Zopim
top of page

Search Results

86 éléments trouvés pour «  »

  • IIBA | CLC Africa

    CERTIFICATION PATH IIBA Training ​ Certification of Capability in Business Analysis™ (CCBA®) The Certification of Capability in Business Analysis™ (CCBA®) course is for business analysts and practitioners who wish to be recognized as experts skilled at conducting BA activities. Business analysts follow a professional approach towards understanding the processes, policies and structure of an enterprise by employing a set of tools and techniques in order to recommend the best possible solutions that drive the organization to accomplish its goals. Download Entry Certificate in Business Analysis™ (ECBA™) ECBA covers the foundational knowledge on business analysis according to the BABOK® Guide and showcases that you have the core knowledge and competencies for the in–demand field of business analysis. Stand out from the crowd - highlight you have the knowledge and be certified by the leading authority in business analysis, IIBA. Download Certified Business Analysis Professional (CBAP®) The Certified Business Analysis Professional™ (CBAP ®) designation is a professional certification for individuals with extensive business analysis (BA) experience. CBAP® recipients are the leading, senior members of the BA community. Download

  • (ISC)² | CLC Africa

    (ISC)² CERTIFICATION PATH Trainings Systems Security Certified Practitioner (SSCP) Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)². Download Certified Information Systems Security Professional (CISSP) Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Download Certified Cloud Security Professional (CCSP) The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by our certified member cybersecurity experts around the globe. Download Certified Authorization Professional (CAP) This course provides you with knowledge about Cisco® Expressway Series solutions enabling business-to-business (B2B) calls, Cisco Mobile, remote access, authentication options, and additional Cisco Expressway Series features. Through a combination of lessons and hands-on labs, you will learn how to leverage collaborative technology to access secure, collaborative work supports including video, voice, content, and remote workloads. This course also prepares you for the 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) exam. Download Certified Secure Software Lifecycle Professional (CSSLP) Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC). Download

  • Services | CLC Africa

    Professional Services Computer Learning Centre provides professional services and consultancy on wide range of Technologies ranging from Cybersecurity , Cloud , Enterprise Networks , Virtualization , Data centre , Infrastructure and Project Management . With over 25 years’ experience we can advise you on best practises when implementing the chosen systems from feasibility study , design , define ( document) , Migrate , implement and evaluation. We have a pool of experienced professional with many years of experience in their chosen specialization. In Todays everchanging world of digital transformation your business needs reliable expertise and experience to define your business strategy. We provide technical consulting on various technologies and International Industry standards Implementation (ISO). Our team of certified professionals provide direction on the latest technologies across different specializations. Start by filling this form First name Company Email Company name Phone Service request Select Course Any additional information Submit

  • AWS Discovery Day Strategies and Tools | CLC Africa

    Strategies and Tools to perform large scale migrations Event description Learn about the AWS strategy and best practices for performing large-scale cloud migrations. Built from the experiences of helping hundreds of enterprise organizations move to the cloud, these proven techniques and tools will help accelerate your successful journey to the AWS Cloud. · Level: Fundamental · Duration: 1.30 hours Key topics covered During this event, you will learn: Describe the primary drivers for moving to the AWS Cloud Describe the migration process Explain the Migration Readiness Assessment Describe the Migration Readiness and Planning process Describe the common application migration strategies List AWS tools and services that can accelerate the migration process Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses Migrating to AWS Resources AWS Ramp-Up Guide: Migration Event outline Section 1: Migration overview · Common migration drivers · Potential barriers to cloud adoption · Elements of a successful journey · The migration process. · Stages of adoption Section 2: Migration Readiness and Assessment (MRA) · Overview · AWS Cloud Adoption Framework · What is the MRA? · Why do an MRA? · When to do an MRA? · How to do an MRA? ​ Section 3: Migration Readiness & Planning (MRP) · When to do an MRP? · Discovery & planning · Analysis · Picking a portfolio discovery tool · Landing zone · Center of excellence · Migration business case · Migration plan · Migration expertise · Operating model · Security and compliance · Shared responsibility model Section 4: Lessons learned and suggested resources · Business justification · Migration strategies · Typical project profile · Suggested resources Intended audience This event is intended for: · IT business decision makers · Individuals who seek an overall understanding of migrating to the cloud Registration is mandatory so please submit your details to secure your place at the event. Click to register East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • EC-Council | CLC Africa

