• Home
  • Course Catalog
  • Contact Us
  • Request info
    Contact Us
    First Name*
    Last Name*
    Email
    Phone
    Questions/Comments
    Lead Status
    Lead Source*
    Referral Information
    External Referrer
    Partner SMEC ID
    Enter text from the pic*

    IT and Software Development

    Active filters

    This certificate in data analytics provides an overview of topics in statistics and their applications in a variety of fields. This certificate will present the basics of quantitative analysis and its increasing use in today's professional landscape. Learners are exposed to quantitative decision-making tools and techniques, which tie into real-world case studies.

    The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.

    Blockchain, the cornerstone of a decentralization strategy, is a distributed database that is replicated across multiple nodes to enable immutable, permanent, transparent, and secure record-keeping of transactions. Essentially Blockchain is a self-regulated data storage and data transaction validation system. The blockchain technology is the only peer-to-peer decentralized network to authorize users to digitally sign transactions with 100% accuracy. Blockchain is gaining popularity across industries such as finance, government, insurance, logistics, media healthcare and many others for being a borderless network of value exchange in real time. This course, provides a 100% hands-on thorough overview of blockchain technology and its implementation to the real world.

    The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.

    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

    The IT incident management training program will make learners proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, the learners will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, it incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.

    The Certified Information Systems Auditor (CISA) program is the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Earning the CISA Certification will highlight your experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the field.

    The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect. This course includes an assessment of their readiness to take ISC2's CISSP® Exam.

    What would you do in the face of an actual information security problem? The Certified Information Systems Security Professional (CISSP) program is designed to ensure that you are equipped with the knowledge and skills to handle computer security for a company or client with a mastery of the ISC² Common Body of Knowledge. The CISSP credential has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines.

    The purpose of the CSCU training program is to provide learners with the necessary knowledge and skills to protect their information assets. This class will immerse learners into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, email hoaxes, sex offenders lurking online, and hacking attacks. More importantly, the skills learned from the class helps learners take the necessary steps to mitigate their online security risks.

    The Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.

    Our online game design course is ideal for anyone who has ever considered a career as a video game designer. Our "learn anytime, from anywhere" approach to learning affords students greater flexibility by allowing them to advance at their own pace, from the comfort of their own homes. Our award winning Video Game Design and Basics of Programming online game design course is also great for amateur gamers looking to increase their knowledge of computer game design and programming. The course combines computer graphics concepts, computer aided instruction and marketing in a highly user-friendly program that requires no prior knowledge of video gaming or graphics programming.