Information Technology Program

CCNA Collaboration

Course Information

Overview

The exams and training courses for CCNA Video and CCNA Voice certification have evolved to CCNA Collaboration
certification. This document provides a summary of the topics that have been removed, as well as the incremental topics
that have been added from CCNA Video and CCNA Voice to CCNA Collaboration.

The CCNA Collaboration certification reflects the convergence of voice and video currently taking place in the IT world.
This new certification tests the knowledge and skills expected of today’s in-demand collaboration professionals.

A candidate is required to pass the following two exams to obtain a CCNA Collaboration certification:
 
210-060 (CICD) Implementing Cisco Collaboration Devices 
210-065 (CIVND)  Implementing Cisco Video Network Devices 
 

Domain Comparison of CCNA Video with CCNA Collaboration 

Candidates holding an active CCNA Video certification will have completed the requirements needed to earn a CCNA
Collaboration certification. However, the existing recertification period applies. For example, if your CCNA Video
certification is scheduled for recertification, you must recertify as a CCNA Collaboration candidate before your CCNA
Video certification lapses.

Minor updates to domain topics, as well as to hardware and software, have been made to the previous (VIVND)
curriculum, and these are reflected in the new CIVND content and exam. The tables below highlight the updates.
Candidates are encouraged to pay special attention to the updated portions of the curriculum before attempting to take
the new exams.

 

  

TOGAF 9.1 Level 1 & 2

Course Information

Overview

TOGAF® is the foremost generic framework in the field of IS/IT Architecture. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.

The TOGAF® accredited course examines how practitioners can base their activities on a solid set of processes. It looks at the framework as a whole, including the numerous techniques to assist in organising, governing and now in the latest version, describing architecture. The recommendations on how to adapt the framework to deal with issues such as Security and Service-oriented Architecture are also covered. The course also spans the Learning Points required to take the combined TOGAF® 9.1 Foundation and Certified exams (Level 1 & 2), and during the course delegates will be helped to prepare for this combined exam.

 

 

Snort IDS/IPS

Course Information

Overview

This five (4) day course is designed to introduce the IT security professional to the world's most effective and widely used Intrusion Detection System (IDS), Snort. When the students complete the course they will have;

 

    (1) a fundamental understanding of the inner architecture of Snort;

 

    (2) an ability to write their own custom Snort rules;

 

    (3) configure Snort to output its alerts to a database for further analysis

 

    (4) tune Snort for optimal performance

 

    (5) how to install and configure Snort as an effective IDS/IPS

 

    (6) choose an appropriate GUI interface for analysis

 

This course will be taught with hand-on labs using Snort in a Debian Linux environment.

Web Application Penetration Testing with Kali Linux

Course Information

Overview

Web applications are getting more intricate by the day due to increasing demand for advanced capabilities. Therefore, from the perspective of security, managing apps is also becoming difficult day by day. Even small cracks and crevices in these web applications have caused various organizations to suffer at the cost of millions of dollars. The OWASP standard is being followed by organizations to cater to the prevalent information security threats. Web application security, specifically, handles security of websites, web services and web applications. At a higher level, web application security outlines principles of application security but it is applied exclusively to Internet and Web systems.

Advanced Web Application Security Testing

Course Information

Overview

This course is designed to teach you the advanced skills and techniques required to test web applications today. This advanced pen testing course uses

a combination of lecture,real-world experiences, and hands-on exercises to educate you in the techniques used to test the security of enterprise applications.

We will begin by exploring specific techniques and attacks to which applications are vulnerable. These techniques and attacks use advanced ideas and skills

to exploit the system through various controls and protections. This learning will be accomplished through lectures and exercises using real-world applications.

We will then explore encryption as it relates to web applications. You will learn how encryption works as well as techniques to identify the type of encryption in use within the application.

Additionally, you will learn methods for exploiting or abusing this encryption, again through lecture and labs.

Oracle Business Intelligence

Course Information

Overview

Oracle Business Intelligence Training will:

  • Illustrate how Oracle solutions can help strategize, plan and optimize business operations.
  • Give your business a platform that connects people with information, any time, on any device.
  • Show you how this software can report, model, analyze and forecast.

Oracle Certified Associate Database/Developer

Course Information

Overview

Oracle Certified Associate  Database/Developer

As a Oracle Certified Associate, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities. With your OCA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by Oracle Coprporation the leader in Database Management Systems. 

SQL Fundamental

This course introduces students to the fundamentals of SQL using Oracle Database 11g database technology. In this course students learn the concepts of relational databases and the powerful SQL programming language. This course provides the essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.

The students also learn to use single row functions to customize output, use conversion functions and conditional expressions and use group functions to report aggregated data. Demonstrations and hands-on practice reinforce the fundamental concepts.

In this course, students use Oracle SQL Developer and SQL *Plus as the tool.

Program with PL/SQL

This course introduces students to PL/SQL and helps them understand the benefits of this powerful programming language. In the class, students learn to create PL/SQL blocks of application code that can be shared by multiple forms, reports, and data management applications. Students learn to create anonymous PL/SQL blocks and are introduced to stored procedures and functions. They learn about declaring variables, trapping exceptions and they also learn to declare and control cursors.

In class students learn to develop, execute and manage PL\SQL stored program units like procedures, functions, packages and database triggers. Student also learns to manage object dependencies and recompilation of invalid objects. This course also describes the characteristics and ways of manipulation of large objects. Students are introduced to the utilization of some of the Oracle-supplied packages.

 

Pages