Optimus Academy is a dedicated knowledge enablement and training facilitation arm of the company, to train, support and qualitatively strengthen the skill level of Optimus's channel and end customer eco-system. On behalf of its vendor partners, the Academy holds a series of training and channel events throughout the year for its channel across the Middle East region.

Optimus Academy was created to continually align with the Channel training and education requirements of the VAD's vendor partners. Through Optimus Academy, the company holds regular product training sessions, certification workshops, seminars and sales workshops for its Middle East channel base, which benefit both its vendor partners and channel partners.

The goal of our training academy is to help the capacity building of technology resources in the region. The value added distributor is at the fulcrum of such an equation where, representing the technology that it resells, the onus of partner enablement, induction, training and support squarely lies on the distributors' shoulders.

Optimus works with many leading training institutes in the region as well as globally. We have tied up with various renowned global training providers to ensure best-of-breed and quality training programmes within the eco system.

OUR TRAINING PROGRAMS

Certification of Cloud Security Knowledge

Duration:

Overview: CCSK- Basic Class
Duration: 1 day

The Cloud Computing Security Knowledge-Basic class provides students a comprehensive one day review of cloud security fundamentals and prepares them to take the Cloud Security Alliance (CCSK) certification exam. Starting with a detailed description of cloud computing, the course covers all major domains in the latest Guidance document from the Cloud Security Alliance, and the recommendations from the European Network and Information Security Agency (ENISA).

CCSK- Plus Class:
Duration: 1 day

The CCSK- Plus class builds upon the CCSK Basic class with expanded material and extensive hands-on activities. Students will learn to apply their knowledge as they perform a series of exercises and complete a scenario bringing a fictional organization securely into the cloud.

Target Audience
Anyone looking to expand their knowledge of cloud security.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • You learn about the security in the various types of cloud computing
  • You will gain insight into the 12 domains that characterize cloud security
  • You will be presented to ENISA's recommendations for improving cloud security
  • You will be well prepared for taking the test for the Certificate of Cloud Security Knowledge.
  • You will learn to apply your knowledge as you perform a series of exercises as you complete a scenario bringing a fictional organization securely into the cloud

Cloud Computing Comprehensive Introduction

Duration: 3 Days
Course Code: 1200

Overview:
Cloud computing is revolutionizing all aspects of IT, including hardware, operating systems and applications. Faced with a rapidly changing business environment, organizations are under pressure to respond with a flexible IT infrastructure and applications. In this course, you gain the key knowledge and experience required to leverage both the business and technical benefits of cloud computing. You develop an effective implementation strategy and learn to build and deploy applications to the cloud.

Target Audience:
Anyone seeking to exploit the benefits of cloud computing technologies. A basic familiarity with Microsoft Windows, the Internet and the web is helpful.

Objectives:
Upon completion of this course you should be able to:

  • Thoroughly assess the architectures, components, operation and tools of cloud computing
  • Leverage cloud vendors, including Force.com, Microsoft Azure, Google and Amazon, for business advantage
  • Exploit Software as a Service (SaaS) to optimize cost and resources
  • Create, deploy and secure applications and services with Platform as a Service (PaaS)
  • Commission a computing Infrastructure as a Service (IaaS) with Amazon EC2 and Eucalyptus
  • Design a cloud implementation strategy that minimizes the risk for your organization

Implementing a Private Cloud Solution

Duration: 4 days
Course Code: 1215

Overview:
As organizations evaluate cloud computing technologies, many are unwilling to trust the public cloud with their sensitive data. Creating a private cloud solution can allow your organization to exploit the benefits of cloud technologies within its data centers. In this course, you gain the key knowledge and experience required to leverage both on- and off-premises private cloud computing technologies.

Target Audience:
System, storage and network administrators, and IT managers who are considering a private cloud solution for their organization.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Build dedicated and hosted private cloud solutions to optimize IT service delivery
  • Assess private cloud computing options to solve business problems
  • Leverage open source and proprietary private cloud products
  • Manage and monitor your cloud infrastructure to improve resource utilization
  • Secure key components of your private cloud implementation
  • Integrate your private cloud with a public cloud to create a hybrid cloud solution

Securing the Cloud

Duration: 3 Days
Course Code: 1220

Overview:
As organizations transition to cloud computing technology, security issues are a vital concern. In order to protect your sensitive data and maintain regulatory compliance, you must address the cyber security challenges faced when moving to a cloud environment. This course provides in-depth, hands-on experience identifying and resolving the security issues specific to public and private clouds.

Target Audience:
Anyone involved in security aspects of cloud computing. Cloud computing knowledge at the level of Course 1200, "Cloud Computing Comprehensive Introduction", or equivalent experience, is assumed. Knowledge of security basics is recommended.

Objectives:
Upon completion of this course you should be able to:

  • Analyze, manage and implement security for public and private clouds
  • Establish privacy and verify data integrity in the cloud
  • Maintain platform security and protect data confidentiality
  • Protect networks, operating systems and applications within various cloud deployments
  • Achieve organizational cyber security compliance with effective cloud governance
  • Follow best practices to achieve high availability of data and services

System and Network Security Introduction

System and Network Security Introduction
Duration: 4 Days Course Code: 468

Overview:
In today's Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks as well as connect mobile users. Each connection increases exposure to customers, competitors and hackers, magnifying vulnerability to attack. In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats.

