Welcome to our site !

Real World Technology Training and Solutions is an ICT company specializing in Computer Training and IT Consultancy Services. We are a Microsoft© Certified Partner which means our training solutions are delivered to international standards. We have the capability to show our customers and potential customers how to make the most out of their IT investment so they can see real return on their investment.

We serve the corporate community in both the public and private sectors. Our customers include small and medium sized entrepreneurs who know how important information technology is to their business success.

Our main services are Information Technology Training for network and systems administration personnel, as well as end users who include senior executives, senior and middle managers and line staff.

We invite you to come and experience "training you can really use".

Featured Courses

20345-1: Administering Microsoft Exchange Server 2016/2019

This course teaches participants how to administer and support a Microsoft® Exchange Server. It covers how to install and configure Exchange Server, how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. Lastly, it will also cover how to implement disaster recovery solutions, how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in an Office 365® deployment.

Read More

Beginning Social Media

This course teaches participants the basics of Social Media Management. They will learn how to identify their target markets, clarify which platforms their audience uses and tailor their message to fit their needs. At the end of this course, participants will be able to manage their own personal or business profiles.

Read More

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Read More

Certified Ethical Hacking (C|EH) v11

The core mission of CEH remains valid and relevant today: “To beat a hacker, you need to think like a hacker.” This course provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach participants how hackers think and act maliciously so that they will be better positioned to set up their security infrastructure and defend against future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. This course incorporates a hands-on environment and systematic process across every ethical hacking domain and methodology. This allows participants to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. Participants will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

Read More

Certified Information Security Manager (CISM)

This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.

Read More

Certified Secure Computer User (CSCU)

The purpose of this training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse participants into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, viruses and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps them take the necessary steps to mitigate their security exposure.

Read More

Computer Hacking Forensics Investigator (CHFI) v10

CHFI v10 includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks participants through every step of the process with experiential learning. The course focuses on the latest technologies including IoT Forensics, Dark Web Forensics, Cloud Forensics (including Azure and AWS), Network Forensics, Database Forensics, Mobile Forensics, Malware Forensics (including Emotet and Eternal Blue), OS Forensics, RAM forensics and Tor Forensics, CHFI v10 covers the latest tools, techniques, and methodologies along with ample crafted evidence files.

Read More

Configuring and Collaborating with Microsoft Teams

This course builds on the foundational knowledge of the Microsoft® Office 365® online apps. It introduces the desktop, online and mobile versions of the Microsoft Teams™ application to participants. Participants will learn how to collaborate on shared files and conduct online meetings.

Read More

ITIL 4 Foundation in IT Service Management

This course introduces learners to the management of modern IT-enabled services, provides them with an understanding of the common language and key concepts, and shows them how they can improve their work and the work of their organization with ITIL® (IT Infrastructure Library) 4 guidance.

Read More