top of page

Search Results

75 items found for ""

Other Pages (70)

  • ENROLL | CLC Africa

    Start by filling this form Full Names Email Company name Training Vendor Training Vendor... Phone Course Name Any additional information Apply

  • AWS Discovery Days Fundamentals | CLC Africa

    Fundamentals of a Modern Data Strategy on AWS Event description Organizations need a data strategy to succeed, but there’s no one-size fits all approach. Every organization will have unique objectives and obstacles. Join this event to learn how to modernize, unify, and innovate your way to a modern data strategy with AWS. Level: Fundamental Duration: 1.30 hours Key topics covered During this event, you will learn: · How AWS services help you modernize, unify, and innovate your data infrastructure · How to use AWS services to provide secure and well-governed access to data · How to innovate with AI/ML by harnessing your data with built-in ML Intended audience This event is intended for: Data architects, data scientists, and data analysts new to the AWS Cloud Solutions architects Database administrators Recommended follow-up training and resources We recommend that attendees of this event continue learning with these: Courses Building Data Analytics Solutions Using Amazon Redshift Building Batch Analytics Solutions on AWS Building Streaming Analytics Solutions on AWS Building Data Lakes on AWS Data Warehousing on AWS Planning and Designing Databases on AWS Resources AWS Ramp-Up Guide: Data Analytics AWS Ramp-Up Guide: Databases Event outline Section 1: Introduction · Business value of a modern data strategy · Challenges · Use cases · Traditional vs. cloud · Modern data strategy on AWS Section 2: Modernize · Relational databases · Purpose-built databases Section 3: Unify · Data lakes with Amazon S3 · Lake house approach on AWS · Purpose-built data services · Breaking down data silos · Unified governance Section 4: Innovate · Machine learning (ML) services · Artificial intelligence (AI) services · Data stores, data lakes, and BI tools with built-in ML Section 5: Next steps · Resources to continue learning Registration is mandatory so please submit your details to secure your place at the event. Submit East African Time Zone: 10a.m to 11:30 p.m West African Time ZONE: 12p.m to 1:30 p.m Time Registration is mandatory so please submit your details to secure your place at the event.

  • PECB - ISO | CLC Africa

    PECB - ISO CERTIFICATION PATH PECB Training PECB GDPR Certified Data Protection Officer Develop the competencies and knowledge necessary to lead all the processes to comply with the requirements of the General Data Protection Regulation (GDPR) in an organization Download ISO/IEC 27032 Lead Cybersecurity Manager ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity. Download ISO/IEC 27001 Lead Auditor Computer Learning Centre offers the ISO/IEC 27001 Lead Auditor training which enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures, and techniques. Download ISO/IEC 27001 Foundation ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001 . During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. Download PECB ISO/IEC 27001 Lead Implementer ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001 . Download PECB Lead Digitalization and Electronic Archiving Manager Interested in expanding your knowledge and advancing your skills on Digitalization and Electronic Archiving? PECB experts are here to provide you with comprehensive theoretical and practical instructions, as well as assist in obtaining the PECB Certified Digitalization and Electronic Archiving credentials. Download PECB Digital Transformation Officer The PECB Certified Digital Transformation Officer training course provides insightful information that will help participants to gain a comprehensive knowledge on digital transformation and the steps required to digitally transform a business model, including a thorough explanation and discussion on digital transformation methodologies and approaches. In addition, participants will acquire knowledge on some of the most widely used technologies, such as artificial intelligence, machine learning, IoT, blockchain, cloud computing, and big data. Download PECB Disaster Recovery Manager Disaster Recovery Manager training enables you to acquire the necessary knowledge to support an organization in implementing, maintaining and managing an ongoing Disaster Recovery Plan. During this training course, you will also gain a thorough understanding of best practices in Disaster Recovery. Download PECB Lead Disaster Recovery Manager The Certified Lead Disaster Recovery Manager is a four-day training course intended to help participants acquire the necessary expertise to support an organization in establishing, implementing, and managing a disaster recovery planning project. Download PECB Chief Information Security Officer By attending the PECB CISO training course, you will gain the necessary expertise to oversee and manage information security, ensuring the implementation of robust security measures, the identification and mitigation of information security risks, and the development of effective security strategies tailored to the organization’s specific needs. In addition, by obtaining the PECB CISO credential, you demonstrate commitment to professional development and ability to take on executive-level responsibilities. Download PECB Lead Cloud Security Manager This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing. Download PECB Lead Crisis Manager The PECB Lead Crisis Manager training course helps participants develop their competence to support an organization in planning, establishing, maintaining, reviewing, and continually improving its strategic crisis management capability based on the guidelines of ISO 22361 and other best practices. Download PECB Certified Lead Cybersecurity Manager By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Download PECB - NIS 2 Directive Foundation The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs. Download PECB - NIS 2 Directive Lead Implementer The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS 2 Directive. Download

