SlideShare a Scribd company logo
1 of 15
Download to read offline
Enterprise IT Certification 
Program 
Dr Shiyghan Emmanuel Navti 
Enterprise IT Consultant & Trainer 
email: shiyghan@techequityltd.com 
web: http://techequityltd.com & http://cloudclinique.com
We Improve 
Service 
Delivery 
We are Global 
Technology 
Leaders 
Our Program is 
Vendor 
Neutral 
We Enable 
Professional 
Development 
We Accelerate 
Best Practice 
Adoption 
Our Program is 
Certification 
Based
Enterprise Foundation Technologies 
Enterprise IT Architecture 
Module 3 Enterprise Service Management 
Enterprise Risk Management 
Module 1 
Module 2 
Module 4 
Module 5 Enterprise Security
Enterprise 
Security 
Risk 
Management 
Service 
Management 
IT 
Architecture 
Foundation 
Technology 
Benefits & Challenges 
Storage types and Tiering 
Optimizing Storage Networks 
NAS and SAN Usage 
Migration Options 
Storage Design 
Devices and Protocols 
Deployment Topologies 
Configuration Options 
Management Options 
Virtualization 
Network Performance 
Network Security 
Benefits & Challenges 
Administration 
Provisioning 
Storage 
Networking 
Compute 
Bare Metal 
Security 
Foundation Technologies 
and Components 
Internet 
Intranet 
Extranets 
Web Services 
Administration Tools 
Networking Tools 
Storage Systems and 
Storage Networks 
Virtualization and 
Multitenancy 
Network Infrastructure 
and Management 
Define and adopt storage 
systems and storage 
networking best practices 
Explore and select the right 
network infrastructure based 
on network infrastructure 
best practices 
Understand how to create a 
path to a flexible IT 
infrastructure using 
virtualization 
Understand the basic 
technologies, capabilities and 
tools used to deliver 
enterprise IT services 
Discussion Topics 
Certification Programs 
Cloud+ Cloud+ Cloud+ 
Certified Cloud Professional 
Certified Cloud Architect 
Cloud Essentials 
Cloud+ 
Certified Cloud Professional 
Certified Cloud Architect
I/O Performance 
Data Redundancy 
Bandwidth 
Scalability 
Redundancy 
Maintenance 
Administration 
Resource Pooling 
Data Redundancy 
Bandwidth 
Scalability 
Redundancy 
Maintenance 
Administration 
Virtualization 
Data Security 
Resource Isolation 
Monitoring 
Availability 
Multitenancy 
Multii-device Access 
Administration 
Service Delivery and 
Deployment Models 
Cloud Concepts 
Characteristics & Roles 
Benefits 
Capabilities & Skills 
Hosting Options 
Cloud Deployment Models 
Cloud Service Models 
Infrastructure 
Architecture 
Platform Systems & 
Mechanisms 
Platform 
Architecture 
Explore proven best practices 
architectures for delivering 
elastic and resilient cloud 
infrastructure. 
In-depth discussion on best 
practices architectures for 
delivering an elastic and 
resilient cloud platform. 
Understand key technology 
systems capabilities that 
enable the delivery of a cloud 
platform infrastructure. 
Understand characteristics, 
roles and benefits. Explore 
various models for delivering 
and deploying cloud services. 
Discussion Topics 
Certification Programs 
Cloud+ 
Certified Cloud Architect 
Cloud+ 
Certified Cloud Architect 
Cloud Essentials 
Cloud+ 
Certified Cloud Professional 
Cloud Essentials 
Cloud+ 
Certified Cloud Professional 
Certificate for Cloud Security 
Knowledge 
Enterprise 
Security 
Risk 
Management 
Service 
Management 
IT 
Architecture 
Foundation 
Technology
Roles & Responsibilities 
Documentation 
Provider Assessment 
Mission Critical Systems 
System Redundancy 
Disaster Recovery Planning 
Skills and Tools 
Processes, Stages & Goals 
Information Security 
Documentation 
Roles and Responsibilities 
Strategy Development 
Provider Assessment 
Testing & Monitoring 
SLA and Contracting 
Provider Selection 
Compliance & Regulation 
Facilities & Equipment 
Virtualization 
Resiliency 
Physical Security 
Human Security 
Maintenance 
Service Delivery 
Compute Resources 
Provider Viability 
Service Contract 
Information Management 
Monitoring 
Cost Management 
Pricing Metrics 
Service Level Agreements 
Business Continuity & 
Disaster Recovery 
Datacenter 
Operations 
Change Management & 
Incident Response 
Understand business 
continuity and disaster 
recovery planning processes 
and capabilities. 
Guidelines for incident 
response, lifecycle, change, 
capacity and configuration 
management 
Explore key datacenter 
operation, maintenance and 
secure datacenter design best 
practices. 
Explore best practices for 
assessing provider viability, 
defining quality of services and 
managing contracts. 
Discussion Topics 
Certification Programs 
Cloud+ 
Certificate for Cloud Security 
Knowledge 