    CERTIFICATION PATH Trainings Certified Ethical Hacker CEH v13 Certified Ethical Hackers, trained in the latest version of CEH v13, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks. You’ll learn to leverage AI for automating threat detection, predicting security breaches, and responding swiftly to cyber incidents. Moreover, you’ll also gain the skills needed to secure AI-driven technologies against potential threats. T Download Fundamentals of Ethical Hacking – FD EH Ethical Hacking Fundamentals (E|HF) is an entry-level security program covering the fundamental concepts of information security. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls. This program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security. The E|HF is designed for those interested in learning the various fundamentals of information security. Download Fundamentals of Network Security - FD NS Network Security Fundamentals (N|SF) is an entry-level security program covering the fundamental concepts of network security. It enables students with the skills to identify information security threats that reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of network security. It provides a solid fundamental knowledge required for a career in network security. This course is designed for those interested in learning the various fundamentals of network security. Download Fundamentals of Computer Forensics -FD CF Computer Forensics Fundamentals (C|FF) is an entry-level security program covering the fundamental concepts of information security. Through this program, students can build skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program gives a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics. The Computer Forensics Fundamentals course significantly benefits students interested in learning the fundamentals of computer forensics. Download EC-Council Security Specialist -ECSS EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data. Download EC-Council Certified Encryption Specialist -ECES The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced: Overview of other algorithms such as Blowfish, Twofish, and Skipjack Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Significant concepts such as diffusion, confusion, and Kerkchoff’s principle. Participants will also be provided with a practical application of the following: How to set up a VPN Encrypt a drive Hands-on experience with steganography Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA. Download Certified SOC Analyst -CSA The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need. Download Certified Threat Intelligence Analyst -CTIA Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. C|TIA is a method-driven Threat Intelligence program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks. Download Disaster Recovery -EDRP The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain business continuity and disaster recovery plan. Download Certified Application Security Engineer (.NET/JAVA) - CASE.NET/CASE JAVA The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security training, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post-development phases of application development. Download EC-Council Certified Security Analyst (ECSA) The EC-Council Certified Security Analyst (ECSA) certification is a security credential like no other. The ECSA program offers a seamless learning progress, continuing where the CEH program left off. Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals. This ECSA penetration testing course provides you with a real world, hands-on penetration testing experience while you prepare to take the ESCA exam. Elevate your ethical hacking skills by utilizing EC-Council’s published penetration testing methodology. Download CCISO-Ec-Council iweek Training EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet. Download ECSA-Ec-Council iweek Training EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet. Download CEH-Ec-Council iweek Training EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet. Download Certified Secure Computer User - CSCU The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure. Download EC-Council Certified Incident Handler -ECIH The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents. The IT incident management training program will enable students to be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals with greater industry acceptance as the seasoned incident handler. Download Computer Hacking Forensic Investigator- CHFI Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered in EC-Council’s CHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery. Download Certified Network Defender Certification- CND The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans. CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). Download

