CGI

Telecommunication, IT, and Cybersecurity

Cybersecurity and Information Security
  1. Offensive Security Web Expert
    Covers advanced web penetration testing, ethical hacking techniques, and security vulnerability assessments.
  2. EC-Council Certified Security Specialist
    Provides a comprehensive overview of cybersecurity principles, ethical hacking, and network defense strategies.
  3. Enterprise Vulnerability Assessor
    Focuses on identifying, analyzing, and mitigating vulnerabilities in enterprise IT environments.
  4. Critical Infrastructure Protection
    Explores strategies for safeguarding essential infrastructure, including power grids, telecommunications, and data centers.
  5. Law of Data Security and Investigations
    Covers legal frameworks for data protection, compliance regulations, and cybersecurity incident investigations.
  6. Assessing and Auditing Wireless Networks
    Teaches security testing, vulnerability assessment, and compliance auditing for wireless network security.
  7. Certified UNIX Security Administrator
    Provides expertise in securing UNIX-based systems, including authentication, access controls, and system hardening.
  8. Certified Windows Security Administrator
    Covers best practices for securing Windows environments, including Active Directory security, patch management, and endpoint protection.
  9. Cisco Certified Network Associate (CCNA) Security
    Focuses on securing network infrastructure, implementing firewalls, and preventing cyber threats.
  10. Certified Cloud Security Professional (CCSP)
    Explores cloud security principles, risk management, and compliance standards for cloud computing.
  11. Cyber Incident Response Management Foundation
    Covers incident detection, response planning, forensic analysis, and mitigation techniques for cybersecurity events.
  12. Certified Information Security Manager (CISM)
    Teaches IT governance, risk management, and information security program development for security professionals.
  13. Advanced Electronic Information Security Implementation
    Provides advanced methodologies for implementing secure information systems, encryption, and cyber resilience strategies.
  14. Cybersecurity Awareness Diploma
    Offers foundational cybersecurity awareness training for professionals and organizations to enhance threat response readiness.
  15. Fundamentals of Computer Network Security
    Explores the basics of securing computer networks, threat mitigation, and intrusion detection systems.
  16. Certified Virtualization Security Expert
    Covers security best practices for virtualized environments, hypervisors, and cloud computing security.
  17. Certified Secure Web Application Engineer
    Focuses on secure web development, vulnerability testing, and mitigating OWASP Top 10 threats.
  18. Certified Penetration Testing Engineer
    Provides hands-on training in ethical hacking, vulnerability exploitation, and network penetration testing.
  19. Cybersecurity for Business Managers
    Teaches business leaders how to mitigate cyber risks, protect company data, and respond to cyber threats.
  20. Cybersecurity Audit for Non-Professionals
    Covers security assessment techniques for business professionals to ensure compliance with cybersecurity regulations.
  21. Wireless Hacking for Professionals
    Provides ethical hacking techniques for assessing and securing wireless networks against cyber threats.
  22. Ethical Hacking: Cryptography for Hackers
    Explores encryption methods, cryptographic algorithms, and secure data transmission techniques.
  23. Information Security and Risk Management
    Covers security frameworks, risk assessment methodologies, and incident management strategies.
  24. Certified Information Security Management Systems Lead Implementer
    Provides in-depth training on implementing ISO 27001-based information security management systems (ISMS).
  25. Digital Investigations and Incident Response
    Teaches forensic investigation techniques, evidence collection, and cybercrime analysis.
Artificial Intelligence, Data Science, and Machine Learning
  1. Artificial Intelligence for Business
    Explores AI applications in business, machine learning models, and automation strategies for decision-making.
  2. Deep Learning
    Covers neural networks, deep learning frameworks, and AI model training for advanced analytics.
  3. Data Mining and Graph Analysis for Social Media
    Teaches data extraction techniques for social media platforms, analyzing user behavior and sentiment analysis.
  4. Neural Network Fundamentals
    Provides an introduction to artificial neural networks, training algorithms, and real-world AI applications.
  5. Data Visualization Techniques
    Explores visualization tools and techniques for presenting complex data insights effectively.
  6. SQL Database Management
    Covers relational database concepts, SQL query optimization, and data integrity best practices.
  7. ORACLE Database Management
    Teaches Oracle database administration, performance tuning, and security configurations.
  8. Data Engineering Principles
    Explores data pipeline development, ETL processes, and big data architecture strategies.
  9. FPGA Programming for Cryptographic Applications
    Focuses on using FPGA technology for secure encryption, hardware acceleration, and cybersecurity applications.
  10. Foundations of Cryptology
    Covers cryptographic techniques, blockchain security, and encryption protocols.
  11. Social Media Data Analytics
    Teaches sentiment analysis, user behavior tracking, and data-driven decision-making using AI.
Networking and IT Infrastructure
  1. Computer Networks Security (Beginner to Advanced)
    Provides a comprehensive guide to securing networks, intrusion detection, and firewall management.
  2. IT Fundamentals for Cybersecurity Specialization
    Covers key IT concepts, security principles, and foundational skills for cybersecurity professionals.
  3. Enterprise Architecture Design
    Explores system design methodologies, IT governance, and enterprise security frameworks.
  4. Fiber Optic Network Design
    Provides hands-on training in fiber optic network architecture, cabling standards, and troubleshooting.
  5. Network Security Awareness
    Focuses on recognizing cyber threats, implementing security controls, and enhancing network protection.
  6. Certified Grid Computing Professional
    Covers distributed computing, parallel processing, and cloud-based infrastructure deployment.
Software Development and Secure Programming
  1. Secure Programming
    Covers secure coding practices, vulnerability assessments, and software security testing techniques.
  2. Application Design and Development
    Teaches principles of UI/UX design, software development lifecycle, and application security.
  3. Advanced Python Programming
    Explores advanced Python techniques for automation, AI, and cybersecurity applications.
  4. Advanced Windows Administration
    Provides expertise in managing Windows systems, security configurations, and troubleshooting techniques.
  5. Advanced Linux Administration
    Covers Linux server management, security hardening, and automation for system administrators.
  6. Computer Hacking Forensic Investigator (CHFI)
    Teaches forensic analysis, cybercrime investigation techniques, and digital evidence handling.
  7. Digital Project Management
    Covers agile methodologies, risk management, and IT project lifecycle management.
  8. The Application of Artificial Intelligence in Telecommunications
    Explores AI-driven network optimization, predictive analytics, and automation in telecom services.