IT MANAGEMENT

Become indispensable and the most sought after manager in the tech world

Explore the new trends in Information Technology.

Our IT management skills training course, enables professionals to gain the skills to manage an IT environment, learn to lead with vision, motivate and empower with passion, facilitate effective communication, and delegate with clarity.
This course gives you the fundamental technical aspects of Information Technology. We will learn cloud computing and various realizations of service-oriented computing, cyber-security threats that organizations need to be aware of and learn about the various defense mechanisms available to them and a host of others.

01- CLOUD COMPUTING – MICROSOFT AZURE
MODULE 1: GETTING STARTED WITH MICROSOFT AZURE

This module introduces students to cloud services and various Azure services. It describes how to use the Azure portal to access and manage Azure services and to manage Azure subscription and billing.

Lessons

  • What is cloud computing?
  • What is Azure?
  • Managing Azure
  • Subscription management, support, and billing

Lab: Using the Azure portals

  • Customizing the Azure portal interface
  • Viewing billing, usage, and quotas data
MODULE 2: MICROSOFT AZURE MANAGEMENT TOOLS

This module explains Azure PowerShell and its use in managing Azure subscriptions. It also describes how to use the Azure SDK and the Azure CLI to manage Azure subscriptions.

Lessons

  • What is Azure PowerShell?
  • Azure SDK and Azure CLI

Lab: Using Microsoft Azure management tools

  • Using the Azure PowerShell modules
  • Using the Azure CLI
MODULE 3: VIRTUAL MACHINES IN MICROSOFT AZURE

This module explains how to create and configure virtual machines in Azure and how to manage disks for virtual machines.

Lessons

  • Creating and configuring Azure VMs
  • Configuring Azure VM storage

Lab: Creating a VM in Azure

  • Creating a VM from the Azure portal by using an Azure Marketplace image
  • Verifying the functionality of the VM
  • Configuring storage of a VM
MODULE 4: AZURE WEB APPS

This module explains how to create, configure, and monitor web apps in Azure.

Lessons

  • Creating and configuring Azure web apps
  • Deploying and monitoring Azure web apps

Lab: Creating and managing Azure web apps

  • Creating and configuring an Azure web app
MODULE 5: IMPLEMENTING AZURE NETWORKING

This module explains how to create and implement Azure networks and how to use their components to enhance the resiliency and availability of virtual machines.

Lessons

  • Getting started with Azure networking
  • Getting started with Azure Load Balancer

Lab: Creating and configuring virtual networks

  • Creating a virtual network
  • Creating an Azure load balancer
MODULE 6: INTRODUCTION AZURE STORAGE AND DATA SERVICES

This module explains the features and benefits of Azure storage and data services.

Lessons

  • Understanding Azure Storage options
  • Creating and managing storage
  • Understanding options for relational database deployments
  • Creating and connecting to Azure SQL databases

    Lab: Configuring Azure Storage

    • Creating and configuring an Azure Storage account
    • Creating and managing blobs

    Lab: Creating a SQL Database in Azure

    • Creating a new Azure SQL database in Azure and configuring SQL Server firewall rules
    • Managing content of an Azure SQL database by using SQL Server Management Studio
MODULE 7: INTRODUCTION TO CONTAINERS AND SERVERLESS COMPUTING IN AZURE

This module explains the options for implementing containers and describes the serverless technologies available in Azure.

Lessons

  • Implementing Windows and Linux containers in Azure
  • Introduction to Azure serverless computing

Lab: Implementing containers on Azure VMs

  • Implementing Docker hosts on Azure VMs
  • Deploying containers to Azure VMs
  • Deploying multicontainer applications with Docker Compose to Azure VMs
MODULE 8: CONFIGURING AND MANAGING AZURE AD

This module explains how to create users, domains, and directories in Azure AD, integrate applications with Azure AD, and use Multi-Factor Authentication.

Lessons

  • Overview of Azure AD
  • Manage Azure AD authentication and authorization

Lab: Create and manage Azure Active Directory

At course completion

After completing this course, students will be able to:

  • Describe cloud computing, Azure, and Azure subscriptions.
  • Use Azure PowerShell, the Azure Software Development Kit (SDK), and the Azure command-line interface (CLI) to manage Azure subscriptions.
  • Create and configure virtual machines in Azure, and manage their disks.
  • Create, configure, and monitor web apps in Azure and deploy Azure platform as a service (PaaS) cloud services.
  • Create and configure Azure virtual networks.
  • Create, manage, and configure cloud storage in Azure.
  • Use Azure SQL Database to create, configure, and manage SQL databases.
  • Create and manage Azure AD.
02- INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL)

Course Overview

This course also helps students prepare for the ITIL Foundation Certificate in IT Service Management examination.  There will be reinforcement in the form of exercises throughout the course with the objective of instilling a deeper understanding of IT Service Management.

The focus of the course is to help students understand the value to the business provided by each phase of the Service Management Lifecycle as covered by the 5 core books:

  • Service Strategy
  • Service Design
  • Service Transition
  • Service Operation
  • Continual Service Improvement

There is particular importance placed on developing an underlying service culture within the IT organization. Topics covered include:

  • Introduction to Service Management
  • The importance of Service Management
  • Definition of a Service and Service Management
  • The need for a service culture
  • Service Management as a practice
  • The Service Lifecycle
03- COBIT 5 FOUNDATION

Course Overview

COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. It helps enterprises create optimal value from IT by maintaining a balance between realizing benefits and optimizing risk levels and resource use. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking in both the full end-to-end business and IT functional areas of responsibility, while considering the IT-related interests of internal and external stakeholders. COBIT 5 is generic and useful for enterprises of all sizes, including commercial, not-for-profit, or public sector.

