Corporate Weekend Schedule

Available courses

Microsoft Certified Solutions Associate (MCSA)

SQL 2016 Database Administration

This certification demonstrates your skills with database installation, maintenance, configuration, and provisioning tasks.

ENQUIRE FOR PRICE & DETAILS

More about this course

After completing this course, students will be able to:

  • Describe key capabilities and components of SQL Server.
  • Describe T-SQL, sets, and predicate logic.
  • Write a single table SELECT statement.
  • Write a multi-table SELECT statement.
  • Write SELECT statements with filtering and sorting.
  • Describe how SQL Server uses data types.
  • Write DML statements.
  • Write queries that use built-in functions.
  • Write queries that aggregate data.
  • Write subqueries.
  • Create and implement views and table-valued functions.
  • Use set operators to combine query results.
  • Write queries that use window ranking, offset, and aggregate functions.
  • Transform data by implementing pivot, unpivot, rollup and cube.
  • Create and implement stored procedures.
  • Add programming constructs such as variables, conditions, and loops to T-SQL code

Duration

5 Days

EC-Council’s Certified Ethical Hacker V10

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

ENQUIRE FOR PRICE & DETAILS

More about this course

What is New in CEH Version 10 Course

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Cisco Certified Network Associate (CCNA)

Routing and Switching

This course consists of Interconnecting Cisco Networking Devices, Part 1 (ICND1) and Interconnecting Cisco Networking Devices, Part 2 (ICND2) content merged into a single course. Overlapping content between ICND1 and ICND2 is eliminated and content is rearranged for the purpose of the course flow. Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats.

ENQUIRE FOR PRICE & DETAILS

More about this course

At Program Completion

  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed); Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches;
  • Interswitch connectivity; Configure, verify, and troubleshoot STP, Layer 2 protocols, Layer 2/Layer 3 EtherChannel
  • Routing fundamentals, components of routing table; Configure, verify, and troubleshoot inter-VLAN routing; static routing and dynamic routing; distance vector and link state routing protocols; interior and exterior routing protocols; Configure, verify, and troubleshoot IPv4 and IPv6 static routing
  • Configure, verify, and troubleshoot single area and multi-area OSPF v2 for IPv4 and OSPF v3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

Sage 50 Training for Beginner

This course is open to anyone who is new to Sage 50 Accounting and wants to learn to use the program proficiently. Also for anyone who wants to update their Sage 50 Accounting skills and learn the new automated features.

ENQUIRE FOR PRICE & DETAILS

More about this course

Skills to learn from this course?

  • By enrolling to this course, you’ll experience the simplicity of using Sage 50.
  • Then you’ll begin by learning to navigate in the program and to create and set up a new company.
  • In this course, you’ll move on to understanding settings and their effect on automated features and functions.
  • This course will train you to record daily business.
  • On completion of this course, you’ll record revenues and sales invoices.
  • Having this training keeps your employee data secure.
  • Logging in to this course, you’ll learn how to un-do or adjust transactions.
  • At the end of this course, you’ll develop your knowledge of financial and other reports.

2013 Microsoft Excel Training

Students will build upon the foundational Microsoft® Office Excel® 2013 knowledge and skills already acquired and learn to create advanced workbooks and worksheets, including advanced formulas, tables, PivotTables, PivotCharts and data filtering.

ENQUIRE FOR PRICE & DETAILS

More about this course

Who Should Attend

Students will build upon the foundational Microsoft® Office Excel® 2013 knowledge and skills already acquired and learn to create advanced workbooks and worksheets, including advanced formulas, tables, PivotTables, PivotCharts and data filtering.

At Course Completion

Upon successful completion of this course, you will be able to leverage the power of data analysis and presentation in order to make informed, intelligent organizational decisions. You will:

  • Customize the Excel environment.
  • Create advanced formulas.
  • Analyze data by using functions and conditional formatting.
  • Organize and analyze datasets and tables.
  • Visualize data by using basic charts.
  • Analyze data by using PivotTables, slicers, and PivotCharts.

ITIL FOUNDATION 2011 EDITION

In this exciting and dynamic course, you will get an introduction to the lifecycle of managing IT services to deliver to business expectations. Using an engaging case study, you’ll learn the core disciplines of ITIL best practices. Upon completing this course, you’ll be well positioned to successfully complete the associated ITIL exam required for entry into the future ITIL intermediate-level training courses.

ENQUIRE FOR PRICE & DETAILS

More about this course

Disciplines Covered

  •  Service Strategy
  •  Service Design
  •  Service Transition
  • Service Operation
  •  Continual Service Improvement

Other available weekday courses

EC-Council’s Certified Chief Information Security Officer (CCISO)

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view.

ENQUIRE FOR PRICE & DETAILS

More about this course

Course Content

Domain 1
Governance

Domain 2
Security Risk Management, Controls, & Audit Management

Domain 3
Security Program Management & Operations

Domain 4
Information Security Core Concepts

Domain 5
Strategic Planning, Finance, & Vendor Management

Duration

5 Days

TOGAF® 9.1 Certification Program

This course covers the latest TOGAF version, which is a part of the leading Open Group Enterprise Architecture standard. This course is independent of the vertical you work for: bank, manufacturer, retailer, aerospace, and government agency.

ENQUIRE FOR PRICE & DETAILS

More about this course

What You'll Learn

  • Architecture Development Method (ADM) phases in the development of an enterprise architecture
  • Architecture Governance in development of an enterprise architecture
  • TOGAF Architecture Content Framework
  • Building Blocks concept
  • Stakeholder Management Technique
  • TOGAF Content Metamodel
  • TOGAF recommended techniques when developing an enterprise architecture
  • TOGAF Technical Reference Model and how to customize it to meet an organization’s needs
  • Integrated Information Infrastructure Reference Model
  • Key deliverables of the ADM cycle
  • Partition an enterprise architecture to meet the specific needs of an organization
  • Architecture Repository
  • Apply iteration and different levels of architecture with the ADM
  • Adapt the ADM for security
  • SOA as a style of architecture
  • Architecture maturity models in developing an enterprise architecture
  • Architecture Skills Framework and how to apply it within an organization

 

View all courses