Zopim
top of page

نتائج البحث

تم العثور على 61 عنصر لـ ""

  • PECB | CLC Africa

    PECB - ISO CERTIFICATION PATH PECB Training PECB GDPR Certified Data Protection Officer Develop the competencies and knowledge necessary to lead all the processes to comply with the requirements of the General Data Protection Regulation (GDPR) in an organization Download ISO/IEC 27032 Lead Cybersecurity Manager ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity. Download ISO/IEC 27001 Lead Auditor Computer Learning Centre offers the ISO/IEC 27001 Lead Auditor training which enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures, and techniques. Download ISO/IEC 27001 Foundation ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001 . During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. Download PECB ISO/IEC 27001 Lead Implementer ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001 . Download PECB Lead Digitalization and Electronic Archiving Manager Interested in expanding your knowledge and advancing your skills on Digitalization and Electronic Archiving? PECB experts are here to provide you with comprehensive theoretical and practical instructions, as well as assist in obtaining the PECB Certified Digitalization and Electronic Archiving credentials. Download PECB Digital Transformation Officer The PECB Certified Digital Transformation Officer training course provides insightful information that will help participants to gain a comprehensive knowledge on digital transformation and the steps required to digitally transform a business model, including a thorough explanation and discussion on digital transformation methodologies and approaches. In addition, participants will acquire knowledge on some of the most widely used technologies, such as artificial intelligence, machine learning, IoT, blockchain, cloud computing, and big data. Download PECB Disaster Recovery Manager Disaster Recovery Manager training enables you to acquire the necessary knowledge to support an organization in implementing, maintaining and managing an ongoing Disaster Recovery Plan. During this training course, you will also gain a thorough understanding of best practices in Disaster Recovery. Download PECB Lead Disaster Recovery Manager The Certified Lead Disaster Recovery Manager is a four-day training course intended to help participants acquire the necessary expertise to support an organization in establishing, implementing, and managing a disaster recovery planning project. Download PECB Chief Information Security Officer By attending the PECB CISO training course, you will gain the necessary expertise to oversee and manage information security, ensuring the implementation of robust security measures, the identification and mitigation of information security risks, and the development of effective security strategies tailored to the organization’s specific needs. In addition, by obtaining the PECB CISO credential, you demonstrate commitment to professional development and ability to take on executive-level responsibilities. Download PECB Lead Cloud Security Manager This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing. Download PECB Lead Crisis Manager The PECB Lead Crisis Manager training course helps participants develop their competence to support an organization in planning, establishing, maintaining, reviewing, and continually improving its strategic crisis management capability based on the guidelines of ISO 22361 and other best practices. Download PECB Certified Lead Cybersecurity Manager By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Download PECB - NIS 2 Directive Foundation The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs. Download PECB - NIS 2 Directive Lead Implementer The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive. Download

  • AWS Discovery Day Strategies and Tools | CLC Africa

    Strategies and Tools to perform large scale migrations Event description Learn about the AWS strategy and best practices for performing large-scale cloud migrations. Built from the experiences of helping hundreds of enterprise organizations move to the cloud, these proven techniques and tools will help accelerate your successful journey to the AWS Cloud. · Level: Fundamental · Duration: 1.30 hours Key topics covered During this event, you will learn: Describe the primary drivers for moving to the AWS Cloud Describe the migration process Explain the Migration Readiness Assessment Describe the Migration Readiness and Planning process Describe the common application migration strategies List AWS tools and services that can accelerate the migration process Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses Migrating to AWS Resources AWS Ramp-Up Guide: Migration Event outline Section 1: Migration overview · Common migration drivers · Potential barriers to cloud adoption · Elements of a successful journey · The migration process. · Stages of adoption Section 2: Migration Readiness and Assessment (MRA) · Overview · AWS Cloud Adoption Framework · What is the MRA? · Why do an MRA? · When to do an MRA? · How to do an MRA? ​ Section 3: Migration Readiness & Planning (MRP) · When to do an MRP? · Discovery & planning · Analysis · Picking a portfolio discovery tool · Landing zone · Center of excellence · Migration business case · Migration plan · Migration expertise · Operating model · Security and compliance · Shared responsibility model Section 4: Lessons learned and suggested resources · Business justification · Migration strategies · Typical project profile · Suggested resources Intended audience This event is intended for: · IT business decision makers · Individuals who seek an overall understanding of migrating to the cloud Registration is mandatory so please submit your details to secure your place at the event. Submit East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • AWS Discovery Day Machine Learning Basic | CLC Africa

