Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
ICT trends
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to acquaint participants with the new generation of mobile 5G. Students will learn new features in the 5 G system such as a complete new radio part, new network core and new 5 G services.
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Practical Introduction to EA and ITSM
Modern approaches to the strategic planning of organization ICT architecture and the ICT service operations served in the introductory course. We will introduce basic methodologies and frameworks for managing ICT ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...