate Program

MICROSOFT CERTIFICATION FAQ s

Microsoft Technologies

What is The Microsoft Certified IT Professional?

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

COMPUTER SCHOOL. Computer Networking. Work anywhere in the world. Build your future the INTEC way

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Network Engineering Technology

capabilities statement

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

How to profit from the growing shortage of IT professionals jobs

Stacey Cumberbatch Commissi oner

Computing 2015/16. courses

GHANA INSTITUTE OF MANAGEMENT AND PUBLIC ADMINISTRATION GIMPA CENTRE FOR I.T. PROFESSIONAL DEVELOPMENT CIPD GIMPA COMPUTER PROFICIENCY LICENCE

How To Get A Computer Science Degree At The University Of Sunderland

Empire College 3035 Cleveland Avenue Santa Rosa, CA

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

Information Technology Resource Services

Information Security Principles and Practices

Kris Madura, MBA, PMP. Security Program Manager

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

CYBER SECURITY TRAINING SAFE AND SECURE

IT and Cyber Security Training Courses

Michigan Technological University. Development of System Administration & Network Security Curriculum

Associate in Science Degree in Computer Network Systems Engineering

Table of Contents. Introduction. Audience. At Course Completion

Hertfordshire Higher Education Consortium Computing Technologies

Minnesota State Community and Technical College Detroit Lakes Campus

Computing. Third Level Courses Higher Diploma in Computing

JOB DESCRIPTION CONTRACTUAL POSITION

Microsoft TS Upgrading MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist

InfoSec Academy Application & Secure Code Track

Information Technology Credentials

Luton International College

Get Qualified. Approved Courses.

Information Technology, Certified Internet. Webmaster & Web Design. Making home learning easy...

Computer Information Technology

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

The Next Generation of Security Leaders

CCNA LAN Switching and Wireless (Exploration 3)

Networking (Exploration 1)

How To Get A Top Paying Certification

Computer and Information Science Division xxx

Access FedVTE online at: fedvte.usalearning.gov

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Most of ecollege courses are also available for a fee if you are not eligible for a free course.

Michelle Govan & Anand Philip Network & Security Engineering

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at

ACTIVE MICROSOFT CERTIFICATIONS:

COMPUTER AND INTERNETWORKING TECHNOLOGIES

Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

Computer Information Science xxx

Computer Security and Investigations

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Transcription:

Computer Domain focuses on the delivery of high quality ICT and Business education Computer Domain forms part of Domain Group (DG) which also incorporates: IIS (International Institute of Studies) which focuses on Higher Education in collaboration with prestigious Universities and other Institutions English Domain an EFL (English as a Foreign Language) School which will be launched in year 2010 Computer Domain (Services) Ltd which is in the ICT services business Nidatech Ltd which offers EDI services in the UAE region Medina Cross Foundation is the charity arm of Domain Group which donates equipment and money to various organizations and individuals throughout the years. Domain Group now operates in Malta, Cyprus and Libya with a representative office in London as well. Computer Domain focuses on the delivery of high quality ICT and Business education including international certification programmes such as Microsoft, CISCO, LPI, EC-Council, (ISC) 2, etc as well as Diplomas such as First Diploma, National Diploma and Higher National Diploma which are all fully recognized and aligned with the relevant EQF (European Qualifications Framework) levels. Undergraduate degrees (BSc and BA) and post graduate degrees (MSc) are provided through the sister organization IIS (International Institute of Studies). Corporate network WiFi facilities Underground parking New computers Large screen projectors in every classroom Fully air-conditioned environment Separate emergency exists Smoke detectors and CCTV security system throughout Full accessible facilities for disabled person Dedicated power sub-station to power up the building Spacious classrooms Study Area/Library Canteen Fully accessible for disabled persons Computer Domain staff compliment is based on full time lecturers, administration and support staff as we believe that quality training can only be achieved by having a loyal and dedicated staff who is always available to cater for the varying needs of our students. Computer Domain accepts students from Malta, EU countries and also non- EU countries creating an interesting mix of cultures which is in line with the globalization reality. Computer Domain also operates its own residence houses for its foreign students. Computer Domain has very ambitious projects for the coming years and will continue to invest heavily both in human resources and infrastructures to ensure it remains at the pole position in the local ICT private educational sector. Computer Domain was established in year 1996 and today is a leading private training organization in Malta which also operates two centres in Cyprus. The main campus of Computer Domain is located in Mosta (Malta) in modern and state-of-the-art facilities which include:

