The goal of this Five-days accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP training and certification experience.

The CISSP certification is governed by the International Information Systems Security Certifications Consortium (ISC)2 and has gained importance as a key component in the selection process for management-level information security positions.

The key advantage of authorized (ISC)2 Institute Training is fundamental: The institute’s goal is to provide an extensive overview of the Common Body of Knowledge (CBK), the compendium of information security practices and standards compiled and continually updated by (ISC)2 and used as the basis for the exam.

The benefits listed below are but a few of the advantages you can receive when doing business with an (ISC)2 host partner.  Only authorized host partners:

  • Are guaranteed to adhere to stringent technical pre-screening practices. Candidates that do not have the necessary work and education experience my be subject to decertification as per the “Code of Ethics”
  • Guarantee the highest quality of education and customer satisfaction. Candidates are able to contact (ISC)2 directly for program quality assurance
  • Utilize (ISC)2 Institute’s instructors, trained directly by the consortium. Many instructors have been training candidates for five years or more
  • Employ the only official (ISC)2 courseware, materials, and Practice Exams – The product of extensive work from (ISC)2; Instructors, and Subject Matter Experts
  • Deliver the (ISC)2 vendor examination truly on-site

You will learn the following on the CISSP training course:


Domain 1 – Access Control

Security architecture that protects the assets of your systems:

  • Concepts, methodologies and techniques
  • Effectiveness
  • Attacks

Domain 2 – Telecommunications & Network Security

Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality:

  • Network architecture and design
  • Communication channels
  • Network components
  • Network attacks

Domain 3 – Information Security Governance & Risk Management

Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines:

  • Security governance and policy
  • Information classification and ownership
  • Contractual agreements and procurement processes
  • Risk management concepts
  • Personnel security
  • Security education, training and awareness
  • Certification and accreditation

Domain 4 – Software Development Security (formerly ‘Application Development Security’)

The controls found in systems and applications software, and their development:

  • Systems Development Life Cycle (SDLC)
  • Application environment and security controls
  • Effectiveness of application security

Domain 5 – Cryptography

The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity:

  • Encryption concepts
  • Digital signatures
  • Cryptanalytic attacks
  • Public Key Infrastructure (PKI)
  • Information hiding alternatives

Domain 6 – Security Architecture & Design

The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications:

  • Fundamental concepts of security models
  • Capabilities of information systems (e.g. memory protection, virtualisation)
  • Countermeasure principles
  • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Domain 7 – Security Operations (formerly ‘Operations Security’)

Controls over hardware, media and operators with access privileges:

  • Resource protection
  • Incident response
  • Attack prevention and response
  • Patch and vulnerability management

Domain 8 – Business Continuity & Disaster Recovery Planning

How to maintain business in the face of major disruptions:

  • Business impact analysis
  • Recovery strategy
  • Disaster recovery process
  • Provide training

Domain 9 – Legal, Regulations, Investigations and Compliance

Computer crime laws, investigation and how to gather evidence:

  • Legal issues
  • Investigations
  • Forensic procedures
  • Compliance requirements/procedures

Domain 10 – Physical (Environmental) Security

How to protect your business’s resources and sensitive information:

  • Site / facility design considerations
  • Perimeter security
  • Internal security
  • Facilities security

To be eligible to get your certification, you must complete two processes:


The eligibility requirements to sit for the examination are completely separate from the eligibility requirements necessary to be certified.

To sit the exam, you must:

  • Prove that you possess a minimum of five years of professional experience in the information security field (or four years plus a college degree)
  • Complete the Candidate Agreement, confirming the above experience, and legally committing to the Code of Ethics
  • Successfully answer four questions regarding criminal history and related background


To be issued a certificate, you must:

  • Pass the exam with a scaled score of 700 points or greater
  • Submit a completed Endorsement Form
  • (If randomly selected) successfully pass an audit of your professional experience


Some candidates who pass the exam and submit endorsements will be randomly subjected to audit, and required to submit a CV for formal review and investigation.

If audited (subject to results), the credential will be awarded within seven business days and notification sent via e-mail. Naturally, there may be some delays due to mail service or the number of forms received. Also, audits may require additional time for verifying information and/or contacting references.

