The Blog

Relationship between COBIT and ITIL

COBIT and ITIL have been used by information technology professionals in the IT service management (ITSM) space for many years. Used together, COBIT and ITIL provide guidance for the governance and management of IT-related services by enterprises.

Continue Reading

Its time to mothball traditional ITSM approaches

Traditional IT services management tactics belong in museums, not in forward-looking IT departments. This article explains the reasons why.

Continue Reading

Certified Ethical Hacker v9 | What You Will Learn

What can you learn from a Certified Ethical Hacker?

Here, you will be exposed to an entirely deferent way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Continue Reading
Contact Program Coordinator

Newsletter Sign-up

Training Gallery