IT INFRASTRUCTURE MANAGEMENT
The purpose of IT infrastructure management is to provide structure and control of the functions responsible for diverse technical operations which generally involve hardware, software, and networking in both physical and virtual environments. The main goal is to minimize downtime and maintain business productivity.
ROLE IN THE INDUSTRY
IT Infrastructure Managers are primarily responsible for overseeing both the technical and managerial aspects of their organization’s IT department. Their job is to plan, direct and design their company’s IT infrastructure while simultaneously managing the IT team responsible for maintaining that infrastructure.
JOB TITLES
Upon completion of the course, students can apply for the job of a
- Security management specialist.
- Network engineer/architect.
- Cyber/information security engineer/analyst.
- IoT designer/developer/engineer.
- Transformation consultant
- Computer support specialist.
COURSES
Network Security
Network Security
Network security is concerned with granting access to a network to the authorized users, and denying access to a network by the unauthorized users.
It encompasses the actions to prevent attacks from viruses, worms, and Trojan horses; spyware and adware; zero-day/zero-hour attacks; hacker attacks; denial of service attacks; data interception and theft, and identity theft. A network security consists of many hardware and software components.
Linux System/ Server Administration
Linux System/ Server Administration
Linux is an operating system like MS Windows, which allow software programs (“application software”) to interact with the computer. An operating system makes the computer hardware (say, a microprocessor) understand the commands of application software and gets the job done.
Server/system administration of Linux is all about keeping a Linux-based computer in usable order. Administration involves functions like backing up files, installing new programs, creating or deleting user accounts, making certain that the filesystem is not corrupted, and so on. In short, if a computer were a house, system administration would be can be likened to maintenance – things like cleaning, fixing broken windows, etc.
Ethical Hacking
Ethical Hacking
Ethical Hacking is the process of breaking into an organization’s IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.
Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.
Cloud Computing
Cloud Computing
The cloud is just a metaphor for the Internet. It is simply about storing and accessing data and programs over the Internet. Cloud computing is an IT discipline growing in popularity.
The subject deals with designing, building and implementing three types of cloud environments: public, private and hybrid. Cloud computing as a science is at the intersection of IT, information architecture, business, software engineering, and data storage.
Networking Engineering (Routing & Switching)
Networking Engineering (Routing & Switching)
Certificate in IT INFRASTRUCTURE DEVELOPMENT
Duration: 60 HOURS (7 WEEKS)
Course Schedule: 3 HOURS / 3 DAYS A WEEK
Class Schedule: MORNING / AFTERNOON / EVENING
CONTACTS
ACCRA CAMPUS
1st Floor, Obrapa House
Atico Junction, Mallam Highway
Accra, Greater Accra Region
POSTAL ADDRESS
P. O. Box GP 14219
Accra
TELEPHONE
+233 (0)30 232 7949
+233 (0)50 020 9080
CONTACTS
CADD CENTRE KUMASI
Ayeduase, KNUST
Off Campus
Kumasi, Ashanti Region
POSTAL ADDRESS
P. O. Box GP 14219
Accra
TELEPHONE
+233 (0)50 637 9590
+233 (0)50 020 9080