PROFESSIONAL DIPLOMA PROGRAMS

Sort By:  
PROFESSIONAL DIPLOMA IN MASTERMIND - SOFTWARE ENGINEERING (SOFTWARE ENGINEERING)

PROFESSIONAL DIPLOMA IN MASTERMIND - SOFTWARE ENGINEERING

INTRODUCTION

One of the most important domains in today's IT industry is Software Engineering. In our endeavour to address this very crucial segment of the industry, SkyWatch Technology Institute  is offering a robust curriculum with key knowledge components essential to be good Software Engineer. The Revolutionary MMS Software Engineering program is aimed at creating software engineering professionals. Students will learn most prevalent and latest technologies in the software Industry. It builds strong foundational skills in Java Technologies, .NET technologies & Web Development programs. Software curriculum have Multiple Job profiles based architecture like Database Developer, Web Application Developer in Java & .NET, Web Designing using HTML & JQuery etc.

This curriculum is also designed by SkyWatch Technology Institute's revolutionary methodology, which provides the teacher and the group of students to mould the learning style dependent on the profile of the Learners and give an environment to provide constructivism and collaborative learning. It has been therefore aptly called as LACC (Learning Architecture based on Collaborative Constructivism).

SkyWatch Technology Institute's Revolutionary MasterMind curriculum provides a learning environment in which participants learn to solve real life problems faced in the software industry. Sufficient exercises and projects help participants apply the concepts learnt in various job roles in the software industry.

 

COURSE CONTENTS/MODULES

Semester 1 

Modules:

  • Working Smart with Microsoft Office & the Internet
  • Logic Building and Effective Problem Solving
  • RDBMS Essentials & T-SQL Programming
  • Advance Excel Tools and Techniques for Analyzing Data

Exit Profile: Database Analyst


Semester 2

Modules:

  • Programming in Java
  • HTML5 Programming
  • Developing Web Applications Using Servlets & JSP

Exit Profile: Web Application Developer (using Java)



Semester 3

Modules:

  • Developing Mobile Apps on the Android Platform
  • Implementing JSF, Hibernate, and Spring in Java EE Applications
  • Automated Testing Using JUNIT

Exit Profile: Distributed Applications Developer (Java)


Semester 4

Modules:

  • Object Oriented Programming Using C#
  • Developing Web Applications Using ASP.NET
  • Developing Windows Store Apps Using HTML5 & JavaScript

Exit Profile: .Net Web Application Developer



Semester 5

Modules:

  • Developing Advanced Web Applications Using ASP.NET MVC
  • Developing Touch and Mobile Devices
  • Responsive Web Design Using HTML5 & JQuery
  • Software Engineering Capstone Project

Exit Profile: Distributed Applications Developer (.Net)



International Certification Mapping 

  • MS 70-461 - Microsoft SQL Server 2012, Database Development
  • MS 77-420 - Excel 2013 Office Specialist (Partially)
  • MS 1Z0-803 - Java SE 7 Programmer

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 1 Year 4 Months


Prerequisites
  • Basic Computer Knowledge
₵1,550.00
PROFESSIONAL DIPLOMA IN INFORMATION TECHNOLOGY MANAGEMENT (PDITM)

PROFESSIONAL DIPLOMA IN INFORMATION TECHNOLOGY MANAGEMENT

Duration: One Year

Course Description

The Diploma in Information Technology Management is a course that trains participants to understand how Information Technology plays a fundamental role in both the structure and control of the modern business. A successful manager must have an excellent grasp of the functionality, capabilities and effects of the technology that he or she must implement and manage. This course presents the core concepts of Information Technology management. The course will review such key areas as corporate environment, software, databases, information systems, communications and management of personnel in relation to technology and from the point of view of the business manager. This course is ideal for management professionals and potential IT Managers who wish to gain an in depth understanding of the management of Information Technology in the modern corporation.

Certification

To qualify for the Diploma award, all modules must be completed with a score of at least 60% in all course assessments.

Course Structure

  • Semester One
    • Introduction to Programming
    • Systems Analysis and Design
    • Organizational
    • Database Systems
    • Networking
  • Semester Two
    • Web Application Development
    • Object-Oriented Analysis and Design
    • Systems Administration
    • Project Work

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.
Prerequisites
  • Basic Computer Knowledge
₵5,000.00
DIPLOMA IN NETWORK ENGINEERING (PROF. DIPLOMA IN NETWORK)

INTRODUCTION
The number of IT networking jobs are growing year after year. The U.S. Bureau of Labor Statistics reports that networking is the fastest growing occupation. The demand for computer networkers outstrips supply by 45%. As long as people need to communicate with each other using technology, there will be a demand for networkers. SQL Server and Windows Server from Microsoft are the most advanced Database and Server operating system used to power networks, applications and web services.


AWARDS OF SKYWATCH COVERAGE PROGRAM END PROFILE

  • SKYWATCH Certified IT Support Professional - compTIA A+ (2009) (Quarter 1)
  • Certificate in Database Design on MS SQL Server (Quarter 2)
  • Microsoft Certified Solutions Associate on Windows Server Platform (MCSA)(Quarter 3 to Quarter 5)
  • Professional Diploma in Network Engineering (Quarter 1 to Quarter 5)


PROFESSIONAL DIPLOMA IN NETWORK ENGINEERING IS MAPPED TO 5 INTERNATIONAL CERTIFICATIONS OF COMPTIA AND MICROSOFT.

INTERNATIONAL CERTIFICATION EXAMS

This programme is mapped to 5 International Certifications from CompTIA and Microsoft, including MCSA.

  • CompTIA A+ certification exam
  • Exam 70–432: TS: Microsoft SQL Server - Implementation and Maintenance
  • Exam 70-640: TS: Windows Server Active Directory, Configuring
  • Exam 70-642: TS: Windows Server Network Infrastructure, Configuring
  • Exam 70-646: Pro: Windows Server, Server Administrator

By clearing the 3 Exams - 70-640, 70-642 and 70-646 student will become Microsoft Certified Solutions Associate (MCSA) Server Administrator.

COURSE CONTENTS/MODULES

SKYWATCH Certified IT Support Professional (CompTIA A+ 2009)

  • General Knowledge and Terms
  • Recognize the roles of a computer service professional
  • Become familiar with the history of the computer
  • State the three stages of computing and identify associated devices
  • Recognize the difference between serial and parallel communication
  • Convert between binary, decimal and hexadecimal
  • Identify the ASCII value for a given character
  • Describe the function of the computer bus
  • Identify cables and connectors

Basic Electricity and Safety

  • Define common electricity terms
  • State Ohm's Law and its associated formula
  • Describe the difference between direct and alternating current
  • Demonstrate the proper use of a multimeter to test a computer power supply
  • Identify basic electronic components and their function
  • List several ways to avoid electro-static discharge
  • Recognize the importance of following proper safety procedures and list several safety precautions
  • Identify the common types of fire extinguishers
  • Motherboards and Processors
  • Recognize the function and styles of computer cases
  • Identify the components of the motherboard
  • List the functions of the motherboard and its associated components

Change CMOS settings

  • State the purpose of the POST test
  • State the function of and the difference between the computer bus and address bus
  • Identify the different types of processor mounts and socket types
  • Be familiar with the history of processors and cite the advancements – speed, data bus, address bus, cache, memory, etc.
  • State the procedure for installing a CPU
  • Determine the upgrade value for various CPUs

Memory

  • Define ROM and RAM
  • Calculate the amount of memory of a given DRAM chip
  • Recognize the relationship between processor speed and memory access time
  • Recognize the relationship between computer clock speed and RAM speed
  • Identify various memory chips and list the features of each
  • Identify various memory modules and list the features of each
  • Determine the number of SIMMs or DIMMs required to fill one memory bank of a 286, 486 and Pentium
  • Identify the memory configuration of a given computer
  • Demonstrate the proper technique for installing memory
  • Recognize memory problems and list options for repair
  • Compare logical, expanded and extended memory
  • List techniques to optimize memory

