X

Company

SMT is an end-to-end IT solutions provider & well established Company based in Amman-Jordan, providing high-end Consultancy and total Turn-Key solutions in the domain of Information Security and IT Infrastructure across industries.

SMT strong team of highly qualified consultants, certified and well-trained technical engineers who are capable of understanding our customers’ needs in order to make sure providing them with right technology and world-class of services surrounding today’s
IT technology that allow large, mid-sized and smaller companies to maintain and safeguard their business-critical IT operations.

ReadMore

Training

Unix/Linux Advanced Security Training

Certified Ethical Hacker v8

  Course Description CEHV8 comes with some remarkable updates, not just to the content, but to the content delivery systems and tools, making it an invaluable tool for organizations ranging from Fortune 500 companies to the world’s governments, preparing the next generation of cyber warriors to protect their networks like never before. Students can expect a strong focus on advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real time case studies. 100% of the concepts presented in the CEH V8 course are reinforced by hands-on exercises in EC-Councils newest cyber range. In addition CEHV8, is now an ANSI 17024 accredited professional certification. The newly updated CEH contains 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The revamped CEH v8 will contain many enhancements including: core content updates, well-organized content flow, diagrammatic representation of concepts and attacks showcasing the latest hacking techniques, pentesting components, updated labs and courseware and popular hacking and security tools videos. Here are a few of the latest advancements the CEH v8 will address and focus on: CEH v8 program focuses on addressing security issues to the latest operating systems including Windows 8 and Windows Server 2012It also focuses on addressing the existing threats to operating environments dominated by Windows 7 and other operating systems (backward compatibility)CEH v8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructureCoverage of latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5 The goal of this course is to help students master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are in high demand, as well as the internationally recognized Certified Ethical Hacker v8 certification! Who Should Attend                                                   Download CEH v8 Brochure Security Officers  Auditors Network Administrators Firewall Administrators Security ProfessionalsAnyone who is concerned about the integrity of the network infrastructure Prerequisites Strong knowledge of TCP/IPInformation systems and security backgroundMinimum of 12 months of experience in networking technologies Exam Info Number of Questions: 125Passing Score: 70%Test Duration: 4 HoursTest Format: Multiple ChoiceTest Delivery: Prime Prometric (IBT), VUE, and APTC Duration 5 days (8hours/day) or 15 days (3hours/day)  Course Outline Version V8 CEHv8 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class. Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Platforms Evading IDS, Firewalls and Honeypots Buffer Overflows Cryptography Penetration Testing Career Track & Roles Network Administrator Systems Administrator Systems Engineer Systems Architect Network Security Specialist

Certified Ethical Hacker v8

Computer Hacking Forensic Investigation v8

Course Description The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. Who Should Attend Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers Prerequisites It is strongly recommended that you attend the CEH class before enrolling into CHFI program. Duration 5 days (9:00 – 5:00) Certification The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.   Download CHFI Brochure

Computer Hacking Forensic Investigation v8

EC Council Certified Security Analyst

Introduction to the Premier Pen Testing Information Security Certification (Advanced Ethical Hacking)   EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker  certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these  tools  and  technologies. Through groundbreaking network penetration testing training methods and techniques, this pen testing computer security  certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.       ECSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Greater industry acceptance as seasoned security professional. Learn to analyze the outcomes from using security tools and security testing techniques. Requirement for the LPT certification. Students will be prepared for EC-Council’s ECSA exam 412-79 on the last day of the class. This certification is also pre-requisite to EC-Council’s Licensed Penetration Tester Program.     Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.   Download ECSA Brochure