Ensure that your IT systems meet the business’s needs – through leadership, and organisational structures and processes. Learn about the roles, responsibilities and various focus areas of IT governance.

Do you have management, advisory or assurance responsibilities, relating to the governance of IT? If so, the CGEIT will help you provide excellent IT governance. Get recognised for your advanced IT governance experience and knowledge, with the internationally-recognised ISACA CGEIT certification.


During this three-day accelerated course, you’ll learn the five domains of CGEIT (Certified in the Governance of Enterprise IT).


  • The definition, development, and management of a framework for the governance of enterprise IT. Learn how to align this with the mission, vision and values of the business.


  • Ensure that IT supports the business, by aligning IT-strategic plans with business-strategic plans.


  • Make IT investments that deliver business benefits. Ensure that outcome and performance are measured, evaluated and that progress is reported to key stakeholders.


  • The IT risk management framework exists to identify, analyse, mitigate, manage, monitor, and communicate IT-related business risk. The framework must be aligned with the Enterprise Risk Management (ERM) framework.


  • How to optimise information, services, infrastructure, applications and people, to support the achievement of business objectives.


The CGEIT exam measures your knowledge of the five domains (see ‘Curriculum’ above). Here is the percentage of questions that will appear on the exam, from each domain:

  • Domain 1: Framework for the Governance of Enterprise IT (25%)
  • Domain 2: Strategic Management (20%)
  • Domain 3: Benefits Realization (16%)
  • Domain 4: Risk Optimization (24%)
  • Domain 5: Resource Optimization (15%)


There are no prerequisites for attending this course, but some knowledge / experience of IT governance is recommended. However, in order to be eligible for receiving the CGEIT certification, you must meet the following requirements:

A minimum of five years experience managing, advising or otherwise supporting IT governance in an enterprise, is required for CGEIT certification. This experience must meet these specific requirements, based on the CGEIT Job Practice domains:

  • A minimum of one year of experience relating to the definition, establishment and management of a Framework for the Governance of IT. The type and extent of experience accepted is described in CGEIT domain 1 (Framework for the Governance of Enterprise IT).
  • Additional broad experience directly related to any two or more of the remaining CGEIT domains is required. The type and extent of experience accepted is described in CGEIT domains 2 through 5. These domains are:
    • Strategic Management
    • Benefits Realization
    • Risk Optimisation
    • Resource Optimisation

There are no waivers or substitutions for CGEIT experience, apart from one exception: Two years as a full-time university instructor teaching IT governance related subjects at an accredited university can be substituted for every one year of IT governance experience.

Individuals can take the CGEIT exam prior to meeting the experience requirements. This practice is acceptable and encouraged, although the CGEIT designation will not be awarded until all requirements are met.

The goal of our three day accelerated Program for CISA Certification is to equip information professionals with the knowledge and technical skills for proficiency in IS audit, control and security skills.

Since 1978, the Certified Information Systems Auditor program, sponsored by the Information Systems Audit and Control Association (ISACA), has been the globally accepted standard of achievement among IS audit, and control and security professionals.

The technical skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organisations around the world.

During the program, students will live, learn, and prepare to take certification examinations on-site.


During this accelerated course, you’ll get instructor-led training to ensure that you learn the fundamentals, obtain hands-on skills and earn your certification.


  1. IS Audit Process
  2. IT Governance
  3. Systems and Infrastructure Lifecycle Management
  4. IT Service Delivery and Support
  5. Protection of Information Assets
  6. Business Continuity and Disaster Recovery

Content Area 1: IS Audit Process

Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected and controlled.

Content Area 2: IT Governance

To provide assurance that the organization has the structure, policies, accountability, mechanisms, and monitoring practices in place to achieve the requirements of corporate governance of IT.

Content Area 3: Systems and Infrastructure Lifecycle

To provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance, and disposal of systems and infrastructure will meet the organization’s objectives.

Content Area 4: IT Service Delivery and Support

To provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization’s objectives.

