Target Audience A Tableau Data Analyst enables stakeholders to make business decisions by understanding the business problem, identifying data to explore for analysis, and delivering actionable insights. The Data Analyst uses Tableau Desktop, Tableau Prep, and either Tableau Server or Tableau Online to: Connect to data sources Perform data transformations Explore and analyze data Create […]
Course Overview This course is designed to introduce participants to the best practices in approaching data analytics initiatives, from asking the right questions to sourcing and analyzing the data, all the way until deriving insights from data and influencing decision-makers. The course is aligned with IIBA Business Data Analytics Guide and features a case study […]
Overview React is probably the most popular front-end library for creating web applications. Originally, React was created by Facebook, but in 2013 the library was made available as open source. React is used by Instagram, Airbnb, Uber, Netflix, Slack and many other companies and organizations. The React Fundamentals course teaches you the basics of React […]
Overview Vue.js is a relatively new frontend JavaScript framework that is as powerful as its major counterparts Angular and React. However, Vue.js has a simpler syntax, has less overhead and is faster to learn. Vue.js is used by companies like Nintendo, Alibaba, L’Oréal and countless other (e-commerce) companies. A website in Vue no longer consists […]
Overview This course provides an easy-to-understand introduction to Digital Transformation and how it relates to business, technology, data and people. Coverage includes the benefits, risks and challenges of Digital Transformation, as well as its business and technology drivers. Also explained are the characteristics of building customer-centric automation solutions, along with an insightful exploration of data […]
Leadership & Management Skills Course Aim To highlight a range of knowledge, skills and practical strategies in order to positively impact on the way you lead and manage others. Course Objectives By the end of the session you will be able to: Define the distinct characteristics of leadership & management. Examine 10 classic leadership styles […]
Overview A Certified Cloud Professional has a proven understanding of cloud computing concepts, models and business considerations, and has further demonstrated proficiency in fundamental technology and security-related areas of cloud computing. Course Objectives The foundational course provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The […]
Overview The DevOps Specialist track is comprised of three courses that develop skills in DevOps practices, processes, metrics and models. The final course module consists of a series of lab exercises that require participants to apply their knowledge of the preceding courses in order to fulfill project requirements and solve real world problems. Course […]
People Influencing, Emotional Intelligence, and Customer Care Skills People Influencing Skills Course Aim To highlight a range of skills and strategies in order to improve the ways that you are able to influence other people. Course Objectives By the end of the session you will be able to: State the differences between ‘influence’ […]
Overview The Big Data Professional track is comprised of BDSCP Modules 1 and 2, the outlines for which are provided below. Completion of these courses as part of a virtual or on-site workshop results in each participant receiving an official digital Certificate of Completion, as well as a digital Training Badge from Acclaim/Credly. The Big […]
Presentation Skills + Time Management + Communication Skills Presentation Skills Theory & Practice Aim To highlight a range of skills and good practice to enable the development and delivery of effective presentations. Objectives By the end of the session you will be able to: State the 3 Stages in giving a presentation; Identify how […]
Course Overview CCBA course is the level 2 of business analysis training and is focused on additional business analysis topics beyond the fundamentals. This comprehensive training will prepare participants to pass the CCBA exam and help making the most of the limited time they have for studying. The course is aligned with the Business Analysis […]
Course Aim To highlight a range of knowledge and good practice in the development and delivery of effective group training sessions. Course Objectives By the end of the session you will be able to: Define the components of the Training Cycle. Identify the stages of the Conscious Competence learning model. State […]
Leaders are the target for cyber security attacks especially Social Engineering because leaders have the access to confidential information and critical systems. It has been found that 7% of the users who click on a Phishing link are Managers and Leaders. Cybersecurity awareness training helps everyone at your company build the digital skills and cyber […]
Cybersecurity has become a major priority for companies and organizations around the world. There are millions of cybersecurity positions open and unfilled, and a shortage of cyber security talent. Companies and organizations need cybersecurity professionals equipped with the knowledge, skills, and abilities to stay ahead of, and to cope with, evolving threats and vulnerabilities. Cybersecurity […]
Course Outline: Information Security Governance Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately, and program resources are managed responsibly. Information Risk Management Manage information risk to an acceptable level based on risk […]
Course Overview This course is designed to assist and enhance the study process, this course will focus on identifying and evaluating entity-specific risk, understanding enterprises business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls. Each of the CRISC job domains will be discussed and attendees will become familiar with the […]
Course Overview This course helps candidates prepare for the rigorous CISSP certification exam anytime, anywhere without sacrificing quality for convenience. Training provides in-depth review of information security concepts and industry best practices, with comprehensive coverage of the eight domains of the CISSP Common Body of Knowledge (CBK). All learning activities are designed to increase abilities […]
