Featured Learning
View all
Welcome to PMP® Certification: Passing the 2021 Exam. This course provides the basic knowledge needed to learn the concepts and skills necessary to pass the 2021 Project Management Professional (PMP) exam administered by the Project Management Institute (PMI). It is intended to be used alongside the PMBOK® Guide, Sixth Edition, which is useful as an ancillary reference and glossary.
The new release of this course (R2.0) includes a new chapter on agile approaches to, and tools for, the project life cycle. These methods address projects that require an adaptive project environment, iterative activities, and changing requirements. The standard example of adaptive project needs is that of software development and revision; however, agile methods are used today in many different project environments, from architecture to medical equipment and services. The new chapter (Managing projects with agility) was inserted at the end of the book. There were no other changes to the rest of the content, including the Exam Prep add-on.
This course assumes that you have project management and other educational experience, as required by PMI, in order to take the exam. In addition, it’s expected either that you have already applied to take the exam, or that you plan to do so while taking this course or shortly thereafter; this course contains instructions for doing so.
PMP Certification: Passing the 2021 Exam, Instructor Edition
R 1322.96
($)

Welcome to PMP® Certification: Passing the 2021 Exam. This course provides the basic knowledge needed to learn the concepts and skills necessary to pass the 2021 Project Management Professional (PMP) exam administered by the Project Management Institute (PMI). It is intended to be used alongside the PMBOK® Guide, Sixth Edition, which is useful as an ancillary reference and glossary.
The new release of this course (R2.0) includes a new chapter on agile approaches to, and tools for, the project life cycle. These methods address projects that require an adaptive project environment, iterative activities, and changing requirements. The standard example of adaptive project needs is that of software development and revision; however, agile methods are used today in many different project environments, from architecture to medical equipment and services. The new chapter (Managing projects with agility) was inserted at the end of the book. There were no other changes to the rest of the content, including the Exam Prep add-on.
This course assumes that you have project management and other educational experience, as required by PMI, in order to take the exam. In addition, it’s expected either that you have already applied to take the exam, or that you plan to do so while taking this course or shortly thereafter; this course contains instructions for doing so.
PMP Certification: Passing the 2021 Exam, Student Edition
R 1322.96
($)

In today's competitive environment, information is one of the most important factors in determining the success of an organization. If you are able to manage and retrieve information efficiently, you can streamline the organization's processes and give it a competitive edge. Some data analysis tasks may require that you query multiple tables simultaneously or create complex views of data.
In the course SQL Querying: Fundamentals (Second Edition), you learned the basics of SQL querying. In this course, you will build on this foundation, learning advanced querying techniques, such as writing nested queries, using JOINs to combine data from multiple tables, summarizing query results, using advanced filtering, and using views to simplify repetitive querying tasks. You will also learn how to perform common database administration tasks such as duplicating tables, modifying table structures, inserting, updating, or deleting data, and indexing tables to optimize query performance. You will also learn how to work with multiple tasks as a transaction.SQL Querying-Advanced (Second Edition), Instructor Edition
R 714.15
($)

The 50-Minute Manager Series was designed to cover critical business and professional development topics in the shortest time possible. Our easy-to-read, easy-to-understand format can be used for self-study or classroom training, or even office training. With a wealth of hands-on exercises, the 50-Minute books keep you engaged and help you retain critical skills.
The success of any organization depends on the quality of the people it hires. This book describes a marketing approach to finding the best candidates. In addition to traditional recruiting, effective alternative strategies like networking, job fairs, and employees referral programs are also discussed.Effective Recruiting Strategies, Student Edition
R 239.20
($)

As technology progresses and becomes more interwoven with our businesses and lives, more data is collected about business and personal activities. This era of "big data" is a direct result of the popularity and growth of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantages.
Creating data-backed visualizations is key for data scientists, or any professional, to explore, analyze, and report insights and trends from data. Microsoft® Power BI® software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and it enables users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, enabling users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action.MS Power BI-Data Analysis Practitioner (Second Edition), Instructor Edition
R 1574.58
($)