Microsoft Certifications Certifications are available for most Microsoft technologies and skill levels from business workers to IT professionals, developers, technology trainers, and system architects. Pursuing a certification, provides you with up-todate, relevant skills that can not only lead to a more fulfilling career, but offer valuable Microsoft Certified Professional (MCP) benefits, including access to the MCP member site and a vast, global network of other certified professionals. Start your journey today. IT PROFESSIONALS MCTS A Microsoft Certified Technology Specialist (MCTS) certification enables IT professionals to target specific technologies and to distinguish themselves by demonstrating in-depth knowledge and expertise. MCITP A Microsoft Certified IT Professional (MCITP) certification enables IT professionals to demonstrate comprehensive skills in planning, deploying, supporting, maintaining, and optimizing IT infrastructures. MCDST enables IT professionals to demonstrate technical and customer service skills in troubleshooting hardware and software operation issues in Microsoft Windows environments. MCSA A Microsoft Certified Systems Administrator (MCSA) certification enables IT professionals to demonstrate their ability to administer network and systems environments that are based on the Windows operating systems. Specializations include the MCSA: Messaging and the MCSA: Security. MCDBA A Microsoft Certified Database Administrator (MCDBA) certification enables IT professionals to demonstrate their ability to design, implement, and administer Microsoft SQL Server databases. MCSE A Microsoft Certified Systems Engineer (MCSE) certification enables IT professionals to demonstrate their ability to design and implement an infrastructure solution that is based on the Windows operating system and Windows Server software. Specializations include the MCSE: Messaging and the MCSE: Security. A Microsoft Certified Desktop Support Technician (MCDST) certification

Microsoft Certified Business Management Solutions Specialist A Microsoft Certified Business Management Solutions Specialist certification enables IT professionals to demonstrate their proficiency with Microsoft Dynamics and related business products. Microsoft Certified Business Management Solutions Professional A Microsoft Certified Business Management Solutions Professional certification enables IT professionals to demonstrate professional proficiency with Microsoft Dynamics in one of three areas: applications, developer, or installation and configuration. DEVELOPER MCPD A Microsoft Certified Professional Developer (MCPD) certification enables IT professionals to demonstrate comprehensive skills in designing, developing, and deploying applications for a particular job role. These certifications show that you have the skills required to perform the job successfully. MCSD A Microsoft Certified Solution Developer (MCSD) certification enables IT professionals to demonstrate their ability to design and develop leadingedge business solutions with Microsoft development tools, technologies, platforms, and the Windows operating system. ADVANCED CERTIFICATIONS Microsoft Certified Master The Microsoft Certified Master program enables experienced IT professionals to demonstrate and validate their ability to successfully design and implement solutions that meet the most complex business requirements. Microsoft Certified Architect The Microsoft Certified Architect program recognizes and provides advanced certification to practicing architects in an enterprise setting. HOME & OFFICE USER MCAS A Microsoft Certified Application Specialist (MCAS) has advanced business skills with the 2007 Microsoft Office system and Windows Vista. MOS A Microsoft Office Specialist (MOS) is globally recognized for demonstrating advanced skills in using Microsoft desktop software.

CISCO Networking Courses CISCO Networking Academy courses are designed to prepare students for career opportunities, continuing education and globally-recognised certifications. This prepares students for industry-recognised certifications and professional career opportunities in ICT with the following courses: Industry recognised certifications and professional career opportunities in ICT. IT Essentials CCNA Exploration This curriculum teaches networking based on technology, covering protocols and theory at deeper levels reflective of university practices. Students learn the basics of routing, switching and advanced technologies to prepare for the CCNA certification and entry-level networking careers. CCNP This curriculum teaches the advanced skills required to manage end-toend converged network infrastructures and prepares students for the Cisco CCNP certification and enterprise networking professions. Advanced Technologies These courses focus on topics such as security, wireless and voice to prepare students for specialised certifications and professional careers in ICT. This introduction to PC hardware, software and network operating systems prepares students for CompTIA A+, EUCIP IT administrator and CompTIA Server+ certifications and entry-level IT support careers. CCNA Discovery This curriculum teaches networking based on application, covering concepts based on the types of practical networks students may encounter from home and small offices to more complex enterprise models. Students learn the nasics of routing, switching and advanced technologies to prepare for Cisco CCENTTM and CCNA certifications and entry-level networking careers.

