IT INFRASTRUCTURE MANAGEMENT

The purpose of IT infrastructure management is to provide structure and control of the functions responsible for diverse technical operations which generally involve hardware, software, and networking in both physical and virtual environments. The main goal is to minimize downtime and maintain business productivity.

ROLE IN THE INDUSTRY

IT Infrastructure Managers are primarily responsible for overseeing both the technical and managerial aspects of their organization’s IT department. Their job is to plan, direct and design their company’s IT infrastructure while simultaneously managing the IT team responsible for maintaining that infrastructure.

JOB TITLES

Upon completion of the course, students can apply for the job of a

  • Security management specialist.
  • Network engineer/architect.
  • Cyber/information security engineer/analyst.
  • IoT designer/developer/engineer.
  • Transformation consultant
  • Computer support specialist.

 

COURSES

Network Security

Network Security

 

Network security is concerned with granting access to a network to the authorized users, and denying access to a network by the unauthorized users.

It encompasses the actions to prevent attacks from viruses, worms, and Trojan horses; spyware and adware; zero-day/zero-hour attacks; hacker attacks; denial of service attacks; data interception and theft, and identity theft. A network security consists of many hardware and software components.

 

Linux System/ Server Administration

Linux System/ Server Administration

 Linux is an operating system like MS Windows, which allow software programs (“application software”) to interact with the computer. An operating system makes the computer hardware (say, a microprocessor) understand the commands of application software and gets the job done.

Server/system administration of Linux is all about keeping a Linux-based computer in usable order. Administration involves functions like backing up files, installing new programs, creating or deleting user accounts, making certain that the filesystem is not corrupted, and so on. In short, if a computer were a house, system administration would be can be likened to maintenance – things like cleaning, fixing broken windows, etc.

Ethical Hacking

Ethical Hacking

 

Ethical Hacking is the process of breaking into an organization’s IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.

Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.

 

 

Cloud Computing

Cloud Computing

The cloud is just a metaphor for the Internet. It is simply about storing and accessing data and programs over the Internet. Cloud computing is an IT discipline growing in popularity.

The subject deals with designing, building and implementing three types of cloud environments: public, private and hybrid. Cloud computing as a science is at the intersection of IT, information architecture, business, software engineering, and data storage.

Networking Engineering (Routing & Switching)

Networking Engineering (Routing & Switching)

A computer network (LAN or WAN) operates by connecting computers and the peripherals (like printers and scanners) using two pieces of equipment: switches and routers. The switches enable the devices in a local network to talk to each other, while the routers enable the devices to connect with external networks.

A switch acts as a controller – it manages how various devices within a local network share information among themselves. The router acts as a dispatcher – it chooses the best route for sending and receiving information across a local and an external network or Internet. Routing and switching functions are all about planning and fixing routers and switches in a network.

 

Course objective

The course teaches students the basics of networking and how to configure a small network with routers and switches. It teaches the difference between protocols like IP, TCP and UDP; between IPv4 and IPv6. It also teaches how to configure routers and switches in a network adhering to protocols. The course also covers many related subjects in LAN/WAN networking.

Certificate in IT INFRASTRUCTURE DEVELOPMENT

Duration: 60 HOURS (7 WEEKS)

Course Schedule: 3 HOURS / 3 DAYS A WEEK

Class Schedule: MORNING / AFTERNOON / EVENING

CONTACTS

ACCRA CAMPUS

1st Floor, Obrapa House
Atico Junction, Mallam Highway
Accra, Greater Accra Region

POSTAL ADDRESS

P. O. Box GP 14219
Accra

TELEPHONE

+233 (0)30 232 7949
+233 (0)50 020 9080
 

CONTACTS

CADD CENTRE KUMASI

Ayeduase, KNUST
Off Campus
Kumasi, Ashanti Region

POSTAL ADDRESS

P. O. Box GP 14219
Accra

TELEPHONE

+233 (0)50 637 9590
+233 (0)50 020 9080

TWITTER FEED

FACEBOOK FEED