Content Area 5: Protection of Information Assets

To provide assurance that the security architecture (policies, standards, procedures, and controls) ensures the confidentiality, integrity, and availability of information assets.

Content Area 6: Business Continuity and Disaster Recovery

To provide assurance that in the event of a disruption the business continuity and disaster recovery processes will ensure the timely resumption of IT services while minimizing the business impact.


A minimum of five years of professional information systems auditing, control or security work experience (as described in the job content areas) is required for CISA certification. Substitutions and waivers of such experience may be obtained as follows:

  • A maximum of one year of information systems experience OR one year of financial or operational auditing experience can be substituted for one year of information systems auditing, control or security experience
  • 60 to 120 completed university/college semester credit hours (the equivalent of a Bachelor degree) can be substituted for one or two years, respectively, of information systems auditing, control or security experience
  • Two years as a full-time university instructor in a related field (e.g., computer science, accounting, information systems auditing) can be substituted for one year of information systems auditing, control or security experience

Experience must have been gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the examination. Retaking and passing the examination will be required if the application for certification is not submitted within five years from the passing date of the examination. All experience will be verified independently with employers.

The goal of our three-day accelerated CISM Certification Accelerated Course is to prepare information security managers and those who have information security management responsibilities to pass the Certified Information Security Manager (CISM) certification examination.


The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services.

During the program, students will live, learn, and prepare to take certification examinations. This blended-learning program employs outcome-based (Lecture | Lab | Review) delivery – that focuses on fully preparing you to take the CISM examination.


The CISM exam covers five information security management areas, each of which is further defined and detailed through task and knowledge statements. These areas and statements were developed by the CISM Certification Board and represent a job practice analysis of the work performed by information security managers as validated by prominent industry leaders, subject matter experts and industry practitioners. The following is a brief description of these areas, their definitions, and approximate percentage of test questions allocated to each area.

Select a title for a list of specific task and knowledge statements that represent a current market perspective of what is performed and what should be known by information security managers. This information provides the basis for the CISM exam.


  • Information Security Governance (21%) Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
  • Risk Management (21%) Identify and manage information security risks to achieve business objectives.
  • Information Security Program Management (21%) Design, develop and manage an information security program(me) to implement the information security governance framework.
  • Information Security Management (24%) Oversee and direct information security activities to execute the information security program.
  • Response Management (13%) Develop and manage a capability to respond to and recover from disruptive and destructive information security events


The CISM designation is for Information Security professionals, managers and other assurance providers who have 3-5 years of front-line or management experience and responsibilities related to security.


The following security-related certifications and information systems management experience can be used to satisfy the indicated amount of information security work experience.


  • Certified Information Systems Auditor (CISA) in good standing
  • Certified Information Systems Security Professional (CISSP) in good standing
  • Post-graduate degree in information security or a related field (e.g., business administration, information systems, information assurance)


  • One full year of information systems management experience
  • Skill-based security certifications (e.g., SANS Global Information Assurance Certification (GIAC), Microsoft Certified Systems Engineer (MCSE), CompTIA Security +)

COBIT 5 Foundation Training Course in London

This official, 3-day COBIT 5 Foundation Course uses content with the permission of ISACA and includes the COBIT 5 Foundation exam from APMG, which leads to the COBIT 5 Foundation certificate.

The course carefully explains the elements of the COBIT 5 framework using a case study and interactive presentations. It will help you build your understanding of COBIT 5 and the governance and management of enterprise IT (GEIT) to create awareness of GEIT at senior level and assess the current state of GEIT your organisation. It will also help you to start the process of scoping which aspects of COBIT 5 are appropriate to implement.


The course is aimed at Business Managers, Chief Executives, Managing Directors, IT/IS Auditors, Internal Auditors, Information Security and IT Practitioners, IT Consultants, IT/IS Management and those looking to be certified as either a COBIT Implementer or Assessor.