Distinguish Yourself. Become a CEH. Certified Ethical Hacker Computer Domain is the exlusive training partner for CEH training in Malta. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Course Outline: Perimeter Defense Policy Creation DDos Attacks Virus Creation Intrusion Detection Social Engineering Buffer Overflows Course is delivered by a foreign professional backing expert. Extensive official CEH course material is provided to all students Hacking tools are included with course material

Linux Professional Institute Computer Domain is the Master Affiliates for Malta and Cyprus for LPI (Linux Professional Institute) certification courses. The LPIC Program The Linux Professional Institute Certification (LPIC) program is designed to certify the competency of IT professionals using the Linux operating system and its associated tools. It is designed to be distribution neutral, following the Linux Standard Base and other relevant standards and conventions. The LPIC program is designed in multiple levels. Determining which tasks were suitable to each level was done using a Job Task Analysis (JTA) survey. As with all of the LPIC exam development processes, the JTA was developed and executed using recognized psychometric processes, to ensure its relevance and high quality. LPIC-1 Junior Level Linux Professional (LPIC-1) To pass Level 1 someone should be able to: Work at the Linux command line. Perform easy maintenance tasks: help out users, add users to a larger system, backup & restore, shutdown & reboot. Install and configure a workstation (including X) and connect it to a LAN, or a stand-alone PC via modem to the Internet. LPIC-2 Advanced Level Linux Professional (LPIC-2) You must have an active LPIC-1 certification to receive LPIC-2 certification, but the LPIC-1 and LPIC-2 exams may be taken in any order. Requirements: Passing Exams 201 and 202 Overview of Tasks: To pass Level 2 someone should be able to: Administer a small to medium-sized site Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a: LAN server (samba) Internet Gateway (firewall, proxy, mail, news) Internet Server (webserver, FTP server) Supervise assistants Advise management on automation and purchases LPIC-3 Senior Level Linux Professional (LPIC-3) The LPIC-3 Certification program represents the culmination of LPI s Certification Program. LPIC-3 is designed for the enterprise-level Linux professional. The program has been developed with the input of hundreds of Linux professionals from around the globe and with input from some of the world s leading technology companies. It also represents the highest level of professional, distribution-neutral Linux certification within the industry.

Edexcel/BTEC Diplomas Edexcel, a Pearson company, is the UK s largest awarding body, offering academic and vocational qualifications and testing to more than 25,000 schools, colleges, employers and other places of learning in the UK and in over 100 countries worldwide. Qualifications include GCSE, AS and A Level, NVQ and our BTEC suite of vocational qualifications from entry level to BTEC Higher National Diplomas, recognised by employers and higher education institutions worldwide. Edexcel delivers 9.4 million exam scripts each year, with more than 90% of exam papers marked onscreen annually. As part of Pearson, Edexcel continues to invest in cutting edge technology that has revolutionised the examinations and assessment system. This includes the ability to provide detailed performance data to teachers and students which helps to raise attainment. BTEC First Diploma for IT Practitioners BTEC National Diploma in Computing BTEC National Diploma for IT Practitioners (Information Systems) BTEC National Diploma for IT Practitioners (Information Technology) BTEC National Diploma for IT Practitioners (Computing and Information Systems) BTEC Higher National Diploma in Computing (Software Development) BTEC Higher National Diploma in Computing (ICT Systems Support) EQF (European Qualifications Framework) All BTEC Diplomas are fully recognised and aligned with EQF Levels as follows: BTEC First Diploma EQF Level 3 BTEC National Diploma EQF Level 4 BTEC Higher National Diploma (HND) EQF Level 5 (equivalent to two yours University degree) The BTEC Higher National Diploma is a direct entry to the last year of the BSc (Hons) degree in Computer Science. How are BTEC qualifications assessed? BTEC qualifications are not exam-based qualifications. Exams work well for some students but others find them rather daunting and struggle to see how they fit into the real world of work. Instead, students study real-life, work-based case studies and complete projects and ssessments, which contribute to achieving each unit studied. Each BTEC Diploma course is made up of units. The number of units is dependent on the level and size of BTEC being studied. In order to complete each unit, students must achieve against a set of outcomes. The assessment criteria address theory with practical exercises. The assessment process is ongoing, so it allows the student to analyse and improve their own performance through their course in much the same way as they would in a real workplace. The projects that students undertake form the basis of their unit results which are graded as a Pass, a Merit or a Distinction.