Target Audience:
Those who require the fundamental skills to develop and implement security schemes designed to protect their organization's information from threats.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Analyze your exposure to security threats and protect your organization's systems and data
  • Reduce your susceptibility to an attack by deploying firewalls and data encryption
  • Assess alternative user and host authentication mechanisms
  • Manage risks emanating from inside the organization and from the Internet
  • Protect network users from hostile applications and viruses
  • Identify the security risks that need to be addressed within your organization

Disaster Recovery Planning

Duration: 4 Days
Course Code: 289

Overview:
A major disaster could cripple your organization, suspending mission-critical processes and disrupting service to your customers. In this course, you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.

Target Audience:
Anyone responsible for ensuring the continuity of an organization's critical systems or processes, including project and business managers, help desk personnel and human resources professionals

Objectives:
Upon completion of this course you should be able to:

  • Create, document and test continuity arrangements for your organization
  • Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
  • Select and deploy an alternate site for continuity of mission-critical activities
  • Identify appropriate strategies to recover the infrastructure and processes
  • Organize and manage recovery teams
  • Test and maintain an effective recovery plan in a rapidly changing technology environment

Securing Web Applications, Services and Servers

Duration: 4 Days
Course Code: 940

Overview:
Cyber security is a serious challenge today as attackers specifically target web application vulnerabilities. These vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity. As a result, organizations must integrate robust security measures into the web application development process. This course provides in-depth, hands-on experience securing web-based applications and host servers.

Target Audience:
Those who want to implement, test and deploy secure web applications. Basic knowledge of web application operation and web server administration is assumed. Web application development and security knowledge are helpful but not required.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Implement and test secure web applications in your organization
  • Identify, diagnose and correct the most serious web application vulnerabilities
  • Configure a web server to encrypt web traffic with HTTPS
  • Protect Ajax-powered Web 2.0 applications
  • Secure XML web services with WS-Security
  • Audit web application security with manual and automated scanning

Vulnerability Assessment

Duration: 4 Da
Course Code: 589

Overview:
Knowledge of vulnerability assessment and hacking techniques allows you to detect vulnerabilities before your networks are attacked. In this course, you learn to configure and use vulnerability scanners to detect weaknesses and prevent network exploitation. You acquire the knowledge to assess the risk to your enterprise from an array of vulnerabilities and to minimize your exposure to costly security breaches.

Target Audience:
Security auditors, firewall/IDS personnel, PCI security testers, network managers and those involved in cyber security measures and implementation. Experience with network security at the level of Course 468, "System and Network Security Introduction", is assumed. A working knowledge of TCP/IP is also assumed.

Objectives:
Upon completion of this course you should be able to:

  • Detect and respond to vulnerabilities that put your organization at risk using scanners
  • Employ real-world exploits and evaluate their effect on your systems
  • Configure vulnerability scanners
  • Analyze the results of vulnerability scans
  • Assess vulnerability alerts and advisories
  • Establish a strategy for vulnerability management

Preparing for the CompTIA Security+ Certification Exam

Duration: 5 Days
Course Code: 446

Overview:
The CompTIA Security+ Certification is considered one of the leading vendor-neutral security certifications and is a cornerstone to the U.S. Department of Defense 8570.1 initiative. This exam preparation course provides in-depth review of the six domains included in the exam. Demonstrations and practice quizzes reinforce the concepts and provide the framework for a personalized study plan for exam success.

Target Audience:
Security professionals, government and military personnel seeking IAT-2 or IAM-1 certification to fulfill the 8570.1 Directive, network security personnel and managers with previous technical skills or background.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Successfully prepare for the CompTIA Security+ Certification Exam
  • Confidently explain and define an array of security terminologies
  • Navigate the complexity of secure communication protection
  • Explore the concepts of network protection with firewalls and IDS
  • Investigate privacy and integrity issues such as cryptography, PKI and digital signatures
  • Assess organizational compliance procedures and access controls that bolster your security foundation

Implementing Information Security with ISO/IEC 27002 Certification

Duration: 2 Days
Course Code: 2005

Overview:
Knowledge of vulnerability assessment and hacking techniques allows you to detect vulnerabilities before your networks are attacked. In this course, you learn to configure and use vulnerability scanners to detect weaknesses and prevent network exploitation. You acquire the knowledge to assess the risk to your enterprise from an array of vulnerabilities and to minimize your exposure to costly security breaches.

Target Audience:
Security auditors, firewall/IDS personnel, PCI security testers, network managers and those involved in cyber security measures and implementation. Experience with network security at the level of Course 468, "System and Network Security Introduction", is assumed. A working knowledge of TCP/IP is also assumed.