Power Supplies 

  • Identify important issues to consider when replacing a power supply
  • List common types of power supplies
  • Estimate the amount of wattage necessary to power computer components
  • Identify connectors and their respective components to which they provide power
  • Demonstrate proper installation of P8 and P9 connectors to the motherboard
  • Identify cable colors and their respective wattage and tolerance
  • Identify molex and mini connectors and what components to which they provide power
  • List common types of power problems
  • Determine the best use of surge suppressors and uninterruptible power supply
  • Recognize the common symptoms of power problems

Storage Devices 

  • List the disk capacities of 5 ¼ and 3 ½ inch floppy disks
  • State the basic procedure for installing storage devices floppy disk drive, hard drive and CD-ROM
  • Identify the proper techniques for maintaining and troubleshooting storage devices floppy disk drive, hard drive and CD-ROM
  • Recognize the physical layout of data on hard drive
  • Check CMOS settings for floppy drive configuration
  • Determine CHS values
  • Prepare a hard drive for installation
  • Partition a hard drive
  • Recognize the structure and value of SCSI drives
  • Identify the current standards for multimedia computers

Buses 

  • Describe the function of expansion buses
  • List the common types of buses
  • Describe the development of the expansion bus
  • List the width and speed of various types of buses
  • Describe the importance of configuring expansion cards and addressing
  • Describe how cascading works
  • List the typical IRQ settings and causes of conflicts
  • List the function of DMA channels
  • List the settings for standard ports
  • Create a startup disk (with CD-ROM)
  • Identify system settings
  • Identify expansion bus
  • Disassembly, Reassembly, and Upgrading
  • Recognize the importance of preparation and documentation in the process of upgrading
  • Identify the components, use, and benefits of the tool kit
  • Demonstrate the proper and safe procedure for disassembly of a computer
  • Demonstrate the proper and safe procedure for re-assembly of a computer
  • List considerations regarding the installation of the following components: CPU, expansion card, IDE drive, and motherboard
  • List the proper procedure for installing the following components: CPU, expansion card, IDE drive, and motherboard 

Printers 

  • Identify the attributes of dot matrix, ink jet, and laser printers
  • List the typical troubleshooting techniques for dot matrix, ink jet, and laser printers
  • List the function of the toner cartridge components
  • Describe the laser printing process
  • Describe the technology used to enhance printing resolution
  • Install a printer driver

Monitors 

  • Define terminology related to computer monitors
  • Describe how the cathode ray tube operates
  • Describe the pros and cons of interlacing
  • Describe CRT sweeping
  • Calculate dots per inch given pitch measurement
  • Demonstrate the proper procedure for adjusting screen resolution
  • Calculate a monitor's viewable size given the horizontal and vertical resolution
  • Describe the four standard levels of operation
  • Demonstrate the proper procedure for adjusting the monitor
  • Identify three places to check when a monitor is not working
  • Recognize that internal servicing of a monitor is beyond the scope of A+ certified individuals
  • List ways to maintain a quality monitor image
  • List video display adapters and their basic features
  • Calculate the minimum memory requirement given resolution and color depth
  • List the types of memory available to use for video cards

Modems 

  • Define basic terms related to modems
  • Describe how modems function
  • Describe how parity is used
  • Describe the steps to install a modem
  • Define common information transfer protocols
  • Recognize the importance of modem standards
  • List possible causes and solutions for troubleshooting modems

Portable Systems 

  • Identify and list the attributes of laptops, notebooks, sub-notebooks, and personal digital assistants (PDA)
  • Describe the four PCMCIA types
  • Compare dual scan displays with active matrix displays
  • Identify the key portability issues with processors, memory and hard disk drives
  • Recognize the importance of voltage reduction and power management
  • Describe the trackball, trackpoint, and trackpad pointing devices
  • Describe and compare the current battery technology

Networking Concepts 

  • Compare a Local Area Network (LAN) to a Wide Area Network (WAN)
  • Describe the basic types of networks
  • Diagram network topology
  • Describe the procedure for installing a network interface card
  • Identify network cabling
  • Describe the primary access methods
  • Define network protocols
  • Describe the devices that can extend the limits of a LAN
  • List the probable causes for network problems
  • Define basic Internet terminology
  • Describe the fundamentals to getting Internet connectivity

Preventive Maintenance 

  • Identify the components of a cleaning tool kit
  • List the procedures for cleaning computer components – monitor, hard disk drives, floppy disk drives, keyboard and mouse
  • Clean the keyboard and mouse
  • List the procedure for cleaning dot-matrix, ink-jet, and laser printers
  • Recognize the importance of establishing a preventive maintenance schedule
  • Identify the recyclable items that require special disposal

Introduction to Operating Systems 

  • Compare operating system with application software
  • Describe the three components of operating systems – firmware, operating system
  • software and interface
  • Compare the command line interfaces with graphical user interface
  • Recognize the importance of DOS as the basis for today's operating systems
  • Identify real and protected mode
  • List the features of Windows operating systems
  • Working in a Command Line Prompt Environment
  • Define basic DOS terminology
  • List commonly used DOS commands and their function
  • View Help in DOS
  • List CONFIG.SYS and AUTOEXEC.BAT commands and their function
  • Determine the source of common problems and issues associated with DOS
  • List features of Windows 3.x
  • Working in a GUI Environment
  • Compare DOS and Windows 3.x system with Windows 9x
  • List features of Windows 9x
  • Describe the process of installing Windows 9x
  • Review the Device Manager
  • Describe the Registry and how to make changes using the Control Panel
  • Use the Control Panel to adjust the display settings
  • Managing Files and Disks in Windows 9x
  • Manage Files and Folders using Explorer and My Computer
  • Customize desktop using Active Desktop

Manage Disks 

  • Troubleshooting Windows 9x
  • Troubleshoot with System Monitor and Resource Meter
  • Use Backup, Disk Cleanup, and Drive Converter
  • Use Maintenance Wizard, ScanDisk, and Scheduled Tasks
  • Troubleshoot Printing Problems and Viruses

Windows Network OS 

  • Become familiar with Windows NT File Services and Security
  • Install, Upgrade, and Uninstall Windows Network OS
  • Troubleshoot Windows NOS
  • Learn about Windows Administrative Tools

Windows Desktop OS

  • Become familiar with the features and benefits of Windows Desktop OS
  • Install Windows Desktop OS
  • Become familiar with Windows Desktop OS Administrative Tools

Networks 

  • Become familiar with Network Operating Systems
  • Find out how to share resources over a network
  • Learn the OSI model
  • Learn about Internet working
  • Staying on Top of Your Profession
  • Recognize the importance of staying current
  • List sources of support and information
  • List materials necessary to be prepared for troubleshooting
  • Describe troubleshooting techniques
  • Recognize the necessity of record keeping and documentation



Certificate in Database Design on MS SQL Server

Introduction to Relational Database Design

  • Define a Database Management System (DBMS).
  • Identify the components of a DBMS.
  • Define the architecture of a DBMS.
  • Identify the functional components of a DBMS.
  • Define database design life cycle and methodology.
  • Describe types of data models.
  • Create an entity-relationship model.
  • List the types of relationships between entities.
  • Define Relational Database Management System (RDBMS).
  • Define relational algebra.
  • Create logical database design.
  • Define normalization and denormalization.
  • Create physical database design.
  • Define Structured Query Language (SQL).
  • Implement relations using SQL.
  • Define views.
  • Explain the different data-integrity constraints imposed by SQL Server.
  • Define, commit, and rollback a transaction.
  • Identify the concurrency problems in multi-user processing.
  • Implement locking on databases.
  • Implement security in databases.

Implementing a Database Design on MS SQL Server

  • Query data.
  • Query data from multiple tables.
  • Manage databases and tables.
  • Manage data in tables.
  • Implement indexes, views, and full-text search.
  • Implement stored procedures and functions.
  • Implement triggers and transactions.
  • Implement managed code.
  • Implement HTTP endpoints.
  • Implement services for message-based communication.
  • Install and configure SQL Server.
  • Manage and secure a database.
  • Back up and restore data.
  • Monitor, optimize, and troubleshoot performance.
  • Maintain high availability.
  • Implement replication.
  • Import and export data.



