+971 2 654 4043
contact@tadafur.com

Enquire Now

Register Now

This course teaches the fundamental concepts and basic functions of a GIS, the properties of GIS maps, and the structure of a GIS database. In course exercises, participants will develop basic software skills by working with ArcGIS Desktop 10.0 tools to visualize geographic data, create maps, query a GIS database, and analyze data using common analysis tools.

The course takes a 360 degrees approach to the operations of e-Government infrastructure and covers related processes, people, technology and governance issues.

Enquire Now

Register Now

  • Public officials with no prior experience in GIS
  • Managers and GIS support staff

Enquire Now

Register Now

Session 1

  • Overview of GIS
  • Components of a GIS map
    • Features and layers
    • Map scale
  • Exploring a GIS database
    • Attribute tables
    • Relationship between features and attributes
    • Symbolizing and labeling features based on their attributes
  • Map layouts
    • Data view and layout view
    • Layout tools
    • Map elements
    • Exporting a map layout
  • Understanding location
    • Location systems for maps and globes
    • Map projections
    • Finding location coordinates on a map
    • Measuring area and distance on a map

Session 2

  • Raster data and vector data
    • Representing real-world features
    • The geodatabase
  • Geographic data
    • Tabular data
    • Working with Item Description to explore geographic data
  • Querying data
    • Attribute queries
    • Location queries
  • Analyzing spatial relationships
    • Buffering features
    • Overlaying features
  • Solving problems with GIS
    • GIS analysis process
    • Applying GIS tools to analyze a geographic problem
    • Creating a map layout to present results

Enquire Now

Register Now

After completing this course, the participants will:

  • develop a good understanding of potential damage that can be caused by cyber attacks
  • Differentiate between different types of cyber threats, motives and implications
  • Assess the current level of security in their organizations
  • Learn practices they should avoid
  • Learn the necessary components of frameworks that guarantees a high level of security

Enquire Now

Register Now

Start Dates Duration Location
 –  –  –