Objectives:
Upon completion of this course you should be able to:

  • Detect and respond to vulnerabilities that put your organization at risk using scanners
  • Employ real-world exploits and evaluate their effect on your systems
  • Configure vulnerability scanners
  • Analyze the results of vulnerability scans
  • Assess vulnerability alerts and advisories
  • Establish a strategy for vulnerability management

Networking Comprehensive Introduction

Duration: 4 Days
Course Code: 450

Overview:
Today's professionals must possess a solid foundation in networking concepts and practices to streamline enterprise operations and maintain a competitive edge. This course provides you with a working knowledge of IP addressing, TCP/IP operation, LAN solutions, Quality of Service (QoS) requirements, wireless network options, security elements, enterprise internetworking and modern hardware

Target Audience:
Anyone who needs an introduction to networking technology and data communication systems as well as those who seek to broaden or update their networking knowledge. This course is particularly beneficial to managers, developers, IT staff and help desk personnel.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Apply fundamental network concepts, terminology and solutions
  • Implement networks using data links and physical media
  • Deploy Local Area Networks (LANs) using Ethernet and Wi-Fi
  • Manage reliable internetworks and intranets using effective TCP/IP design
  • Enhance network security using industry-standard solutions and practices
  • Evaluate and select leading-edge enterprise network technologies

Network Configuration and Troubleshooting

Duration: 4 Days
Course Code: 451

Overview:
Providing users with constant access to critical data is essential for the success of today's rapidly evolving networks. In this course, you gain the skills necessary to configure networks and resolve problems related to cables, wireless connections, protocols and applications. You learn to configure, maintain and troubleshoot networks using a comprehensive set of tools and techniques.

Target Audience:
Anyone involved in designing, configuring, installing or maintaining a network. Networking experience at the level of Course 450, "Networking Comprehensive Introduction", or equivalent knowledge is assumed.

Objectives:
Upon completion of this course you should be able to:

  • Configure, maintain and troubleshoot multiple network configurations
  • Configure and test network adapters for optimum LAN performance
  • Install a switched network with VLANs
  • Access and secure your wireless network
  • Manage IP address assignments and sub netting
  • Identify and resolve application layer issues using protocol analysis

Switches and Routers Comprehensive Introduction

Duration: 4 Days
Course Code: 364

Overview:
Switches and routers are the critical building blocks of a successful internetwork infrastructure. In this course, you gain the essential knowledge required to deploy and use switches and routers in IP networks. Through a combination of written and hands-on exercises, you acquire the skills to effectively select and deploy appropriate internetworking technologies.

Target Audience:
Network managers, technicians, engineers and consultants involved in designing, implementing or managing networks. Knowledge of computer networking principles at the level of Course 450, "Networking Comprehensive Introduction", is assumed.

Objectives:
Upon completing this course, the learner will be able to meet these overall objectives:

  • Build and design scalable networks
  • Compare the operational benefits of Ethernet and WLAN
  • Deploy switches using Spanning Tree and VLANs
  • Employ a variety of LAN interconnection techniques
  • Determine the optimum routing protocol for various internetworking environments
  • Integrate network management and security

Certified Data Centre Technician Professional (CDCTP®)

Learn how to increase the operational capability and productivity of the Data Centre to continually meet the demands of the business.
The Certified Data Centre Technician Professional (CDCTP®) program is aimed at the numerous technicians across the spectrum of a mission critical Data Centre facility providing a holistic understanding of the key environments and their dependencies and inter-dependencies they have upon one another.

Certified Data Centre Design Professional (CDCDP®)

Learn how to scope, plan and implement a Data Centre design to meet the ever expanding demands of today‚Äôs business environment. Utilising current industry best practices and applicable standards across the key Data Centre infrastructures. The Certified Data Centre Professional (CDCDP®) program is proven to be an essential certification for individuals wishing to highlight their expertise and progress their career within the Data Centre sector.

Certified Data Centre Management Professional (CDCMP®)

Learn industry best practice principles for achieving effective operational management of the complex technical environments of a Data Centre facility. Learn how to ensure that the business strategy is delivered through effective IT service management, maximising the operational capability of the Data Centre.
The Certified Data Centre Management Professional (CDCMP®) program is a comprehensive program that explores and addresses the management of the complex but complementary elements of a Data Centre facility.

Certified Data Centre Energy Professional (CDCEP®)

Learn how to plan, implement, analyse and formulate recommendations through an effective Energy Efficiency Plan to ultimately reduce energy use and carbon emissions.The Certified Data Centre Energy Professional (CDCEP®) program teaches expertise in Energy Efficiency and provides the tools to make a significant contribution to the energy strategy and effectively deal with, and manage, energy related issues and Energy Efficiency.

Data Center Energy Practitioner (DCEP) - Generalist

Developed by Department of Energy (DOE) who have partnered with the industry to create a program leading to practitioners being qualified to evaluate the energy status and efficiency opportunities in data centers. The key objective of the Data Center Energy Practitioner (DCEP) Program is to raise the standards of those involved in energy assessments of data centers to accelerate energy savings in data centers.

Optimus Academy Trainings are also available at Doha. Riyadh. Muscat. Cairo. Karachi