Course Information
Course Name
CITO: Certified IT Operator
Exam code
CITO
Duration
2 Days
Certification
Certified IT Operator
Overview
CITO® is the first level in the EPI IT Training Framework©. CITO® is a 2-day course designed to teach the competencies required of the modern IT professional working at the operations level in IT. Also known as the IT engineer’s course, CITO® candidates will become instantly productive having gained knowledge and understanding of the demands in today’s IT infrastructures. Their improved capabilities will deliver immediate results, increasing efficiency and significantly reducing the margin of error.
CITO® is aligned with the latest European e-Competence (e-CF) Framework – addressing proficiency levels 1 and 2 (Associate & Professional). In 2016, the e-CF became a European standard and was published officially as the European Norm EN 16234-1.
Exam: Certified IT Operator (CITO®)
The CITO® exam is a 60-minute closed book exam, with 40 multiple-choice questions. The candidate requires a minimum of 26 correct answers to pass the exam.
Attendees passing the exam will be awarded the internationally accredited and recognized ‘Certified IT Operator’ certificate (CITO®). The CITO® certificate is valid for 3 years, after which recertification is required.
Audience Profile
System administrators/engineers, service desk operators/agents, network administrators/engineers, software developers/engineers, account managers.
This course is most suited for aspiring and existing IT professionals from entry level up to two years of actual working experience in IT, with basic knowledge of (operating) systems, network and/or applications, and service desk operations. It is also suited for people who are changing careers and entering the IT professional world.
Prerequisites
This course is most suited for aspiring and existing IT professionals from entry level up to two years of actual working experience in IT, with basic knowledge of (operating) systems, network and/or applications, and service desk operations. It is also suited for people who are changing careers and entering the IT professional world.
At Course Completion
After completion of the course, the participant will be able to:
Understand the role and importance of Information Technology in the organisation
Describe the function of the IT organisation, roles and responsibilities
Provide technical input for vendors RFP (Request for Proposal)
Cooperate and coordinate with vendors for delivery, maintenance, support and monitoring activities
Execute basic projects using principles of project management
Deploy applications and understand application life cycle management
Identify the options for virtualisation and storage solutions
Create, publish and maintain documentation
Operate incident and event management and request fulfilment
Identify risk and understand the principles of risk management
Design, implement and operate security logging
Understand the principles of information security
Monitor and report on quality in IT
Course Outline
Module 1: IT Strategy
The need for Information Technology
IT strategy and key objectives of IT
IT services and service catalogue
IT infrastructure and Data Centre
Module 2: IT Organisation
IT organisation
Data centre operations
IT operations
Data centre roles
IT operations roles
Module 3: Vendor
Vendor selection
Technical coverage and due diligence of RFP
Place and receive orders
Verifying deliveries
Invoice verification
Maintenance
Support
Monitoring and reporting
Module 4: Project Management
Project management methods
Business case
Project constraints
Scope
Time
Cost
Monitor and control
Change request
Closing
Module 5: Application
Application program and API’s
Software Development Life Cycle (SDLC)
DevOps
Design
Development
Testing
Deployment
Module 6: System Administration
Server hardware / server administration
Storage
Virtualisation
Database administration
Network fundamentals
Module 7: Documentation
Importance of document management
Documentation guidelines
Documentation lifecycle
Types of documents
Document categories
Content Management System (CMS)
Module 8: Service Management
Service desk
Event management
Request fulfilment
Incident management
Module 9: Risk
Assets
Threats
Vulnerabilities
Existing controls
Consequences
Risk analysis
Risk evaluation
Risk treatment
Module 10: Information Security
Standards and guidelines
Confidentiality
Integrity
Availability
Administrative controls
Physical controls
Technical (logical) controls
Security logging
Module 11: Technology Trends
Cloud computing
Big Data
Internet of Things (IoT)
Social media
Mobile applications
Bring Your Own Device (BYOD)
Module 12: Quality
Quality control
Quality assurance
Quality metrics
Key Performance Indicators (KPIs)
All EPI certification courses are conducted by certified trainers from Iverson.
Digital Methods acts as the official training partner and assists with program consultation, registration, coordination, scheduling, and administrative arrangements to ensure a seamless and professionally managed training experience.