Sales & Marketing,marketing management,
Information and Communications,
Customer Service,
Environmental Cleaning,
Personal Services,
Building and Construction,
Information and Communications
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking thei...
Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.1 is an instructor-led course that is presented by Cisco Learning Partners to their end-user customers. This five-day course focuses on using Cisco Catalyst switches and Cisco routers that are connected in LANs and WANs typically found at medium-sized network sites. Upon completing this training course, you should be able to conf...
Strategic Marketing
In this turbulent and fast changing business environment, modern project management methods and tools help organizations achieve their strategic, business and operational objectives. Projects are used to enable change and allow organizations to effectively implement new strategies. Irrespective of the product or service sector, strategic/advanced project management competence require a multidiscip...
Project Management
Stakeholder is anyone who has an influence on the success or failure of your endeavour. Your endeavour can be a project, initiative, career, promotion, strategy execution, relationship with customers, peers, subordinates, superiors. Therefore, balancing the web of relationships of various stakeholders often result in trade-off. A smart manager will influence the trade-off for his/her personal...
Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task focused activities, lab based knowledge checks and facilitative discussions to ensure maximum skill transfer and retention. In addi...
This course is designed for sales personnel, bid managers, project personnel and technical consultants responsible for responding to tenders. The course aims to prepare the participants with the necessary knowledge and skills in reviewing tender documents, understanding thoroughly the requirements of the tender and, thereby, conducting a complete and accurate scoping of the requirements of the ten...
service Management
This course is a five day classroom training relevant for professionals who play a role in the daily implementation and execution of activities covered under Release Control and Validation in order to deliver business value delivered through quality IT services. This course is a free-standing qualification and is also part of the ITIL intermediate capability stream, and one of the modules tha...
Leadership and People Management
Most leadership courses emphasize on the why and what of leadership, i.e. the intangibles. This course focus on who and the how of leadership, i.e. the tangibles that are measurable. The rationale of “we can only improve or manage what can be measured” is the objective of this 2-day leadership competence development course. COURSE OUTLINEThe 2-day action learning workshop covers who ...
This course is a five-day classroom training relevant for professionals who play a role in the daily implementation and execution of activities covered under Service Offering and Agreement in order to deliver business value delivered through quality IT services. This course is a free-standing qualification and is also part of the ITIL intermediate capability stream, and one of the modules tha...
This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) ne...
Administration
This course takes the database administrator beyond the basic tasks covered in the first workshop. The student begins by gaining a much deeper understanding of possibly the most important job of a DBA – backup and recovery. The concepts and architecture that support backup and recovery, along with the steps of how to carry it out in various ways and situations, are covered in detail. This i...
Workplace Safety and Health
The Lifting Supervisors Safety Course is a mandatory course for individuals who are assigned to supervise lifting operation involving a mobile crane or tower crane or any other crane in the workplace.
Entry Requirement: ESS WPLN Level 4 or equivalent & Successfully completed Signalman & Rigger Courses
Provider: AA INTERNATIONAL CONSULTANCY PTE. LTD.
Course Duration34 hours (4 hours of assessment)Full time(4 DAYS)Part Time(4 x SUNs)Legal RequirementWorkplace Safety and Health (Construction) Regulations 2007 reg. 9 (2b) stipulates that no person shall be employed to oversee or supervise any work or process carried out in a worksite unless the person has received adequate safety and health training for the purpose of ensuring that such work or p...
Provider: A1 TRAINING PRIVATE LIMITED
The Java SE 7 Fundamentals course was designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs. Students taking this cour...
Scrum is the leading Agile development methodology for completing complex projects and is usedby top organizations around the world. It was originally designed for software development, but hasproven its value for any complex project.Agile Scrum is as radically different from traditional project management, as agile processes are differentfrom traditional methodologies. Rather than plan, instruct ...
This course starts with an introduction to PL/SQL and proceeds to list the benefits of this powerful programming language. Participants are made aware of how to create PL/SQL blocks of application code that can be shared by multiple forms, reports, and data management applications. In addition, creation of anonymous PL/SQL blocks as well as stored procedures and functions are covered in this cours...
The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover how to effectively manage an Oracle Database instance, configure the Oracle Network Environment and perform database maintenance.Learn To:Create and manage an Oracle Database Instance.Create and manage Storage Structures.Configure the Oracle Network Environment.Create and manag...
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to succes...
Though 90% of strategy failure during implementation, however the dilemma is that every organization, every manager, and every one of us at some point in time needs to strategize implement operate the derived strategy. The objective of this 3-day workshop addresses the amalgam of issues that hinder the successful execution of a strategy. It provides a step-by-step approach to overcome the pit...
This Oracle Database 12c: Managing Multitenant Architecture training helps you gain a conceptual understanding of the multitenant architecture. You'll practice plugging and unplugging databases in multi-tenant container databases, while learning how to create common and local users and administer database security to meet your business requirements.Learn To:Understand the multitenant architecture....