Organizations typically store their most critical information—the information used to manage day-to-day operations—within a database. The ability to retrieve and analyze this information is essential to the functioning of the organization. Structured Query Language (SQL) is the primary language used to accomplish such tasks. Essentially, SQL is the language you use to interact with a database.
The ability to write SQL is an essential job skill for those who need to manage large volumes of data, produce reports, mine data, or combine data from multiple sources. Even if someone else on your team creates reports for you, having a fundamental understanding of SQL querying will help you ask the right questions and know what you're looking for in your data analysis tools.
This course, SQL Querying: Fundamentals (Third Edition), will teach you to use SQL as a tool to retrieve the information you need from databases.
SQL Querying-Advanced (Third Edition), Instructor Edition
R 749.80
($)

Organizations typically store their most critical information—the information used to manage day-to-day operations—within a database. The ability to retrieve and analyze this information is essential to the functioning of the organization. Structured Query Language (SQL) is the primary language used to accomplish such tasks. Essentially, SQL is the language you use to interact with a database.
The ability to write SQL is an essential job skill for those who need to manage large volumes of data, produce reports, mine data, or combine data from multiple sources. Even if someone else on your team creates reports for you, having a fundamental understanding of SQL querying will help you ask the right questions and know what you're looking for in your data analysis tools.
This course, SQL Querying: Fundamentals (Third Edition), will teach you to use SQL as a tool to retrieve the information you need from databases.
SQL Querying-Advanced (Third Edition), Student Edition
R 749.80
($)

ELK-EB-94-029IG_rev1.0: SQL Querying–Fundamentals (Third Edition), Instructor Edition
Organizations typically store their most critical information—the information used to manage day-to-day operations—within a database. The ability to retrieve and analyze this information is essential to the functioning of the organization. Structured Query Language (SQL) is the primary language used to accomplish such tasks. Essentially, SQL is the language you use to interact with a database.
The ability to write SQL is an essential job skill for those who need to manage large volumes of data, produce reports, mine data, or combine data from multiple sources. Even if someone else on your team creates reports for you, having a fundamental understanding of SQL querying will help you ask the right questions and know what you're looking for in your data analysis tools.
This course, SQL Querying: Fundamentals (Third Edition), will teach you to use SQL as a tool to retrieve the information you need from databases.SQL Querying–Fundamentals (Third Edition), Instructor Edition
R 749.80
($)

ELK-EB-94-029SG_rev1.0: SQL Querying–Fundamentals (Third Edition), Student Edition
Organizations typically store their most critical information—the information used to manage day-to-day operations—within a database. The ability to retrieve and analyze this information is essential to the functioning of the organization. Structured Query Language (SQL) is the primary language used to accomplish such tasks. Essentially, SQL is the language you use to interact with a database.
The ability to write SQL is an essential job skill for those who need to manage large volumes of data, produce reports, mine data, or combine data from multiple sources. Even if someone else on your team creates reports for you, having a fundamental understanding of SQL querying will help you ask the right questions and know what you're looking for in your data analysis tools.
This course, SQL Querying: Fundamentals (Third Edition), will teach you to use SQL as a tool to retrieve the information you need from databases.SQL Querying–Fundamentals (Third Edition), Student Edition
R 749.80
($)

QCTO-SP-220330_rev1.0: QCTO SP-220330: Cybersecurity Defender, NQF L4
This qualification will support the recommendations of the Presidential Commission on the 4th Industrial Revolution. This report forefronts human capital and the future of work and refers to growing skills instability. The 4th Industrial Revolution (4IR) is a fusion of advances in artificial intelligence (AI), robotics, process automation, the Internet of Things (IoT), genetic engineering, quantum computing, cyber security, cloud computing and data science. These will bring enormous changes to the world of work in which cybersecurity will play an increasingly pivotal role in the execution of tasks, manufacturing and services.
The COVID pandemic caused a global shift towards remote and hybrid work environments and forced organisations to engage in a huge shift of how the workforce engage in day-to-day work activities. Similarly, the pandemic influenced the cyber threat landscape, creating a cyber pandemic in its wake. Companies are now forced to strengthen their cyber resilience strategy through continuous improvements to cyber security mechanisms. In South Africa the first piece of legislation was promulgated, namely the Cybercrimes Act of 2020, which will have an impact on how Cybersecurity Specialists and Defenders will operate. It is therefore of imperative importance that Cybercrime Defenders are trained and prepared for this demanding work environment.
Currently, as hacking and data breaches increase, the demand for cybersecurity professionals is outpacing the supply. No similar skills programmes that have been approved by the QCTO. Cybercrime has demonstrated that it can have detrimental effects on companies, governments and individuals. Nobody is secure against these malicious attacks; cybercrimes causing loss of data, loss of money and loss of privacy, thus impacting on all levels of society and the economy.
A well-trained Cybersecurity workforce will benefit the full range of possible victims of cybercrime. The sector will benefit by being able to supply the much-needed Cybersecurity Defenders for deployment in the market. Currently, as hacking and data breaches increase, the demand for Cybersecurity professionals is outpacing the supply.
Cybersecurity Defenders are responsible for proactively protecting organisations’ systems from attacks, they are the first line of defence against cyberattacks, the first responders to cybersecurity breaches and are responsible for the hardening of the information systems of organisations ensuring compliance with legislation.
QCTO SP-220330
Cybersecurity Defender, NQF L4