Cloud+ 
Certificate for Cloud Security 
Knowledge 
Certified Cloud Professional 
Certificate for Cloud Security 
Knowledge 
Cloud Essentials 
Cloud+ 
Certified Cloud Professional 
Certificate for Cloud Security 
Knowledge 
Enterprise 
Security 
Risk 
Management 
Service 
Management 
IT 
Architecture 
Foundation 
Technology
Benefits 
Application 
Platform 
Infrastructure 
Security 
APIs 
Migration 
Network 
Availability & Performance 
Security 
Compliance 
Configuration 
Cloud Considerations 
Documentation 
Implementation 
Data & Cloud 
Provider Assessment 
Contract Structure 
Roles & Responsibilities 
Regulation 
Enforcement 
Governance & Enterprise 
Risk Management 
Facets of Risk 
Management Framework 
3rd Party Provider 
IT & Physical Infrastructure 
Compliance & Legal 
Cloud Business Model 
Information Security 
Interoperability and 
Portability 
Legal, Compliance and 
Audit Management 
Testing and 
Troubleshooting 
Define the need for 
interoperability and 
portability, and best practices 
for avoiding vendor lock-in. 
Explore strategies for testing 
in a cloud environment, and 
best practices for ensuring 
the cloud is fit for purpose. 
Explore compliance, audit, 
regulation, data management 
and provider contracting best 
practices. 
Understand risks in the cloud, 
define compromise risks, 
vulnerabilities and risk 
management practices. 
Discussion Topics 
Certification Programs 
Certificate for Cloud Security 
Knowledge 
Cloud+ 
Certificate for Cloud Security 
Knowledge 
Certificate for Cloud Security 
Knowledge 
Enterprise 
Security 
Risk 
Management 
Service 
Management 
IT 
Architecture 
Foundation 
Technology
Authentication & 
Authorization Management 
Hardening Best Practices 
Large Scale Systems 
Provisioning Automation 
Provider Selection 
Application Security 
Multi-tenancy 
Responsibilities & Liabilities 
Personnel On-boarding 
Policies and Procedures 
Contract Negotiation 
IT and Physical Controls 
Audit and Compliance 
Data Management 
Security as a Service 
Operational Practices 
Encryption Alternatives 
Key Management & Storage 
Encryption as a Service 
Hardware Encryption 
Data Loss Prevention 
Intrusion Prevention 
Audit and Compliance 
Identity, Entitlement and 
Access Management 
Identity Federation 
Governance 
Application Design 
Building Trust 
Management & Administration 
Cloud Business Model 
Entitlement Process 
Secure Platform 
Management 
Encryption and Key 
Management 
Secure IT 
Operations 
Explore best practices for 
securing cloud infrastructure 
components, platform 
services and applications. 
Understand key roles, 
responsibilities and liabilities, 
and best practices for building 
trust. 
Understand data protection 
compliance requirements and 
guidelines for encryption and 
key management. 
Understand Identity, 
Entitlement and Access 
Management (IdEA) patterns 
and best practice. 
Discussion Topics 
Certification Programs 
Certificate for Cloud Security 
Knowledge 
Certificate for Cloud Security 
Knowledge 
Certificate for Cloud Security 
Knowledge 
Certificate for Cloud Security 
Knowledge 
Enterprise 
Security 
Risk 
Management 
Service 
Management 
IT 
Architecture 
Foundation 
Technology
Founder, Tech Equity Ltd & CloudClinique.com 
Africa Cloud Credentials Council Ambassador 
IBM Europe Cloud Technical Sales Leader (2012/13) 
Certified Cloud Trainer 
Certified Cloud Architect 
Certified Cloud Professional 
PhD Computational Modeling 
MSc. Computational Modeling and Finite Elements in 
Engineering Mechanics 
BEng. Structural Engineering with Architecture 
Lead Consultant & Trainer 
Dr Shiyghan Emmanuel Navti 
http://vizualize.me/shiyghan 
IBM Africa Expansion Strategy Leader (2009/10/11)
Enterprise IT Workshop 
at Mozambique Stock 
Exchange, Nov 2014! 
CEO Remarks “…I would like to express that the training achieved the 
objectives and we hope we can continue in contact…”
1. Security risk perceptions 
2. Limited skill and understanding 
3. Weak legal & regulatory framework 
4. Incompatibility with current infrastructure 
5. Risk of vendor lock-in 
6. Data access concerns 
7. Inability to quantify value 
8. Fear of change 
9. Cost concerns 
10. Technology complexity 
Partner with Tech Equity to overcome Enterprise Technology adoption 
concerns that limit opportunity
Tech Equity is committed to supporting Enterprise IT adoption in Africa
Tech Equity is the Africa cloud technology ambassador
Tech Equity consultants have deep experiences in growth markets and 
mature markets
Contact Us 
@ 
cloud@techequityltd.com 
Tech Equity enables organizations to realize more value from their IT 
investments

