Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...
Advanced Project Management
Understand the Project Management knowledge areas and processes Understand the project parameters and the project life-cycle Develop a Work Breakdown Structure (WBS) and understand how it relates to project ...
Project Portfolio Management
After completion of the course, students will be able to: Relate projects to an organization's strategic objectives Define what is involved in project prioritization in large, complex organizations Know how to ...
PRINCE2 - Projects in Controlled Environments Course
After completion of the course, students will be able to: Understand key concepts relating to projects and PRINCE2 Understand how the PRINCE2 principles underpin the PRINCE2 method Understand the PRINCE2 themes and ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Arhitektura i osnove upravljanja HCI sistemima
Saznajte sve o savremenim hiperkonvergiranim data centar tehnologijama kroz prizmu arhitekture Nutanix-a, HCI pionira i vodećeg proizvođača. Sadržajan, tehnički kurs bez marketinških slajdova sa akcentom na ...
Negotiation skills
What is the easiest and the quickest way to earn more or to save more money? The answer is simple - to be better in negotiating. We all negotiate almost every dan, both at work and at home, but we do it without ...
Psychology of communication
This training is based on Transactional Analysis (TA). TA is a psychological theory, developed by Eric Berne in the 1960s, that helps explain why we think, act and feel the way we do.