  • AWS Discovery Day Introduction to Cloud | CLC Africa

    Cloud Practitioner Essentials Event description This three-hour event is designed to teach business leaders and IT technical professionals the benefits of computing in the AWS Cloud. We’ll cover AWS services for computing, storage, database management, networking, and content. You will learn how to use AWS services to improve business processes and gain an understanding of how to benefit from AWS security and compliance services. · Level: Fundamental · Duration: 3 hours Key topics covered During this event, you will learn: What the cloud is, and how it works The benefits of the AWS Cloud AWS core services and their common use cases (compute, storage, database, etc.) The basic global infrastructure of the cloud Basic characteristics of deploying and operating in the AWS Cloud The shared responsibility model Basic security and compliance aspects of the AWS platform Intended audience This event is intended for: Business leaders and IT-technical professionals Learners who want to learn about basic cloud concepts, AWS Cloud terminology, and AWS core Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses AWS Cloud Practitioner Essentials AWS Cloud Essentials for Business Leaders AWS Technical Essentials Resources AWS Ramp-Up Guide: Cloud Foundations Registration is mandatory so please submit your details to secure your place at the event. Click to register Event outline Section 1: Introduction to the Cloud and AWS · Benefits of cloud computing · Cloud computing components · Cloud computing deployment models Section 2: Overview of AWS Services · AWS service domains · Compute · Storage · Database · Networking and Content Delivery Section 3: Security and Compliance Overview · Overview of security · Shared responsibility model · AWS security services · AWS compliance Registration is mandatory so please submit your details to secure your place at the event. Duration East African Time Zone: 10a.m to 1p.m West African Time ZONE: 12p.m to 3p.m

  • PMP | CLC Africa

    CERTIFICATION PATH PMP Training ​ Project Management Professional The Project Management Professional (PMP) certification is an internationally-recognized project management certification offered by the Project Management Institute (PMI), a U.S. nonprofit professional organization. It stands out compared to other project management certifications because it is not focused on a particular location, industry or methodology. Instead, it requires that you understand the best practices and principles of project management and also validates that you have the experience, skill and competency required to lead any project and achieve the desired objectives. The versatility of the PMP certification makes it the most-sought-after certification by project managers. Download

  • Fiber Optics | CLC Africa

    CERTIFICATION PATH ETA Training Fiber Optics Installer – FOI A Fiber Optics Installer has a general understanding of optical fiber installation, connectorization, splicing, and testing, is familiar with optical fiber, connector, and splice performance characteristics described in TIA/EIA-568B, ITU-T G.671, ITU-T G.652 and Telcordia GR-326 A Fiber Optic Installer can perform connector endface evaluation as described in TIA/EIA-455-57B, is proficient in optical loss testing as described in TIA/EIA-526-14A, and understands the installation requirements described in articles 770 and 250 of the National Electrical Code. A Fiber Optic Installer is proficient at the installation of connectors on various types fiber of optic cables using various types of epoxies, and can perform mechanical and fusion splicing. Download

  • AWS Discovery Days Getting Started with AWS Training and Certification 

    Getting Started with AWS Training and Certification Training event description Is your organization new to AWS Cloud, or are you interested in trying new services but don’t know where to begin? AWS Training and Certification offers a variety of live and on-demand resources that can help you build skills across a variety of topics like cloud practitioner, solutions architect, machine learning, and more, from beginner to advanced levels. Level: Fundamental Duration: 1 hour 10 minutes Activities This course includes lecture materials, visual presentation, and audience participation. Learning Objectives During this event, you will learn to describe: The cloud skills gap and benefits of training Ramp-up Guides and Learning Paths The benefits of AWS Certification Education Programs at AWS Intended audience This event is intended for: IT leaders Executives Recommended follow-up training and resources We recommend that attendees of this event continue learning with this course: AWS Cloud Practitioner Essentials Registration is mandatory so please submit your details to secure your place at the event. Click to register What is AWS Discovery Days? AWS Discovery Days, hosted by official AWS Training Partners, introduce cloud concepts, including generative AI, security, machine learning, migrations, and modern data strategy. Expert AWS Instructors will help you learn what’s possible in the cloud and how to achieve it with AWS. East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • AWS Discovery Days  Migrating Applications and Databases to AWS 

    Migrating Applications and Databases to AWS Training event description Build the foundational knowledge required to plan and perform lift and shift migrations to the AWS Cloud. In this training you will learn about methodologies for discovering, planning, performing, and tracking migrations by using various AWS tools and services. Level: Fundamental Duration: 60 minutes Activities This course includes lecture materials, visual presentation, and audience participation. Learning Objectives During this event, you will learn to: Describe, at a high level, the AWS services, resources, and tools necessary for migrations of data and databases Describe, at a high level, the AWS services, resources, and tools necessary for migrations of applications and servers. Intended audience This event is intended for: Solutions architects Developers Administrators Recommended follow-up training and resources We recommend that attendees of this event continue learning with this course: AWS Migration Essentials Registration is mandatory so please submit your details to secure your place at the event. Click to register What is AWS Discovery Days? AWS Discovery Days, hosted by official AWS Training Partners, introduce cloud concepts, including generative AI, security, machine learning, migrations, and modern data strategy. Expert AWS Instructors will help you learn what’s possible in the cloud and how to achieve it with AWS. East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • Microsoft | CLC Africa

