Give yourself a quick up­grade

The Star Malaysia - Star2 - - POSTGRADUATE -

WHILE ob­tain­ing an MBA is an ex­cel­lent way to up­grade yourself, con­tin­u­ing pro­fes­sional de­vel­op­ment (CPD) pro­grammes are also great al­ter­na­tives. Re­gard­less of your back­ground, pur­su­ing a CPD will serve as a quick ca­reer up­grade. In this is­sue, we take a look at CPD pro­grammes from the ICT sec­tors that are avail­able to make sure you stay com­pe­tent and rel­e­vant.

AIX Jump­start for UNIX pro­fes­sion­als

This course is for ex­pe­ri­enced UNIX ad­min­is­tra­tors to learn about and un­der­stand AIX sys­tems, how to set up and in­stall, ad­min­is­trate, and run it in a multi­user POWER par­ti­tioned en­vi­ron­ment. It is for those who wish to make a jump from UNIX to AIX run on POWER pro­ces­sors and POWER (Sys­tem p) en­vi­ron­ment. Af­ter com­ple­tion, they will be able to han­dle the ba­sics of the AIX 7 op­er­at­ing sys­tem, use the com­pli­cated but pow­er­ful vi edi­tor, write ba­sic shell scripts and learn about the ba­sics of the Korn shell.

AIX Net­work In­stal­la­tion Man­ager (NIM): Con­cepts and Con­fig­u­ra­tion

The ob­jec­tive of this course is to pro­vide knowl­edge of the Net­work In­stal­la­tion Man­ager (NIM) fa­cil­ity for the AIX 6 op­er­at­ing sys­tem. This course com­bines the­ory and a hands-on ap­proach to give stu­dents a holis­tic view of the fa­cil­ity.

Those who are re­spon­si­ble for main­te­nance and ad­min­is­tra­tion of AIX in a multi­user POWER (Sys­tem p) en­vi­ron­ment are en­cour­aged to ap­ply.

Linux sys­tem ad­min­is­tra­tion: Im­ple­men­ta­tion

This course helps stu­dents get ready for ad­min­is­tra­tion tasks on a Linux server. The cov­ered topics in­clude: in­stalling Linux from a net­work server, man­ag­ing the sys­tem’s tasks, con­fig­u­ra­tion of print­ers, con­fig­ur­ing the X Win­dow Sys­tem, back­ups and log­ging, PCMCIA and USB con­fig­u­ra­tion, filesys­tem and Xen man­age­ment, us­ing sched­ul­ing tools and trou­bleshoot­ing prob­lems.

Korn and Bash shell pro­gram­ming

If you are un­fa­mil­iar with the names Korn and Bash, it is be­cause they are used on an op­er­at­ing sys­tem that is not main­stream: Linux. This course will help you learn more about the shell en­vi­ron­ment and to cre­ate and use the scripts within. Shell scripts are of­ten used to au­to­mate mun­dane and repet­i­tive tasks, so learn­ing how to cre­ate some on the fly will be a use­ful skill to have as an ad­min­is­tra­tor.

Linux jump­start for UNIX sys­tem ad­min­is­tra­tors

This course bridges the gap be­tween UNIX and a selected amount of Linux dis­tri­bu­tions, so that ad­min­is­tra­tors can port their knowl­edge be­tween these two op­er­at­ing sys­tems. It aims to build more Linux knowl­edge, specif­i­cally the RHEL and SUSE Linux sys­tems, and helps stu­dents to iden­tify sys­tem ad­min­is­tra­tion tools, man­age soft­ware pack­ages, un­der­stand block de­vices, cre­ate Linux filesys­tems, man­age users and groups, and to get fa­mil­iar with Linux mem­ory man­age­ment util­i­ties.

Cer­ti­fied Eth­i­cal Hacker (CEH)

Stu­dents who enrol in this course are en­cour­aged to test and hack their own sys­tems in or­der to find a way to break through sys­tems. This hands-on ap­proach helps stu­dents un­der­stand deep knowl­edge about se­cu­ri­ties and how to go around scan­ning and pen­e­trat­ing their own net­works. Through this knowl­edge, stu­dents will learn how to pre­vent at­tacks from hap­pen­ing. They will also ex­plore other forms of at­tacks such as DDoS, buf­fer over­flows and virus cre­ation. This course is typ­i­cally catered to se­cu­rity spe­cial­ists and net­work man­agers.


Newspapers in English

Newspapers from Malaysia

© PressReader. All rights reserved.