More Related Content

What's hot

Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyNetwork Intelligence India
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career pathKushantha Gunawardana
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsEryk Budi Pratama
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?Terro White
 

What's hot (20)

Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?
 

Similar to Cloud Clinique Enterprise IT Certification Program - Module Matrix

Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training programAdrian Hall
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentationcygnet-infotech
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Servicesssphelps
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech ServicesSEdwardPhelps
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Servicesssphelps
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloudImpetus Technologies
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Managed It Services
Managed It ServicesManaged It Services
Managed It ServicesGss America
 
Harness the power of cloud Enterprise IT Program
Harness the power of cloud   Enterprise IT ProgramHarness the power of cloud   Enterprise IT Program
Harness the power of cloud Enterprise IT ProgramAdrian Hall
 
Towards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & AtosTowards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & AtosCsilla Zsigri
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the CloudRolf Frydenberg
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalMauricio Godoy
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentationprashantjky
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxSteven Quach
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentationmhalcrow
 

Similar to Cloud Clinique Enterprise IT Certification Program - Module Matrix (20)

Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
WIPRO
WIPROWIPRO
WIPRO
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentation
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
Building a mature foundation for life in the cloud
Building a mature foundation for life in the cloudBuilding a mature foundation for life in the cloud
Building a mature foundation for life in the cloud
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
Harness the power of cloud Enterprise IT Program
Harness the power of cloud   Enterprise IT ProgramHarness the power of cloud   Enterprise IT Program
Harness the power of cloud Enterprise IT Program
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Towards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & AtosTowards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & Atos
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentation
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptx
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 

More from Adrian Hall

Afripay Presentation IAD DCS 2022
Afripay Presentation IAD DCS 2022Afripay Presentation IAD DCS 2022
Afripay Presentation IAD DCS 2022Adrian Hall
 
ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022Adrian Hall
 
Modular Data Center - Innovation Africa Digital Summit 20220512.pptx
Modular Data Center - Innovation Africa Digital Summit  20220512.pptxModular Data Center - Innovation Africa Digital Summit  20220512.pptx
Modular Data Center - Innovation Africa Digital Summit 20220512.pptxAdrian Hall
 