    Machine Learning Basics Event description Are you interested in machine learning, but not sure where to start? Join us for this session with an AWS expert and demystify the basics. Using real-world examples, you’ll learn about important concepts, terminology, and the phases of a machine learning pipeline. Learn how you can unlock new insights and value for your business using machine learning. · Level: Fundamental · Duration: 1.30 hours Key topics covered During this event, you will learn: What is Machine Learning? What is the machine learning pipeline, and what are its phases? What is the difference between supervised and unsupervised learning? What is reinforcement learning? What is deep learning? Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses Deep Learning on AWS MLOps Engineering on AWS Practical Data Science with Amazon SageMaker The Machine Learning Pipeline on AWS Resources AWS Ramp-Up Guide: Machine Learning Event outline Section 1: Machine learning basics · Classical programming vs. machine learning approach · What is a model? · Algorithm features, weights, and outputs · Machine learning algorithm categories · Supervised algorithms · Unsupervised algorithms · Reinforcement learning Section 2: What is deep learning? · How does deep learning work? · How deep learning is different ​ ​ Section 3: The Machine Learning Pipeline · Overview · Business problem · Data collection and integration · Data processing and visualization · Feature engineering · Model training and tuning · Model evaluation · Model deployment Section 4: What are my next steps? · Resources to continue learning Intended audience This event is intended for: · Developers · Solution architects · Data engineers · Individuals interested in building solutions with machine learning - no machine learning experience required! Registration is mandatory so please submit your details to secure your place at the event. Submit East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • AWS Discovery Days Fundamentals | CLC Africa

    Fundamentals of a Modern Data Strategy on AWS Event description Organizations need a data strategy to succeed, but there’s no one-size fits all approach. Every organization will have unique objectives and obstacles. Join this event to learn how to modernize, unify, and innovate your way to a modern data strategy with AWS. Level: Fundamental Duration: 1.30 hours Key topics covered During this event, you will learn: · How AWS services help you modernize, unify, and innovate your data infrastructure · How to use AWS services to provide secure and well-governed access to data · How to innovate with AI/ML by harnessing your data with built-in ML Intended audience This event is intended for: Data architects, data scientists, and data analysts new to the AWS Cloud Solutions architects Database administrators Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses Building Data Analytics Solutions Using Amazon Redshift Building Batch Analytics Solutions on AWS Building Streaming Analytics Solutions on AWS Building Data Lakes on AWS Data Warehousing on AWS Planning and Designing Databases on AWS Resources AWS Ramp-Up Guide: Data Analytics AWS Ramp-Up Guide: Databases Event outline Section 1: Introduction · Business value of a modern data strategy · Challenges · Use cases · Traditional vs. cloud · Modern data strategy on AWS Section 2: Modernize · Relational databases · Purpose-built databases Section 3: Unify · Data lakes with Amazon S3 · Lake house approach on AWS · Purpose-built data services · Breaking down data silos · Unified governance Section 4: Innovate · Machine learning (ML) services · Artificial intelligence (AI) services · Data stores, data lakes, and BI tools with built-in ML Section 5: Next steps · Resources to continue learning Registration is mandatory so please submit your details to secure your place at the event. Submit East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • Amazon Web Service | CLC Africa

    Amazon Web Service CERTIFICATION PATH REGISTER FOR AWS DISCOVERY DAY AWS Discovery Day-Fundamentals of a Modern Data Strategy on AWS هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Discovery Day-Machine Learning Basics هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Discovery Day-Strategies and Tools to perform large scale migrations هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل Architecting on AWS هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Technical Essentials هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Discovery Day ( Securing your AWS Cloud ) هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Discovery Day-Cloud practitioner Essentials هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل AWS Machine Learning Basics هذه فقرة. انقر فوق "تحرير النص" أو انقر نقرًا مزدوجًا على مربع النص لبدء تحرير المحتوى وتأكد من إضافة أي تفاصيل أو معلومات ذات صلة تريد مشاركتها مع زوارك. تحميل

  • ENROLL | CLC Africa

    Start by filling this form Full Names Email Company name Training Vendor Training Vendor... Phone Course Name Any additional information Apply