Microsoft Certified Solutions Associate (MCSA) - MS Windows Server

Course 6424A: Fundamentals of Windows Server Active Directory

  • Describe the Active Directory server roles required for a variety of Active Directory deployment scenarios.
  • Describe the integration of AD DS with other Active Directory server roles.
  • Install the AD DS management tools on a Windows Vista computer.
  • Describe the AD DS logical components.
  • Describe the AD DS physical components
  • Configure AD LDS instances and application partitions.
  • Configure AD LDS access control.
  • Configure AD LDS replication.
  • Request certificates using Web enrollment.
  • Manage certificate requests.
  • Verify AD RMS functionality.
  • Customize the AD RMS configuration.
  • Describe how to implement the AD FS components.
  • Configure the AD FS resource partner organization.
  • Create and configure user accounts.
  • Create and configure computer accounts.
  • Create and configure group accounts.
  • Create and configure organizational units
  • Apply considerations when creating an OU design.
  • Plan a shared folder implementation.
  • Implement a secure shared folder implementation.
  • Evaluate the shared folder implementation.

Course 6425A: Configuring and Troubleshooting Windows Server Active Directory Domain Services

  • Install Active Directory Domain Services.
  • Deploy Read-Only Domain Controllers.
  • Configure AD DS Domain Controller Roles.
  • Describe Active Directory Domain Services and DNS integration.
  • Configure Active Directory Integrated Zones.
  • Configure read only DNS zones.
  • Configure Active Directory Objects.
  • Describe strategies for using groups.
  • Automate AD DS object management.
  • Delegate Administrative access to AD DS objects.
  • Configure AD DS trusts.
  • Describe AD DS replication.
  • Configure Active Directory Domain Services sites.
  • Configure and monitor AD DS replication.
  • Describe Group Policy.
  • Configure the scope of Group Policy objects.
  • Evaluate the application of Group Policy objects.
  • Manage Group Policy objects.
  • Delegate administrative control of Group Policies.
  • Configure Group Policy settings.
  • Configure scripts and folder redirection using Group Policy.
  • Configure administrative templates.
  • Describe Group Policy preferences.
  • Deploy software using Group Policy.
  • Configure security settings.
  • Implement fine-grained password policies.
  • Restrict group membership and access to software.
  • Manage security using security templates.
  • Monitor Active Directory Domain Services using Event Viewer.
  • Monitor Active Directory Domain servers using reliability and performance monitor.
  • Configure Active Directory Domain Services Auditing.
  • Maintain the AD DS Domain Controllers.
  • Back up the Active Directory Domain Services.
  • Restore the Active Directory Domain Services.
  • Troubleshoot Active Directory Domain Services.
  • Troubleshoot DNS integration with AD DS.
  • Troubleshoot AD DS replication.
  • Describe Group Policy troubleshooting.
  • Troubleshoot Group Policy application.
  • Troubleshoot Group Policy Settings.
  • Implement an Active Directory Domain Services infrastructure.

Course 6426A:  Configuring and Troubleshooting Identity and Access Solutions with Windows Server Active Directory

  • Describe IDA Management.
  • Identify Active Directory server roles in IDA Management.
  • Identify the key aspects of ILM 2007.
  • Deploy certificates by using AD CS.
  • Use autoenrollment to deploy certificates.
  • Revoke certificates.
  • Configure certificate templates.
  • Configure certificate recovery.
  • Install and configure AD LDS.
  • Configure AD LDS instances.
  • Configure AD LDS replication.
  • Configure AD LDS integration with AD DS.
  • Identify the key aspects of AD FS.
  • Explore AD FS deployment scenarios.
  • Deploy AD FS.
  • Implement AD FS claims.
  • Identify the key aspects of AD RMS.
  • Install and configure AD RMS server components.
  • Administer AD RMS.
  • Implement AD RMS Trust Policies.
  • Support AD CS.
  • Maintain AD LDS.
  • Maintain and Monitor AD FS.
  • Maintain AD RMS.
  • Troubleshoot AD CS.
  • Troubleshoot AD LDS.
  • Resolve AD FS issues.
  • Solve AD RMS issues.

Course 6421A: Configuring and Troubleshooting a Windows Server Network Infrastructure

  • Identify the system requirements and process for installing Windows Server.
  • Describe the difference between server roles and features.
  • Describe the benefits of and roles supported by a Server Core installation.
  • Install the DNS Server role.
  • Configure the DNS Server role to support various query types.
  • Configure DNS zones.
  • Configure DNS zone transfers.
  • Manage DNS zone records and troubleshoot DNS using various tools.
  • Install and configure the Windows Internet Name Service.
  • Manage WINS client records.
  • Configure and manage WINS replication.
  • Migrate a WINS infrastructure to DNS.
  • Describe how DHCP works.
  • Configure DHCP scopes and options.
  • Manage a DHCP database.
  • Monitor and troubleshoot DHCP.
  • Secure DHCP.
  • Describe the benefits and considerations of IPv6.
  • Describe how IPv6 can coexist with IPv4 environments.
  • Describe IPv6 tunneling technologies used to interoperate with IPv4 networks.
  • Describe the process used to migrate from IPv4 to IPv6.
  • Troubleshoot IPv6 connectivity.
  • Install and configure the Routing and Remote Access service.
  • Configure VPN access.
  • Configure network policies.
  • Configure a connection profile using the Connection Manager Administration Kit.
  • Troubleshoot Routing and Remote Access.
  • Install and configure the Network Policy Server role.
  • Configure a RADIUS client and server.
  • Describe NPS authentication methods.
  • Monitor and troubleshoot a Network Policy server.
  • Describe the benefits and uses of NAP.
  • Describe how NAP works in various access scenarios.
  • Configure NAP.
  • Monitor and troubleshoot NAP.
  • Describe the benefits and uses of IPsec.
  • Configure Connection Security rules.
  • Configure IPsec NAP enforcement.
  • Monitor IPsec activity.
  • Troubleshoot IPsec.
  • Describe the Distributed File System.
  • Manage DFS namespaces.
  • Configure DFS replication.
  • Describe storage management solutions included in Windows Server.
  • Manage storage using File Server Resource Manager (FSRM).
  • Configure quota management using FSRM.
  • Implement file screening using FSRM.
  • Manage storage reports.
  • Back up data.
  • Configure shadow copies.
  • Provide server and service availability.
  • Secure a server role within a Windows infrastructure.
  • Secure servers using security templates.
  • Configure an audit policy.
  • Describe the use of Windows Server Update Services.
  • Manage updates using WSUS.

Course 6418B: Deploying Windows Server

  • Describe Windows Server setup improvements.
  • Describe the Windows Server Server Core installation option.
  • Automate server activation using Microsoft Volume Activation.
  • Configure Server Core.
  • Describe how to add roles to Server Core.
  • Perform an unattended Windows Server installation.
  • Perform an unattended domain controller installation.
  • Configure and use Windows Deployment Services in Windows Server.
  • Manage operating system images in the WIM image format.
  • Describe the Microsoft Deployment Toolkit.
  • Use the Microsoft Deployment Toolkit.
  • Describe the Windows Server upgrade process.
  • Describe how to upgrade from previous Microsoft Windows Server Domain Controllers to latest Windows Server Domain Controllers.
  • Describe the Active Directory upgrade sequence.
  • Describe considerations for upgrading file and print servers.
  • Describe considerations for upgrading Web and application servers.
  • Describe considerations for upgrading remote infrastructure servers.
  • Describe Microsoft server virtualization solutions
  • Migrate workloads to Microsoft virtual machines
  • Describe hardware considerations for Windows Server performance.
  • Describe workload-specific tuning considerations.

