Explore our programs

place Riaydh, KSA.

IT Security Training

Maximize your training time and turbo-charge your career in security by learning the full Inter Land Security Essentials curriculum needed to qualify for the GSEC certification. In this track you will learn the language and underlying theory of computer security. At the same time you will learn the essential, up-to-the-minute knowledge and skills required for effective performance if you are given the responsibility for securing systems and/or organizations. This course meets both of the key promises Inter Land makes to our students: (1) You will gain up-to-the-minute knowledge you can put into practice immediately upon returning to work; and, (2) You will be taught by the best security instructors in the industry. As always, great teaching sets Inter Land courses apart, and Inter Land ensures this by choosing instructors who have ranked highest in a nine-year competition among potential security faculty.

Note: This course is endorsed by the Committee on National Security Systems (CNSS) NSTISSI 4013 Standard for Systems Administrators in Information Systems Security (INFOSEC).

MCSE Training Courses

High quality, self-paced MCSE training courses to help achieve your goals conveniently Anytime, Anywhere!. 12-months of e-Learning FREE quarterly course additions and updates, dedicated, professional technical support, access 24 hours a day, 7 days a week from any PC with Internet access. No parking hassles, no missed assignments, and nothing to install.

  • subjectMCSE training courses available online
    • Installation provides an overview of the installation process for Microsoft Windows 2000 Server and has step-by-step procedures for installation tasks.
    • Hardware describes how to install, configure, manage, and troubleshoot hardware devices in a Windows 2000 environment.
    • Controlling Access to Files and Folders shows how to configure interoperability and Web services, manage users and groups, share folders, and manage a distributed file system.
    • Controlling Access to Web Resources and Printers describes the process and capabilities of managing resources shared on a network.
    • Optimizing describes how to manage processes, monitor system resources, and optimize disk performance.
    • Recovering from Disaster describes system tools used to save and recover data.
    • Configuring Disks and Volumes describes how to monitor, configure, and troubleshoot disks and volumes.
    • Administering Disks describes how to manage user profiles, data compression, and disk quotas, as well as how to recover from a disk failure.
    • Networking describes how to install, configure, and troubleshoot network protocols, services, and connections.
    • Implementing Remote Access describes how to install, configure, and troubleshoot shared access, remote access, and virtual private networks.
    • Implementing Terminal Services describes how to install, configure, monitor, and troubleshoot Terminal Services.
    • Using Security Features describes how to implement, configure, manage, and troubleshoot security features.
    • Windows XP Installation provides users with an overview of the installation process for Microsoft Windows XP Professional.
    • Administering Resources shows how to manage files, folders, and file systems. In addition, it describes the process and capabilities of managing resources shared on a network.
    • Configuring Hardware describes how to view properties of disks, configure disks, maintain disks, and work with removable media. It also describes the installation and configuration of hardware devices.
    • Optimizing the System teaches users how to monitor, troubleshoot, and back up the system for optimum performance.
    • Configuring the Desktop describes how to configure user profiles and support for multiple languages and locations.
    • Networking the System teaches users how to configure and connect a network. It also shows users how to configure and troubleshoot the TCP/IP protocol.
    • Securing the System provides the user with an overview of user and group accounts. It also provides users with an overview of configuring, monitoring, and maintaining systems security using audit policies, security templates, and encryption technology.
  • subjectFeatures of our courses
    • Certificates of Completion
    • Instructional steps -- walk through a procedure
    • Exercises -- try it out
    • Notes - See additional information related to the topic in the text
    • Tips - See a different, faster, or easier way of doing something
    • Quick References - See a quick reference guide to the features introduced in a chapter
    • Details - Display more detailed information related to the current topic
    • Hotwords - See related information
    • Navigation Bar - Maneuver easily through the courses
    • Topics and Index -- with searching feature and hyper-links
    • Printable Exercises - PDF downloadable files
    • Sample Application Files - PDF downloadable files
    • Glossary

Skill Assessment - can be used for pre and post-testing -- tracking first try, best try and grade - if passed, green check mark will appear as 'mastered' - hyperlinks to units within the course to go back and re-take a certain unit again. Use as pre-test to determine which topics you want to focus on and to go directly into that unit.

Technical Requirements

200MHz Pentium with 32MB Ram. 640 x 480 256-color video (800 x 600 is recommended). Windows 95, 98, NT, 2000, or XP. Internet Explorer 5.0 or higher required. Minimum Connection Speed: 28.8k. Author ware recommended but not required. JavaScript must be enabled. Netscape and AOL browsers not supported.

Learning comes to life with challenging labs, critical assessment and real-world insight from experts with vast experience in the subject matter. Engage in dynamic learning where multiple senses help reinforce learning concepts. Our proven methodology provides an unequalled experience with exceptional results Learning that's Easy, Convenient and Affordable! High-quality, online, self-paced courses designed to help you achieve your goals. Affordable annual subscription plans give you unlimited access to an entire suite of topics at prices that you just won't find anywhere else.

Our courses are based on sound principles, from extensive research in instructional design, adult learning and information processing. All courses are design so that new knowledge and skills will be remembered and retrieved for future use. Each course includes a 30-questions skill assessment, which evaluates your knowledge of the course material. You can be assured that this high-quality, instructionally-sound online product will enhance your professional and personal growth.

Sign up for our courses right now, and join the ranks of people who are taking financial advantage of the explosion in the Information Technology field.

sign up

call our customer care  0471-2710424