Futuristic has been involved in delivering unique, practical and value adding training to organizations and individuals across the country. We have provided training for IT Professionals, Project Managers, Management and various cadres of staff members. We have obtained accreditation through various partner organizations including regional Universities, Colleges and other Professional Bodies.
The main objectives of the training are to ensure that the participants have gained specific and specialized knowledge to be able to use and implement what they have learned effectively in their organizations.
Some of the courses include:
Virtualization & Cloud Computing
The virtualization and cloud computing course is aimed at bringing you to terms with this approach, and equips you with the necessary knowledge and skills, to make you able to implement, administer and manage a virtualized environment and/or the cloud. It will provide essential and practical knowledge, though incorporation of examples, illustrations and videos, to fully drive in the skills as the trainers take you through the course content. Our qualified staff are fully equipped with materials, experience and are certified to offer the course.
This workshop will answer questions on how one can; Configure and install various Linux Servers including web servers (APACHE), DNS Servers (BIND), File Servers (SAMBA), DHCP Servers, Internet Proxies (SQUID), Email Gateways (Postfix/ sendmail with spam filters and antivirus filtering), Secure Linux Systems (Hardening, SSH and Encryption), Managing Linux Networks Services, Use Linux to implement firewalls and to perform routing, Write BASH Scripts and Shell Programming, among others. Upon completion of this course, students will be prepared to competently maintain a Linux system in a networked business environment.
Anti-Money Laundering and Combating Financial Crimes
This training will make you recognize how, what, where and why money launderers and terrorist financiers are targeting the financial sectors. Those who attend will better recognize their own responsibilities in detecting and preventing money laundering, and will understand the steps they can take to reduce those risks.
We have created a portfolio of training solutions that give your employees the necessary skills and understanding to help protect your business against financial crime to ensure on-going compliance with relevant financial regulations.
IT Security and Ethical Hacking Training Course
This is a unique, authoritative, high-value, hands-on practical course which will provide participants with essential understanding of the tools, methodologies and vulnerabilities that fraudsters could employ to exploit IT systems. Most organisations now realize that in order to defend themselves against the threat of attack by fraudsters and indeed any individual intent on causing disruption to their IT systems, IT staff must have an informed and current understanding of the present-day methodologies, tools, and vulnerabilities which allow these exploits to happen Using state-of-the-art classroom setups, delegates work with Microsoft Windows and LINUX/UNIX systems, and associated server software. A wide range of security and auditing tools will be used during the course
Computer Forensics and Investigations Training
The Computer Forensics course is designed to help digital investigators identify malware on a computer system, pull malware apart to uncover its functionality and purpose, and determine the havoc malware wreaked on a subject system.Practical case scenarios are used throughout the course to demonstrate techniques and associated tools.
Web 2.0 and Social Media for Development
Web 2.0 and Social Media are online technologies that enable people to collaborate to create, share and publish information.
This course covers advanced online searching, getting information served via alerts and RSS, collaborating remotely using Google Drive, Dropbox, VoIP, online mapping and social networking.Participants will get a chance to see what others have done, get hands-on experience on how to use innovative applications, and assess how they could adopt these innovations within the context of their work and organisation.
Mobile Banking Security Training
Mobile banking is a convenient approach to perform remote banking, but there are security shortfalls in the present mobile banking implementations. This training discusses some of these security shortfalls, such as security threats with GSM network, SMS/GPRS protocols and security problems with current banks' mobile banking solutions.
The Mobile Banking Security Training course content is customized to meet the particular needs and requirements of the banking sector, as well as purpose-built content to deliver the training course.
Advanced IT Security And Ethical Hacking Training
Our Advanced Ethical Hacking Course has proven to be the most practical course in Security. We help you realize the latest attacks that hackers are using. By learning and anticipating the hackers next move, you are able to thwart these threats before they materialize. You will learn the skills that hackers, both inside and outside the organisation are using.