QCTO-SP-220328_rev1.0: QCTO SP-220328: Technopreneur, NQF L4
Technopreneurs a derivative of entrepreneurs is one of the critical and scarce skills identified by the Department of Home Affairs. The MICT SETA has developed 10 4IR qualifications in the ICT sector and embarked on the development of 5 more qualifications. Each of these qualifications creates opportunities for individuals to establish themselves as Technopreneurs.
Socio-economic benefits include possibilities of establishing start-up businesses in any community and encouraging local employment and creating work in local communities.
A Technopreneur will be able to establish, manage and grow a business and create client relationships related to the 4IR skills in order to employ from the local community.
Typical learners include individuals who have a passion to start their own businesses and have the technical skills to enter a niche market and provide in a market need.
No professional registration is needed to operate as a Technopreneur.
QCTO SP-220328
Technopreneur, NQF L4

QCTO-SP-211009_rev1.0: QCTO SP-211009: Workplace Essential Skills, NQF L4
Workplace Essential Skills are the skills needed for work, learning and life. The programme is designed to support apprentices who have experienced difficulties within a company working environment. The purpose of this skills programme is to prepare a learner to operate as an employee and to complete daily tasks and activities at a workplace.
Workplace Essential Skills are used in every industry and at different levels of complexity. They provide the foundation for learning other skills and enable employees to adapt to modern working practices and workplace change. Workplace Essential Skills are the core skills you need to continue learning and to complete daily tasks and activities at work. The typical learners for the skills programme is employed and unemployed South Africans, including those employed or previously employed in low-skilled occupations.
The purpose of this skills programme is to prepare a learner to operate as an employee and to complete daily tasks and activities at a workplace. Workplace Essential Skills are the core skills you need to continue learning and to complete daily tasks and activities at work. Workplace Essential Skills are the skills needed for work, learning and life.
QCTO SP-211009
Workplace Essential Skills, NQF L4

QCTO-SP-240201_rev1.0: QCTO SP-240201: Basic End User Computing, NQF L3
As technology advances, basic computer skills have become essential for most jobs. Employees with these skills can complete tasks more quickly and accurately, increasing overall productivity in the workplace. Basic computer skills help individuals become more efficient in their personal lives, such as managing their finances, communicating with others, and completing daily tasks. It provides a foundation for individuals to build on and develop more advanced technology skills, which can lead to greater opportunities for career and personal life advancement. A workforce with effective computing skills led to increased innovation, productivity and competitiveness, which contribute to overall economic growth.
The Basic End User Computing skills programme will benefit both society and the economy by equipping people with basic skills in using word processing, spreadsheet, and presentation software applications. Basic skills in these software applications can help individuals’ complete tasks more efficiently, which lead to increased productivity in the workplace. Effective use of word processing, spreadsheet, and presentation software can improve communication between individuals and teams, making it easier to share ideas, data, and information. Basic proficiency in these software applications is often a requirement for many jobs, and individuals with these skills may have an easier time finding employment or advancing in their careers. The use of word processing, spreadsheet, and presentation software can help reduce costs associated with printing, copying, and distributing physical documents. Basic skills in these software applications can help individuals and teams become more creative and innovative in their work, leading to new ideas and solutions. A workforce with strong skills in these software applications can help businesses remain competitive by improving efficiency, communication, and productivity. Effective use of these software applications can make it easier to access, analyse, and share data and information, which can have positive impacts on decision-making processes.
Basic End- User Computing skills programme will benefit learners by equipping them with essential computer skills, including how to use common software applications, create and manage documents, use email and the internet, and maintain data security. These skills are becoming increasingly necessary in today's digital world. The skills improve learners’ employability, job performance, enhance personal productivity and enable learners to engage more effectively with technology.
The purpose of the skills programme is to build the capacity of a person to function as Basic End User Computing. Basic End User Computing enables learners to handle a range of computing devices safely and effectively managing the interface between the devices, and proficiency in the selection, use and integration of a range of word processing, spreadsheet, and presentation application software to execute basic level tasks.
QCTO SP-240201
Basic End User Computing, NQF L3