    CERTIFICATION PATH Microsoft Training Administering Microsoft Azure SQL Solutions This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Download Microsoft 365 Identity and Services This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Download Configuring Windows Server Hybrid Advanced Services Candidates for this exam are responsible for configuring and managing Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. The Windows Server hybrid administrator is tasked with integrating Windows Server environments with Azure services and managing Windows Server in on-premises networks. This role manages and maintains Windows Server IaaS workloads in Azure as well as migrating and deploying workloads to Azure. Download Administering Windows Server Hybrid Core Infrastructure Candidates for this exam are responsible for configuring and managing Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. The Windows Server hybrid administrator is tasked with integrating Windows Server environments with Azure services and managing Windows Server in on-premises networks. This role manages and maintains Windows Server IaaS workloads in Azure as well as migrating and deploying workloads to Azure. Download Development Environment Introduction in Microsoft Dynamics Nav 2018 and Dynamics 365 Training This course focuses on the capabilities and features of the development environment for Microsoft Dynamics NAV 2017 and Dynamics 365 Financials. It explains the basic development concepts and provides an overview of the C/AL programming language and various object types. Download Office 365 Administration and Troubleshooting Office 365 administration and troubleshooting course aims at the needs of Information Technology professionals who take part in administering, configuring, troubleshooting, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. It focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, such as Exchange Online, SharePoint Online and Skype for Business. It also covers security and compliance features of Office 365. Download 20774 Securing Windows Server 2016 This is a five-day course that teaches IT professionals, how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to when they need to. Download Developing SQL Databases This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to developing a database. Download Querying Data with Transact-SQL This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge for other courses in the SQL Server curriculum. Days 4 & 5 teach the remaining skills required to take exam 70-761. Download Microsoft Azure Architect Technologies This exam measures your ability to accomplish the following technical tasks: deploy and configure infrastructure; implement workloads and security; create and deploy apps; implement authentication and secure data; and develop for the cloud and Azure storage. Download Azure Solutions Architect | Microsoft Azure Architect Technologies- AZ-300 This exam measures your ability to accomplish the following technical tasks: deploy and configure infrastructure; implement workloads and security; create and deploy apps; implement authentication and secure data; and develop for the cloud and Azure storage. Download Installation, Storage, and Compute with Windows Server 2016 This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016. Download Networking with Windows Server 2016 This course provides the fundamental networking skills required to deploy and support Windows Server 2016 in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking. Download Analyzing Data with Power BI This three-day instructor-led course provides students with the knowledge and skills to analyze data with Power BI. The primary audience for this course is BI professionals who need to analyze data utilizing Power BI. The secondary audiences for this course are technically proficient business users. Download Analyzing Data with Excel The main purpose of the course is to give students the ability to add BI techniques to Excel data analysis. The course goes beyond the capabilities of tables and charts and uses Pivot Charts, the Excel Data Model, and Power BI. Download Microsoft Azure Administrator This course teaches IT Professionals how to manage their Azure subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. Download Microsoft Azure Fundamentals This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. The course will cover general cloud computing concepts as well as general cloud computing models and services such as Public, Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service (SaaS). Download Identity with Windows Server 2016 This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Download Implementing Microsoft Azure Infrastructure Solutions In this course, you will learn how to provision and manage services in Microsoft Azure. Learn how to implement infrastructure components such as virtual networks, virtual machines, containers, web and mobile apps, and storage in Azure. You will also review how to plan for and manage Azure AD and configure Azure AD integration with on-premises Active Directory domains. This course incorporates materials from the Official Microsoft Learning Product 20533 and can assist you in your preparation for Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions. Download Developing Microsoft Azure Solutions The course is intended for students who have experience building web applications. Students should also have experience with the Microsoft Azure platform and a basic understanding of the services offered in Azure. This course offers students the opportunity to take an existing web application and expand its functionality as part of moving it to