|
|
ÃÏæÇÊ ÇáãæÖæÚ | ÇäæÇÚ ÚÑÖ ÇáãæÖæÚ |
#1
|
||||||
|
||||||
![]()
ÈÓã Çááå ÇáÑÍãä ÇáÑÍíã íÊÔÑÝ ãÑßÒ ÇáÎáíÌ ááÊÏÑíÈ Çä íÞÏã ÏæÑÇÊ ÊÏÑÈíå 2019: ááÇÓÊÝÓÇÑ æãÚÑÝÉ ÇáãÒíÏ Úä ÇáÎØå ÇáÊÏÑíÈíÈå Ýí åÐÇ ÇáãÌÇá íÑÌí ÇáÊæÇÕá ÚÈÑ ÇáÈÑíÏ ÇáÇáßÊÑæäí ÇæÚÈÑ ÇáåÇÊÝ ÇáÊÇáí : Mr. Mohamed Abdelhay Mobile: 00201281305654 Fax: 002035917861 E-mail:m.abd@traininggulf.com| Web Site:www.traininggulf.com åäÏÓÉ ÇáÃÊÕÇáÇÊ æÊÞäíÉ ÇáãÚáæãÇÊ íäÇíÑ "ÇáãåÇÑÇÊ ÇáÊÞäíÉ ÇáÍÏíËÉ Ýí ÇáãÚíÇÑ ÇáÇãäí ÇáÚÇáãíISO áÇãä ÇáãÚáæãÇÊ æÔÈßÇÊ ÇáÍÇÓÈ Modern technical skills in the global security standard ISO for information security and computer networks" "Ããä æÅÏÇÑÉ ÇáÓÍÇÈÉ : ÃÝÖá ÇáãÈÇÏÆ æÇáÊØÈíÞÇÊ Cloud Management and Security: best Principles and Practice" "ÅÏÇÑÉ ÇáÈäíÉ ÇáÊÍÊíÉ ááÔÈßÇÊ Network infrastructure management" "ÊÕãíã æÈÑãÌÉ ãæÇÞÚ ÇáÇäÊÑäÊ Design and programming of Internet sites" "ÊÕãíãAdobe After Effects(ãÓÊæì ãÊÞÏã) Design Adobe after Effect (Advanced Level)" ÝÈÑÇíÑ "ÇáÌäÇÆíÇÊ æÇáÊÍÞíÞÇÊ ÇáÑÞãíÉ Digital Forensics and Cyber Investigations" "ÅÏÇÑÉ ÇáãßÊÈÇÊ æãÑÇßÒ ÇáãÚáæãÇÊ ÅáßÊÑæäíÇð Management of libraries and electronic information centers" "ãÍÊÑÝ ÊÍÌíã ÅØÇÑ ÓßÑã(™SPS) Scaled Professional Scrum (SPS™)" "ÊÍáíá æÊÕãíã æÅäÔÇÁ äÙã ÇáãÚáæãÇÊ ÇáãÓÇäÏÉ ááÅÏÇÑÉ Analysis, design and establishment of information systems supporting management" "ãåÇÑÇÊ ÇáÍÏíËÉ áÅÏÇÑÉ ÇáÔÈßÇÊ Modern networking skills " ãÇÑÓ "ÇáÅÏÇÑÉ ÇáÝÚøÇáÉ áãÔÇÑíÚ ÊÞäíÉ ÇáãÚáæãÇÊ Effective management of IT projects" " ÍãÇíÉ äÙÇã ÇáÊÔÛíá áíäßÓLinux Operating system Protection - Linux" "ÊØæíÑ ÊØÈíÞÇÊ ÇáæíÈ -ãÓÊæí ãÊÞÏã Web Application Development (Advanced Level)" " 3ds Max -ãÓÊæí ãÊÞÏã 3ds Max-Advanced level" "ÇÌÑÇÁ ÇáÊÏÞíÞ æßÔÝ ÇáÇÍÊíÇá ÈÇÓÊÎÏÇã ÊßäæáæÌíÇ ÇáãÚáæãÇÊ Auditing and detecting fraud by using information technology" ÃÈÑíá "ÏæÑÉ ÇáÌÇÝÇ ÇáãÊÞÏãÉ Advanced Java Programming" "ÃÓÇÓíÇÊ ÇÍÊÑÇÝ ÓßÑã(™PSF) Professional Scrum Foundations (PSF™)" "ÇáãÚíÇÑ ÇáÇãäí ÇáÚÇáãí CISSP-CISA áÇãä ÇáãÚáæãÇÊ Global security standard