• Home
  • Course Catalog
  • Contact Us
  • Request info
    Contact Us
    First Name*
    Last Name*
    Email
    Phone
    Questions/Comments
    Lead Status
    Lead Source*
    Referral Information
    External Referrer
    Partner SMEC ID
    Enter text from the pic*

    IT and Software Development

    Active filters

    In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. With this complete course you can develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. With the ease and convenience of the Internet we provide you with the knowledge and skills needed to successfully install, operate and troubleshoot a small branch office network. This course makes sure the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security.

    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

    The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. This course will prepare students for the CompTIA Advanced Security Practitioner CAS003 exam.

    Have you ever wanted to develop the next big web or mobile application? Or wanted to design and develop your own apps for your business? Then this program is for you! Businesses, consumers, and programmers have all embraced the new innovative medium of web and mobile applications, making web and mobile application developer one of the most in demand and fastest growing IT careers. The median salary for an Applications Developer is $72,000 per year, with a range between $46,000 and $108,000 per year based on experience and education level. What’s in this program? You will learn the skills you need through our real-world project based learning approach.

    Microsoft Office Specialist 2013 (MOS 2013) Learn how to create, format, and secure professional and creative documents using Microsoft Word 2013, and prepare for certification, too! In Excel, you’ll cover basic through advanced topics, including formatting cells; applying number formats, linking worksheets, creating a PivotTable, and more. In PowerPoint, you’ll discover how to create and format presentation, how to apply Transitions and animations, how to set up presentations. In Outlook, you will design and format E-mail, track and respond to messages, how to manage the Inbox with Rules and Quick Steps, creating appointments, tasks.

    In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. With this complete course you can develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. With the ease and convenience of the Internet we provide you with the knowledge and skills needed to successfully install, operate and troubleshoot a small branch office network. With the included Practice Lab we provide access to real equipment that brings theory to life and gives you a greater depth of technology understanding. You are also provided with our integrated lab guides which walk you through a variety of topics.

    The IT incident management training program will make learners proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, the learners will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, it incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.

    In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. With this complete course you can develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. With the included Practice Lab we provide access to real equipment that brings theory to life and gives you a greater depth of technology understanding. You are also provided with our integrated lab guides which walk you through a variety of topics. Students should be able to perform maintenance tasks with the command line, install and configure a workstation, and be able to configure a basic network.

    Thousands of companies depend on CompTIA standards to provide a consistent predictor of employee success. The CompTIA Network+ certification is the sign of a qualified networking professional. IT Professionals in Network + exhibit qualifications to work in areas such as: network technologies, installation and configuration, media and topologies, management, and security. CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Advanced Security Practitioner training included in this program will give students the introductory knowledge to pursue an advanced level certification. This program includes three Practice Labs that cover topics for the CompTIA exams using real CompTIA equipment.

    In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. With this complete course you can develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. With the included Practice Lab we provide access to real equipment that brings theory to life and gives you a greater depth of technology understanding. You are also provided with our integrated lab guides which walk you through a variety of topics. Students should be able to perform maintenance tasks with the command line, install and configure a workstation, and be able to configure a basic network.

    The Certified Information Systems Auditor (CISA) program is the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Earning the CISA Certification will highlight your experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the field.

    The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide. The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.