ITIL

The Information Technology Infrastructure Library (ITIL) is a set of concepts and practices for Information Technology Services Management (ITSM), Information Technology (IT) development and IT operations. ITSM derives enormous benefit from a best practice approach as it is driven both by technology and the huge range of organisational environments in which it operates; it is in a state of constant evolution. Adopting ITIL can offer users a huge range of benefits that include:

Lean & Six Sigma

Lean Six Sigma is a result of two powerful methodologies (Lean and Six Sigma) that have a complementary toolkit. Combining the two techniques with effective team skills has provided vast improvements

Lean

Is the elimination of waste, as seen from the customer and business perspective. Waste refers to the non-value-added tasks that a customer or employer would not pay for. Deployment of Lean is highly successful by using proven tools, properly applying technology, getting things done systematically and quickly, and creating a high performance work environment.

Six Sigma

Is a measure of performance that strives for near perfection in all processes. Six Sigma is a systematic approach and information-driven methodology for eliminating process deficiencies and variation that increase costs and reduce revenues. Some of the benefits:

Malware Forensics

This training is designed to help digital investigators identify malware on a computer system, pull malware apart to uncover its functionality and purpose, and determine the havoc malware wreaked on a subject system. Practical case scenarios are used throughout the training to demonstrate techniques and associated tools.

Mitigating Business Risk

This is a high impact training seminar Entitled Mitigating Business risk using Digi tal Forensic Practices. It provides delegates wi t h the knowledge they need to protect the evidence in the event of an incident and shows them how to integrate the principles and practices of computer Forensics into the policies and procedures of their organisations.

Certified Ethical Hacking

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Information Security Awareness and Training

Myriad View recognises that awareness of risks and available safeguard is the first line of defense for security of information systems and networks. Therefore, this training aims to provide practical advice for organisations to prepare and implement awareness raising initiatives to information security.

ProjectManagement Professional

Project management is a discipline that can be applied to all industries, regardless of the product or service they are designed to deliver. Beyond its basic application across various industries, project management has tremendous value when effectively implemented to significantly increase the success of the product or service being delivered.

Digital Forensics for Legal Practioners

This training introduces tech-challenged litigators to computer forensics and offer a host of practical strategies geared to helping you win your cases with the power of computer forensics and electronic discovery.

Network Fraud Analysis

The objective of network forensics is to identify malicious activities, discover their details, and to assess the damage. Network forensics begins by capturing network traffic and saving it in a useful format; the forensics analyst can then pores through the traffic logs to identify patterns and spot malicious activity.

Malware Forensics

This training is designed to help digital investigators identify malware on a computer system, pull malware apart to uncover its functionality and purpose, and determine the havoc malware wreaked on a subject system. Practical case scenarios are used throughout the training to demonstrate techniques and associated tools.

Log Management and Incident Response

One of the most challenging, yet rewarding, aspects of perimeter security is network log file analysis. This process involves trying to identify intrusions and intrusion attempts through vigilant monitoring and analysis of various log files and then correlating events among those files. Analyzing log files might sound a bit tedious to you, the techniques presented in this training can help you to gain a great deal of value from your files in a short amount of time.

Mobile Phone & E-mail Forensics

IT professionals need to take advantage of mobile forensics to help them crack cases and improve their investigations. Too many investigators are overlooking mobile phone forensics, and are missing out on a powerful source of forensic data.

Penetration Testing guide & Methodology

This helps Companies to protect critical infrastructures, identify chinks in the armor, and prevent serious data breaches. This training is designed to teach you everything from the fundamentals of the Metasploit Framework to advanced techniques in exploitation.

Computer Hacking Forensic Investigation

C|HFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendorneutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.