DCA - Africa Market Analysis 2021_South Africa.pdf
DCA - Africa Market Analysis 2021_South Africa.pdfDCA - Africa Market Analysis 2021_South Africa.pdf
DCA - Africa Market Analysis 2021_South Africa.pdfAdrian Hall
 
Napoleon - C Squared.pdf
Napoleon - C Squared.pdfNapoleon - C Squared.pdf
Napoleon - C Squared.pdfAdrian Hall
 
Chris Lazarues Safaricom Ethiopia
Chris Lazarues Safaricom EthiopiaChris Lazarues Safaricom Ethiopia
Chris Lazarues Safaricom EthiopiaAdrian Hall
 
Anthony Voscarides - Wingu.pdf
Anthony Voscarides - Wingu.pdfAnthony Voscarides - Wingu.pdf
Anthony Voscarides - Wingu.pdfAdrian Hall
 
Bethelhem Dejene.pptx
Bethelhem Dejene.pptxBethelhem Dejene.pptx
Bethelhem Dejene.pptxAdrian Hall
 
JICA - Project Ninja in Africa
JICA - Project Ninja in AfricaJICA - Project Ninja in Africa
JICA - Project Ninja in AfricaAdrian Hall
 
Orbit Health - Transforming Healthcare Access and Delivery in Africa
Orbit Health - Transforming Healthcare Access and Delivery in AfricaOrbit Health - Transforming Healthcare Access and Delivery in Africa
Orbit Health - Transforming Healthcare Access and Delivery in AfricaAdrian Hall
 
Sewasew presentation IAD DCS 2022
Sewasew presentation IAD DCS 2022Sewasew presentation IAD DCS 2022
Sewasew presentation IAD DCS 2022Adrian Hall
 
Blue Health presentation IAD DCS 2022 summit.pptx
Blue Health presentation IAD DCS 2022 summit.pptxBlue Health presentation IAD DCS 2022 summit.pptx
Blue Health presentation IAD DCS 2022 summit.pptxAdrian Hall
 
Roen Menezes Regional Director Thuraya IAD Summit 2019
Roen Menezes Regional Director Thuraya IAD Summit 2019Roen Menezes Regional Director Thuraya IAD Summit 2019
Roen Menezes Regional Director Thuraya IAD Summit 2019Adrian Hall
 
Jonathon Adams VP Ericsson IAD 2019
Jonathon Adams VP Ericsson  IAD 2019Jonathon Adams VP Ericsson  IAD 2019
Jonathon Adams VP Ericsson IAD 2019Adrian Hall
 
Nuran solution showcase
Nuran solution showcaseNuran solution showcase
Nuran solution showcaseAdrian Hall
 
Aviat slides
Aviat slidesAviat slides
Aviat slidesAdrian Hall
 
Abdessattar Sassi CTO ZTE
Abdessattar Sassi  CTO ZTEAbdessattar Sassi  CTO ZTE
Abdessattar Sassi CTO ZTEAdrian Hall
 
Daniel Jaeger VP Nokia IAD 2019
Daniel Jaeger VP Nokia IAD 2019Daniel Jaeger VP Nokia IAD 2019
Daniel Jaeger VP Nokia IAD 2019Adrian Hall
 
Dr. Solomon Assefa VP IBM Research IAD 2019
Dr. Solomon Assefa VP IBM Research IAD 2019 Dr. Solomon Assefa VP IBM Research IAD 2019
Dr. Solomon Assefa VP IBM Research IAD 2019 Adrian Hall
 
MTN IAD 2019 presentation - group COO
MTN IAD 2019 presentation - group COOMTN IAD 2019 presentation - group COO
MTN IAD 2019 presentation - group COOAdrian Hall
 

More from Adrian Hall (20)

