3 Courses
Cohort A
The Project Management Essentials course offers a comprehensive introduction to the fundamentals of project management. It explains what constitutes a project and the importance of distinguishing it from routine activities, emphasizing the need for a temporary venture with a defined outcome. The course details various project management methodologies, including Waterfall and Agile, and explores their respective attributes and applications. Participants will learn about the phases of project management, such as initiation, planning, execution, monitoring, and closure. Additionally, the course discusses the roles and responsibilities of project managers, the significance of project management organizations and certifications, and essential tools like Gantt charts, RAID logs, and RACI diagrams, providing a well-rounded foundation for effective project management.
Cohort A
This course on Information Security Awareness emphasizes the critical role of end users in preventing data breaches by fostering a thorough understanding of various aspects of information security. It covers topics such as cybersecurity, physical security, portable media device security, social engineering, identity theft, wireless security, and password protection. The course aims to equip participants with the knowledge and skills to secure their organization's information and data, highlighting the importance of maintaining confidentiality, integrity, and availability of information. Practical guidelines and best practices are provided to mitigate risks and enhance both organizational and personal data protection.
This course on Information Security Awareness emphasizes the critical role of end users in preventing data breaches by fostering a thorough understanding of various aspects of information security. It covers topics such as cybersecurity, physical security, portable media device security, social engineering, identity theft, wireless security, and password protection. The course aims to equip participants with the knowledge and skills to secure their organization's information and data, highlighting the importance of maintaining confidentiality, integrity, and availability of information. Practical guidelines and best practices are provided to mitigate risks and enhance both organizational and personal data protection.