گروه دوران
بسته
(0) دانلود فایل
شما هیچ موردی قابل دانلود ندارید!
شماره تماس : 43585
دسته بندی ها
    فیلترها
    Preferences
    جستجو

    CITP - Certifi¬ed IT Professional

    تماس برای قیمت
    مشخصات محصول
    سرفصل دوره
    IT Strategy
    • The need for Information Technology
    • IT strategy and key objectives of IT
    • IT services and service catalogue
    • IT infrastructure and Data Centre
    IT Organisation
    • IT organisation
    • Data centre operations
    • IT operations
    • Data centre roles
    • IT operations roles
    Vendor Selection
    • Vendors
    • Vendor selection
    • RFP / technical coverage / due diligence
    • Place and receive orders
    • Verifying deliveries
    • Invoice verification
    • Maintenance and support
    • Monitoring and reporting
    Project Management
    • Project management methods
    • Business case
    • Project constraints
    • Scope
    • Time
    • Cost
    • Monitor and control
    • Change request
    • Closing
    Applications
    • Application program and API’s
    • Software Development Life Cycle (SDLC)
    • DevOps
    • Design
    • Development
    • Testing
    • Deployment
    System Administration
    • Server hardware / server administration
    • Storage
    • Virtualisation
    • Database administration
    • Network fundamentals
    Documentation
    • Importance of document
    • management
    • Documentation guidelines
    • Documentation lifecycle
    • Types of documents
    • Document categories
    • Content Management System (CMS)
    Service Management
    • Service desk
    • Event management
    • Request fulfilment
    • Incident management
    Business Continuity Planning
    • Business continuity strategy
    • Resource requirements
    • Relocation of staff
    • Information requirements
    • Back-up strategies
    • Site selection
    • Business Continuity Plan (BCP)
    • Test and exercise
    • Review, report and follow-up
    • Monitor and review
    Risk
    • Guidelines
    • Risk management
    • Identification of assets, threats,
    • Vulnerabilities, existing controls and consequences
    • Analysis
    • Evaluation
    • Treatment
    Information Security
    • Standards and guidelines
    • Confidentiality, integrity and availability
    • Administrative controls
    • Physical controls
    • Technical (logical) controls
    • Security logging
    Quality
    • Quality
    • Quality control and assurance
    • Quality metrics
    • Key Performance Indicators