Welcome To Smeep Technologies

TRAINING PROGRAMS

Application Management

This includes the processes and activities that come into play in application management. From management to maintenance and renewal.
READ MORE

Cloud Computing

It is unavoidable a tiny bit technical, however emphasizes the characteristics, (dis)advantages, and general management aspects of Cloud Computing.
READ MORE

Cyber and IT Security

Certification will provide candidates with the knowledge that is necessary to understand all aspects that are relevant to the technical side of information security.
READ MORE

Ethical Hacking

It covers the basic steps of ethical hacking: intelligence gathering, scanning computer network/systems, and penetrating systems.
READ MORE

Information Security, based on ISO 27002

It Create awareness amongst employees and Provide understanding of the measures that need to be taken.
READ MORE

Privacy and Data Protection

Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns rise. PDPF covers the main subjects related to the protection of personal data.
READ MORE

IT Service Management, based on ISO/IEC 20000

It describes the key information and concepts for IT Service Management as well as their relationships with other areas of information management. It covers the core concepts ISO/IEC 20000:2011.
READ MORE

Agile Scrum

This unique certification program validates a professional’s blended knowledge in agile methodologies and scrum practices.
READ MORE

Business Information Management

This includes, outlines the processes and activities and supports these with a set of best practices. candidate will be able to apply business information management in practice.
READ MORE

Principles of IT Management

A concise introduction to IT and Information Management, this programme provides greater insight into the various methods of information management.
READ MORE

Secure Programming

In-built security of applications is worth the investment. If programmers do not understand the security of the software they are building, any additional investment in the process is useless.
READ MORE