View All

Blog Posts (5)

  • Fortinet Training in CLC Africa: Enhancing Cybersecurity Expertise

    In today's rapidly evolving digital landscape, cybersecurity has become a paramount concern for individuals, businesses, and governments alike. As the reliance on technology grows, so do the threats posed by cybercriminals seeking to exploit vulnerabilities. To counter these risks effectively, organizations are increasingly turning to comprehensive cybersecurity solutions, with Fortinet standing out as a prominent player in the field. In this article, we delve into the significance of Fortinet training in CLC Africa, shedding light on how it enhances cybersecurity expertise to safeguard critical digital assets. Table of Contents Introduction Understanding Fortinet: A Brief Overview The Growing Importance of Cybersecurity Training CLC Africa: Empowering Cybersecurity Professionals Fortinet Training Programs: A Multilayered Approach Benefits of Fortinet Training Real-World Application and Skill Development Certifications and Career Advancement Tailored Training for Varied Audiences Interactive Learning Environment Collaboration and Networking Opportunities Staying Ahead in the Cybersecurity Landscape Conclusion FAQs Access Now: Elevate Your Cybersecurity Skills 1. Introduction As the digital world expands, the vulnerabilities associated with it also increase. Cyberattacks, data breaches, and other online threats have the potential to disrupt businesses and compromise sensitive information. To counter these risks, organizations are investing in robust cybersecurity solutions and the training required to implement and manage them effectively. 2. Understanding Fortinet: A Brief Overview Fortinet is a global leader in broad, integrated, and automated cybersecurity solutions. The company offers a wide range of products and services designed to protect networks, endpoints, applications, and cloud environments from cyber threats. From firewalls and intrusion prevention systems to secure access solutions, Fortinet's comprehensive suite of offerings addresses the diverse security needs of modern enterprises. 3. The Growing Importance of Cybersecurity Training In the realm of cybersecurity, technology alone is not enough. Cyber threats continue to evolve, becoming more sophisticated and challenging to detect. This underscores the need for skilled professionals who can navigate the complex cybersecurity landscape. Training programs, such as those provided by Fortinet, play a pivotal role in equipping individuals with the knowledge and skills required to defend against cyber threats effectively. 4. CLC Africa: Empowering Cybersecurity Professionals CLC Africa, a renowned training and education institute, recognizes the significance of cybersecurity in today's interconnected world. To address the growing demand for cybersecurity expertise, CLC Africa has partnered with Fortinet to offer specialized training programs that cater to professionals seeking to enhance their cybersecurity knowledge. 5. Fortinet Training Programs: A Multilayered Approach Fortinet training programs provided through CLC Africa are designed to offer a comprehensive understanding of Fortinet's cybersecurity solutions. The training covers a wide array of topics, including network security, cloud security, threat detection, and more. The curriculum is structured to accommodate varying levels of expertise, making it suitable for beginners and experienced professionals alike. 6. Benefits of Fortinet Training Fortinet training goes beyond theoretical knowledge. Participants gain hands-on experience through practical exercises, simulations, and real-world scenarios. This approach allows individuals to apply their learning in simulated environments, preparing them to address cybersecurity challenges in their actual work settings. 7. Real-World Application and Skill Development One of the key advantages of Fortinet training is its emphasis on practical skills. Participants learn to configure and manage Fortinet solutions, analyze security data, and develop strategies to mitigate threats. This hands-on experience is invaluable for individuals aiming to become effective cybersecurity practitioners. 8. Certifications and Career Advancement Fortinet training programs offer industry-recognized certifications upon successful completion. These certifications validate participants' expertise and enhance their credibility in the job market. Whether you're a cybersecurity enthusiast looking to start a career or a professional aiming to advance, Fortinet certifications can open doors to various opportunities. 