  • Discovery Day Securing your AWS Cloud | CLC Africa

    Introduction to Securing your AWS Cloud Event description Whether you are thinking of migrating to the AWS Cloud or already have a workload running on AWS, securing your data and resources should be at the top of the list. This event introduces several AWS services that you can use to improve your current security posture. It also covers the different security design principles that will help you to plan your security approach in the AWS Cloud and provides information on resources you can use to further your knowledge around security on AWS. · Level: Fundamental · Duration: 1.30 hours Key topics covered: During this event, you will learn: Identify security benefits and responsibilities of using the AWS Cloud Describe the different design principles for security in the cloud Determine which AWS services you can use to improve your security posture Intended audience This event is intended for: IT business-level professionals interested in cloud security practices Security professionals with minimal working knowledge of AWS Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: · Courses o AWS Security Essentials o AWS Security Governance at Scale o Security Engineering on AWS · Resources AWS Ramp-Up Guide: Security Event outline Section 1: Security design principles · Principle of least privilege · Traceability · Securing all layers · Automating security · Protecting data in transit and at rest · Preparing for security events · Minimizing attack surface ​ ​ Section 2: What is your security posture? · Authentication · Authorization · Monitoring · Audit · Encryption · Data path Section 3: What are my next steps? · Resources to continue learning Registration is mandatory so please submit your details to secure your place at the event. Submit East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • AWS Discovery Days | CLC Africa

    Get an official introduction to AWS from one of the only organizations that are authorized to deliver it. Our AWS Discover Day is a free of charge onsite event that is designed to introduce AWS cloud computing concepts and foundational infrastructure services. This event is particularly relevant for customers who have recently signed up with AWS, or for those who simply want to grasp the basics of the AWS cloud platform. By attending this event, customers can learn how to: Define the cloud and how it works Explain the benefits of the AWS Cloud Describe the basic global infrastructure of the cloud Compare the different methods of interacting with AWS Describe and differentiate between AWS service domains Gain a deeper understanding of AWS core services Explain the shared responsibility model Describe security services with the AWS Cloud Identify AWS management services and their use Intended audience This course is intended for: Business leaders and IT-technical professionals Learners who want to learn about basic cloud concepts, AWS Cloud terminology, and AWS core services Registration is mandatory so please submit your details to secure your place at the event. Submit Registration is mandatory so please submit your details to secure your place at the event.

  • Business Training | CLC Africa

    1/1 Defining Quality in IT & Business Training To play, press and hold the enter key. To stop, release the enter key. تدريب الأعمال أفتح اكثر أفتح اكثر أفتح اكثر أفتح اكثر أفتح اكثر أفتح اكثر TESTIMONIALS JUDE BLADE تجربة مذهلة ودورة تدريبية قوية في كل مكان. Mr. Aunally Maloo, C.E.O CLC Africa هذه هي المؤسسة الرائدة والمجهزة تجهيزا جيدا لتكنولوجيا المعلومات المهنية وأمبير. تدريب الأعمال. KONE مدربين رائعين. أمر لا بد منه لأي متخصص في تكنولوجيا المعلومات يبحث عن التقدم في حياته المهنية. Enroll Country Email Kenya training.kenya@clc-africa.com ​ Tanzania training.tanzania@clc-africa.com ​ Uganda training.uganda@clc-africa.com ​ Rwanda training.rwanda@clc-africa.com ​ UAE training.emea@clc-africa.com ​ Nigeria training.nigeria@clc-africa.com ​ Ethiopia anteneh.engdashet@clc-africa.com

  • Information Technology Training | CLC Africa

    1/1 Defining Quality in IT & Business Training To play, press and hold the enter key. To stop, release the enter key. Defining Quality in IT & Business Training تدريب تكنولوجيا المعلومات Get in touch يفتح يفتح يفتح يفتح يفتح يفتح يفتح يفتح يفتح يفتح يفتح يفتح Open Open Open Open TESTIMONIALS الاسم واللقب شارك الأشياء المدهشة التي يقولها العملاء عن عملك. انقر نقرًا مزدوجًا أو انقر فوق تحرير النص لجعله ملكًا لك. الاسم واللقب شارك الأشياء المدهشة التي يقولها العملاء عن عملك. انقر نقرًا مزدوجًا أو انقر فوق تحرير النص لجعله ملكًا لك. الاسم واللقب شارك الأشياء المدهشة التي يقولها العملاء عن عملك. انقر نقرًا مزدوجًا أو انقر فوق تحرير النص لجعله ملكًا لك. Enroll Country Email Kenya training.kenya@clc-africa.com ​ Tanzania training.tanzania@clc-africa.com ​ Uganda training.uganda@clc-africa.com ​ Rwanda training.rwanda@clc-africa.com ​ UAE training.emea@clc-africa.com ​ Nigeria training.nigeria@clc-africa.com ​ Ethiopia anteneh.engdashet@clc-africa.com