CISSP Certification Computer Domain is the exclusive training partner for CISSP Courses in Malta. These courses are delivered by a foreign expert. The (ISC)² CISSP CBK Review training programme is the most comprehensive, complete review of information systems security concepts and industry best practices. The training programme (review seminar): Offers a high-level review of the main topics. Identifies areas students need to study. Provides an overview of the scope of the field. The course material, covering the 10 CISSP domains of the CBK, is redesigned and updated for every Review Seminar to reflect the latest information system security issues, concerns, and countermeasures. The following domains are covered in the seminar modules. Access Control Access Controls are a collection of mechanisms that work together to create a security architecture to protect the assets of the information system. Application Security This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security. Continuity and Disaster Recovery Planning This domain addresses the preservation and recovery of business operations in the event of outages. Cryptography The Cryptography domain addresses the principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity. Information Security and Risk Management Security Management entails the identification of an organization s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines. Management tools such as data classification and risk assessment/analysis are used to identify threats, classify assets, and to rate system vulnerabilities so that effective controls can be implemented. Legal, Regulations, Compliance, and Investigation This domain addresses: Computer crime laws and regulations. The measures and technologies used to investigate computer crime incidents.

Operations Security Operations Security is used to identify the controls over hardware, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools, and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process. Physical (Environmental) Security The Physical (Environmental) Security domain provides protection techniques for the entire facility, from the outside perimeter to the inside office space, including all of the information system resources. Security Architecture and Design The Security Architecture and Design domain contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality. Telecommunications and Network Security The Telecommunications and Network Security domain discusses the: Network structures Transmission methods Transport formats Security measures used to provide availability, integrity, and confidentiality Authentication for transmissions over private and public communications networks and media Industries best practices

University Degrees University of Hertfordshire is focused on developing new and creative approaches to learning, teaching and research with a commitment to adding value to employers, enterprise and regional, national and international economies. The University of Hertfordshire is fully accredited and recognised and the Degrees awarded by the University are aligned to the relevant EQF Levels. IIS (International Institute of Studies) is the sister company of Computer Domain Ltd falling within Domain Group (DG). IIS is Malta s support partner for the University of Hertfordshire and is soley focused on the delivery of Higher Education in Malta. The University of Hertfordshire is one of its region s largest employers with over 2,700 staff and a turnover of 181m. With a student community of 23,000, including students from over 85 countries, the university has a global network of over 160,000 alumni (40% of Malta s population). The following degrees are available in Malta and awarded by the University of Hertfordshire: BSc (Hons) in Computer Science BA (Hons) Business Administration MSc Computer Science MSc Distributed Data Management MSc Distributed Systems and Networks MSc Human Computer Interaction MSc Mobile Computing MSc Multimedia Technology MSc Software Engineering

International Exams Computer Domain is an Authorised Testing Centre for Prometric and Pearson VUE and delivers the following exams: 3Com AccessData ACSM Actuate Adaptec Adobe AFP Altiris American College American Power Conversion APBM Apple Applied Biosystems Ariba Aruba Networks Inc. Ascendant Learning SCP ATG Avaya Inc. Testing BEA Systems Brocade Communications Business Objects Check Point Software Technologies Cisco Systems, Inc. Citrix Systems, Inc. CIW COGNOS CompTIA Computer Associates Convergence Technologies Professional (CTP) CWNP Dassault Systemes Dell Computers DI EC Council EMC Enterasys Ericsson Exam Express EXIN F5 Networks FileMaker Fujitsu IT License Fujitsu Limited Middleware Genesys Global Association of Risk Professionals Guidance Software HDI Help Desk Institute Hewlett Packard HIPAA Academy Hitachi Data Systems Huawei Hyperion IBM

ICRM ifs School of Finance ILOG Infoteria Interwoven Intuit Isilon Systems Juniper Network Landesk Linux Professional Institute LNAT Microsoft MRO Software MySQL National Instruments NCR Net Expert Netilla Networks Network Appliances Nokia Siemens Network Nortel Novell Object Management Group Oracle Packateer PatchLink Pegasystems Inc Polycom PostgreSQL CE (SRA OSS ) Pragmatic Marketing PRMIA Radware Riverbed Technology RSA Security Testing SAP SAS Institute SCO Security Certified Program Siemens Enterprise Communications SITA, Inc. SpringSource Storage Network Industry Association Sun Microsystems Sun Microsystems - SAI Program Sybase Symantec TIBCO Software Inc UKCAT UML Technology Institute VMware, Inc. Voice XML Websense Zend Technologies, Ltd. ECDL, ECDL Advanced