This course is intended to complement Personal Organisation skills for Secretaries & PAs', but can be taken alone. The focus
...It is often said that the greatest asset of any organisation is its people & certainly one of the keys to success in modern business
...This course provides the basic information users need to set up & configure Global Payroll elements, including earnings, deductions,
...The rules for work have changed & we all have to perform better, work smarter, stay motivated, & achieve specific
...IT auditing is a specialised sub-set of the general audit process. As such the normal audit planning & procedural mechanisms apply
...The Perl Programming course is a comprehensive course that explains the Perl programming language, from basic through
...Having gained basic knowledge of Perl, this course will take you to the next level. To understand what Perl contexts really
...This highly practical class discusses Perl Web development in Linux, UNIX & Windows environments. It provides delegates
...Perl is a powerful object-oriented scripting language used extensively with UNIX, Linux, Win 32 & the Internet. Perl's rich
...This course follows on from Performing IT Audits - Part 1, with which it can be combined to form a three day programme. It will cover in more detail the areas of cybercrime, computer forensics and data analytics. The basic approach is the same,
This course follows on from Performing IT Audits
- Part 1, with which it can be combined to form a three day programme. It will cover in more detail the areas of cybercrime, computer forensics & data analytics. The basic approach is the same, to exploit vulnerabilities in the computer environment
- invisibility, speed, remoteness & concealment.
The growth in cybercrime has led to the need for a new branch of crime investigation called computer forensics. No matter how hard the criminal tries to conceal himself there are often sufficient traces of his activity to allow for his activity to be tracked. Delegates will be introduced to the concepts of data analytics & how they can be used to identify anomalies in the data.
The leader of this course is both an investigator & a computer forensics specialist who has acted as an expert witness in a number of high profile cases.
This training may be available onsite; please contact us if you are interested.