  • Home | CLC Africa

    Learn more 1/1 To play, press and hold the enter key. To stop, release the enter key. Get in touch Defining Quality in IT & Business Training 1/1 Learn more الباعة هذا هو قسم فريقك. إنه مكان رائع لتقديم فريقك والتحدث عما يجعله مميزًا ، مثل ثقافتك وفلسفتك في العمل. لا تخف من توضيح الشخصية والشخصية لمساعدة المستخدمين على التواصل مع فريقك.

  • About us | CLC Africa

    معلومات عنا تعريف الجودة في التدريب على تكنولوجيا المعلومات والأعمال لتزويد عملائنا بتجربة تدريبية مدروسة جيدًا تتناسب مع أهدافهم مع توفير قيمة للاستثمار. أن نكون الشركة الرائدة في السوق في مجال التدريب عالي الجودة على تقنية المعلومات واختبار الشهادات ودورات التخصص للشركات والحكومة والأفراد. بيان سياسة الجودة سنستثمر في البحث وتطوير المنتجات ليس فقط لتطوير المنتجات التي تلبي متطلبات السوق ولكن تزويد العميل بتجربة التدريب الأكثر ملاءمة. سنقوم بتمكين موظفينا بالمعرفة والمهارات وتوفير بيئة تعزز الموقف الإيجابي تجاه تحقيق الأهداف التنظيمية. سيتم تصميم عملياتنا بشكل جيد بحيث لا نقدم خدمة فقط ولكن نتأكد من أن عملية تقديم تلك الخدمة المعينة هي تجربة عملاء ممتعة تأتي معها. سيُعهد إلى موظفينا بالمسؤوليات على جميع المستويات مما يمنحهم أهدافًا صعبة تتأكد من أنهم يسعون إلى التركيز على التحسين المستمر. من أجل إدارة عملياتنا وتركيزنا ، سوف نتأكد من أننا نضع معايير قابلة للقياس ونوفر مؤشرات للاتجاه الذي نتجه إليه عند التحقق من أي حالة معينة. هذه هي صفحة "حول" الخاصة بك. تُعد هذه المساحة فرصة رائعة لإعطاء خلفية كاملة عن هويتك وما تفعله وما يجب أن يقدمه موقعك. المستخدمون لديك مهتمون حقًا بمعرفة المزيد عنك ، لذلك لا تخف من مشاركة الحكايات الشخصية لخلق جودة أكثر ودية. كل موقع له قصة ، ويريد زوار موقعك أن يسمعوا قصتك. هذه المساحة فرصة رائعة لتقديم أي تفاصيل شخصية تريد مشاركتها مع متابعيك. قم بتضمين الحكايات والحقائق الشيقة للحفاظ على تفاعل القراء. انقر نقرًا مزدوجًا فوق مربع النص لبدء تحرير المحتوى الخاص بك وتأكد من إضافة جميع التفاصيل ذات الصلة التي تريد أن يعرفها زوار الموقع. إذا كنت تمثل شركة ، فتحدث عن كيفية بدايتك وشارك رحلتك المهنية. اشرح قيمك الأساسية والتزامك تجاه العملاء وكيف تتميز عن الآخرين. أضف صورة أو معرضًا أو مقطع فيديو لمزيد من المشاركة. شركة تاريخ فجوات تقنية البناء مع تقدم التكنولوجيا بمعدل متزايد باستمرار ، تنشأ فجوة بين الأساس الذي يوفره التعليم الأكاديمي والكفاءة التقنية المطلوبة في بيئة الأعمال اليوم. تم إنشاء شهادات تكنولوجيا المعلومات لسد فجوة التعليم الفني. نحن نقدم مجموعة واسعة من شهادات تكنولوجيا المعلومات والأعمال. تشمل دوراتنا بدوام كامل ، وفي المساء ، ودوام جزئي مرن. يمكن أن تكون الدورات متاحة أيضًا في الموقع ، أي في مكان عملك بناءً على طلب العميل. في هذه الحالة سيوفر العميل غرفة التدريب وأجهزة الكمبيوتر. لنعمل معا

bottom of page