The CDRP® is a 2-day course is designed to expose attendants to the overall risk management process. Focus is on both the data centre infrastructure and the physical data centre facility and equipment; the attendant will learn how to identify and quantify risk in their organization, creating the ability to reduce the risk to a level acceptable for the organization. The course is based on international standards (ISO/IEC27001:2005) and guidelines (ISO/IEC27005:2011, NIST800-30, ISO/IEC31000).
CDCS® (Certified Data Centre Specialist) is a 3-day advance level for training data centre design/build professionals. The CDCS® course will cover engineering calculations on the various components in a data centre facility. CDCS® will further increase attendees' competences to a level of a compatible sparring partner with suppliers and verify offers provided by vendors for correctness, effectiveness and efficiency.
CNCDP® is a 2-day course designed to expose participants to in-depth knowledge in designing and installing the data network cabling system which includes key subject matters such as; technical standards, designing of different cabling sub-systems, calculation of material requirements, architecture, installation, testing and acceptance.
In three-day CTDC® course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. This course is well suited for all types of data centres, be it enterprise data centres or multi-tenant, third party data centres such as co-location, managed services and cloud service providers.
The CTIA® course is a 2-day intensive course builds further on the technical understanding of the standard acquired in the CTDC® (Certified TIA-942 Design Consultant)course. It enables participants to develop skills and knowledge to conduct an internal audit program by applying widely recognised audit principles, procedures and techniques which are aligned with the ISO-19011 auditing guideline.
The Data Centre Foundation Certificate (DCFC®) is a 2-day course designed to deliver foundation knowledge about data centre facilities infrastructure. It provides participants with global overview and knowledge on data centres which will be of advantage to the participants who are looking at joining the ranks of professionals working in the data centre, ICT, infrastructure or the mechanical and electrical (M&E) design industries.
This course gives a functional understanding of the BIG-IP system, as it is commonly deployed in an application delivery network. Also aimed at network administrators responsible for installation, and set up of BIG-IP LTM systems.
This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. Participants identify and mitigate common web application vulnerabilities on the client and application sides of the threat spectrum. Participants use F5 Advanced WAF to quickly configure advanced protection against common Layer 7 vulnerabilities (OWASP Top Ten) and bot defense.
In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.