Sortiraj po
Filter
Online / Onsite Otkaži filter
Guaranteed term
Tehnologija Otkaži filter
Lokacija
Jezik
Microsoft Cloud 365 Mobility and Security
This three-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Mobility and Security contains courseware that helps prepare students for Exams MS-101. Passing this exam is required to earn the Microsoft 365 ...
Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...
Agile Project Management
After completion of the course, students will be able to: Learn how agile project management techniques can help to ensure project success Learn when agile is a good fit and when it is still appropriate to use a ...
Business Analysis forOrganizations
After completion of the course, students will be able to: Analyze the strategic, tactical and operational business needs of companies and organization in combination with effective and efficient requirements ...
Business Analysis for Projects
After completion of the course, students will be able to: Understand the principles, tools and techniques and the processes to conduct business analysis in support of projects. Explain the importance of business ...
Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...
Advanced Project Management
Understand the Project Management knowledge areas and processes Understand the project parameters and the project life-cycle Develop a Work Breakdown Structure (WBS) and understand how it relates to project ...
Project Portfolio Management
After completion of the course, students will be able to: Relate projects to an organization's strategic objectives Define what is involved in project prioritization in large, complex organizations Know how to ...
PRINCE2 - Projects in Controlled Environments Course
After completion of the course, students will be able to: Understand key concepts relating to projects and PRINCE2 Understand how the PRINCE2 principles underpin the PRINCE2 method Understand the PRINCE2 themes and ...
Implementing Cisco EnterpriseAdvanced Routing and Services
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
Implementing and Oper. Enterprise Network Core Technologies
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.