Course 6420A: Fundamentals of Windows Server Network and Applications Infrastructure

  • Describe the purpose of network communication standards and the OSI model.
  • Describe the components of physical network infrastructure.
  • Describe the logical organization of networks.
  • Describe the characteristics of Active Directory components.
  • Describe server roles and how they are categorized.
  • Describe the IT professional roles.
  • Describe IT management and processes.
  • Describe options for the professional development of IT professionals.
  • Describe the TCP/IP protocol suite and the individual protocols that are part of it.
  • Describe the components of IPv4 addressing.
  • Describe NetBIOS and DNS name resolution.
  • Describe how IPv4 addresses can be assigned dynamically.
  • Describe tools that can be used to manage and monitor IPv4.
  • Describe the IPv4 communication process between computers.
  • Describe the concept of subnetting.
  • Create IPv4 networks by performing subnetting.
  • Describe the characteristics of IPv6.
  • Describe the characteristics of IPv6 unicast addresses.
  • Describe how IPv6 can be configured automatically and statically.
  • Describe common Windows Server Administrative Tools.
  • Describe how to monitor performance.
  • Describe how to monitor events.
  • Describe how to use Remote Desktop for administration.
  • Describe how to configure security for server administration.
  • Describe how Defense in Depth is used to secure computers.
  • Describe how to secure access to Web content.
  • Describe how to secure access to files.
  • Describe data encryption and how it is used to protect data on disk.
  • Describe public key infrastructure components and certificates.
  • Describe methods for securing network communication by using certificates.
  • Describe firewall and proxy server characteristics.
  • Describe Windows Firewall and how to perform basic administration.
  • Describe how to create Windows Firewall rules.
  • Describe how to monitor and troubleshoot Windows Firewall.
  • Describe the characteristics of remote access methods.
  • Describe how RADIUS is used.
  • Describe how to implement network policies on a Network Policy Server.
  • Describe how to troubleshoot remote access.
  • Describe routing protocols and routing tables.
  • Describe how to configure RRAS as a LAN router.
  • Describe Quality of Service (QoS) and how to implement it.
  • Describe server availability and scalability options.
  • Describe Windows Network Load Balancing.
  • Describe how to configure Windows Network Load Balancing.Describe the printing process.
  • Describe how to configure network printers.
  • Describe how to manage servers by using Print Management.
  • Describe how to manage printers by using Print Management.
  • Describe how to troubleshoot network printing.

Course 6430A: Planning and Administering Windows Server Servers

  • Explain the advantages of deploying Windows Server.
  • Identify Windows Server compatibility issues.
  • Develop a Windows Server deployment plan.
    Create a deployment plan for Windows Server.
  • Identify server decommissioning steps.
  • List Windows Server deployment and migration tools.
  • Identify hardware configuration options for Windows Server.
  • Identify performance implications when combining server roles.
  • List guidance for installing file servers.
  • Plan for Windows Server Server Core.
  • Design a change control process for implementing configuration changes.
  • Plan for configuration changes.
  • Evaluate the success of configuration changes.
  • Plan a defense-in-depth strategy for Windows Server security.
  • Implement host-level security for Windows Server.
  • Implement server security by using Group Policy.
  • Implement network security for Windows Server servers.
  • Determine the requirement for application servers.
  • Identify application server role components.
  • Plan for supporting the Microsoft .NET Framework.
  • Develop a plan for Network Load Balancing (NLB).
  • Describe the improved failover clustering support in Windows Server.
  • Plan for failover clustering in Windows Server.
  • Create a server management task schedule for Windows Server.
  • Plan for security update management plan by using Windows Server Update Services (WSUS).
  • List automated maintenance tools for Windows Server.
  • Identify services required for Distributed File System (DFS).
  • Explain DFS fault tolerance.
  • Identify DFS management tools.
  • Create a backup and recovery plan by using Windows Server Backup.
  • Develop a backup policy for using Windows Server Backup.
  • Create a server restore plan.
  • Create a plan for restoring Encrypting File System (EFS) files.
  • Verify the restore procedure.
  • Plan monitoring tasks.
  • Determine an appropriate server baseline.
  • Determine objects and counters to monitor based on server role.
  • Select the appropriate monitoring tools.
  • Identify appropriate notification methods.
  • Identify hardware issues.
  • Explain physical component failure.
  • Manage device driver failure.
  • Evaluate the effect of software problems.
  • Identify troubleshooting log files.
  • Identify core operating system components.
  • Evaluate software security issues.
  • Identify common types of network problems.
  • Resolve IP connectivity issues.
  • Resolve name resolution issues.

2 Hours Daily 3 Times a Week

Total Duration 1 Years 3 Month

Prerequisites
  • Basic Computer knowledge.
Recommended Courses and Certification:
  • Installing and Configuring Windows Server 2012
  • CCNA V3
  • CEH V9
₵6,000.00
Administering Microsoft® SQL Server® Databases (Administering SQL Server 2014 )

COURSE OVERVIEW

This course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related to maintaining a database. Note: This course is designed for customers who are interested in learning SQL Server 2012 or SQL Server 2014.  It covers the new features in SQL Server 2014, but also the important capabilities across the SQL Server data platform.

TARGET AUDIENCE

The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audience for this course is individuals who develop applications that deliver content from SQL Server databases.

COURSE OBJECTIVES

  • Describe core database administration tasks and tools.
  • Install and configure SQL Server 2014.
  • Configure SQL Server databases and storage.
  • Plan and implement a backup strategy.
  • Restore databases from backups.
  • Import and export data.
  • Monitor SQL Server.
  • Trace SQL Server activity.
  • Manage SQL Server security.
  • Audit data access and encrypt data.
  • Perform ongoing database maintenance.
  • Automate SQL Server maintenance with SQL Server Agent Jobs.
  • Configure Database Mail, alerts and notifications.

COURSE CONTENT

  • Module 1:
  • Introduction to SQL Server 2014 Database Administration
  • Database Administration Overview
  • Introduction to the SQL Server Platform
  • Database Management Tools and Techniques
  • Lab : Using SQL Server Administrative Tools
  • Using SQL Server Management Studio
  • Using the sqlcmd Utility
  • Using Windows PowerShell with SQL Server

  • Module 2:
  • Installing and Configuring SQL Server 2014
  • Planning SQL Server Installation
  • Installing SQL Server 2014
  • Post-Installation Configuration
  • Lab : Installing SQL Server 2014
  • Preparing to Install SQL Server
  • Installing SQL Server
  • Performing Post-Installation Configuration

  • Module 3:
  • Working with Databases and Storage
  • Introduction to Data Storage with SQL Server
  • Managing Storage for System Databases
  • Managing Storage for User Databases
  • Moving Database Files
  • Configuring the Buffer Pool Extension
  • Lab : Managing Database Storage
  • Configuring tempdb Storage
  • Creating Databases
  • Attaching a Database

  • Module 4:
  • Planning and Implementing a Backup Strategy
  • Understanding SQL Server Recovery Models
  • Planning a Backup StrategyBacking up Databases and Transaction Logs
  • Using Backup Options
  • Ensuring Backup Reliability
  • Lab : Backing Up SQL Server Databases
  • Backing Up Database
  • Performing Database, Differential, and Transaction Log Backups
  • Performing a Partial Backup

  • Module 5:
  • Restoring SQL Server 2014 Databases
  • Understanding the Restore Process
  • Restoring Databases
  • Advanced Restore Scenarios
  • Working with Point-in-Time Recovery
  • Lab : Restoring SQL Server Databases
  • Restoring a Database BackupRestoring Database, Differential, and Transaction Log Backups
  • Performing a Piecemeal Restore

  • Module 6:
  • Importing and Exporting Data
  • Introduction to Transferring Data
  • Importing and Exporting Table Data
  • Copying or Moving a Database
  • Lab : Importing and Exporting Data
  • Using the SQL Server Import and Export Wizard
  • Using the bcp Utility
  • Using the BULK INSERT Statement
  • Using the OPENROWSET Function

  •  Module 7:
  • Monitoring SQL Server 2014
  • Introduction to Monitoring SQL Server
  • Dynamic Management Views and Functions
  • Performance Monitor
  • Lab : Monitoring SQL Server 2014
  • Collecting Baseline Metrics
  • Monitoring a Workload

  • Module 8:
  • Tracing SQL Server Activity
  • Tracing SQL Server Workload Activity
  • Using Traces
  • Lab : Tracing SQL Server Workload Activity
  • Capturing a Trace in SQL Server Profiler
  • Generating Database Tuning Recommendations
  • Using SQL Trace

  • Module 9:
  • Managing SQL Server Security
  • Introduction to SQL Server Security
  • Managing Server-Level Security
  • Managing Database-Level Principals
  • Managing Database PermissionsLab : Managing SQL Server Security
  • Managing Server-Level Security
  • Managing Database-Level Security
  • Testing Database Access