EC Council Certified Security Analyst

Redhat Administrator I

  RED Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. This course focuses on essential administration tasks that will be encountered in the workplace, including installing the operating system, establishing network connectivity, managing physical storage, and performing basic security administration Audience a foundation for students planning to continue to Red Hat System Administration II with the goal of becoming full-time Linux system administrators.. Early in the course, GUI-based tools will be featured to build upon the students' existing technical knowledge. As the course progresses, key command line concepts will be introduced to provide a foundation for students planning to continue to Red Hat System Administration II with the goal of becoming full-time Linux system administrators. Requirement Previous operating system administration experience is beneficial. IT professionals and system administrators, including Windows and network administrators who need to gain a core level of proficiency with Linux administrationNon-Linux IT professionals on the path to becoming full-time Linux system administrators.     Outline: Unit 1: Get Started with the GNOME Graphical DesktopObjective: Get started with GNOME and edit text files with g edit Unit 2: Manage Files Graphically with NautilusObjective: Manage files graphically and access remote systems with Nautilus Unit 3: Get Help in a Graphical EnvironmentObjective: Access documentation, both locally and on-line Unit 4: Configure Local ServicesObjective: Configure the date and time and configure a printer Unit 5: Manage Physical Storage IObjective: Understand basic disk concepts and manage system disks Unit 6: Manage Logical VolumesObjective: Understand logical volume concepts and manage logical volumes Unit 7: Monitor System ResourcesObjective: Manage CPU, memory, and disk utilization Unit 8: Manage System Software Objective: Manage system software locally and using Red Hat Network (RHN) Unit 9: Get Started with BashObjective: Understand basic shell concepts, execute simple commands, and use basic job control techniques Unit 10: Get Help in a Textual EnvironmentObjective: Use man and info pages and find documentation in /usr/share/doc Unit 11: Establish Network ConnectivityObjective: Understand basic network concepts; configure, manage, and test network settings Unit 12: Administer Users and GroupsObjective: Manage users and groups Unit 13: Manage Files from the Command LineObjective: Understand Linux file system hierarchy and pathnames; manage files from the command line Unit 14: Secure Linux File AccessObjective: Understand Linux file access mechanisms; manage file access from the GUI and the command line Unit 15: Administer Remote SystemsObjective: Share and connect to a desktop; use SSH and r sync Unit 16: Configure General ServicesObjective: Manage services; configure SSH and remote desktops Unit 17: Manage Physical Storage IIObjective: Manage file system attributes and swap space Unit 18: Install Linux GraphicallyObjective: Install Red Hat Enterprise Linux and configure the system with first-boot Unit 19: Manage Virtual MachinesObjective: Understand basic Virtualization concepts; install and manage virtual machines Unit 20: Control the Boot ProcessObjective: Understand run levels and manage GRUB Unit 21: Deploy File Sharing ServicesObjective: Deploy an FTP server and a web server Unit 22: Secure Network ServicesObjective: Manage a firewall; understand SELinux concepts and manage SELinux Unit 23: Comprehensive ReviewObjective: Get a hands-on review of the concepts covered in this course

Redhat Administrator I

Redhat Administrator II

A follow up course for students that have completed Red Hat System Administration I (RH124), Red Hat System Administration II with RHCSA Exam (RH135) is designed for IT professionals working to become full-time enterprise Linux system administrators. Building on the foundation of command line skills covered in System Administration I, students will dive deeper into Red Hat Enterprise Linux to broaden their toolkits of administration skills. By the end of this course, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, and package management. Students who attend Red Hat System Administration I & II will be fully prepared to take the Red Hat Certified System Administration (RHCSA) exam. AudienceIT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators or earn RHCSA certifications PrerequisitesRed Hat System Administration I (RH124) Course Outline Unit 1: Automated Installations of Red Hat Enterprise LinuxObjectives: Create and manage kick start configuration files; perform installations using kick start. Unit 2: Accessing the Command LineObjectives: Access the command line locally and remotely; gain administrative privileges from the command line. Unit 3: Intermediate Command Line ToolsObjectives: Use hard links, archives and compression, and vim. Unit 4: Regular Expressions, Pipelines, and I/O RedirectionObjectives: Use regular expressions to search patterns in files and output; redirect and pipe output. Unit 5: Network Configuration and TroubleshootingObjectives: Configure network settings; troubleshoot network issues. Unit 6: Managing Simple Partitions and File systemsObjectives: Create and format simple partitions, swap partitions, and encrypted partitions. Unit 7: Managing Flexible Storage with the Logical Volume Manager (LVM)Objectives: Implement LVM and LVM snapshots. Unit 8: Access Network File Sharing Services; NFS and CIFSObjectives: Implement NFS, CIFS, and autofs. Unit 9: Managing User AccountsObjectives: Manage user accounts including password aging. Unit 10: Network User Accounts with LDAPObjectives: Connect to a central LDAP directory service. Unit 11: Controlling Access to FilesObjectives: Manage group memberships, file permissions, and access control lists (ACL). Unit 12: Managing SELinuxObjectives: Activate and deactivate SELinux; set file contexts; manage SELinux booleans; analyze SELinux logs. Unit 13: Installing and Managing SoftwareObjectives: Manage software and query information with yum; configure client-side yum repository files. Unit 14: Managing Installed ServicesObjectives: Managing services; verify connectivity to a service. Unit 15: Analyzing and Storing LogsObjectives: Managing logs with rsyslog and log rotate. Unit 16: Managing ProcessesObjectives: Identify and terminate processes, change the priority of a process, and use crone and at to schedule processes. Unit 17: Tuning and Maintaining the KernelObjectives: List, load, and remove modules; use kernel arguments. Unit 18: System Recovery TechniquesObjectives: Understand the boot process and resolve boot problems.

