Information Technology and Computer Training

ITCT Courses

ITCT is responsible for imparting and improving theoretical knowledge and practical skills in computing and information technology applications. It is concerned with the application of computers to a wide range of problems. It provides organizations with an understanding of how software and hardware can be harnessed to help solve problems. It provides an understanding of the many forms of interaction between humans and computers. The division has a wide variety of career courses in Information Technology Programs to promote a greater awareness and cost-effective use of IT skills in the public and private sectors.

Aim

To provide participants with computer skills so that they can perform various functions at their workplace effectively and efficiently.

Course Objectives

At the end of the course, participants will be able to:

  • Login into Microsoft office 365 using their GOL domain accounts.
  • Use OneDrive (cloud computing) to store their files.
  • Use Microsoft office applications (word, excel, power point, outlook, teams, and SharePoint)

Target Group

Beginners in the use of Microsoft office 365

Course Synopsis

a. OneDrive
The module capacitates participants with important skills of storing and synchronizing data in the single space and share them with their contacts in an easier and cheaper way.


b. Microsoft office power point
After training of this application participants are able to prepare, design and display slides for presentations.


c. Microsoft office outlook
The application provides participants with techniques to access GOL emails, manage tasks and schedule calendar for virtual appointments and meetings in a very straight forward way.

 

d. Microsoft office Teams
The application equips participants with basic skills to collaborate with other people virtually through chats, calls and meetings. Participants can also create teams(groups) for their various ministries for easy communication.


e. Microsoft office SharePoint
The application provides participants with easier ways to share documents and discuss them together on their intranet and to share their calendars to avoid clashes of meetings.

Duration : 4 DAYS

Aim

To provide participants with diverse ways of protecting their organizations sensitive information against cyber-attacks.

Course Objectives

At the end of the course, participants will be able to Protect their data against:

  • Phishing attacks
  • Removable media attacks
  • Internet and Email use cyber attacks
  • Cloud computing attacks

Target Group

 Beginners in the cyber security course

Course Synopsis

I. Phishing crime
This course will equip participants with ways of protecting their data against online frauds.


II. Attacks through removable media
This course provides participants with techniques to avoid loss of data through inappropriate ways of using USB flashes and external hard drives at their workplaces.


III. Internet and Email cyber attacks
This course provides awareness of frauds associated with the use of internet and emails. It equips participants with diverse ways of securing personal data online like authentication and passwords encryptions.

 

IV. Cyber-attacks on cloud computing
This course provides participants with different techniques of protecting their data while working online. 

Duration : 2 Hours