Welcome to our site !

Real World Technology Training and Solutions is an ICT company specializing in Computer Training and IT Consultancy Services. We are a Microsoft© Certified Partner which means our training solutions are delivered to international standards. We have the capability to show our customers and potential customers how to make the most out of their IT investment so they can see real return on their investment.

We serve the corporate community in both the public and private sectors. Our customers include small and medium sized entrepreneurs who know how important information technology is to their business success.

Our main services are Information Technology Training for network and systems administration personnel, as well as end users who include senior executives, senior and middle managers and line staff.

We invite you to come and experience "training you can really use".

Featured Courses

20345-1: Administering Microsoft Exchange Server 2016/2019

This course teaches participants how to administer and support a Microsoft® Exchange Server. It covers how to install and configure Exchange Server, how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. Lastly, it will also cover how to implement disaster recovery solutions, how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in an Office 365® deployment.

Read More

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Read More

Certified Ethical Hacking (C|EH) v10

This program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, participants will need to become one, but an ethical one! This accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, participants need to think like a hacker”. NOTE: It is also the first part of a three (3) part EC-Council Information Security Track which helps participants master hacking technologies.

Read More

Certified Information Security Manager (CISM)

This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.

Read More

Certified Secure Computer User (CSCU)

The purpose of this training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse participants into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, viruses and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps them take the necessary steps to mitigate their security exposure.

Read More

Computer Hacking Forensics Investigator (CHFI) v9

This is a comprehensive course covering major forensic investigation scenarios that enables participants to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out computer forensic investigation leading to the prosecution of perpetrators. It covers all the relevant knowledge-bases and skills to meet with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. In addition, it also aims at elevating the knowledge, understanding, and skill levels of cybersecurity and forensic practitioners.

Read More

ITIL Intermediate: Service Lifecycle – Service Operation

The aim of this course is to improve the way an organization delivers the ITIL® Service Lifecycle. It will increase the knowledge and understanding of terminology, processes, activities and roles of IT Service Operations. It provides a detailed exploration of organization and human aspects of ITIL such as team functions and departmental operations and provides the opportunity to sit the certification exam. This certificate is a free-standing qualification but is also part of the ITIL Intermediate Lifecycle stream, and one of the modules that leads to the ITIL Expert in IT Service Management certificate.

Read More