Dandemutande adheres in promoting and developing ICT skill as part of our mandate to the ICT industry. We provide tools and knowledge that allow ICT professionals and Executives to engage confidently.
KEY BENEFITS
This is a Security Awareness Training which is priority for organizations of all sizes as it helps employees understand existing and arising information security concerns. The awareness training helps employees and management understand IT governance issues, recognize security concerns, and learn their relevance to respond accordingly.
This is an overview of security operations structures, functions, and activities. It describes general good practices and processes for effective and resilient operations. The course discusses how to effectively manage and operate a security operations center and provide a framework to mature the operations over time. The course addresses various ways that security operations activities are institutionalized such as in a Security Operations Center (SOC)
It features an introduction to networking models, topology, components, and services as well as network standards, copper and optical media types, TCP/IP and Ipv4.
Network management and administration refers to all the activities associated with designing, building, monitoring, and maintaining computer and telecommunication networks.
As the internet evolves and computer networks become bigger, network security has emerged as one of the most important factors for companies to consider. It is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-accessible resources
This demonstrates how an Office 365 administrator can add new users, remove users, buy, or change licenses, create service requests, configure Office 365 services, reset passwords, and see the status of tenants.
Microsoft 365 Security Administrators proactively secure Microsoft 365 enterprise and hybrid environments, implement and manage security and compliance solutions, respond to threats, and enforce data governance.
This is a set of detailed practices for IT Services Management that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are neither organization-specific nor technology-specific. improvement.
This involves complex and basic management of critical infrastructure and networks by our high-level IT experts. Which involves remote monitoring of networks, servers, and checking and report on security alerts. Management of colocation equipment, rack, and stack, circuit testing, complex cable configurations, equipment testing, setting up a firewall, concentrated troubleshooting.
Available from 08:00 – 16:30
Email sales@dandemutande.co.zw