Azure. The course does not require any existing experience with the ASP.NET platform but does require experience with C#. certification exam. Download MCSA:Provisioning SQL Databases This course is designed to teach students how to provision SQL Server databases both on premise and in SQL Azure. Download Administering a SQL Database Infrastructure This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additional it will be of use to individuals who develop applications that deliver content from SQL Server databases. Download Microsoft Azure Security Technologies In this course, students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture. Students should have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure. Download Analyzing Data with Power BI The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App. Download Administering Microsoft Exchange Server 2019 Administering Microsoft Exchange Server 2019 certification validates that you have the skills and abilities required to install, configure and manage a Microsoft Exchange Server 2016. A Microsoft Exchange Server is a very powerful mail client, it contains software where you can create and host you own mail servers and you can customize your own setting such as your security. Download Developing Microsoft SharePoint Server 2013 Core Solutions In this course, students learn core skills that are common to almost all SharePoint development activities. These include working with the server-side and client-side object models, developing and deploying features, solutions, and apps, managing identity and permissions, querying and updating list data, managing taxonomy, using workflow to manage business processes, and customizing the user interface. Download Advanced Technologies of SharePoint 2016 This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint 2016 environment. The special areas of focus for this course include implementing high availability, disaster recovery, service application architecture, and Microsoft Business Connectivity Services. This course also focuses on social computing features, productivity, and collaboration platforms and features. Download Planning and Administering SharePoint 2016 In this course, you will learn to deploy, administer, and troubleshoot a Microsoft SharePoint 2016 environment. You’ll learn the guidelines, best practices, and considerations to install, configure, manage, and optimize SharePoint 2016. This course uses Microsoft SharePoint 2016 and incorporates material from the Official Microsoft Learning Product 20339-1: Planning and Administering SharePoint 2016. Download Administering System Center Configuration Manager This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Download Delivering Continous Value with Visual Studio Application Lifecycle Management Delivering Continuous Value with Visual Studio 2012 Application Lifecycle Management. This Jump Start targets application development teams interested in leveraging Application Lifecycle Management (ALM) to improve their development processes and deliver continuous value with Visual Studio 2012. Download Software Testing with Visual Studio Candidates for this course are software testers. They manage the process of running tests, creating and monitoring bugs, and managing and mitigating issues that a software organization has in controlling test coverage for project requirements. The qualified candidate typically has a strong understanding of the software testing role and modern testing practices, and the ability to implement testing practices by using Microsoft technologies. Download Administering Microsoft Visual Studio Team Foundation Server This topic, the third part of the Restore a Single-Server tutorial, teaches you how to install Team Foundation Server (TFS) using the Application-Tier Only wizard. You will also learn how to install the Extensions for SharePoint Products on the new server. Additionally, you will learn how to configure SharePoint Foundation, reporting, and analysis services to work with the new server. Download Developing Microsoft SharePoint Server 2013 Advanced Solutions Learn to implement SharePoint 2013 solutions using Enterprise Search, MMS, BCS, ECM, and WCM, along with Social Computing features and SharePoint apps.This instructor-led course provides SharePoint developers with the skills to implement SharePoint 2013 solutions by using Enterprise Search, Managed Metadata Service (MMS), Business Connectivity Services (BCS), Enterprise Content Management (ECM), Web Content Management (WCM), Social Computing, and SharePoint Apps.This course incorporates materials from the Official Microsoft Learning Product 20489: Developing Microsoft SharePoint Server 2013 Advanced Solutions. You will gain hands-on experience as well as the skills and knowledge needed to prepare for Exam 70-489. Download Developing ASP.NET MVC Web Applications In this course, students will learn to develop advanced ASP.NET MVC applications using .NET Framework tools and technologies. The focus will be on coding activities that enhance the performance and scalability of a web application. ASP.NET MVC will be introduced and compared with Web Forms so that students know when each should/could be used. This course will also prepare the students for exam 70-486. Download Programming in HTML5 with Javascripts and CSS3 This course provides an introduction to HTML5, CSS3, and JavaScript. This course helps students gain basic HTML5/CSS3/JavaScript programming skills and is an entry point into both the Web application and Windows Store apps training paths. The course focuses on using HTML5/CSS3/JavaScript to implement programming logic, define and use variables, perform looping