Vendor Cancel filter
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Advanced Negotiation Training
You'll participate in 4 advanced negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll boost your skill to think about negotiation strategically.
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
EC-Council Certified Security Analyst
The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Enterprise architecture (EA) is a necessity for enterprises of almost all sizes. They are using it for efficient management of the whole enterprise and its assets. It can help you to be prepared for future changes, ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Linux Virtualization with KVM
By the end of this course, Learners will understand how the Linux Kernel, QEMU, libvirt and other related open source components can be assembled to create a virtual IT infrastructure, develop practical deployment ...
Neutron The OpenStack Networking Service
At the end of the course, Learners should be able to: Understand the OpenStack networking components and how they work together Understand the architecture of an OpenStack based network Troubleshoot an OpenStack ...
Application Portfolio Management (APM)
Management of the application portfolio may bring significant savings. We will explain how to manage your portfolio, what to look for and how to avoid failures..
Cryptosession: Introduction to cryptography
Introduce participants to the basics of cryptography Clarify relationships and principles for this important field Show limitations of individual mechanisms in terms of speed and architecture Alert on basic problems ...
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Cryptosession: Cryptography in SSL/TLS
To secure the confidentiality and authenticity of transmitted information, the term SSL / TLS is most commonly used in the Internet environment. It is a layer that provides cryptographic protection (encryption and ...