It will be particularly relevant if:

  • It is your goal to align your IT department with business requirements
  • You are tasked with meeting regulatory and statutory requirements or government targets that demand IT services to be properly evaluated, directed and monitored
  • You want to gain an understanding of COBIT 5 and its relationship with other best practice guidelines

COBIT 5 Foundation learning objectives

This course will prepare you for the COBIT 5 Foundation certificate exam. More importantly, it will ensure that you gain an understanding of:

  • The major drivers for the development of COBIT 5
  • The business benefits of COBIT 5
  • The COBIT 5 Product Architecture
  • The Governance and Management of Enterprise IT and the IT management issues and challenges that affect enterprises
  • The 5 Key Principles of COBIT 5
  • How COBIT 5 processes and Process Reference Model (PRM) help create the 5 Principles and the 7 Governance and Management Enablers
  • How to create awareness with business executives and senior IT Management
  • How to assess the current state of Enterprise IT in your organisation
  • The basic concepts for the implementation of COBIT 5 and of the new Process Assessment Model (PAM)
  • How to scope what aspects of COBIT 5 would be appropriate to implement

Get CRISC certified and improve your understanding of IT risk management, and its impact on your business. With the CRISC certification you’ll be able to design, implement, monitor and maintain risk-based, efficient and effective information systems controls.

The Certified in Risk and Information Systems Control (CRISC) certification proves your knowledge of enterprise risk, and your ability to use information systems controls to mitigate this risk.

You’ll learn the following on this ISACA CRISC training course:

  • Risk identification, assessment and evaluation
  • Risk response
  • Risk monitoring
  • Information systems control design and implementation
  • Information systems control monitoring and maintenance


During this three-day course, you’ll learn the five domains of CRISC.


  • Identify, assess and evaluate risk to enable the enterprise risk management strategy.


  • Develop and implement risk responses, to ensure that risk factors and events are addressed cost-effectively and in-line with business objectives.


  • Communicate risk information to the relevant stakeholders, to ensure the continued effectiveness of the enterprise’s risk management strategy.


  • Design and implement information systems controls in alignment with the organisation’s risk appetite and tolerance levels.


Monitor and maintain information systems controls to ensure that they function effectively and efficiently


This CRISC training course is designed for IT and business professionals who are engaged at an operational level to mitigate risk. It is therefore an advantage to have knowledge of business and technology risk management, and the implementation of information systems controls. You should also be familiar with general IT and business terminology.

You will take the CRISC exam on the course. But you will only be able to receive the CRISC certification if / when you have at least three years’ cumulative work experience, performing the tasks of a CRISC professional across at least three of the ISACA CRISC domains



This course provides comprehensive training and certification for anyone involved in software testing. It follows the syllabus specified by the International Software Testing Qualification Board (ISTQB).

This course is designed to prepare you for and test you in the following accreditations:

ISTQB Foundation Certificate in Software Testing

On completion of this course you will be able to:

  • Manage, plan and prepare rigorous, formal, visible and repeatable tests that will fully exercise software, in the development of quality systems.
  • Apply different testing approaches (black box, white box, static and dynamic) to all stages of software development.
  • Prepare test plans, strategy, specifications, procedures and controls to provide a structured approach to testing.
  • Identify what is involved in acceptance testing, system testing, integration testing and unit testing, what should be tested when and by whom.
  • Document testing appropriately.
  • Describe the different types of testing tools available and identify and implement the appropriate types of tools for their needs.

Our ISTQB Foundation Software Testing Course:

  • Allows you to achieve your certifications in a fraction of the time of ‘traditional training’ while delivering industry-leading exam passing percentages.
  • Helps students grasp complex technical concepts more easily by identifying and catering to individual student learning styles through a mixed visual, auditory and kinaesthetic-tactual delivery system.
  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory.