QCTO-SP-230375_rev1.0: QCTO SP-230375_Python Programmer, NQF L4
Python programmers will play a pivotal role in establishing a data-driven culture and currently available advanced technology to manipulate these big data and complex datasets.
It is also important to note that there are great opportunities to become self-employed and the entrepreneurial orientated Python Programmers will form new companies (with the employment creation associated to it).
A demand for competent Python programmers exist in any economic sector, e.g. finance, insurance, healthcare, energy, environmental, government, transportation, agriculture and food. International research also confirms the phenomenal growth in the need for qualified programmers, including Python Programmers.
Typical learners include school leavers and persons who want to enter the ICT sector with programming skills. Minimum requirements are a Gr 11 with Maths Lit and English.
No formal registration is required to function as a Python Programmer.
Python Programmers can be employed in developing websites and software, task automation, data analysis, and data visualisation, search engine optimisation, Blockchain, etc.
A Python Programmer will be able to implement solutions to solve real-life problems in an efficient manner applying a knowledge and understanding of the principles of programming with Python and applicable tools.QCTO SP-230375
Python Programmer, NQF L4

(Valid till 31-12-2030)
This COURSE TILE is designed to provide clients with the knowledge and skills necessary to successfully navigate the online bookstore ordering process.
By using THIS COURSE TILE, you will be able to confidently make TEST PURCHASES, understand the ordering and payment procedures, and troubleshoot any potential issues.
Please note that the TEST PURCHASE TILE will contain sample materials for viewing purposes only and is not intended for actual training.
This will allow you to focus on the ordering and payment procedures without the concern of completing a real transaction.
Mastering the Online Bookstore Ordering Process (Valid till 31-12-2030)
R 23.00
($)

CISSP: Certified Information Systems Security Professional (2024): ITPRO TV Videos and Practice Tests
R 2501.25
($)

CompTIA CySA+ (Exam CS0-003): ITPRO TV Videos, Labs and Practice Tests
R 2501.25
($)

This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification. In this course, you will learn how to assess the security posture of an enterprise environment, enabling you to recommend and implement appropriate security solutions. You will delve into the intricacies of monitoring and securing hybrid environments, covering cloud, mobile, and Internet of Things (IoT) technologies. Our expert instructors will guide you through the essential principles of governance, risk, and compliance, ensuring you operate with a keen awareness of applicable regulations and policies. Moreover, you will gain proficiency in identifying, analyzing, and responding to security events and incidents, a crucial skillset in the ever-evolving world of cybersecurity. By the end of this course, you will not only be prepared to ace the CompTIA Security+ certification exam but also be well-equipped to tackle real-world security challenges and secure vital systems and data. Join us on this educational journey, and take the first step toward a fulfilling career in cybersecurity.
CompTIA Security+ (Exam SY0-701): ITPRO TV Videos, Labs and Practice Tests
R 2501.25
($)

This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies. Learners will explore how to troubleshoot various network issues effectively. The course will examine critical aspects of network security necessary to protect against a wide range of threats.
CompTIA Network+ (Exam N10-009): ITPRO TV Videos, Labs and Practice Tests
R 2501.25
($)

CompTIA A+ is the preferred qualifying credential for technical support and IT operational roles. It is about much more than PC repair. Candidates are better prepared to troubleshoot and problem solve. Technicians understand a wide variety of issues ranging from networking and operating systems to mobile devices and security. A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used.
CompTIA A+ Core 1 & 2 (Exams 220-1101, 220-1102): ITPRO TV Videos, Labs and Practice Tests
R 2501.25
($)

