Welcome to our site !
Real World Technology Training and Solutions is an ICT company specializing in Computer Training and IT Consultancy Services. We are a Microsoft© Certified Partner which means our training solutions are delivered to international standards. We have the capability to show our customers and potential customers how to make the most out of their IT investment so they can see real return on their investment.
We serve the corporate community in both the public and private sectors. Our customers include small and medium sized entrepreneurs who know how important information technology is to their business success.
Our main services are Information Technology Training for network and systems administration personnel, as well as end users who include senior executives, senior and middle managers and line staff.
We invite you to come and experience "training you can really use".
20345-1: Administering Microsoft Exchange Server 2016/2019
This course teaches participants how to administer and support a Microsoft® Exchange Server. It covers how to install and configure Exchange Server, how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. Lastly, it will also cover how to implement disaster recovery solutions, how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in an Office 365® deployment.
Beginning Social Media
This course teaches participants the basics of Social Media Management. They will learn how to identify their target markets, clarify which platforms their audience uses and tailor their message to fit their needs. At the end of this course, participants will be able to manage their own personal or business profiles.
Certified Chief Information Security Officer (CCISO)
The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Certified Ethical Hacking (C|EH) v10
This program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, participants will need to become one, but an ethical one! This accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, participants need to think like a hacker”.
NOTE: It is also the first part of a three (3) part EC-Council Information Security Track which helps participants master hacking technologies.
Certified Information Security Manager (CISM)
This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.
Certified Secure Computer User (CSCU)
The purpose of this training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse participants into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, viruses and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps them take the necessary steps to mitigate their security exposure.
Computer Hacking Forensics Investigator (CHFI) v9
This is a comprehensive course, covering major forensic investigation scenarios, that enables participants to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out computer forensic investigation leading to the prosecution of perpetrators. It covers all the relevant knowledge-bases and skills to meet with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. In addition, it also aims at elevating the knowledge, understanding, and skill levels of cybersecurity and forensic practitioners.
Configuring and Collaborating with Microsoft Teams
This course builds on the foundational knowledge of the Microsoft® Office 365® online apps. It introduces the desktop, online and mobile versions of the Microsoft Teams™ application to participants. Participants will learn how to collaborate on shared files and conduct online meetings.
ITIL 4 Foundation in IT Service Management
This course introduces learners to the management of modern IT-enabled services, provides them with an understanding of the common language and key concepts, and shows them how they can improve their work and the work of their organization with ITIL® (IT Infrastructure Library) 4 guidance.