In this course interactive course, you will learn about the need for an IT governance framework and how COBIT addresses this need by providing the latest insights into enterprise-wide governance of IT. Using a logical and example-driven approach, you will cover the elements and supporting materials of the COBIT framework.

Course Outline

COBIT 5 is based on five key principles for governance and management of enterprise IT:

Principle 1: Meeting Stakeholder Needs

Principle 2: Covering the Enterprise End-to-End

Principle 3: Applying a Single, Integrated Framework

Principle 4: Enabling a Holistic Approach

Principle 5: Separating Governance from Management

 

The COBIT 5 framework describes seven categories of enablers:

Principles, policies and frameworks are the vehicles to translate the desired behaviour into practical guidance for day-to-day management.

Processes describe an organized set of practices and activities to achieve certain objectives and produce a set of outputs in support of achieving overall IT-related goals.

Organizational structures are the key decision-making entities in an enterprise.

Culture, ethics and behaviour of individuals and of the enterprise are very often underestimated as a success factor in governance and management activities.

Information is required for keeping the organization running and well governed, but at the operational level, information is very often the key product of the enterprise itself.

Services, infrastructure and applications include the infrastructure, technology and applications that provide the enterprise with information technology processing and services.

People, skills and competencies are required for successful completion of all activities, and for making correct decisions and taking corrective actions.

04- IT GOVERNANCE RISK AND CONTROL
MODULE 1: SECURITY AND RISK MANAGEMENT (SECURITY, RISK, COMPLIANCE, LAW, REGULATIONS, AND BUSINESS CONTINUITY)
  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethics
  • Security policies, standards, procedures and guidelines
  • Business continuity requirements
  • Personnel security policies
  • Risk management concepts
  • Threat modelling
  • Risk considerations
  • Security education, training, and awareness 
MODULE 2: ASSET SECURITY (PROTECTING SECURITY OF ASSETS)
  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements (e.g. markings, labels, storage)
MODULE 3: SECURITY ENGINEERING (ENGINEERING AND MANAGEMENT OF SECURITY)
  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security
MODULE 4: COMMUNICATION AND NETWORK SECURITY (DESIGNING AND PROTECTING NETWORK SECURITY)
  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks
MODULE 5: IDENTITY AND ACCESS MANAGEMENT (CONTROLLING ACCESS AND MANAGING IDENTITY)
  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service (e.g. cloud identity)
  • Third-party identity services (e.g. on-premise)
  • Access control attacks
  • Identity and access provisioning lifecycle (e.g. provisioning review)
MODULE 6: SECURITY ASSESSMENT AND TESTING (DESIGNING, PERFORMING, AND ANALYZING SECURITY TESTING)
  • Assessment and test strategies
  • Security process data (e.g. management and operational controls)
  • Security control testing
  • Test outputs (e.g. automated, manual)
  • Security architectures vulnerabilities
MODULE 7: SECURITY OPERATIONS (FOUNDATIONAL CONCEPTS, INVESTIGATIONS, INCIDENT MANAGEMENT, AND DISASTER RECOVERY)
  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns
MODULE 8: SOFTWARE DEVELOPMENT SECURITY (UNDERSTANDING, APPLYING, AND ENFORCING SOFTWARE SECURITY)
  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact
05- CYBERSECURITY THREATS AND VULNERABILITIES
MODULE 1: ASSESSING INFORMATION SECURITY RISK
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
MODULE 2: CREATING AN INFORMATION ASSURANCE LIFE-CYCLE PROCESS
  • Evaluate Information Assurance Lifecycle Models
  • Align Information Security Operations to the Information Assurance Lifecycle
  • Align Information Assurance and Compliance Regulations
MODULE 3: ANALYZING THREATS TO COMPUTING AND NETWORK ENVIRONMENTS
  • Identify Threat Analysis Models
  • Assess the Impact of Reconnaissance Incidents
  • Assess the Impact of Systems Hacking Attacks
  • Assess the Impact of Malware
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
MODULE 4: DESIGNING SECURE COMPUTING AND NETWORK ENVIRONMENTS
  • Information Security Architecture Design Principles
  • Design Access Control Mechanisms
  • Design Cryptographic Security Controls
  • Design Application Security
  • Design Computing Systems Security
  • Design Network Security
MODULE 5: OPERATING SECURE COMPUTING AND NETWORK ENVIRONMENTS
  • Implement Change Management in Security Operations
  • Implement Monitoring in Security Operations
MODULE 6: ASSESSING THE SECURITY POSTURE WITHIN A RISK MANAGEMENT FRAMEWORK
  • Deploy a Vulnerability Management Platform
  • Conduct Vulnerability Assessments
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
MODULE 7: COLLECTING CYBER-SECURITY INTELLIGENCE INFORMATION
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Security Intelligence Sources
MODULE 8: ANALYZING CYBER-SECURITY INTELLIGENCE INFORMATION
  • Analyze Security Intelligence to Address Incidents
  • Use SIEM Tools for Analysis
MODULE 9: RESPONDING TO CYBER-SECURITY INCIDENTS
  • Deploy an Incident Handling and Response Architecture
  • Perform Real-Time Incident Handling Tasks
  • Prepare for Forensic Investigation
MODULE 10: INVESTIGATING CYBER-SECURITY INCIDENTS
  • Create a Forensic Investigation Plan
  • Securely Collect Electronic Evidence
  • Identify the Who, Why, and How of an Incident
  • Follow Up on the Results of an Investigation
MODULE 11: AUDITING SECURE COMPUTING AND NETWORK ENVIRONMENTS
  • Deploy a Systems and Processes Auditing Architecture
  • Prepare for Audits
  • Perform Audits Geared Toward the Information Assurance Lifecycle

Here’s what you stand to gain