The ISTQB certifications are internationally recognised as the primary qualifications in the software testing industry. You’ll learn the curriculum for, and take, the following exam at our training centre:

ISTQB Advanced Certificate (Test Manager)

  • Models for tests
  • Component, Acceptance testing and System Integration
  • Maintenance tests
  • Non-functional system tests
  • Functional system tests

Static Techniques

  • Reviewing and the testing processes
  • Benefits and costs of reviews
  • Types of reviews: Walkthrough, technical review, informal reviews and inspections
    Static analysing

Test Design Techniques

  • Black and White box tests
  • Black box testing techniques including equivalence partitioning, state transition and boundary value analysis tests
  • White box testing techniques including decision and statement tests
  • Experience-based techniques
  • Choosing test techniques

Management Testing

  • Organisation
  • Project testing plans
  • Configuring management
  • Estimation Testing: Inclusion in project schedule
  • Monitoring and control
  • Track progress and deviations from plan
  • Incident management: Analysis, tracking and logging
  • Risk and testing

Testing Tools

  • Requirement tests; Static analysing
  • Testing design
  • Data preparation
  • Capture/replay
  • Test running
  • Test harnesses, drivers and simulators
  • Performance testing
  • Dynamic analysing
  • Debugging
  • Comparison
  • Management testing
  • Coverage measurement
  • Effective use, benefits and risk
  • Introducing tools into an organization

After gaining the Foundation certificate, you will choose to study either Advanced Test Manager or Advanced Test Analyst – content for both certificates are covered within the

  • Advanced section of the course
  • Advanced Test Manager
  • Basic Aspects of Software Tests

Tests in the Software Lifecycle

  • Specific Systems
  • Metrics & Measurements

Testing Processes

  • Testing, planning & control
  • Test implementation & execution
  • Evaluate exit criteria & reporting
  • Testing Closure Activities

Management Testing

  • How to test Management Documentation
  • Testing Plan Documentation
  • Testing Estimation
  • Scheduling Test Planning
  • How to test Progress Monitoring & Control
  • The Business value of Testing
  • Testing of Distributed, Outsourced & Insourced
  • How to do Risks-Based Testing
  • The Failure Mode & Effects Analysis
  • Testing Management issues

Testing Techniques

  • Testing of Software Characteristics
  • Reviews
  • Principles of Reviews
  • Introduction of Reviews
  • Success Factors of Reviews

Incident Management

  • Standards & Test Improvement Process
  • Improving the Test Processes
  • Test Tools & Automation
  • Concepts of Testing Tools
  • Category Test Tools

People Skills – Team Composition

  • Testing Team Dynamics
  • Fitting and Testing within an Organization
  • Motivation
  • Communication

Foundation Software Tester (3 days)


This three-days accelerated course provides comprehensive training and certification for anyone involved in software testing. It follows the syllabus specified by the International Software Testing Qualification Board (ISTQB). This course is designed to prepare you for and test you in the following accreditations:

ISTQB Foundation Certificate in Software Testing

On completion of this course you will be able to:

  • Manage, plan and prepare rigorous, formal, visible and repeatable tests that will fully exercise software, in the development of quality systems.
  • Apply different testing approaches (black box, white box, static and dynamic) to all stages of software development.
  • Prepare test plans, strategy, specifications, procedures and controls to provide a structured approach to testing.
  • Identify what is involved in acceptance testing, system testing, integration testing and unit testing, what should be tested when and by whom.
  • Document testing appropriately.
  • Describe the different types of testing tools available and identify and implement the appropriate types of tools for their needs.

During our program the following topics will be presented | ISTQB Foundation Certificate in Software Testing:

  • Testing Throughout the Lifecycle
  • Testing Models
  • Testing System Integration, Component and Acceptance
  • Testing Maintenance
  • Testing Non-functional system
  • Testing Functional system

Static Techniques

  • Reviewing and the testing process
  • Benefits and costs of reviews
  • Types of review: Walkthroughs, inspections, technical review, informal review
  • Static analysis

Test Design Techniques

  • Testing Black and White box
  • Testing black box techniques including equivalence partitioning, state transition and boundary value analysis
  • Testing white box techniques including statements and decisions
  • Experienced based techniques
  • Choose test techniques

Management Testing

  • Organisation
  • Project testing plan
  • Configuration management
  • Estimation testing: Inclusion in project schedule
  • Monitor and control
  • Track progress and deviations from plan
  • Incident management: Tracking, logging and analysis
  • Risk and testing

Test Tools

  • Types of testing tools
  • Testing requirement; Static analysis
  • Testing design
  • Data preparation
  • Replay/capture
  • Test running
  • Test harnesses, simulators and drivers
  • Performance tests
  • Dynamic analysing
  • Debugging
  • Comparison
  • Management testing
  • Coverage measurement
  • Effective use, benefits and risk
  • Introducing tools into an organization

TOGAF®, an Open Group certification, is the open enterprise architecture standard used by the world’s leading organizations to improve business efficiency. The TOGAF Certification Program has enabled more than 20,000 enterprise architects and trainers around the globe to demonstrate their proven knowledge of the framework.