The course will immerse the delegates into an interactive practical environment where they will be shown how to hack and secure their own systems.The lab intensive environment gives each student in-depth knowledge and practical experience with the latest essential security systems.
Data Analysis Techniques and For Revenue Assurance
This course is designed to give participants a complete vision about how Revenue Assurance programs could improve the financial results on Telecommunications Operators. By describing the different methods and the tasks to develop, participants will have the whole information to start building Revenue Assurance Teams in order to define monitoring controls used to identify revenue risk and report them to perform their correction. The course will analyze some of the principal processes of a Telecommunication Operator and will explain all of the usually problems that could appear on it such as Bill Incidence Detection, Rate Reviews, Fraud Alarms or Loyalty Policies.
e-Government Office Automation Training
These training programs focuses on empowering the National and County Governments to use ICT as an enabler in achieving their strategic objectives in improving service delivery, access to citizenship services and efficiency.
Youth Empowerment Training Based On Knowledge Driven Agricultural Value Chains
Utilizing our existing partnerships (e.g Local Financial Institutions - Rafiki Bank & Family Bank, Local Universities - University of Nairobi & JKUAT), County Governments and other players, we design capacity building interventions that are geared towards empowering the Youth, Women and Persons With Disabilities through participation in value addition Knowledge Driven, Agricultural Value Chains ecosystems that empowers them with the relevant knowledge, financial resources and access to markets.
In this regard, Futuristic GLO and its partners designs a customized training program based on the subject matter and the skills required to participate in the value chain e.g subject matter-based training programs.
Multimedia Training Services
Under this course we facilitate: Virtual Learning Environment (Moodle and BlackBoard); Adobe:Photography (Photoshop, InDesign, Illustrator), Animations (Flash & Animate); 3D Animations (3DMax, Maya and Blender).
Multimedia vs. Graphic Design
Often grouped with graphic design, multimedia training courses are essentially a form of visual communication, using a combination of multiple images to create a message. The difference between multimedia and graphic design lies within the message, not the technique. Graphic design is intended to create a clear and functional message and thus forms part of the more general definition of multimedia.
These courses are often geared at training professionals on how to perfect visual techniques for commercial results. Many courses in audio, video and photography will also prepare individuals for creating artistic works. No matter what your visual communication needs, you’ll find the multimedia training you’re looking for in Futuristic GLO.
Multimedia Training: Photography
Multimedia training in photography spans a great number of individual skills sets and technical capacities. There’s always something new to be learned in photography. Whether looking to gain skills in equipment use, lighting techniques, aperture, or editing software, there are multimedia training courses available for participants.This is split into the following sub-courses:
Multimedia Training: Videography (Adobe Premier, After Effects)
Working with video as a professional requires a highly diverse skill set. Our video course entails video editing software guidance, tools and techniques for getting the most out of professional video equipment, and methodologies for using and embedding various kinds of video for various purposes. Similar to other industries that depend greatly on technology, professional video production and editing requires not just the latest equipment, but a firm grasp of the latest in best practice. As new technological capacities are developed ,professionals must learn a wider range of functionalities. Our instructors will train learners how to:
Multimedia Training: Animation
Animation is the creation of motion through the combination of a great number of individual images, or frames. The industry has seen major changes over the past years. As such, relevant skills for working as an animation professional are constantly in need. Search the above multimedia training courses for providers offering training programs and short courses in:
Intrusion Detection and Prevention Training
This course is designed to give students practical, working knowledge in intrusion detection and traffic analysis. The students will gain an understanding of the workings of TCP/IP, methods of network traffic analysis and one popular network intrusion detection system Snort.
The emphasis of this course is on increasing students’ understanding of the workings of TCP/IP, methods of network traffic analysis and one specific network intrusion detection system (NIDS) - Snort. Challenging, hands-on exercises are specially designed to be valuable for all experience levels. Delegates will install and commission the Snort Open Source IDS/IPS system on their own internal network and be trained in the management, monitoring and support of the system.