Available courses

This course is about proper care of hydraulic fluid as a medium for power transmission in hydraulic systems.Contamination control is crucial for hydraulic systems to survive and to sustain their reliability and performance.

This course focuses on hydraulic fluids and contamination control.

This Work At Heights Safety Orientation is an introductory guide to height safety

training.

This module gives a basic introduction to Work At Height Training. It assumes that

the delegate is working at an elevation and focuses on fall protection rather than

eliminating the fall hazards ( covered in WAH II/FATL2 ).

The purpose of this course is to teach

you safe working procedures and the use

of Fall Arrest Equipment to workers

performing their duties at height where

there exits the risk of a fall that may lead

to injury or death


A qualified learner must achieve

competence with regard to the UNIT

STANDARD.

No matter your industry, organization size or even the geographical location, we are living in an age

of interconnectivity and every organization (also individuals) face a growing array of cyber security

risks. While and organization may invest heavily on technology that is designed to detect and prevent

breaches to their systems and network, they must also address the human side of the CyberSecurity

equation.

Your security is only as strong as your weakest link. The Security Awareness Training starts off with

any institution acknowledging that indeed humans (employees) are the weakest cyber security link.

Equally, they are classified as also being the first line of defense against cyber-attacks. With human

error playing such a big role in many security breaches from recent studies, this translates to the

importance of provision for the CyberSecurity trainings for employees.

With advancement and massive adoption of ICT in organizations brings with it an equivalent rise in

potential cyber security threats. Everyday people are using the internet, but few are concerned about

it, when it comes to the security. User online are susceptible to cyber-attacks including but not

limited to ransomware, system intrusion, website defacements and attacks, denial of service,

phishing, social engineering, database hacking, wireless network (Wi-Fi) hacks among others and

with the adoption of cloud computing and other emerging technologies such as IoT, the target for

cybercriminals widens further.

Cyber Security Awareness trainings is essential in providing every technology user (the training can

be customized for different audiences deeper for developers, security officers, IT professionals) with

a fundamental understanding of the imminent and ongoing cyber threats, preparing them for common

cyber-attacks and threats.

Objective

1. To educate the users upon their responsibility to help protect the confidentiality, integrity and

availability of their organizations information and information assets.

2. To contribute to the change of behavior of users of technology to keep safe from the

imminent cyber threats and attacks from hackers who are always on the checkout for victims.

This training is intended to promote and have a cyber-safe technology space.

Learning Outcome

Upon completion of this course, participants will be able to:

 Appreciate cyber security by understanding their exposure to the cyber criminals

 Recognize information systems vulnerabilities, threats and attacks and their place in the line

of defense against cyber-attack.

 Familiarize with the cyber-attacks leveraged on different spectrums through practical

sessions.

 Recognize ways which individuals and corporates can protect themselves from cyber-attacks.

Risk management is an essential part of planning for success in every business and especially in projects. This Risk  Management online training is designed to provide you with an understanding of how to identify potential risks and the tools needed to develop the right risk management plan for your project or business.
The training content is founded around the principles of ISO 31000:2009; Risk Management Principles and ISO 31010:2009; Risk Assessment Techniques and PMI PMBOK Guide.

The training not only provides participants with guidance and proven tips in projects risk management but also basic tools they can use and further develop as complexities within an organization and  projects

Learning Outcomes:
Upon completion of this self-paced online courses, trainees will be able to:
  • Appreciate of Risk management as a tool for business efficiency and sustainability
  • Appreciate ISO 31000 as the guide for Business Risk management 
  • Understand and apply the principles of effective risk management.
  • Gain an overview to identify and analyse risk, and plan risk responses
  • Gain an understanding on how to monitor and control risks throughout a project. 


Course Highlights:

The training covers the below areas:

  • Risk Management Basics
  • Relationship between Business Strategy and Risk management 
  • Risk Planning
  • Risk Identification 
  • Risk Analysis 
  • Project Risks
  • Risk Monitoring and Controlling 
  • Risk Reviews 

Course Overview

This self-paced online course is designed to provide skills for sales personnel. Our focus is on

gaining significant improvements for our customers in terms of time-to-revenue from new

initiatives as well as optimization of sales process for existing solutions.


Learning Outcomes

Participants will learn to:

 Lead masterful sales conversations from beginning to end

 Use questioning techniques to uncover the full set of buyer needs and desires

 Sell ideas, insights, and perspectives that influence the buyer’s agenda

 Develop and communicate the most compelling value case

 Understand buyers, buyer types, and buying

 Close new business with maximum success and integrity

 Overcome objections that get in the way of the sale

 Sell based on value and reduce price push backs

 Avoid common mistakes that even the most experienced sellers make


Course Highlights:

 Account management

 Perception mapping and the competitive matrix

 Business buying cycle

 Value added selling

 Creating value and capturing value

 Portfolio management

 Negotiation and influencing factors

 Customer relationship management