CISSP-CISA for information security " "ãÎÇØÑ ÈÑãÌíÇÊ ÇÏÇÑÉ Çãä ÇáãÚáæãÇÊ Information Security Management software risks" " Ããä ÇáÔÈßÇÊ ÇááÇÓáßíÉ wireless security" ãÇíæ "åäÏÓÉ ÇáÔÈßÇÊMCSE Network engineering MCSE" " ÇáÃãä ÇáÑÞãí Digital Security" íæäíæ "ÅÏÇÑÉ ãÑÇßÒ ÇáãÚáæãÇÊ æäÙÜã ÏÚã ÇáÞÜÑÇÑ Information centers management and decision support systems" "ÇáÊÍæøá ÇáÑÞãí æÅÏÇÑÉ ÇáãáÝÇÊ Digital transformation and file management" "ÃÓÇÓíÇÊ ÈÑäÇãÌ ÇáãÇÊáÇÈ MATLAB Basics" "ÇÓÊÑÇÊíÌíÇÊ æÊßÊíßÇÊ ÇáÍßæãÉ ÇáÅáßÊÑæäíÉ Ýì Ùá ãäåÌíÉ ÇáÌæÏÉ ÇáÔÇãáÉ Strategies and tactics of e-government in light of the Total quality methodology" íæáíæ "ÇÏÇÑÉ äÙã ÇáãÚáæãÇÊ æÝÞ ÇáãäåÌ ÇáÈÑíØÇäíInfrastructure Library- ITIL Information Technology Infrastructure Library - ITIL" "ÍãÇíÉ ÇáäÙã æÇáÔÈßÇÊ Protection of systems and networks" "ÖæÇÈØ ÊÞäíÉ ÇáãÚáæãÇÊ æÇáÊÞäíÇÊ ÇáãÊÚáÞÉ ÈåÇCobit foundation Control Objectives for Information and Related Technologies (Cobit foundation)" "ÊØÈíÞ ÃäÙãÉ ÇáÌæÏÉ ÇáÔÇãáÉ Ýí ÅÏÇÑÉ ÊÞäíÉ ÇáãÚáæãÇÊISO20 000 Applying of total quality systems in IT management ISO20 000" "ÃÓÇÓíÇÊ ÊÞäíÉ ÇáãÚáæãÇÊ Information Technology Basics" ÃÛÓØÓ "ÊÕãíã ÇáæíÈ ãÚCSS Web design with CSS" "ÇáÊÚÇãá ãÚ ÞæÇÚÏ ÇáÈíÇäÇÊ æÇáæÕæá ÇáÓÑíÚ ÚÈÑ ÇáÅäÊÑäÊAccess 2007 Dealing with databases and fast Internet access- Access 2007" "ÔåÇÏÉ Ýí ÊÍáíá ÇáÈíÇäÇÊ ÇáÖÎãÉ Certificate in Massive data Analysis " " ÇáÇÎÊÑÇÞ ÇáãÚáæãÇÊí ÇáãÔÑæÚ¡ æÇáãÕÑÍ Èå valid and authorized information penetration" "ITIL® Foundation áÅÏÇÑÉ ÎÏãÇÊ ÊßäæáæÌíÇ ÇáãÚáæãÇÊ ITIL® Foundation for IT Services Management" ÓÈÊãÈÑ "ÅÏÇÑÉ æÊØæíÑ ÇáãæÇÞÚ Úáì ÇáÅäÊÑäÊ ÈÇÓÊÎÏÇã ÍÒãÉNET Manage and develop websites using NET Framework" "ÊÕãíã ÇáãæÇÞÚ ÈÃÓÊÎÏÇã ãÇßÑæãíÏíÇ ÏÑíã æíÝÑý Web Design using Macromedia Dreamweaver " "ÔåÇÏÉ Ýí ãÌÇá ÊÎØíØ ÇáÊÚÇÝí ãä ßæÇÑË ÊßäæáæÌíÇ ÇáãÚáæãÇÊ Certificate in planning recovery from IT disasters" "ÅÓÊÑÇÊíÌíÉ Ããä ÇáæËÇÆÞ æÇáãÚáæãÇÊ ÇáÅáßÊÑæäíÉ Security strategy of documents and e-information" " ÇÏÇÑÉ ÇáãÚÑÝå æ ÇáÇÏÇÑÉ ÇáÇáßÊÑæäíå æÊÍÏíÇÊåãÇ Knowledge management, Electronic management and their Challenges" ÃßÊæÈÑ "ãæÌåÇÊ ÊÔÛíá ÔÈßÇÊ ÌæäíÈÑ Ýí ÇáãÄÓÓÇÊ(OJRE) Operating Juniper Networks Routers in the Enterprise (OJRE)" VISUAL BASIC "áÛÉ ÇáÇÓÊÚáÇã ÇáåíßáíÉSQL Structured Query Language (SQL)" "äÙã ÇáãÚáæãÇÊ ÇáÅÏÇÑíÉ ÇáãÚÊãÏÉ Úáì ÊßäæáæÌíÇ ÇáÍÇÓÈÇÊ Computer based Management information systems" "ÇáÇÊÕÇáÇÊ æÇäÙãÉ ÇáÇÊÕÇáÇÊ æÊÞäíÉ ÇáãÚáæãÇÊ Communication systems and Communications and Information Technique" äæÝãÈÑ "ÅÏÇÑÉ ãÄÓÓÇÊ ÇáãÚáæãÇÊ Ýí Ùá ÈíÆÇÊ ÇáæíÈ ÇáãÊÛíÑÉ Information institutions management in light of the changing Web environments" "ÇáãÝÇåíã ÇáãÊÞÏãÉ Ýì ßíÝíÉ ÊÈÇÏá ÇáÈíÇäÇÊ ÇáßÊÑæäíÇEDI Advanced concepts for Electronic Data Interchange EDI" "ÇÓÊÎÏÇã ÊßäæáæÌíÇ ÇáãÚáæãÇÊ æÔÈßÇÊ ÇáÇÊÕÇáÇÊ Ýí ÊäÙíã æÅÏÇÑÉ ÇáãßÊÈÇÊ Use of information and communications technology networks in the organization and management of libraries" "ÇáÏÚã ÇáÝäí æ ÊÕãíã æÅÏÇÑÉ Çãä ÇáÔÈßÇÊ æÊÃãíäåÇ ÖÏ ÇáÇÎÊÑÇÞ Technical support, and design and management of network security and secure it against penetration" "ÇáÊãíÒ æÇáÅÈÏÇÚ Ýí ÅÏÇÑÇÊ ÇáÏÚã ÇáÝäíHelp Desk Creativity and innovation in technical support departments - Help Desk" ÏíÓãÈÑ "ÇáÅÏÇÑÉ ÇáÅáßÊÑæäíÉ æ ãåÇÑÇÊ ÇáÊÚÇãá ãÚ äÙã ÏÚã ÇáÞÑÇÑ(DSS) æÇáäÙã ÇáÎÈíÑÉ E-management & Skills to deal with decision support systems (DSS) and Expert Systems" "ÃåãíÉ ÇáÊÎØíØ ÇáÇÓÊÑÇÊíÌí Ýí ÅÏÇÑÉ ÃÞÓÇã ÊÞäíÉ ÇáãÚáæãÇÊ The importance of strategic planning in the management of IT departments" "ÇáãåÇÑÇÊ ÇáÝäíÉ æÇáÊÞäíÉ áÅÏÇÑÉ ÇáãæÇÞÚ ÇáÅáßÊÑæäíÉ ÇáÍßæãíÉ Technical skills for managing government websites" "ãåÇÑÇÊ æÊÞäíÇÊ ÇáÈÍË Úä ÇáãÚáæãÇÊ Ýí ÇáãÕÇÏÑ ÇáÑÞãíÉ Skills and techniques to search for information in the digital sources" "ÊØÈíÞÇÊ ÇáÃÑÔÝÉ ÇáÅáßÊÑæäíÉ æÇáÊäÙíã ÇáÅáßÊÑæäí ÇáÝÚÇá ááãÚáæãÇÊ æÇáæËÇÆÞ E-archiving applications and effective electronic organization of information and documents" |
ÃÏæÇÊ ÇáãæÖæÚ | |
ÇäæÇÚ ÚÑÖ ÇáãæÖæÚ | |
|
|