Afripay Presentation IAD DCS 2022
Afripay Presentation IAD DCS 2022Afripay Presentation IAD DCS 2022
Afripay Presentation IAD DCS 2022
 
ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022ITU Presentation at IAD DCS Summit 2022
ITU Presentation at IAD DCS Summit 2022
 
Modular Data Center - Innovation Africa Digital Summit 20220512.pptx
Modular Data Center - Innovation Africa Digital Summit  20220512.pptxModular Data Center - Innovation Africa Digital Summit  20220512.pptx
Modular Data Center - Innovation Africa Digital Summit 20220512.pptx
 
DCA - Africa Market Analysis 2021_South Africa.pdf
DCA - Africa Market Analysis 2021_South Africa.pdfDCA - Africa Market Analysis 2021_South Africa.pdf
DCA - Africa Market Analysis 2021_South Africa.pdf
 
Napoleon - C Squared.pdf
Napoleon - C Squared.pdfNapoleon - C Squared.pdf
Napoleon - C Squared.pdf
 
Chris Lazarues Safaricom Ethiopia
Chris Lazarues Safaricom EthiopiaChris Lazarues Safaricom Ethiopia
Chris Lazarues Safaricom Ethiopia
 
Anthony Voscarides - Wingu.pdf
Anthony Voscarides - Wingu.pdfAnthony Voscarides - Wingu.pdf
Anthony Voscarides - Wingu.pdf
 
Bethelhem Dejene.pptx
Bethelhem Dejene.pptxBethelhem Dejene.pptx
Bethelhem Dejene.pptx
 
JICA - Project Ninja in Africa
JICA - Project Ninja in AfricaJICA - Project Ninja in Africa
JICA - Project Ninja in Africa
 
Orbit Health - Transforming Healthcare Access and Delivery in Africa
Orbit Health - Transforming Healthcare Access and Delivery in AfricaOrbit Health - Transforming Healthcare Access and Delivery in Africa
Orbit Health - Transforming Healthcare Access and Delivery in Africa
 
Sewasew presentation IAD DCS 2022
Sewasew presentation IAD DCS 2022Sewasew presentation IAD DCS 2022
Sewasew presentation IAD DCS 2022
 
Blue Health presentation IAD DCS 2022 summit.pptx
Blue Health presentation IAD DCS 2022 summit.pptxBlue Health presentation IAD DCS 2022 summit.pptx
Blue Health presentation IAD DCS 2022 summit.pptx
 
Roen Menezes Regional Director Thuraya IAD Summit 2019
Roen Menezes Regional Director Thuraya IAD Summit 2019Roen Menezes Regional Director Thuraya IAD Summit 2019
Roen Menezes Regional Director Thuraya IAD Summit 2019
 
Jonathon Adams VP Ericsson IAD 2019
Jonathon Adams VP Ericsson  IAD 2019Jonathon Adams VP Ericsson  IAD 2019
Jonathon Adams VP Ericsson IAD 2019
 
Nuran solution showcase
Nuran solution showcaseNuran solution showcase
Nuran solution showcase
 
Aviat slides
Aviat slidesAviat slides
Aviat slides
 
Abdessattar Sassi CTO ZTE
Abdessattar Sassi  CTO ZTEAbdessattar Sassi  CTO ZTE
Abdessattar Sassi CTO ZTE
 
Daniel Jaeger VP Nokia IAD 2019
Daniel Jaeger VP Nokia IAD 2019Daniel Jaeger VP Nokia IAD 2019
Daniel Jaeger VP Nokia IAD 2019
 
Dr. Solomon Assefa VP IBM Research IAD 2019
Dr. Solomon Assefa VP IBM Research IAD 2019 Dr. Solomon Assefa VP IBM Research IAD 2019
Dr. Solomon Assefa VP IBM Research IAD 2019
 
MTN IAD 2019 presentation - group COO
MTN IAD 2019 presentation - group COOMTN IAD 2019 presentation - group COO
MTN IAD 2019 presentation - group COO
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cloud Clinique Enterprise IT Certification Program - Module Matrix

  • 1. Enterprise IT Certification Program Dr Shiyghan Emmanuel Navti Enterprise IT Consultant & Trainer email: shiyghan@techequityltd.com web: http://techequityltd.com & http://cloudclinique.com
  • 2. We Improve Service Delivery We are Global Technology Leaders Our Program is Vendor Neutral We Enable Professional Development We Accelerate Best Practice Adoption Our Program is Certification Based
  • 3. Enterprise Foundation Technologies Enterprise IT Architecture Module 3 Enterprise Service Management Enterprise Risk Management Module 1 Module 2 Module 4 Module 5 Enterprise Security
  • 4. Enterprise Security Risk Management Service Management IT Architecture Foundation Technology Benefits & Challenges Storage types and Tiering Optimizing Storage Networks NAS and SAN Usage Migration Options Storage Design Devices and Protocols Deployment Topologies Configuration Options Management Options Virtualization Network Performance Network Security Benefits & Challenges Administration Provisioning Storage Networking Compute Bare Metal Security Foundation Technologies and Components Internet Intranet Extranets Web Services Administration Tools Networking Tools Storage Systems and Storage Networks Virtualization and Multitenancy Network Infrastructure and Management Define and adopt storage systems and storage networking best practices Explore and select the right network infrastructure based on network infrastructure best practices Understand how to create a path to a flexible IT infrastructure using virtualization Understand the basic technologies, capabilities and tools used to deliver enterprise IT services Discussion Topics Certification Programs Cloud+ Cloud+ Cloud+ Certified Cloud Professional Certified Cloud Architect Cloud Essentials Cloud+ Certified Cloud Professional Certified Cloud Architect
  • 5. I/O Performance Data Redundancy Bandwidth Scalability Redundancy Maintenance Administration Resource Pooling Data Redundancy Bandwidth Scalability Redundancy Maintenance Administration Virtualization Data Security Resource Isolation Monitoring Availability Multitenancy Multii-device Access Administration Service Delivery and Deployment Models Cloud Concepts Characteristics & Roles Benefits Capabilities & Skills Hosting Options Cloud Deployment Models Cloud Service Models Infrastructure Architecture Platform Systems & Mechanisms Platform Architecture Explore proven best practices architectures for delivering elastic and resilient cloud infrastructure. In-depth discussion on best practices architectures for delivering an elastic and resilient cloud platform. Understand key technology systems capabilities that enable the delivery of a cloud platform infrastructure. Understand characteristics, roles and benefits. Explore various models for delivering and deploying cloud services. Discussion Topics Certification Programs Cloud+ Certified Cloud Architect Cloud+ Certified Cloud Architect Cloud Essentials Cloud+ Certified Cloud Professional Cloud Essentials Cloud+ Certified Cloud Professional Certificate for Cloud Security Knowledge Enterprise Security Risk Management Service Management IT Architecture Foundation Technology
  • 6. Roles & Responsibilities Documentation Provider Assessment Mission Critical Systems System Redundancy Disaster Recovery Planning Skills and Tools Processes, Stages & Goals Information Security Documentation Roles and Responsibilities Strategy Development Provider Assessment Testing & Monitoring SLA and Contracting Provider Selection Compliance & Regulation Facilities & Equipment Virtualization Resiliency Physical Security Human Security Maintenance Service Delivery Compute Resources Provider Viability Service Contract Information Management Monitoring Cost Management Pricing Metrics Service Level Agreements Business Continuity & Disaster Recovery Datacenter Operations Change Management & Incident Response Understand business continuity and disaster recovery planning processes and capabilities. Guidelines for incident response, lifecycle, change, capacity and configuration management Explore key datacenter operation, maintenance and secure datacenter design best practices. Explore best practices for assessing provider viability, defining quality of services and managing contracts. Discussion Topics Certification Programs Cloud+ Certificate for Cloud Security Knowledge Cloud+ Certificate for Cloud Security Knowledge Certified Cloud Professional Certificate for Cloud Security Knowledge Cloud Essentials Cloud+ Certified Cloud Professional Certificate for Cloud Security Knowledge Enterprise Security Risk Management Service Management IT Architecture Foundation Technology
