CITO® - CERTIFIED Information Technology Operator

CITO® - CERTIFIED Information Technology Operator

CITP - CERTIFIED INFORMATION TECHNOLOGY OPERATOR

CITO® is a 2-day course designed to teach the competencies required of the modern IT professional working at the operations level in IT. Also known as the IT engineer’s course, CITO® candidates will become instantly productive having gained knowledge and understanding of the demands in today’s IT infrastructures. Their improved capabilities will deliver immediate results, increasing eciency and signicantly reducing the margin of error.

CITO® is aligned with the latest European e-Competence (e-CF) Framework - addressing prociency levels 1 and 2 (Associate & Professional). In 2016, the e-CF became a European standard and was published officially as the European Norm EN 16234-1.

 

Certified IT Operator Course Outline
  • IT Strategy
  • IT Organisation
  • Vendors
  • Project Management
  • Applications
  • Systems Administration
  • Documentaton
  • Service Management
  • Business Continuity Planning
  • Risk 
  • Information Security
  • Technology Trends
  • Quality 

Check out the course outline for a more detailed description of the Certified IT Manager Course.

CITM Learning Benefits

After completion of this CITM course you will be able to:

 

  • Understand the role and importance of Information Technology in the organisation
  • Describe the function of the IT organisation, roles and responsibilities
  • Provide technical input for vendors RFP (Request for Proposal)
  • Cooperate and coordinate with vendors for delivery, maintenance, support and monitoring activities
  • Execute basic projects using principles of project management
  • Deploy applications and understand application life cycle management
  • Identify the options for virtualisation and storage solutions
  • Create, publish and maintain documentation
  • Operate incident and event management and request fullment
  • Identify risk and understand the principles of risk management
  • Design, implement and operate security logging
  • Understand the principles of information security
  • Monitor and report on quality in IT

 

Accreditation

Candidates who successfully pass the exam will receive the ocial ‘Certied InformationTechnology Operator’ certicate. The certication is valid for three years after whichthe candidate needs to re-certify.

The CITO® course material and exam are globally accredited by EXIN. EXIN is a world leading provider of independent certication and accreditation in the IT and data centre sectors. EXIN is ISO-certified (ISO 9001:2008). Operating Exam Certication exams are administered at the end of the last training day by an authorised training partner.

  • 60-minute closed-book exam
  • 40 multiple-choice questions.
  • The candidate requires a minimum of 26 correct answers to pass the exam. 
IT strategy
  • The need for IT
  • IT strategy and key objectives
  • IT services and service catalogue
  • IT and data centre infrastructure
IT Organization
  • IT organization
  • Data centre operations
  • IT operations
  • Data centre roles
  • IT operations roles
Vendors
  • Vendor selection
  • Technical coverage and due diligence of RFP
  • Place an receive orders
  • Verifying deliveries
  • Invoice verification
  • Maintenance
  • Support
  • Monitoring and reporting
Project Management
  • Project management methods
  • Business case
  • Project constraints
  • Scope
  • Time
  • Cost
  • Monitor and control
  • Change request
  • Closing
Applications
  • Application Programming Interface (API)
  • Software Development Life Cycle (SDLC)
  • DevOps
  • Design
  • Development
  • Testing
  • Deployment
System Administration
  • Server hardware/administration
  • Storage
  • Virtualisation
  • Database administration
  • Network essentials
Documentation
  • Documentation guidelines
  • Lifecycle of documents
  • Types of documents
  • Document categories
Service Management
  • Service desk
  • Event management
  • Request fullment
  • Incident management
Risk
  • Guidelines
  • Assets
  • Threats
  • Vulnerabilities
  • Existing controls
  • Consequences
  • Risk analysis
  • Risk evaluation
  • Risk treatment
Information Security
  • Standards and guidelines
  • Confidentiality
  • Integrity
  • Availability
  • Administrative controls
  • Physical controls
  • Technical (logical) controls
  • Security logging
Technology Trends
  • Cloud computing
  • Big Data
  • Internet of Things (IoT)
  • Social media
  • Mobile applications
  • Bring Your Own Device (BYOD)
Quality
  • Quality control
  • Quality assurance
  • Metrics
  • Key Performance Indicators (KPIs)
  • Gold EPI Training Partner 
  • KHDA Accredited Training Partner
Related Courses