Welcome to our site !
Real World Technology Training and Solutions is an ICT company specializing in Computer Training and IT Consultancy Services. We are a Microsoft© Certified Partner which means our training solutions are delivered to international standards. We have the capability to show our customers and potential customers how to make the most out of their IT investment so they can see real return on their investment.
We serve the corporate community in both the public and private sectors. Our customers include small and medium sized entrepreneurs who know how important information technology is to their business success.
Our main services are Information Technology Training for network and systems administration personnel, as well as end users who include senior executives, senior and middle managers and line staff.
We invite you to come and experience "training you can really use".
20345-1 Administering Microsoft® Exchange Server 2016
This course teaches IT professionals how to administer and support Exchange Server 2016. Candidates will learn how to install Exchange Server 2016, and how to configure and manage an Exchange Server environment. The course covers how to manage mail recipients and public folders, including how to perform bulk operations using Exchange Management Shell. Candidates also will learn how to manage client connectivity, message transport and hygiene, how to implement and manage highly available Exchange Server deployments, and how to implement back up and disaster recovery solutions. It will also teach candidates how to maintain and monitor an Exchange Server 2016 deployment. In addition, candidates will learn how to administer Exchange Online in an Office 365® deployment.
Certified Chief Information Security Officer (CCISO)
The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Certified Ethical Hacking and Countermeasures (CEH)
This program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH is the first part of a three (3) part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!
Certified Information Security Manager (CISM)
This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.
Certified Secure Computer User (CSCU)
The purpose of this training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class will not only help the students to identify these threats but also to mitigate them effectively.
Computer Hacking Forensics Investigator (CHFI) v9
Computer Hacking Forensic Investigation is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out computer forensic investigation leading to the prosecution of perpetrators. It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. In addition, it also aims at elevating the knowledge, understanding, and skill levels of cybersecurity and forensics practitioners.
ITIL® Intermediate: Service Lifecycle – Service Operation
The aim of the course is to improve the way any organization delivers the ITIL® Service Lifecycle. It will increase the knowledge and understanding of terminology, processes, activities and roles. It provides a detailed exploration of organization and human aspects of ITIL® such as team functions and departmental operations and provides the opportunity to sit the ITIL® Lifecycle examination in Service Operation. The ITIL® Intermediate Qualification: Service Operation Certificate is a free-standing qualification, but is also part of the ITIL® Intermediate Lifecycle stream, and one of the modules that leads to the ITIL® Expert in IT Service Management Certificate.