ICT and computer sciences Courses
  • Database Design

Database design is the organization of data according to a database model. The designer determines what data must be stored and how the data elements interrelate. 

apply now
R14 900
  • Introduction to Visual Basic .Net Programming

Visual Basic . NET (VB.NET) is an object-oriented programming language implemented on the . NET Framework. It has support for object-oriented features such as abstraction, encapsulation, polymorphism, and inheritance. The future of Visual Basic includes both.

apply now
R14 900
  • Applied Project Management in an Information Technology Environment

IT project management is the process of managing, planning, and developing information technology projects.IT projects exist within a variety of industries, including software development, information security, information systems, communications, hardware, network, databases, and mobile apps

apply now
R14 900
  • Introduction to Java Programming

Java is an extremely transferable programming language used across platforms and different types of devices, from smartphones to smart TVs. It's used for creating mobile and web apps, enterprise software, Internet of Things (IoT) devices, gaming, big data, distributed, and cloud-based applications among other types..

apply now
R14 900
  • Linux Administration I

 Linux System Administrator involves the installation, configuration, maintenance and management of Linux-based systems.   

apply now
R14 900
  • Research and data analysis

Data analysis is the most crucial part of any research. Data analysis summarizes collected data.

apply now
R14 900
  • C++ Programming

C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs.

apply now
R14 900
  • Introduction to Cyber Security

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting normal business processes.

apply now
R14 900

Computer Forensic Data Collection

Computer forensic data collection focuses on extracting valuable evidence from computers and related storage devices.

apply now
R14 900
  • Python for Information Security

Python for Cybersecurity is an introductory Python scripting course, designed for individuals who have no prior scripting experience.

apply now
R14 900
  • Penetration Testing & Ethical Hacking

Penetration testing, also known as pen testing or ethical hacking: Is an advanced, offensive form of security testing designed to provide a deep technical analysis of a target environment's vulnerability to exploitation and attack

apply now
R14 900
  • Computer Forensic Data Analysis Techniques & Reporting

Understand the importance of digital forensics, types of digital forensics, process and techniques, and how DFIR merges forensics with incident response.

apply now
R14 900
  • Computer Forensic Investigations

In the same way that law enforcement officials comb crime scenes for clues, computer forensics investigators search digital devices for evidence that lawyers can use in criminal investigations, civil cases, cybercrime investigations and other corporate and national security matters.

apply now