Vendor Cancel filter
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Advanced Negotiation Training
You'll participate in 4 advanced negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll boost your skill to think about negotiation strategically.
EC-Council Certified Security Analyst
The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
An Introduction OpenStack
By the end of this course, learners will able to describe how to create and manage private and public clouds with OpenStack including Deployment, administration and use the core OpenStack services.
Linux Virtualization with KVM
By the end of this course, Learners will understand how the Linux Kernel, QEMU, libvirt and other related open source components can be assembled to create a virtual IT infrastructure, develop practical deployment ...
Neutron The OpenStack Networking Service
At the end of the course, Learners should be able to: Understand the OpenStack networking components and how they work together Understand the architecture of an OpenStack based network Troubleshoot an OpenStack ...
Application Portfolio Management (APM)
Management of the application portfolio may bring significant savings. We will explain how to manage your portfolio, what to look for and how to avoid failures..
Cryptosession: Introduction to cryptography
Introduce participants to the basics of cryptography Clarify relationships and principles for this important field Show limitations of individual mechanisms in terms of speed and architecture Alert on basic problems ...
Cryptosession: Cryptography in SSL/TLS
To secure the confidentiality and authenticity of transmitted information, the term SSL / TLS is most commonly used in the Internet environment. It is a layer that provides cryptographic protection (encryption and ...
How to make company processes digital in industry
Introduction with Industry 4.0 tools Understanding how to increase competitive advantage using digital tools on real business examples .
Certified Information Systems Security Professional
If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level. This course is ideal for individuals with security responsibilities, for example: ...