Redhat Administrator II

Redhat Administrator III

Course Description Red Hat System Administration III with RHCSA and RHCE Exams (RH255) is designed for experienced Linux administrators who require networking and security administration skills. With a heavy emphasis on practical, hands-on labs, this course is tightly aligned with experienced Linux administrators' job tasks and the skills required for advancement. Focus is placed on enhancing the students' automation skills to securely configure, deploy and manage network services including DNS, Apache, SMTP, and network file sharing. In addition, this course emphasizes security, including monitoring, packet filtering, access controls, and SELinux. At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This class includes the RHCSA and the RHCE exams. AudienceSenior Linux system administrators who require networking and security administration skillsLinux IT professionals who currently have RHCT/RHCSA certification, and are interested in earning an RHCE certificationLinux IT professionals that can demonstrate the competencies needed to earn an RHCT/RHCSA, but have not passed the RHCSA exam provided with the Red Hat System Administration II coursePrerequisitesRHCSA Rapid Track Course (RH200) or Red Hat System Administration I & IIEquivalent experience to the RHCSA Rapid Track CourseSkills required to earn an RHCT/RHCSA certification Duration5 daysCourse ContentEnhancing user securityDisk management with iSCSISystem and network activity monitoringNetwork management and packet filteringSoftware managementWeb service managementFile sharing across platformsBasic SMTP managementCourse OutlineUnit 1: Getting Started with the Classroom EnvironmentObjective: Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Unit 2: Enhance User SecurityObjective: Configure system to use Kerberos to verify credentials and grant privileges via sudo Unit 3: Bash Scripting and ToolsObjective: Automate system administration tasks utilizing Bash scripts and text-based tools Unit 4: File Security with GnuPGObjective: Secure files with GnuPG Unit 5: Software ManagementObjective: Use yum plugins to manage packages; understand the design of packages; build a simple package Unit 6: Network MonitoringObjective: Profile running services, then capture and analyze network traffic Unit 7: Route Network TrafficObjective: Configure system to route traffic and customize network parameters with sysctl Unit 8: Secure Network TrafficObjective: Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) Unit 9: NTP Server ConfigurationObjective: Configure an NTP server Unit 10: System Monitoring and LogsObjective: Manage local file system integrity; monitor systems over time and system logging Unit 11: Centralized and Secure StorageObjective: Access centralized storage (iSCSI) and encrypt filesystems Unit 12: SSL-encapsulated Web ServicesObjective: Understand SSL certificates and deploy an SSL-encapsulated web service Unit 13: Web Server Additional ConfigurationObjective: Configure a web server with virtual hosts, dynamic content, and authenticated directories Unit 14: Basic SMTP ConfigurationObjective: Configure an SMTP server for basic operation (null client, receiving mail, smart-host relay) Unit 15: Caching-Only DNS ServerObjective: Understand DNS resource records and configure a caching-only name server Unit 16: File Sharing with NFSObjective: Configure file sharing between hosts with NFS Unit 17: File Sharing with CIFSObjective: Configure file and print sharing between hosts with CIFS Unit 18: File Sharing with FTPObjective: Configure file sharing with anonymous FTP Unit 19: Troubleshooting Boot ProcessObjective: Understand the boot process and recover unbootable systems with rescue mode

