• 08677 020 250

We're IT experts.

Adopt, Adapt, and Improve through Dandemutande

Why ICT Training?

Dandemutande adheres in promoting and developing ICT skill as part of our mandate to the ICT industry. We provide tools and knowledge that allow ICT professionals and Executives to engage confidently.


LEverage Dandemutande's knowledge hub and experiece

  • • Adopt to emerging new technologies
  • • Increase of competitiveness and improve efficiency
  • • Enhance staff Skills and development
  • • Effectively manage its data and resources
  • • Increased customer satisfaction and customer loyalty, customers are always interested in receiving quick services and deliverables.

our courses

Cyber Security Awareness

This is a Security Awareness Training which is priority for organizations of all sizes as it helps employees understand existing and arising information security concerns. The awareness training helps employees and management understand IT governance issues, recognize security concerns, and learn their relevance to respond accordingly.

Cyber Operations

This is an overview of security operations structures, functions, and activities. It describes general good practices and processes for effective and resilient operations. The course discusses how to effectively manage and operate a security operations center and provide a framework to mature the operations over time. The course addresses various ways that security operations activities are institutionalized such as in a Security Operations Center (SOC)

Network Basics

It features an introduction to networking models, topology, components, and services as well as network standards, copper and optical media types, TCP/IP and Ipv4.

Network Administration

Network management and administration refers to all the activities associated with designing, building, monitoring, and maintaining computer and telecommunication networks.

Network Security

As the internet evolves and computer networks become bigger, network security has emerged as one of the most important factors for companies to consider. It is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-accessible resources

Microsoft Office 365 (Administration)

This demonstrates how an Office 365 administrator can add new users, remove users, buy, or change licenses, create service requests, configure Office 365 services, reset passwords, and see the status of tenants.

Microsoft Office 365 (Security)

Microsoft 365 Security Administrators proactively secure Microsoft 365 enterprise and hybrid environments, implement and manage security and compliance solutions, respond to threats, and enforce data governance.

IT Infrastructure Library (ITIL)

This is a set of detailed practices for IT Services Management that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are neither organization-specific nor technology-specific. improvement.

IT Infrastructure Library (ITIL)

This involves complex and basic management of critical infrastructure and networks by our high-level IT experts. Which involves remote monitoring of networks, servers, and checking and report on security alerts. Management of colocation equipment, rack, and stack, circuit testing, complex cable configurations, equipment testing, setting up a firewall, concentrated troubleshooting.



08677 020 250

Available from 08:00 – 16:30

Email sales@dandemutande.co.zw