Certification is achieved through a two-part exam, following a course of self-study or an Accredited TOGAF 9 Training Course.

The Open Group TOGAF 9 certification is: • Used by the world’s leading enterprises to certify a common body of core knowledge about the methodology and framework • A trusted, vendor-neutral, globally recognized and portable credential • Valuable in demonstrating to employers and peers your commitment to enterprise architecture as a discipline • An outstanding career move and a foundational certification in the career of any enterprise architect

The TOGAF® 9 Certification for People Program is a market-driven education and certification program to support TOGAF 9.   TOGAF 9 Professional Certification takes two forms:

  • TOGAF 9 Foundation. This provides validation that the candidate has gained knowledge of the terminology and basic concepts of TOGAF 9 and understands the core principles of Enterprise Architecture and TOGAF
  • TOGAF 9 Certified. This certification provides validation that in addition to knowledge and comprehension, the candidate is able to analyze and apply knowledge of TOGAF


The TOGAF certification exam will test you on all of the topics below. During the course, you will learn everything:


  • Enterprise Architecture and basic concepts
  • TOGAF 9 Core concepts
  • Key terminology
  • The ADM cycle and the objectives of each phase
  • Adapting and scoping the ADM
  • The concept of the Enterprise Continuum; its purpose and constituent parts
  • How each of the ADM phases contributes to the success of enterprise architecture
  • The ADM guidelines and techniques
  • How Architecture Governance contributes to the Architecture Development Cycle
  • Concepts of views and viewpoints
  • Roles in communicating with stakeholders
  • Concepts of building blocks
  • Key deliverables of the ADM cycle
  • Reference models
  • Certification program


  • Applying the ADM phases in development of enterprise architecture
  • Applying  Architecture Governance in development of enterprise architecture
  • Applying Architecture Content Framework
  • Applying concepts of Building Blocks
  • Applying the Stakeholder Management Technique
  • Applying Content Metamodels
  • Applying recommended techniques when developing enterprise architecture
  • Technical Reference Model and customizing it to meet an organization’s needs
  • Integrated Information Infrastructure Reference Model
  • Content of the key deliverables of the ADM cycle
  • Partitioning enterprise architectures to meet the specific needs of an organization
  • Purposes of the Architecture Repository
  • Applying iteration and different levels of architecture with the ADM
  • Adapting the ADM for security
  • SOA as a style of architecture
  • Roles of architecture maturity models in developing enterprise architecture
  • Purposes of the Architecture Skills Framework and how to apply it within an organization

This class is intended as comprehensive enhancement in the Project Management skill focusing in Information Technology (IT) projects, which is essential to professionals involving in the project activities(endeavors) of IT applications and implementation.
The contents is focused on concise skill enhancement to give participants what specific project management skill required to interface with the IT project implementation within the operational environment and the interlinked networks. The course contents covers process and domains of those tasks that are routinely performed by project manager and project individuals. The course contents are impregnated by standard course recognized by international Project Management Institute.



  1. To enhance the skill of the participants on Information Technology (IT) Project Management
  2. Escalate their project management proficiency with broad managerial perspective essential for their day-to-day IT project operation
  3. Preparing the skill for IT project management procedural set up


  1. IT Operation Manager
  2. MIS Manager
  3. Project Manager
  4. IT operation functional roles
  5. Business Operation Manager


  1. IT Project Management : IT Project Commencement
  2. IT Project Planning
  3. IT Project : Management Approval and Support
  4. IT Project Budgeting
  5. IT Project Scope Management
  6. Organizing IT Project Team
  7. IT Project Time Management
  8. IT Project Implementation
  9. IT Project Changes Management
  10. IT Project Quality Management