Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
CompTIA Linux+
The new CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, as a vast number of enterprises use Linux in cloud, cybersecurity, mobile and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
Business Analysis for Projects
After completion of the course, students will be able to: Understand the principles, tools and techniques and the processes to conduct business analysis in support of projects. Explain the importance of business ...
Business Analysis forOrganizations
After completion of the course, students will be able to: Analyze the strategic, tactical and operational business needs of companies and organization in combination with effective and efficient requirements ...