  • Module 10:
  • Auditing Data Access and Encrypting Data
  • Auditing Data Access in SQL Server
  • Implementing SQL Server Audit
  • Encrypting Databases
  • Lab : Auditing Data Access and Encrypting Data
  • Implementing Auditing
  • Implementing Transparent Database Encryption

  • Module 11:
  • Performing Ongoing Database Maintenance
  • Ensuring Database Integrity
  • Maintaining Indexes
  • Automating Routine Database Maintenance
  • Lab : Performing Ongoing Database Maintenance
  • Managing Database Integrity
  • Managing Index Fragmentation
  • Implementing a Maintenance Plan

  • Module 12:
  • Automating SQL Server 2014 Management
  • Automating SQL Server Management
  • Implementing SQL Server Agent Jobs
  • Managing SQL Server Agent Jobs
  • Managing Job Step Security Contexts
  • Managing Jobs on Multiple Servers
  • Lab : Automating SQL Server Management
  • Creating a Job
  • Scheduling a Job
  • Configuring Job Step Security Contexts

  • Module 13:
  • Monitoring SQL Server 2014 by Using Alerts and Notifications
  • Monitoring SQL Server Errors
  • Configuring Database Mail
  • Configuring Operators, Alerts, and Notifications
  • Lab : Monitoring SQL Server by Using Alerts and Notifications
  • Configuring Database Mail
  • Implementing Operators and Notifications
  • Implementing Alerts

COURSE PREREQUISITES

  • This course requires that you meet the following prerequisites:
  • Basic knowledge of the Microsoft Windows operating system and its core functionality.
  • Working knowledge of Transact-SQL.
  • Working knowledge of relational databases.
  • Some experience with database design.
  • Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:
  • 20461C: Querying Microsoft SQL Server 2014

Schedule for Administering Microsoft SQL Server 2014 Databases Training
CourseExam
Administering Microsoft SQL Server 2014 Databases70-462

2 Hours Daily 3 Times a Week

Total Duration 6 Months

₵2,200.00
Management Information Systems (MIS)

Why study Management Information Systems?

In today’s rapidly changing business world, a company’s ability to compete depends on how quickly that enterprise can respond to change. Central to this ability, is the successful use of information, and by extension, the appropriate deployment of information technology.

The Management Information Systems program at SkyWatch Technology Institute seeks to train system analysts and managers, who combine the knowledge of information technology with an understanding of business and organizational strategy. As such, this interdisciplinary program trains managers who are uniquely empowered to enhance the competitiveness of enterprises in the new knowledge economy.



In addition to courses in the Core Curriculum, students majoring in Management Information Systems take the following courses:

  • Programming I
  • Programming II
  • Discrete Structures & Theory
  • Data Structures & Algorithms
  • Software Engineering
  • Operating Systems
  • Database Management
  • Human Computer Interaction
  • Web Technologies
  • Networks & Distributed Computing
  • Ecommerce
  • Advanced Database Systems
  • Financial Accounting
  • Managerial Accounting
  • Marketing
  • Operations Management
  • Competitive Strategy
  • Thesis

Programming I: Fundamental Ideas in Computer Science

This course will cover the basics of information technology literacy, including hands-on use of microcomputer applications, principles of digital computers and information technology and an introduction to problem-solving through programming. The algorithmic concepts will be illustrated in Visual Basic and will include the concepts of elementary data types and variables; arithmetic expressions and assignments; program control flow; and using prewritten functions.

The goal of this course is to introduce students to common desktop and database applications and to elements of basic programming and of problem solving using the computer.

 

Programming II: Introduction to Computer Programming

This course gives students an intensive introduction to programming, as well as experience working with (but not designing) larger systems. Concepts will be illustrated using the Java language. In addition to elaborating on all the concepts from Programming I, this course will introduce the object concept; using and declaring functions (methods); data types and variables including arrays; and the use of standard packages. Some techniques for searching and sorting arrays will be introduced. Basic software engineering concepts will also be introduced, such as the software life-cycle; characteristics of good software; documentation, testing; and coding practices which promote correctness and robustness. The course will include at least one team project. At the end of the course, students will be fluent in the basic concepts of modern programming using an object oriented paradigm, and should have the ability to carry out a simple program development process.

 

Discrete Structures and Theory

This course will introduce students to discrete mathematical objects useful for computer science and engineering. Topics covered include fundamentals of set theory, graph theory, enumeration, and algebraic structures, with applications in computing. The goal of this course is to provide students with the definitions and basic tools for reasoning about discrete mathematical objects useful for computer science and engineering.

 

Data Structures and Algorithms

This course will cover fundamental abstract data types and their implementations as data structures, such as lists and trees, as well as asymptotic analyses of algorithms involving these data structures. Students will also learn about searching (dictionaries, priority queues, and hashing); sorting (internal and external); graphs and algorithms on graphs (shortest path, minimum spanning trees); and pattern matching. The main goal of this course is to introduce students to the basic data structures needed to efficiently implement common programming problems. Students will also learn to analyze the run-time of the algorithms that manipulate these data structures.

 

Software Engineering

This course covers the fundamentals of software engineering with a focus on the software life cycle and developing quality software as a team. Topics covered include requirements, specification, design, quality assurance and testing, process, as well as tools and environments. The course will include a programming project in which teams of 4-6 students take a high-level concept provided by the instructor from requirements through implementation.

This course will introduce students to the basics of software engineering, focusing on life cycle, team and technical activities.

 

Operating Systems and Systems Administration

Topics relating to the principles of operating system design will include process management, memory management, auxiliary storage management, and resource allocation. Topics relating to the administration of operating systems will include installation, configuration, systems management and applications support. The course will include a team project.

The goal of this course is to provide students with an understanding of the issues confronting the design and management of an operating system. Students will also develop skills in concurrent programming.

 

Database Management

This course provides a comprehensive overview of database systems. Students will learn the fundamentals of data access and file systems, including hierarchical, network, relational and object oriented data models. The course will cover the elements of relational database design, data query languages, services such as data protection and integrity control, and database management. The course will provide a balance of theory and practical application and will culminate in a database implementation project conducted by teams of students.

This course will provide a basic introduction to the concepts of database system design and implementation including data models, query languages and transaction processing.

 

Human Computer Interaction

This course covers topics in human-computer interaction, including user-centered design, user interface software architecture, rapid prototyping and iterative design, and evaluation techniques. The goal of this course is to introduce students to tools and skills that can be applied to the process of user interface design.

 

Web Technologies

This course will cover the central concepts and technologies related to the World Wide Web. Topics covered will include basic and advanced HTML, scripting and active pages, design and developing Web-based applications, principles and tools for Web content creation, database fundamentals for the Web, security, and e-commerce basics. The primary goal of this course is to introduce many of the technologies and skills needed to design, develop, and deploy effective Web sites.

 

Networks and Distributed Computing

This course introduces the underlying principles of computer network design, from the physical layer up through data transport protocols. Methods and mechanisms for constructing distributed computing systems and network services are discussed in the context of common Internet systems such as electronic mail, print and file servers and Web services. The goal of this course is to provide students with an understanding of how to construct large-scale computer networks.

 

Ecommerce

An introduction to e-Commerce principles, technologies and applications. This course also develops understanding of the problems and requirements of Internet security, and the corresponding solutions. Protocols to ensure secure transactions and e-commerce protocols based on encryption techniques will also be studied.

 

Advanced Database Systems

This course will address the advanced issues in modern database management systems design principles, techniques and applications. Databases underlie most complex computing systems. Major applications include enterprise integration.

 

Financial Accounting

This course will cover the basic concepts of financial accounting, including the construction of financial statements and the various uses that outsiders, such as investors and creditors, make of them. Material will be presented in lecture form supplemented with examples from the popular press. Lectures will typically be followed by class discussions of one or two accounting problems that focus on the "big picture" and illustrate the uses and misuses of financial reports. Students will become familiar with the various components of financial statements and with basic financial statement analysis skills.

 

Managerial Accounting

This course introduces students to the concepts, theory and application of the control functions of management with regard to financial management decisions and long term planning. Beginning with the basics of cost accounting, the course will cover alternative costing systems; determining relevant costs, revenues and profits; how to make outsourcing and capital budgeting decisions; and internal and transfer pricing. Students will learn how to use financial information to identify and analyze alternative projects to be to undertaken by the firm or business unit in order to optimize profitability.