  • 7. Benefits Application Platform Infrastructure Security APIs Migration Network Availability & Performance Security Compliance Configuration Cloud Considerations Documentation Implementation Data & Cloud Provider Assessment Contract Structure Roles & Responsibilities Regulation Enforcement Governance & Enterprise Risk Management Facets of Risk Management Framework 3rd Party Provider IT & Physical Infrastructure Compliance & Legal Cloud Business Model Information Security Interoperability and Portability Legal, Compliance and Audit Management Testing and Troubleshooting Define the need for interoperability and portability, and best practices for avoiding vendor lock-in. Explore strategies for testing in a cloud environment, and best practices for ensuring the cloud is fit for purpose. Explore compliance, audit, regulation, data management and provider contracting best practices. Understand risks in the cloud, define compromise risks, vulnerabilities and risk management practices. Discussion Topics Certification Programs Certificate for Cloud Security Knowledge Cloud+ Certificate for Cloud Security Knowledge Certificate for Cloud Security Knowledge Enterprise Security Risk Management Service Management IT Architecture Foundation Technology
  • 8. Authentication & Authorization Management Hardening Best Practices Large Scale Systems Provisioning Automation Provider Selection Application Security Multi-tenancy Responsibilities & Liabilities Personnel On-boarding Policies and Procedures Contract Negotiation IT and Physical Controls Audit and Compliance Data Management Security as a Service Operational Practices Encryption Alternatives Key Management & Storage Encryption as a Service Hardware Encryption Data Loss Prevention Intrusion Prevention Audit and Compliance Identity, Entitlement and Access Management Identity Federation Governance Application Design Building Trust Management & Administration Cloud Business Model Entitlement Process Secure Platform Management Encryption and Key Management Secure IT Operations Explore best practices for securing cloud infrastructure components, platform services and applications. Understand key roles, responsibilities and liabilities, and best practices for building trust. Understand data protection compliance requirements and guidelines for encryption and key management. Understand Identity, Entitlement and Access Management (IdEA) patterns and best practice. Discussion Topics Certification Programs Certificate for Cloud Security Knowledge Certificate for Cloud Security Knowledge Certificate for Cloud Security Knowledge Certificate for Cloud Security Knowledge Enterprise Security Risk Management Service Management IT Architecture Foundation Technology
  • 9. Founder, Tech Equity Ltd & CloudClinique.com Africa Cloud Credentials Council Ambassador IBM Europe Cloud Technical Sales Leader (2012/13) Certified Cloud Trainer Certified Cloud Architect Certified Cloud Professional PhD Computational Modeling MSc. Computational Modeling and Finite Elements in Engineering Mechanics BEng. Structural Engineering with Architecture Lead Consultant & Trainer Dr Shiyghan Emmanuel Navti http://vizualize.me/shiyghan IBM Africa Expansion Strategy Leader (2009/10/11)
  • 10. Enterprise IT Workshop at Mozambique Stock Exchange, Nov 2014! CEO Remarks “…I would like to express that the training achieved the objectives and we hope we can continue in contact…”
  • 11. 1. Security risk perceptions 2. Limited skill and understanding 3. Weak legal & regulatory framework 4. Incompatibility with current infrastructure 5. Risk of vendor lock-in 6. Data access concerns 7. Inability to quantify value 8. Fear of change 9. Cost concerns 10. Technology complexity Partner with Tech Equity to overcome Enterprise Technology adoption concerns that limit opportunity
  • 12. Tech Equity is committed to supporting Enterprise IT adoption in Africa
  • 13. Tech Equity is the Africa cloud technology ambassador
  • 14. Tech Equity consultants have deep experiences in growth markets and mature markets
  • 15. Contact Us @ cloud@techequityltd.com Tech Equity enables organizations to realize more value from their IT investments