The AWS (Amazon Web Services) Cloud Practitioner certification serves as the ideal starting point for technical and non-technical professionals to build expertise in the AWS cloud. This course provides a foundational introduction to AWS's most popular cloud services, including EC2, Lambda, S3, EBS, VPC, and RDS. You'll learn the core concepts of cloud computing and see how billing and pricing strategies can save companies money on their IT infrastructure. The course also explores cloud security and compliance solutions, covering every objective and service listed on the Cloud Practitioner exam objectives Course Learning Objectives: 1) Explain foundational cloud concepts. 2) Use popular AWS services, including EC2, Lambda, S3, EBS, and VPC. 3) Apply fundamental security best practices in AWS. 4) Use pricing models and information resources to manage cloud costs.
AWS Certified Cloud Practitioner (Exam CLF-C02): ITPRO TV Videos, Labs and Practice Tests
R 2501.25
($)

Artificial intelligence (AI) tools can be used in a business setting to create images that are unique, high quality, and cost effective. In response to your written prompt describing what you require in an image, these tools can quickly produce art, illustrations, diagrams, sketches, graphical concepts, and a wide range of other images, enabling you to save time and money designing and developing new graphic concepts, custom images, and product designs.
Prompt Engineering for AI Image Generation, Student Edition
R 220.57
($)

Artificial intelligence (AI) tools can be used in a business setting to create images that are unique, high quality, and cost effective. In response to your written prompt describing what you require in an image, these tools can quickly produce art, illustrations, diagrams, sketches, graphical concepts, and a wide range of other images, enabling you to save time and money designing and developing new graphic concepts, custom images, and product designs.
Prompt Engineering for AI Image Generation, Instructor Edition
R 220.57
($)

Artificial intelligence (AI) tools can be used in a business setting to generate text that is unique, thorough, and highly effective at communication. In response to your written prompt describing what you require, these tools can quickly summarize information, generate ideas, solve problems, participate in conversations, and engage in a wide range of other purposes, enabling you to save time and money designing and developing text-based content. In order to achieve these goals, you must learn how to tell AI tools what you want in the right ways through prompt engineering.
Prompt Engineering for AI Text Generation, Instructor Edition
R 207.00
($)

Artificial intelligence (AI) tools can be used in a business setting to generate text that is unique, thorough, and highly effective at communication. In response to your written prompt describing what you require, these tools can quickly summarize information, generate ideas, solve problems, participate in conversations, and engage in a wide range of other purposes, enabling you to save time and money designing and developing text-based content. In order to achieve these goals, you must learn how to tell AI tools what you want in the right ways through prompt engineering.
Prompt Engineering for AI Text Generation, Student Edition
R 220.57
($)

The Cybersecurity Maturity Model Certification (CMMC) program provides a standard model and process for conducting a conformity assessment of Department of Defense (DoD) suppliers and service providers. Organizations wanting to provide products and services to the DoD will be required to demonstrate their cybersecurity competency and compliance under the CMMC program. A rigorous Assessment Process is used to ensure that the relevant security controls have been effectively implemented and that there is evidence that these controls can be sustained.
This course covers identifying the scope of an Assessment, assessing the CMMC Level 2 practices, and using an established process and workflow to enable efficiencies during an Assessment.
CMMC-Organizational Practices, Instructor Edition
R 2132.10
($)

The Cybersecurity Maturity Model Certification (CMMC) program provides a standard model and process for conducting a conformity assessment of Department of Defense (DoD) suppliers and service providers. Organizations wanting to provide products and services to the DoD will be required to demonstrate their cybersecurity competency and compliance under the CMMC program. A rigorous Assessment Process is used to ensure that the relevant security controls have been effectively implemented and that there is evidence that these controls can be sustained.
This course covers identifying the scope of an Assessment, assessing the CMMC Level 2 practices, and using an established process and workflow to enable efficiencies during an Assessment.
CMMC-Organizational Practices, Student Edition
R 2132.10
($)

The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program.
CMMC-Organizational Foundations, Instructor Edition
R 2132.10
($)

The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program.
CMMC-Organizational Foundations, Student Edition
R 2132.10
($)
Browse by Categories
A variety to choose from