 

Marketing

This survey course will cover issues related to the philosophy of marketing, developing marketing strategy, and planning marketing tactics. The treatment will be from a practical perspective with emphasis on managerial decision-making. The course consists of lectures, case analyses and participation in a marketing simulation. It is designed to provide students with an understanding of the basic concepts of marketing management, and to give students experience in making marketing decisions.

 

Operations Management

This course introduces students to concepts and techniques related to the design, planning, control, and improvement of service and manufacturing operations. It covers topics in process analysis, quality program implementation and management, inventory and supply chain management, and operations strategy. The course consists of lectures and case analyses.

The goal of this course is to make students conversant in the language of operations management, provide them with the quantitative and qualitative tools needed to analyze basic operations issues, and enable them to see the role of operations management in the overall strategy of the firm.

 

Competitive Strategy

Among the critical tasks facing senior managers are the creation, implementation, and evaluation of a business unit's strategy. This course seeks to provide the management student with tools and frameworks essential to carrying out these tasks. Many of these tools and frameworks will be based on recent advances in game theory, industrial organization, and organization theory, although the course will also draw from the older business policy tradition as well. Students who successfully complete this course will be able to analyze industries, identify areas of strategic advantage and disadvantage, and to devise strategies that exploit advantages and remedy disadvantages.

 

Thesis

Students must select one of three possible ways to fulfill their thesis requirement.

 

(1) Entrepreneurship

This course is fundamentally about how to start a scalable business. Scalable businesses are those that can be expected to develop into complex enterprises. By focusing on businesses that have significant growth potential, this course challenges students to think through many aspects of running an enterprise. The unifying framework for this course will be a class project in which students work in teams to write business plans intended to attract support from venture capitalists and other investors. Students will also be required to make oral presentations to potential investors. The course places a heavy emphasis on case studies and discussions with business leaders. Entrepreneurial teams can consist of both business and computer science students.

 

(2) Applied Project

In this course, students will work individually or in teams on a real-life project at a firm operating in Ghana. Students will be assigned a faculty advisor. Business students will typically be required to write up a case study that adds to the body of knowledge about doing business in Ghana and Africa. Computer Science students may work on specific software or information technology projects for companies operating in Ghana or abroad. In addition to a written report, students will be required to make oral presentations to their peers, faculty advisors, and their host companies. Teams working on applied projects can consist of both business and computer science students.

 

(3) Research Project

In this course, students will work individually or in teams on original research in their area of interest. Students will be assigned a faculty advisor at SkyWatch Technology Institute, but may in addition work with faculty living abroad via electronic correspondence. In addition to a written report, students will be required to make oral presentations to their peers and faculty advisors.

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 1 Year

 



Prerequisites
  • Basic Knowledge of Computing
  • ecommended Courses and Certification
₵6,000.00
PROFESSIONAL DIPLOMA IN CYBER SECURITY SPECIALIST (CYBER SECURITY SPECIALIST)

PROFESSIONAL DIPLOMA IN CYBER SECURITY SPECIALIST

The increased reliance on computer systems, the internet, and connected technologies has made cybersecurity a critical concern for organizations and individuals alike. Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from cyber threats and cyberattacks.

The Cybersecurity Specialist Diploma program at Skywatch Technology Institute will prepare students to access, plan, and implement cybersecurity defense strategies. In  1 year 4 months including a 210-hour hands-on practicum, learn how to plan, implement, administer, support, and secure networked computer systems and their users. In addition, you will learn how to monitor and evaluate networks for security risks and vulnerabilities.

Industry and vendor certifications have become a benchmark used by employers during the hiring process. The Cybersecurity Specialist program helps students prepare for certification examinations in the following areas:

  • Computing Technology Industry Association (CompTIA) A+, Network+, Security+, CySA+, Pentest+
  • Cisco Certified Network Associate (CCNA V3)
  • Microsoft Certified Solutions Expert (MCSE)

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 1 Year 4 Months

₵6,000.00
SYSTEM ADMINISTRATION / DIPLOMA IN SERVER INFRASTRUCTURE ( DIPLOMA IN SERVER INFRASTRUCTURE)

INTRODUCTION

Enterprises network environment are centrally managed, inter-operable, and hierarchical in nature. These need to be robust, scalable, and secure. Enterprises, therefore, require a server-based platform to cater to its ever-changing business requirements. In order to manage such dynamic and heterogeneous environment, enterprises need skilled server specialists and administrators, who can install, configure, maintain, and troubleshoot the servers and network infrastructure services.

Windows Server 2012 from Microsoft is the most advanced server operating system used to power networks, applications and web services. This course provides you with having skills and knowledge required to manage, deploy, build, design, optimize, and operate Microsoft Windows Server 2012 technologies.

This course is mapped with MCSA: Server Infrastructure

The Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification validates that you have the skills needed to run a highly efficient and modern data centre, with expertise in identity management, systems management, virtualisation, storage and networking. Earning an MCSE Server Infrastructure certification will qualify you for jobs such as computer support specialist and information security analyst.

This course includes following modules:

  • Installing and Configuring Windows Server 2012
  • Administering Windows Server 2012
  • Configuring Advanced Windows Server 2012 Services
  • Designing and Implementing a Server Infrastructure
  • Implementing an Advanced Server Infrastructure

 

AUDIENCE PROFILE
This course is designed for students who have the desire to work as Computer support specialist and information security analyst. 

The students who want to take this program should have basic knowledge of: 

  • Hardware devices.

 

INTERNATIONAL CERTIFICATION EXAMS
This course includes the necessary information to help you clear the following exam 

  • Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification

 

COURSE CONTENTS/MODULES

Installing and Configuring Windows Server 2012

After completing this module, students will be able to:

  • Plan, install, and configure Windows Server 2012.
  • Install and configure an Active Directory domain controller.
  • Administer Active Directory objects.
  • Automate administrative tasks.
  • Configure IPv4.
  • Configure IPv6.
  • Install and configure DHCP.
  • Install and configure DNS.
  • Configure storage spaces and file and print services.
  • Configure Group Policy.
  • Secure Windows servers.
  • Install and configure virtual servers and clients.

Administering Windows Server 2012

After completing this module, students will be able to:

  • Manage Active Directory accounts.
  • Administer Group Policy.
  • Manage network file services.
  • Manage and configure DNS.
  • Implement and configure Remote Access.
  • Deploy operating system updates.
  • Deploy operating system images.
  • Deploy operating system updates.
  • Monitor system resources.
  • Manage Active Directory services.



Configuring Advanced Windows Server 2012 Services

After completing this module, students will be able to:

  • Configure advanced DNS services.
  • Configure advanced DHCP services.
  • Configure IP Address Management (IPAM).
  • Configure iSCSI and iSNS.
  • Configure Dynamic Access Control (DAC).
  • Configure Active Directory Domain Services (AD DS).
  • Configure Active Directory Certificate Services (AD CS).
  • Configure Active Directory Rights Management Services (AD RMS).
  • Configure Active Directory Federated Services (AD FS).
  • Configure Failover Clustering (FoC).
  • Configure Network Load Balancing (NLB).
  • Configure Hyper-V virtual machines.
  • Implement disaster recovery.
  • Configure additional services.

Designing and Implementing a Server Infrastructure

After completing this module, students will be able to:

  • Plan server upgrade and migration.
  • Plan and implement a server deployment strategy.
  • Plan and deploy servers by using System Center 2012 R2 Virtual Machine Manager (VMM).
  • Design and maintain an IP configuration and address management solution.
  • Design and implement name resolution.
  • Design and implement an AD DS forest and domain infrastructure.
  • Design and implement an AD DS organizational unit (OU) infrastructure.
  • Design and implement a Group Policy Object (GPO) strategy.
  • Design and implement an AD DS physical topology.
  • Plan and implement storage and file services.
  • Design and implement network protection.
  • Design and implement remote access services.

