IT Training Modules

Services & Support Training Program

What do you need to know about this training program for members of your staff.

There are two very important considerations for all managers wanting to send staff on this training. The first is how to measure the level of skill your employee has before enrolling them on the programme, so they start at the correct point in the learning path and the second to understand the amount of time required by a student to achieve the learning along with practicing the skills learnt. This is the most important consideration before allowing a member of your team to join the training.

Entry Level and Skills

Below is a guide to the content of the courses for you to consider.

Modules 1 and 2 - Networking & Virtualisation / Cloud.

These modules are at an entry level where no previous IT training is required. There needs to be a commitment from both manager and delegate to completing the training path. The delegate will be expected to complete post learning and practise skills learnt for minimum of 3 months after completing the classroom training before attending the next level. There is no pre learning needed.

Modules 3 and 4 - Active Directory & Servers Systems.

These modules are aimed at delegates with a foundation IT skill in virtualisation, client-server networks and cloud technology as a minimum, or must have attended the first 2 module in this programme.

Delegates should be able to perform basic device connectivity. Explain TCP-IP, Network Addressing, Subnetting, CIDR Notation, (Basic DNS and DCHP functionality and their configuration) relating to a Canon device. The delegate should feel comfortable working on a server operating system with limited instruction set (not a full step by step guide). For example, "Change the IP of your NIC to 192.168.0.34" this should be something the delegate will be able to do without instruction.

Modules 5, 6 & 7 - IT security, Networks and Canon Devices

These modules are designed to support delegates in understanding security with Canon devices and incorporating them into a customers secure environment. 

In module five delegates will gain an understanding the technology of security, the terminology and why security is so important to our customers. Cyber security has been the highest spend within the IT Departments of our customers for at least two years. They will understand how Canon MFDs and software can help our customers maintain their security policies.? Delegates will gain practical experience and get hands on to understand some cryptography, PKI and understand root CA certificate along with how its built. Then create a TLS encrypted website which will allow them to see the security in place by monitoring with Wireshark. The course will look at a trusted platform module understanding how it works with Microsoft, a computer, server networks and eventually they will enable BitLocker using TPM just to understand how TPM works.?

In module six we will also give the delegates the ability to understand Canon device integration in secure networks. This module will look in detail and the requirements for secure networking and the more advanced builds of networks. It will introduce VLANs, Advanced DNS, IPsec, SMB, VPN, EFS and the Certificate based Identity along with the technologies of encryption, authentication, authorisation and access. Delegates will build a secure network infrastructure which will be used in module seven to connect Canon MFDs and software.

The last module seven, is a practical module using the Canon MFD as the centre of the module?. The delegate will learn about setting up a network printer and understand how to configure management settings. They will also learn about securing the network printer and understand print settings using Microsoft.? They can also experience some features of setup in a MS Azure cloud.