9. Tailored Training for Varied Audiences Fortinet training caters to a diverse audience, including IT professionals, network administrators, security analysts, and managers. The training programs are tailored to address the specific needs and responsibilities of each role, ensuring that participants acquire skills that align with their job requirements. 10. Interactive Learning Environment Learning is most effective in an engaging environment. Fortinet training fosters interactivity through hands-on labs, group discussions, and practical exercises. This dynamic approach keeps participants actively engaged and encourages collaborative learning. 11. Collaboration and Networking Opportunities Fortinet training sessions provide a platform for professionals to interact, share experiences, and learn from one another. Networking opportunities are essential in the cybersecurity field, as they allow individuals to stay updated on industry trends and best practices. 12. Staying Ahead in the Cybersecurity Landscape The threat landscape is ever-changing, making continuous learning a necessity for cybersecurity professionals. Fortinet training equips participants with the knowledge to adapt to emerging threats, implement effective security measures, and contribute to the overall resilience of organizations. 13. Conclusion In an era where digital vulnerabilities can have profound real-world impacts, cybersecurity expertise is paramount. Fortinet training offered by CLC Africa empowers individuals with the skills to safeguard digital assets and contribute to a safer online ecosystem. By bridging the cybersecurity skills gap, Fortinet training plays a vital role in fortifying organizations against cyber threats. 14. FAQs Q1: Who can benefit from Fortinet training? A: Fortinet training caters to IT professionals, network administrators, security analysts, and anyone interested in enhancing their cybersecurity skills. Q2: What makes Fortinet training unique? A: Fortinet training offers hands-on experience, industry-recognized certifications, and a comprehensive curriculum designed to address real-world challenges. Q3: Can beginners enroll in Fortinet training? A: Yes, Fortinet training programs are suitable for beginners and experienced professionals alike. Q4: How does Fortinet training contribute to career growth? A: Fortinet certifications enhance participants' credibility and open doors to various career opportunities in the cybersecurity field. Q5: Where can I access Fortinet training through CLC Africa? A: Access Now: https://www.clc-africa.com/fortinet 15. Access Now: Elevate Your Cybersecurity Skills Ready to take your cybersecurity skills to the next level? Explore Fortinet training programs offered by CLC Africa and equip yourself with the knowledge and expertise needed to defend against evolving cyber threats. Access now and embark on a journey towards a more secure digital future.

  • Datacomms Training

    Data Comms Training (DCT) has been designing and developing Infrastructure training since 1999. The Data Centre trainings were added in 2015 , giving a comprehensive training portfolio at the Physical layer and Network layer. The trainings are suitable for contractors , Installers , and System Integrators . Our Trainers have many years of practical experience in their field , we use our own trainers and not part time trainers . The instructors are knowledgeable in the subject they are teaching. The trainings come with CREDLEY Digital badges Certifications which are internationally recognized.


    Computer Learning Centre offers Cisco Authorized training curriculum to partners and customers in Kenya, Uganda Tanzania, Rwanda, and Dubai. Cisco Learning Credits can be redeemed at CLC. The course content is written by official Cisco experts Simulations created by Cisco to help you prepare for the exams – which you’ll sit on the course Physical and virtual practice labs using the latest Cisco equipment. Official Kits and Remote Labs are used during the training A comprehensive set of customer satisfaction measurement tools, issuance of authorized course completion certificates to students. We add value to standard Cisco technology offerings that match the specific learning requirements of our clients. ( CISCO, PRNE, CLCEI, SVPN,SCOR, SECICC, DNAAS, Network )

View All
bottom of page