 Redhat Administrator III

RedHat Enterprise Virtualization

The EX318 Red Hat Certified Virtualization Administrator (RHCVA) exam continues the Red Hat tradition of benchmarking the skills of IT professionals through hands-on skills assessments. Individuals who earn the RHCVA credential have demonstrated the skills and knowledge to create, deploy, and manage Linux and Microsoft Windows virtual machines hosted on either Red Hat Enterprise Linux servers or dedicated hyper-visor nodes using Red Hat Enterprise Virtualization Manager. An RHCVA credential assures enterprises that their virtualization solutions are administered optimally and establishes credibility for service providers. AudienceExperienced system administrators who are preparing to adopt and deploy Red Hat Enterprise Virtualization to a large number of servers or virtual machinesIT professionals who are evaluating a migration from other virtualization technologies and want to fully understand what skills are needed to administer Red Hat Enterprise Virtualization technologySystem administrators whose jobs include managing virtual environmentsPrerequisitesExperience using Red Hat Enterprise Virtualization Manager and Hyper-visorExperience using and installing software on Microsoft WindowsExperience using VNC to view remote desktops Duration 4 days Exam overviewPerformance-based, meaning that candidates must perform tasks on live systems, rather than answering questions about how one might perform those tasksExam results are emailed within five business days following the exam Course description Red Hat Enterprise Virtualization offers customers a complete set of virtualization solutions that allows the entire spectrum of enterprise workloads to run on one common infrastructure. To help system administrators deploy and manage their virtual environment, Red Hat offers its Red Hat Enterprise Virtualization (RH318) course. Red Hat Enterprise Virtualization (RH318) is an extensive hands-on training course that explores the virtualization features of Red Hat Enterprise Linux with the advanced Red Hat Enterprise Virtualization platform. Students acquire the skills and knowledge to deploy and centrally manage virtual servers and virtual desktops in the enterprise. Upon completion of RH318, students will have the skills and knowledge to effectively create, deploy, manage, and migrate Linux and Microsoft® Windows® virtual machines hosted on either RHEV Hyper-visor or Red Hat Enterprise Linux servers dedicated nodes using RHEV Manager. AudienceExperienced Linux system administrators responsible for managing enterprise servers who are interested in learning how to manage large numbers of servers or virtual machines using Red Hat Enterprise Virtualization.PrerequisitesIT professionals who have earned either Red Hat Certified Technician (RHCT),Red Hat Certified System Administrator (RHCSA), or maintain the equivalent experience with Linux.System administration experience on Microsoft Windows® operating systems is beneficial, but is not necessary for this course.

 RedHat Enterprise Virtualization

Solutions

Our high-end security solutions combined with unique experience in the security industry make our customers’ hybrid IT environment more secure and giving organizations more control to their network and data security

Services

The department of high-end professional services is specialized in complex services for small, medium and enterprise markets. Today, SMT's professional services department has not only a national, but a regional and European recognition being involved in multiple cross-border infrastructure projects.

Value Added Services

Professional Services Department

The department of high-end professional services is specialized in complex services for small, medium and enterprise markets. Today, SMT's professional services department has not only a national, but a regional and European recognition being involved in multiple cross-border infrastructure projects.

Professional Services Department – Business Impact:

  • * Reduction in operating costs, Lower capital expenditure. More certainty about costs
  • * Improve service levels
  • * Raise customer satisfaction, Retain customers, Winning new customers
  • * Extracting more value from customers
  • * Developing new products and services Launch services and products fast
  • * Facilitate strategic decisions in your business plan development

               

  • * Out-maneuver the competition, through offering faster response times and a more accurate service
  • * Meet SLA commitments to the rest of the business
  • * Offer answers to needs of visibility of how the operation is performing
  • * Linking the Contact Center to the core of the business
  • * Monitor the sequence of responses to client queries
  • * Empower your clients with a responsive, flexible solution

 

Managed Services

A new feature is available for our clients
The Help Desk service. This is accessible by phone, fax, e-mail or web and includes SLA management, operational support, data recovery, technical documentation, on-line services and support programmers (where applicable).

NOC (Network Operations Center) provides remote monitoring and reporting. Using a proactive work-flow algorithm it integrates data on the customer’s network events with Help-Desk services and Technical Support Team or Technical Mobile Team (TMT).

ReadMore

Contact Us

Using the contact form to send us email at below

Keep in touch with us

You can use the following information to contact us if you wanna join us or anything need to communicate.

Name: SMT & SMT Center
Telephone: +962-6-537-400-1
Fax: +962-6-537-400-2
email: info[at]smt-center.com
Address: Bl, nr 1 (Boz Center), 3rd floor, Thabet Ben Dinar Str, KhaldaP.O BOX 2166, Amman 11821 Jordan