Implementing an Advanced Server Infrastructure

After completing this course, students will be able to:

  • Describe an enterprise data center.
  • Plan and implement a server virtualization strategy using System Center 2012.
  • Plan and implement the network and storage infrastructure required to deploy a virtualized server infrastructure.
  • Plan and deploy virtual machines on Windows Hyper-V.
  • Plan and implement a virtualization administration solution by using System Center 2012.
  • Plan and implement a server monitoring strategy using the Windows Server 2012 tools and using Microsoft System Center 2012 - Operations Manager.
  • Plan and implement an application and a file services infrastructure that is highly available.
  • Plan and implement a highly available server infrastructure by using the failover clustering features in Windows Server 2012.
  • Plan and implement a business continuity strategy in a Windows Server 2012 environment.
  • Plan and implement a PKI deployment, and plan and implement a certificate management solution.
  • Plan and implement an AD FS server deployment and claims aware application access.
  • Plan and implement Dynamic Access Control, Workplace Join and Work Folders.
  • Plan and implement an AD RMS deployment, plan and manage AD RMS templates and access, and plan and implement external access to AD RMS services.

Schedule for MCSE: Server Infrastructure On server 2012 R2
Course#Course ContentsExam#Exam
20410Installing and Configuring Windows Server 2012 R270-410Installing and Configuring Windows Server 2012 R2
20411Administering Windows Server 2012 R270-411Administering Windows Server 2012 R2
20412Configuring Advanced Windows Server 2012 Services R270-412Configuring Advanced Windows Server 2012 Services R2
20413Designing and Implementing a Server Infrastructure70-413Designing and Implementing a Server Infrastructure
20414Implementing an Advanced Server Infrastructure70-414Implementing an Advanced Server Infrastructure

2 Hours Daily 3 Times a Week

Total Duration  6 Months

Prerequisites
  • A+, N+
Recommended Courses and Certification:
  • MCSE 2012: Desktop Infrastructure
  • MCSE Messaging
  • MCSE Private Cloud
  • MCSE SharePoint
  • MCSE: Communication
₵4,500.00
PROFESSIONAL DIPLOMA IN NETWORK SECURITY SPECIALIST

PROFESSIONAL DIPLOMA IN NETWORK SECURITY SPECIALIST

The problem with digital information is that it’s bendable, breakable, hackable and open to theft, and because of this, the need for security professionals is expected to continue to increase exponentially. If you are a tech-minded person who loves computers, networks, and problem-solving, come and apply your talents to train for one of the fastest growing professions in one of our industry-driven Network Security training programs at Skywatch Technology Institute.

Virtually every system, database, social network, email network, and Internet server is run through information systems that are stored digitally. The problem with digital information is that it’s bendable, breakable, hackable and open to theft, and because of this, the need for security professionals is expected to continue to increase exponentially. If you are a tech-minded person who loves computers, networks, and problem-solving, come and apply your talents to train for one of the fastest growing professions in one of our industry-driven Network Security training programs at Skywatch Technology Institute.

Interested in figuring out which Network Security program is right for you? Introduce yourself to us through our online inquiry form so we can put you in touch with one of our program advisors!

Network Security Training: Certifications

Our Network Security programs address multiple certification options for students upon graduation, including Microsoft Certified Technology Specialist (MCTS), Microsoft Certified IT Professional (MCITP) on Server Admin, Enterprise Admin, and Messaging, CCNA, Network+, Security+, Linux+, LPI, CEH, and CPT.

NETWORK ADMINISTRATOR SPECIALIST CERTIFICATE

This short program allows you to start your career as a Network Security Administrator in just 12 months. It covers the foundations of network security such as hardware and networking, system administration, desktop support, network infrastructure, network systems, system automation, computing, and Network Architecture. Should you choose, this program is transferrable into our more advanced Network Security Specialist program.

Centre for Arts and Technology provides vouchers to Network Security Administrator students for the MCTS, MCITP on Server Admin, and MCITP on Enterprise Admin certifications.

NETWORK SECURITY SPECIALIST PROFESSIONAL DIPLOMA

The first 12 months of our 18-month Network Security Specialist program is comprised of our Network Security Administrator Certificate program, followed by advanced network security training including perimeter security, operating systems, data communications and networks, computer forensics, encryption, and hands-on network exploits, vulnerabilities, and penetration testing.

Centre for Arts and Technology provides vouchers to Network Security Administrator students for the MCTS, MCITP on Server Admin, MCITP on Enterprise Admin, and CCNA certifications.

Careers

Study for a career as a:

  • LAN Manager
  • Network Administrator
  • Network Engineer
  • Network Analyst
  • Computer and Network Operator
  • User Support Analyst
  • Mail Administrator
  • System Analyst
  • Information Systems Security Professional
  • Systems Operations Analyst
  • LAN Technician
  • Hardware Installation Coordinator
  • Network Security Architect
  • Computer Forensic Investigator

* Notice * – This program requires students to have a laptop. Please inquire with a Program Advisor for complete details.

Course Flow

Quarter A focuses on introducing students to the Microsoft platform for network administration. Students will be challenged to set up domain-based environments aimed at small businesses while building a foundation in automated administration using Windows PowerShell. This quarter will also cover Microsoft Active Directory, aimed at expanding student knowledge to network administration for larger business enterprises. Courses vary between lectures, discussions, and hands-on practical application in a virtual environment.

Courses Include: Desktop Support Administration; Network Scripting Essentials; Active Directory and Network Infrastructure Administration; Application Infrastructure and Enterprise Administration

Quarter B focuses on introducing students to the concepts of wireless technologies and security. Students will learn wireless technologies and implementation, leaving them with the foundations for CWNA certification. In project-based learning, students will explore LANs, WANs, and VLANs in the context of a typical commercial enterprise, constructed with Cisco IOS-based equipment. Added into the mix are an understanding of common languages, best practice, and design decisions for CompTIA Security + certification. Courses vary between lectures, discussions, and hands-on practical application in a virtual environment.

Courses Include: Networking with Cisco Technologies; Wireless Technology Networks; Computing Security Architecture

Quarter C starts with an introduction to Linux, including usage and operation. Upon this foundation, students will progress into an intermediate understanding of Linux, covering DNS, mail servers, DHCP, FTP, NFS, and NIS. It is at this intermediate level that students will be challenged to use Linux scripting in their networks. In addition to Linux content, students will learn the basics of IT project management methodologies and application. Courses vary between lectures, discussions, and hands-on practical application in a virtual environment.

Courses Include: Linux Operating Systems; IT Project Management; Data Communication and Networks

Quarter D will focus on communications systems. Students will learn how to set-up and configure Microsoft Exchange, while also learning Active Directory and basic network infrastructure. Simultaneously, students will be introduced to the concepts of hardware virtualization, and challenged to design, implement, and maintain a full virtualization environment using OpenStack. To complete their new skills, students will learn the foundations of the IT Information Library and its framework and methodology for IT/business integration. Courses vary between lectures, discussions, and hand-on practical application in a virtual environment.

Courses Include: Virtualization and Cloud Computing; ITIL Foundations; Enterprise Messaging and Collaboration Services

Quarter E starts to focus on issues of network security, building foundational knowledge. Students will pursue advanced level Linux administration techniques, as well as integration between differing platforms. Students will delve into recent versions of server software, including Apache, Samba, and MySQL. This quarter also focuses on network monitoring and optimization, using industry standard tools. An introduction to computer forensics is also made, discovering the rules of engagement, intrusion management, and privacy. Courses vary between lectures, discussions, and hand-on practical application in a virtual environment.

Courses Include: Advanced Network Systems; Computer Forensics for the First Responder; Network Optimized Monitoring

The final quarter of the program is the culmination of everything the students have learned. Students learn about encryption technology, including a conceptual knowledge of cryptographic algorithms, authentication, non-repudiation, and access control. Students are also introduced to the concepts of ethical hacking, including malicious software, security attacks, OS vulnerabilities and network protection. The quarter culminates in a capstone project, the scope of which challenges students to use their accumulated knowledge on a large-scale hypothetical industry standard project.