and branching, develop user interfaces, capture and validate user input, store data, and create well-structured applications. The lab scenarios in this course are selected to support and demonstrate the structure of various application scenarios. They are intended to focus on the principals and coding components/structures that are used to establish an HTML5 software application. Download Developing Microsoft Azure and Web Services In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students will also learn how to develop and deploy services to hybrid environments, including on-premises servers and Windows Azure. This course helps people prepare for exam 70-487. Download Advanced Windows Store App Development Using C# In this course the students will learn the more advanced programming skills and techniques that they can use to optimize their Windows Store app and differentiate their app from other apps in the Windows Store. These advanced skills and techniques include a combination of both design and development skills. The students will also learn about supporting the apps that they have published to the Windows Store. Download Essentials of Developing Windows Store Apps Using C# Learn essential programming skills and techniques, including Visual Studio and Expression Blend tools, required to develop Windows Store apps. In this course, you will learn essential programming skills and techniques, for both design and development, to develop Windows Store apps. You will also learn to make the most of Visual Studio and Expression Blend tools. This course uses Visual Studio 2013 and Windows 8.1. = Download Programming C# This training course teaches developers the programming skills that are required for developers to create Windows applications using the C# language. During their five days in the classroom, students review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of the .NET Framework 4.5. The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications. This course uses Visual Studio 2012, running on Windows 8. Download Advanced Windows Store App Development Using HTML 5 and Java Script In this course the students will learn the more advanced programming skills and techniques that they can use to optimize their Windows Store app and differentiate their app from other apps in the Windows Store. These advanced skills and techniques include a combination of both design and development skills. The students will also learn about supporting the apps that they have published to the Windows Store. Download Essentials of Developing Windows Metro Style Apps Using HTML5 and JavaScript In this course students will learn essential programming skills and techniques that are required to develop Windows Store apps. This includes a combination of both design and development skills, as well as ensuring that students are comfortable using and making the most of the Visual Studio and Expression Blend tools. Download Programming in HTML 5 with JavaScript and CSS3 Learn the basics of HTML5/CSS3/JavaScript programming in just three days. That's 50% faster than traditional training. Microsoft's Programming in HTML5 with JavaScript and CSS3 course is your entry point into the Web application training path. Download Advanced Solutions of Microsoft Exchange Server 2013 This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange Server 2013 messaging environment. Download Core Solutions of Microsoft Exchange Server 2013 This course will provide you with the knowledge and skills to plan, deploy, manage, secure, and support Microsoft® Exchange Server 2013. Download Advanced Solutions of Microsoft SharePoint Server 2013 This is follow-up exam to Microsoft 70-331: Core Solutions of SharePoint Server 2013 Download Core Solutions of Microsoft SharePoint Server 2013 This course will provide you with the knowledge and skills to configure and manage a Microsoft® SharePoint Server 2013 environment. This course will teach you how to configure SharePoint Server 2013, as well as provide guidelines, best practices, and considerations that will help you optimize your SharePoint server deployment. This is the first in a sequence of two courses for IT Professionals and will align with the first exam in the SharePoint Server 2013 IT Pro certification. Download Managing Office 365 Identities and Requirements This exam is for the Microsoft 365 Enterprise Administrator role and the Microsoft 365 Certified: Enterprise Administrator Expert Certification. Audience profile Candidates for this exam are Microsoft 365 Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. Download Implementing a Data Warehouse with Microsoft SQL Server This course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL Server 2014, implement ETL with SQL Server Integration Services, and validate and cleanse data with SQL Server Data Quality Services and SQL Server Master Data Services. Download Administering Microsoft® SQL Server® Databases This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related to maintaining a database. Download Querying Microsoft SQL Server® This 5-day instructor-led course provides students with the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server 2014. This course is the foundation for all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. This course helps people prepare for exam 70-461. Download Configuring Advanced Windows Server 2012 R2 Services Get hands-on instruction and practice configuring advanced Windows Server 2012, including Windows Server 2012 R2, services in this five-day Microsoft Official Course. This course is part three in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. n Download Administering Windows Server 2012 Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft Official Course. This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. Download Installing and Configuring Windows Server 2012 R2 Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Download Software Testing Fundamentals This course validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices and network ports. Download HTML5 Application Development Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-375, and build an understanding of these topics: Manage the Application Life Cycle, Build the User Interface by Using HTML5, Format the User Interface by Using CSS, Code by Using JavaScript. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download Gaming Development Fundamentals Are you ready to take your gaming skills to the next level? Look no further! CLC Africa offers specialized Microsoft Gaming Training designed to equip you with the knowledge and expertise needed to excel in the gaming industry. Our comprehensive training program covers various gaming disciplines, including game design, development, programming, and esports management. With a team of industry experts and access to cutting-edge Microsoft technologies, we provide a hands-on learning experience that prepares you for success in the competitive gaming landscape. Whether you aspire to become a game developer, a professional esports player, or a gaming entrepreneur, our training will empower you to unleash your potential and stand out in the gaming industry. Download Microsoft .NET Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-372, and build an understanding of these topics: .NET Framework Concepts, Namespaces and Classes in the .NET Framework, .NET Code Compilation, I/O Classes in the .NET Framework, Security, .NET Languages, and Memory Management. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download Web Development Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-363, and build an understanding of these topics: Programming Web Applications, Working with Data and Services, Troubleshooting and Debugging Web Applications, Working with Client-Side Scripting, and Configuring and Deploying Web Applications. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download Software Development Fundamentals This course is designed to help business professionals, , who work in technical environments, learn the fundamentals and gain a better understanding of software development and application life cycle management. In this course, you will learn how desktop and web applications are developed and the programming logic behind them. This course is designed to help you prepare for the Microsoft Technology Associate (MTA) Exam: 98-361 - Software Development Fundamentals. Download Database Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-364, and build an understanding of these topics: Core Database Concepts, Creating Database Objects, Manipulating Data, Data Storage, and Administering a Database. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download Security Fundamentals In this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security principles. You will focus on operating system security, network security, and security software. The course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-367 - Security Fundamentals, which can be taken outside of the course. Download Networking Fundamentals In this course, you will be introduced to networking concepts in today's increasingly connected and technology-driven businesses. You will learn how communication and information transfers are enabled by networking technologies such as the internet, intranet, and extranet, local area networks, wide area networks, wireless networking, network topologies, and access methods. You will also build foundational knowledge in various networking concepts, including the OSI model, IP addressing, internet protocols, and more. This course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-366 - Networking Fundamentals, which can be taken outside of the course. Download Windows Server ® Administration Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-365, and build an understanding of these topics: Server Installation, Server Roles, Active Directory, Storage, Server Performance Management, and Server Maintenance. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download Windows Operating System Fundamentals This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-349 and build an understanding of these topics: Operating System Configurations, Installing and Upgrading Client Systems, Managing Applications, Managing Files and Folders, Managing Devices, and Operating System Maintenance. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Download

  • 6sigma study | CLC Africa

    6SIGMA STUDY CERTIFICATION PATH 6SIGMA Training Six Sigma Black Belt (SSBB) Six Sigma Black Belt course focuses on providing students with comprehensive understanding of the various Six Sigma tools and techniques useful to improve the production process and minimize defects in the end product with a greater focus on the practical implementation of these tool and techniques in the organization. The participants will definitely be able to use the knowledge you gained in this course in managing sixsigma projects in their respective organizations Download Six Sigma Green Belt (SSGB) Six Sigma Green Belt course focuses on providing students with an understanding of the various Six Sigma tools and techniques useful to improve the production process and minimize defects in the end product with a greater focus on the practical implementation of these tool and techniques in the organization Download

bottom of page