Scheda corso
NovaNext Training / EPI Data Center / EPI Data Center Training Framework / Certified IT Operator (CITO®)

Certified IT Operator (CITO®)

Codice
CITO
Durata
2 Giorni
Prezzo
Su richiesta
Lingua
Inglese
Modalità
Virtual Classroom
Certificazioni Associate
CITO
       

 

Schedulazione
Luogo Data Iscrizione
A Richiesta

CITO® is a 2-day course designed to teach the competencies required of the modern IT professional working at the operations level in IT.

Also known as the IT engineer’s course, CITO® candidates will become instantly productive having gained knowledge and understanding of the demands in today’s IT infrastructures.

Their improved capabilities will deliver immediate results, increasing eciency and signicantly reducing the margin of error.

CITO® is aligned with the latest European e-Competence (e-CF) Framework - addressing prociency levels 1 and 2 (Associate & Professional). In 2016, the e-CF became a European standard and was published ocially as the European Norm EN 16234-1.

The CITO® course is lectured by an EPI Certified Instructor.

CITO® course is available in the following delivery methods:

  • ILT – Instructor Led Training 
  • VILT – Virtual ILT 
  • TOD – Training On Demand 

Exam: Certified IT Operator (CITO®)

The CITO® exam is a 60-minute closed book exam, with 40 multiple-choice questions. The candidate requires a minimum of 26 correct answers to pass the exam. 

 

Obiettivi

After completion of the course the participant will be able to:

• Understand the role and importance of Information Technology in the organisation

• Describe the function of the IT organisation, roles and responsibilities

• Provide technical input for vendors RFP (Request for Proposal)

• Cooperate and coordinate with vendors for delivery, maintenance, support and monitoring activities

• Execute basic projects using principles of project management

• Deploy applications and understand application life cycle management

• Identify the options for virtualisation and storage solutions

• Create, publish and maintain documentation

• Operate incident and event management and request fullment

• Identify risk and understand the principles of risk management

• Design, implement and operate security logging

• Understand the principles of information security

• Monitor and report on quality in IT

 

Destinatari

System administrators/engineers, service desk operators/agents, network administrators/engineers, software developers/engineers, account managers.

This course is most suited for aspiring and existing IT professionals from entry level up to two years of actual working experience in IT, with basic knowledge of (operating) systems, network and/or applications, and service desk operations.

It is also suited for people who are changing careers and entering the IT professional world.

 

Contenuti

IT strategy

  • The need for IT
  • IT strategy and key objectives
  • IT services and service catalogue
  • IT and data centre infrastructure

IT Organization

  • IT organization
  • Data centre operations
  • IT operations
  • Data centre roles
  • IT operations roles

Vendors

  • Vendor selection
  • Technical coverage and due diligence of RFP
  • Place an receive orders
  • Verifying deliveries
  • Invoice verication
  • Maintenance
  • Support
  • Monitoring and reporting

Project Management

  • Project management methods
  • Business case
  • Project constraints
  • Scope
  • Time
  • Cost
  • Monitor and control
  • Change request
  • Closing

Applications

  • Application Programming Interface (API)
  • Software Development Life Cycle (SDLC)
  • DevOps
  • Design
  • Development
  • Testing
  • Deployment

System Administration

  • Server hardware/administration
  • Storage
  • Virtualisation
  • Database administration
  • Network essentials

Documentation

  • Documentation guidelines
  • Lifecycle of documents
  • Types of documents
  • Document categories 

Service Management

  • Service desk
  • Event management
  • Request fulfiment
  • Incident management 

Risk

  • Guidelines
  • Assets
  • Threats
  • Vulnerabilities
  • Existing controls
  • Consequences
  • Risk analysis
  • Risk evaluation
  • Risk treatment

Information Security

  • Standards and guidelines
  • Confidentiality
  • Integrity
  • Availability
  • Administrative controls
  • Physical controls
  • Technical (logical) controls
  • Security logging

Technology Trends

  • Cloud computing
  • Big Data
  • Internet of Things (IoT)
  • Social media
  • Mobile applications
  • Bring Your Own Device (BYOD)

Quality

  • Quality control
  • Quality assurance
  • Metrics
  • Key Performance Indicators (KPIs)