|Course or Certification Name||Category||Location||Mode of learning|
|Certified SAS Base Programmer||Analytics & Statistics tools||Online self study|
|70-247: Configuring and Deploying a Private Cloud with System Center||Cloud Computing||Online self study|
|70-246: Monitoring and Operating a Private Cloud with System Center 2012||Cloud Computing||Online self study|
|Systems Security Certified Practitioner (SSCP)||Cloud Computing||Online self study|
|Red Hat Certified System Administrator - RHCSA||Online self study|
|Microsoft SCCM - Administering and Deploying System Center 2012||Online self study|
|Oracle Certified Professional, Java SE 7 Programmer||Online self study|
|Payment Systems II - Analysis and Trends||Commercial Banking||Online self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||Online self study|
|Certified Information Systems Security Professional (CISSP)||cissp||Classroom|
|PG Diploma in HPC System Administration (PG-DHPCSA)||Hadoop Administration||Classroom|
|PG Diploma in System Software Development(PG-DSSD)||Emerging Web Technologies||Classroom|
|Payment Systems I - Concepts||Commercial Banking||Online self study|
|PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)||Cloud Computing||Classroom|
|Advanced Operating Systems||Relational Databases||Online self study|
A beginner level course for SAS experts, Certified SAS Base Programmer is intended to allow you to begin your analytics career and be ready to prepare for the training. The course lets you scout the tool and a variety of techniques to aid, create data structures and handle errors. After completion of course, you will be able to resolve programming, syntax and data errors.
In this course, you will explore about the basics of private clouds and how they are monitored for performance, health and fulfillment. It also covers the system center 2012 R2 suite of products and how they are used for holistic cloud management. This course focuses on decision making, maintaining service management, resource monitoring and critical thinking. It is one of a series of programs that prepares that learner for Microsoft exam.
This course is aligned with Microsoft Certified Solutions Expert (MCSE): Private Cloud | In this course, you will explore about the basics of private clouds and how they are monitored for performance, health and fulfillment. It also covers the system center 2012 R2 suite of products and how they are used for holistic cloud management. This course focuses on decision making, maintaining service management, resource monitoring and critical thinking. It is one of a series of programs that prepares that learner for Microsoft exam.
The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.
Red Hat Certified System Administrator (RHCSA) is a title given to an IT professional who is able to perform the core system administration skills required in Red Hat Enterprise Linux environments. The credential is earned after successfully passing the Red Hat Certified System Administrator (RHCSA) Exam (EX200). This RHCSA course has been designed by expert professionals to help candidates in their preparation for the exam | With the course’s high quality online learning content and training modules, it will give a boost to the candidate’s career | Aligned with the RHCSA exam syllabus, the course covers various topics like introduction to Gnome and Bash, command-line interface, scripting, advanced networking, remote connections, user and software administration, and other related areas | The candidates get a course completion certificate
Microsoft System Center Configuration Manager (SCCM) certification proves that a candidate has the ability to help businesses manage client computers and devices. This Microsoft SCCM: Administration course has been designed to impart the necessary training and skills to the candidates to install and manage Microsoft System Center Configuration Manager 2012 R2 | Developed by experts in the industry, this course offers quality online content that will help candidates to boost their career prospects | The course covers various areas like administering and deploying, configuration the System Center 2012, performance and health monitoring, and other related topics
Java is a general-purpose object-oriented programming language which is often used due to its extensibility and scalability. The Oracle Certified Professional (OCP), Java SE 7 Programmer certification is designed for individuals who possess a strong foundation in the Java Programming language as well as proven skill in creating Java technology programs. This OCP, Java SE 7 Programmer course offers the right amount of training to the candidates to help in their preparation for the exam | The course has been designed by a group of talented professionals in the industry to help candidates in their effective learning, with quality online content and study materials | It also gives hands-on experience on the Java programming language; covering a wide range of topics like variables, operators, class, handling errors, deploying applications, syntax, concurrency, JDBC, and other related areas | A certificate is awarded to the candidates upon completion of the course
This course is the second of two courses on Payments from TrainingCentral Solutions | The course 'Payment Systems - Analysis & Trends' takes the learner through the various advances in payment instruments, the impact of these changes and the various implementations in key nations around the world. The course also identifies the alternatives which bypass the banking systems in facilitating payments.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.
PG-DHPCSA will educate the aspirants who want to make an impact in the corporate and academic world in the domain of High Performance Computing system administration as System Administrator, Storage Administrator and IT Infrastructure Specialist. The course is also suitable for those who are already working in HPC administration domain to enhance their theoretical and conceptual knowledge as well as those who would like to start career in HPC administration. The collaboration with the different multi-national companies at the level of mutual research interests and customer related projects will ease the path for campus recruitment. At the end of the course the students will be able to manage HPC infrastructure like network, storage, resource and backup management, efficiently design data center, maintain the HADOOP cluster and map reduce technology, explore on HPC applications and solutions, and understand the fundamentals of various cloud techniques and system security
C-DAC has taken up the challenge to address the need for trained system software development professionals by introducing an in-depth course Post Graduate Diploma in System Software Development (PG DSSD) giving emphasis to secure software design & implementation practices as per the Industry needs. Post Graduate Diploma in System Software Development (PG DSSD) is a 22 weeks fulltime course consisting of 9 modules including an industry relevant project and a seminar. C-DAC which is doing pioneering research work in providing system and network security solutions has the requisite expertise to conceive, design to develop and implement training program in system software development. The result of their efforts is the most successful career oriented course “Post Graduate Diploma in System Software Development” (PG DSSD) for Engineers in Electronics, Computer Science and Information Technology and also for Computer Science Post Graduates.
This course is the first of two courses on Payments from TrainingCentral Solutions | Access this course if you wish to be able to define how various payment instruments (both paper-based and electronic) work | Access this course if you wish to familiarise yourself with the detailed processes of National Electronic Funds Tranfer (NEFT) and Real Time Gross Settlement (RTGS) | Access this course if you wish to gain introduction to evolved models such as Target2 and Faster Payment Service (FPS). | Access this course if you wish to describe the legalities and the country-level payment structure that ensure a robust and efficient payment system. | Mobile-based payment systems is expected to be introduced in the next version.
The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security (PG-DITISS) programme has the following focus: | To explore the fundamental concepts of Cyber Security | To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain. | To learn to analyze the threats detection techniques. | To understand the Concepts of Data Centre Management. | To learn & use various techniques for Ethical Hacking and Cyber Forensics. | To understand the applications security implementation. | To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical. | To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.
In this course, we will see all the advances that have led to the state-of-the-art operating system that we know today, covering variety of platforms -- cell phones, multi-core, parallel systems, distributed systems, and cloud computing.