Course image Installation of IP Based Devices
Information Technology

This core module describes the  skills,  knowledge  and  attitude  required  to install and operate IP based devices. The learner will be able to identify type of device to install, Install CCTV  camera,  install  printer,  operate  mobile  devices and maintain IP devices. He/she  will  be  also  able  to  select  and  arrange different materials, equipment and tools used when installing IP based devices.



Course image INDUSTRIAL ATTACHMENT PROGRAM
Information Technology

This module describes the skills, knowledge and attitudes required to integrate learners in workplace for an industrial attachment program to gain work-based experience for future employment. The module will allow the learner to Analyze  own professional gaps in line with industry demands for better Enhancement innovation during IAP program and be able to promote  professional skills  transfer.


Course image INSTALLATION OF IP BASED DEVICES
Information Technology

Purpose statement
This core module describes the skills, knowledge and attitude required to install and operate IP based devices. The learner will be able to Identify type of device to install, Install CCTV camera, install printer, operate mobile devices and maintain IP devices. He/she will be also able to select and arrange different materials, equipment and tools used when installing IP based devices.

Course image Advanced Networking
Information Technology

This core module describes the skills, knowledge and attitude required to make a preparation effectively  in switch,wireless router,routers and firewall by applying relevant technical knowledge and technical skills :

The learner will be able to describe, Configure troubleshoot and  implement basic switch security,VLAN ,VTP ,STP,PVST+,RSTP ,PVST+,PPT, Asynchronous Transfer Mode (ATM), Broadband Access, Frame Relay, Point-to-Point Protocol (PPP), Synchronous Optical Network (SONET), Synchronous Digital Hierarchy (SDH), X. 25 ,Also the learner will be able to install and configure wireless network components, perform WLAN network security, verify WLAN connectivity,   conduct standard tests, measurements and write technical report.He will be also able to describe LAN concepts hierarchical Network model concepts.

Course image ICT 208 Oracle Database Management Systems
Information Technology

This course aims at enabling trainees to apply Oracle Database Management Systems.

After completing this course, the learners will be able to: 

1 Identify the major components of Oracle Database 

2 Retrieve row and column data from tables with the SELECT statement 

3. Create reports of sorted and restricted data 

4. Employ SQL functions to generate and retrieve customized data 

5. Run complex queries to retrieve data from multiple tables 

6. Run data manipulation language (DML) statements to update data in Oracle Database 

7. Run data definition language (DDL) statements to create and manage schema objects 

Course image ICT 212 Object Oriented Programming Using Java
Information Technology
At the end of this module, the learners will should be able to:
  • Describe Java
  • Explain key features of Java
  • Write a java program
  • Execute a java Program
  • Apply variables 
  • Apply java Data types
  • Apply Operators in Java
  • Apply arrays
  • Handle String
  • Apply control Structures
  • Apply classes and objects
  • Apply Methods
  • Apply the toString() method
  • Apply Constructors
  • Apply OOP Principles(Inheritance, Encapsulation, Polymorphism and Abstraction) using Java.
  • Apply Java interface
  • Apply Java package
  • Handle Exceptions
  • Apply Multi-threading.
Course image Windows server administration
Information Technology

This course covers the installation and configuration of mainstream operating systems, important network services, disaster recovery procedures, and techniques for ensuring the security of the system.Students will learn and apply basic concepts and methodologies of System Administration and Security by building from the ground up a miniature corporate network. They will be responsible for installing backend servers that users would normally require for day to day operations. They will also be responsible for validating, from a user’s perspective that their network is functional. Lastly, they will implement security measures into the network and do a risk assessment as to how effective their security measures are and their fellow students. Students will use Microsoft Windows Server for the Active Directories servers, and Microsoft Windows XP and/or 7 for the clients. Also, Ubuntu 10.10 and/or CentOS 5.6 will be used for the networking part of the class. All server and client computers are Virtual Machines working on a VMware environment.