|Course or Certification Name||Category||Location||Mode of learning|
|CompTIA Cybersecurity Analyst (CSA+)||Cyber Security||24/7 Anywhere||Online self study|
|VMware: Datacenter Virtualization with vSphere 5 - Part 2||Virtualization||24/7 Anywhere||Online self study|
|Exin Cloud Computing (Online Classroom - Flexi Pass)||Cloud Computing||Online Classroom|
|Exin Cloud Computing||Cloud Computing||24/7 Anywhere||Online self study|
|VMware vSphere: Install, Configure, Manage [V6.0]||Virtualization||Classroom|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||24/7 Anywhere||Online self study|
CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification offered by a non-profit trade association, The Computing Technology Industry Association. This CompTIA CSA+ course will provide the requisite training to the candidates to have critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats | Candidates get a boost to their career by gaining expertise in securing and analysing IT assets at the hardware and software levels | The course covers various topics like network architecture, threat identification, threat mitigation, monitoring security issues, and other related areas
VMware, Inc., a subsidiary of Dell Technologies, provides cloud and virtualization software and services. VMware: Datacenter Virtualization with vSphere 5 - Part 2 course discusses VMware Virtual Infrastructure High Availability options built in and available out of the box: vSphere HA and vSphere FT. This course provides a comprehensive training on various topics like clustering, fault tolerance, DRS, vApps, vSphere Security, virtual machines, and other related areas. This course can be used in preparation for the VCP5 exam. However, it is not sponsored or authorized by VMware so does not fully satisfy the training requirements to achieve the certification.
EXIN Cloud Computation certification assesses a candidate’s knowledge in the basics of cloud computing and is provided by EXIN, world's leading provider of independent information management certification and accreditation. | This EXIN Cloud Computing (Online Classroom – Flexi Pass) course has been designed to provide the candidates foundational skills on handling cloud applications and services | Aligned with the foundation certification by EXIN on Cloud Computing, the course offers high-quality online learning content developed by some of the experts in the industry | It covers a variety of topics like the type of clouds, deployment models, architectures, big data and other related topics | A certification is awarded upon successful course completion
Offering IT-related services through internet, EXIN Cloud Computing enables you to expand your skills on handling cloud applications and services at your own ease. It is designed for people who are looking at successfully completing the foundation certification by EXIN on cloud computing. This training program renders candidates with the skills required to successfully implement cloud computing. Candidates will also be familiar with the opportunities and risks to make a business case and assess cloud services. It is the next career step and most sought after domain.
VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 6, which includes VMware ESXi™ 6 and VMware vCenter Server™ 6. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most other VMware technologies in the software-defined data center.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.