| |
As any good service provider should, we offer fully customized training with all of
our projects. This training has become so popular that we are now offering stand-alone, customized training, at our
facilities or yours:
(Other topics upon request)
Internet Series
- 7 Steps to a Meaningful Intranet
- Internet: Planning your Presence
- E-Business Roadmap
- E-Commerce Roadmap
- Internetworking Security Fundamentals
Security Series
- Network Security Fundamentals
(Can feature MS ISA, Raptor, Checkpoint, Gauntlet, PIX, Cisco or IPchains)
- Network Security Advanced
(Can feature MS ISA, Raptor, Checkpoint, Gauntlet, PIX, Cisco or IPchains)
- System Security - Solaris
- System Security - Tru64 Unix
- System Security - HP/UX
- System Security - Open VMS
- System Security - Windows 2000 Servers
- System Security - Windows XP Servers
- System Security - Redhat Linux
- System Security - Mac OS X / Mac OS X Server
- Security Awareness Seminars
- Cisco PIX Security Administration
- Nortel Router Security Administration
- CheckPoint Firewall-1 Security Administration
- Gauntlet Firewall Security Administration
- Raptor Firewall Security Administration
UNIX Series
- Bourne Shell Basics
- C Shell Basics
- Bourne Shell Scripting
- C Shell Scripting
- Advanced Shell Scripting (awk, sed and data management)
- Solaris System Administrator I
- Solaris System Administrator II
- Tru64 System Administrator I
- Tru64 System Administrator II
- HP/UX System Administrator I
- HP/UX System Administrator II
- Linux System Administrator I
- Linux System Administrator II
- Mac OS X System Administrator I
- Mac OS X Server System Administrator II
Project Management Series
- Project Management Fundamentals (PMBOK-based)
- Project Management Advanced (PMBOK-based)
We are proud of our work, but we also respect the privacy of our clients. References are available upon request
for serious inquiries only.
|