Courses Include: Encryption, Public Key Infrastructure Architecture and Administration; Hands-on Network Exploits, Vulnerabilities and Penetration Testing; Industry Capstone Project


Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 1 Year 4 Months


Prerequisites
  • Basic Computer Knowledge
₵4,500.00
DIPLOMA IN WEB DEVELOPMENT DESIGN

INTRODUCTION

Before you start on any programming language, you need to know the techniques used in programming.
The understanding of the techniques that are used to represent the logic required for solving problems using a computer.
The Introduction to Programming Logic and Techniques module focuses on developing basic programming logic using pseudo code and flow charting techniques.
 
You will learn concepts related to programming, conditions, iterations, and modular programming.
For an individual or an organization to create a global presence, they need to create a Web site.
These Web sites contain the information in the form of Web pages. These Web pages are created in a language known as Hypertext Markup Language (HTML).
 
This module aims at enabling students to create Web pages and Web sites.

 

COURSE CONTENTS/MODULES

Introduction to Programming Logic and Techniques
After completing this module, students will be able to:
  • Input and output requirements of a computer problem
  • Programs and programming languages
  • Various tools for problem-solving
  • Pseudo code keywords and structure
  • Data and data types
  • Use operators
  • Representing decisions in a pseudo code
  • Using flowcharts
  • Representing decisions in a flowchart
  • Using the dry run table
  • Identifying repetitive processes
  • Representing complex conditions and iterations in a problem
  • Modular approach to programming
 
Introduction to Web Content Development (IWCD)
After completing this course, the student should be able to:
  • Create and format Web pages
  • Add images, colors, and backgrounds to Web pages
  • Create tables, forms, and frames in HTML
  • Identify the origins of JavaScript and its key characteristics
  • Call JavaScript functions
  • Write JavaScript programs
  • Identify the limitations of Electronic Data Interchange (EDI)
  • XML
  • Create a CSS document
  • Create an Extensible Style Sheet Language Transformation (XSLT) to format data

Adobe Photoshop CS6
After completing this course, the students should be able to:
  • Identify the basic components of the Photoshop workspace and Adobe Bridge.
  • Define image size, resolution, and color modes.
  • Work with selection tool and layers.
  • Make image enhancements and adjustments.
  • Open and modify an image in Camera Raw.
  • Prepare images for print and web.
  • Draw images by using raster tools such as brushes, stamps, erasers, and gradients.
  • Create visuals by using vector tools such as the pen, shape, and type tools.
  • Create Videos
  • etc.
 
Dreamweaver
After completing this course, the student should be able to:
  • Identify the capabilities of Dreamweaver CS6, the elements of design, and the technologies used in website production.
  • Describe the work and project planning required to create a website.
  • Create web pages and content elements for those pages.
  • Use Cascading Style Sheets (CSS) to style page content.
  • Insert images and manage the image properties.
  • Create tables and import external content for the pages.
  • Create reusable web assets and page templates for other web pages.
  • Integrate media files with Dreamweaver.
  • Use mobile integration techniques.
  • Preview and test a website.
  • Manage website files.
 

Diploma in Web Development

  • Introduction to Programming Logic and Techniques
  • Introduction to Web Content Development (IWCD)
  • Adobe Photoshop CS6
  • Dreamweaver
  • Creating, Querying, and Managing Databases Using MySQL
  • Developing Web Applications Using PHP

2 Hours Daily 3 Times a Week

Total Duration 6 Months

Prerequisites
  • Basic Computer knowledge.
₵3,500.00
MASTERMIND SERIES - INFRASTRUCTURE MANAGEMENT (INFRASTRUCTURE MANAGEMENT)

INTRODUCTION

The need for Network solutions arose from minimum requirement of transferring information and data across computers. In today's connected world, networking solutions have become important for organizations. Most of the work is being done online using Internet. With the world integrating into one system, the demand for professionals who can create, maintain and administer networks is growing rapidly. Networking professionals are some of the most respected workers in the IT industry. And, they are also one of the highest paid.

The Revolutionary Mastermind Series - Infrastructure Management (IM) program is aimed at creating professional skills in network infrastructure management. Students will learn most prevalent and latest technologies in IM track. It builds strong foundational skills in Hardware & Networking support, MCSE windows server infrastructure, Database administrator etc. IM curriculum have Multiple Job profiles based architecture like Desktop Technician support, Network Technician, Windows server administration, Database administration. In IM some modules are global certification mapped with CompTIA and Microsoft Server and database administration, which will help student to clear the exam.

This curriculum is also powered by SkyWatch Technology Institue's methodology, which provides the teacher and the group of students to mould the learning style dependent on the profile of the Learners and give an environment to provide constructivism and collaborative learning. It has been therefore aptly called as LACC (Learning Architecture based on Collaborative Constructivism).

 

COURSE CONTENTS/MODULES

Semester 1 

Modules:

  • Working Smart with Microsoft Office & the Internet
  • Installing, Configuring & Troubleshooting a Windows PC
  • RDBMS Essentials & T-SQL Programming

Exit Profile: PC Support Professional



Semester 2

Modules:

  • CompTIA Network+ - Protocols and Internetworking Standards
  • Enterprise Business Desktop Deployment
  • Installing and Configuring Windows Server 2012

Exit Profile: Network Administrator



Semester 3

Modules:

  • Administering Windows Server 2012
  • Configuring Advanced Windows Server 2012 Services
  • Microsoft SQL Server 2012: Database Administration
  • CompTIA Security+

Exit Profile: Server Administrator



Semester 4

Modules:

  • IT Operations and Infrastructure Management
  • Designing and Implementing a Server Infrastructure
  • Implementing an Advanced Server Infrastructure
  • Microsoft SharePoint 2013

Exit Profile: Enterprise Infrastructure Administrator / Manager



International Certification Mapping 

Semester
1
  • MS 70-461 - Microsoft SQL Server 2012, Database Development
  • CompTIA A+ 220-801 and 220-802 exams.
2
  • CompTIA Network+ N10-005 exam
  • MS 70-410-Installing and Configuring Windows Server 2012
3
  • MS 70-411-Administering Windows Server 2012
  • MS 70-412-Configuring Advanced Windows Server 2012 Services
  • MS 70-462 : Administering Microsoft SQL Server 2012 Databases
  • SY0-401 : CompTiA Security+
4
  • MS 70-413-Designing and Implementing a Server Infrastructure
  • MS 70-414-Implementing an Advanced Server Infrastructure

Prerequisites
  • Basic Computer knowledge.
₵6,500.00
PROFESSIONAL DIPLOMA IN NETWORK AND INTERNET SECURITY SPECIALIST

PROFESSIONAL DIPLOMA IN NETWORK AND INTERNET SECURITY SPECIALIST

The Network and Internet Security Specialist program will prepare you to plan, implement, administer, support and secure networked computer systems and their users. It also covers all aspects of implementation, and operating computer services.

If you're interested in entering a rapidly growing field, IT is for you. The Network and Internet Security Speciality program at SkyWatch Technology Institute will also prepare for certification exams in Computing Technology Industry Association (CompTIA) A+, Network+ and Security+ certifications, Cisco Certified Network Associate (CCNA V3), Microsoft Certified Systems Administrator (MCSA), and Microsoft Certified Database Solutions Expert (MCSE). In addition to developing a solid foundation in programming skills, you will participate in a work placement program.

Price Includes International Curriculum Course ware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 1 Year 4 Months


Prerequisites
  • Basic Computer  Knowledge
₵6,500.00
PROFESSIONAL DIPLOMA IN NETWORKING AND SYSTEMS ADMINISTRATION

PROFESSIONAL DIPLOMA IN NETWORKING AND SYSTEMS ADMINISTRATION

Duration: One Year

Course Description

The Diploma in Networking and Systems Administration is a course that trains participants to understand the principles of networking and equips them with the requisite skills to solve business network challenges. This course presents the core concepts of networking, operating systems and systems administration.

Certification

To qualify for the Diploma award, all modules must be completed with a score of at least 70% in all course assessments.

Course Structure

  • Semester One
    • Operating Systems
    • Data Communications and Networking
    • IT Security and Management
    • Practical Cabling and Wireless Networking
    • Routing and Switching
  • Semester Two
    • Systems Administration
    • Linux Server Administration
    • Windows Server Administration
    • IT Service Management
    • Project Work

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.
Prerequisites
  • Basic Computer Knowledge
₵6,500.00
Per Page      1 - 12 of 12
  • 1