Course Overview This course provides IT leaders, practitioners, support staff and staff interfacing with the organization’s digital and information systems functions with a practical understanding of the key concepts, common language, principles and practices that enables successful management of modern IT-enabled services. It also prepares delegates for the ITIL Foundation Certificate Examination. The course […]
Course Overview The ISTQB Advanced Level Test Automation Engineer Course is a three to a four-day course. Each training day shall start at 9.00 and finish at 1 In today’s world when skipping the testing phase is quite impossible for companies wishing to be competitive, one step ahead before everybody and that desire to have […]
Course Overview Agile testing is a relatively new approach to software testing that follows the principles of agile software development as outlined in the Agile Manifesto. A tester on an Agile project will work differently than one working on a traditional project. Testers must understand the values and principles that underpin Agile projects, and how […]
Course Overview The Entry Certificate in Business Analysis (ECBA certification) recognizes professionals for their knowledge and proficiency in business analysis. The ECBA course is in accordance with ISO 17024 standard for certifying professionals. Course Objectives Upon Completion of this Course, you will accomplish following: Gain professional understanding and knowledge of BA principles and industry […]
Course Overview CBAP® (Certified Business Analysis Professional) training & certification is ideal for professionals with in-depth experience in business analysis. This course offers proficiency in understanding business requirements and recommending likewise solutions that bring maximum returns. This CBAP® training by JODAYN is based on the latest version of BABOK® Guide i.e. BABOK® Guide V3.0 provides […]
Course Aim To highlight a range of techniques and good practice leading to more effective management of time, personal productivity and prioritization of tasks. Course Objectives By the end of the session you will be able to: Identify what time management is. State typical reasons why your time might be mis-used. […]
Course Aim To highlight a range of skills and strategies in order to improve the ways that you are able to influence other people. Course Objectives By the end of the session you will be able to: State the differences between ‘influence’ and ‘persuasion’; Identify the people you need to influence and […]
Course Aim To highlight key principles of Emotional Intelligence (EI) and how you might use them to develop your own abilities relating to EI. Course Objectives By the end of the session you will be able to: Define specifically what Emotional Intelligence is; Identify the characteristics of Emotionally Intelligent people (as […]
THEORY & PRACTICE Aim To highlight a range of skills and good practice to enable the development and delivery of effective presentations. Objectives By the end of the session you will be able to: State the 3 Stages in giving a presentation; Identify how to develop and prepare a presentation ‘from scratch’; […]
Course Aim To highlight a range of strategies and techniques that can be used to deal more effectively with stressors and worries and instead condition & maintain a positive personal attitude. Course Objectives By the end of the session you will be able to: State the importance of your own ‘Belief Systems’ and […]
Course Aim To highlight a range of knowledge, skills and practical strategies in order to positively impact on the way you lead and manage others. Course Objectives By the end of the session you will be able to: Define the distinct characteristics of leadership & management; Examine 10 classic leadership styles and […]
Course Aim To highlight a range of ideas, strategies and techniques that can assist in and developing an effective team. Course Objectives By the end of the session you will be able to: Identify your 7C’s of developing an effective team and why you chose them; Discuss the Adair Model of Action […]
Course Aim To highlight a range of skills and good practice in order to deliver consistently high-quality levels of customer care. Course Objectives By the end of the session you will be able to: Identify the difference between an internal customer and external customer; State the basics of what your customers want […]
Course Aim To highlight a range of skills and strategies in order to improve the impact of your face to face and telephone communications. Course Objectives By the end of the session you will be able to: State the components of the Communication Cycle; Identify potential barriers to effective communication and basic […]
Course Aim To highlight a range of skills and practical techniques in order to improve the impact of the coaching and mentoring you carry out with others. Course Objectives By the end of the session you will be able to: State the key components of the ‘Conscious Competence’ model in relation to how […]
Course Aim To highlight a range of skills, techniques and good practice in order to effectively carry out a worthwhile and professional appraisal. Course Objectives By the end of the session you will be able to: Define what a worthwhile Appraisal actually is; State some of the benefits of an effective appraisal […]
Course Aim To highlight a range of skills and practical strategies in order to develop a more assertive personal style. Course Objectives By the end of the session you will be able to: Define what being assertive actually means; Identify your current Assertive, Passive & Aggressive behaviour profile & highlight the possible […]
The PMI-SP certification acknowledges the individual’s unique expertise on the project team while demonstrating the recognition and value the role provides to the project management profession. This global certification also supports individuals in meeting organizational needs. Organizations can be confident in hiring capable, experienced practitioners as well as having a means for a career development […]
Overview This course is a practical hands-on jump start in Big Data and Data Science designed as a first step for trainees who are interested to start a career in this evolving fast growing specialty. The course starts with introducing the practice itself and ensures deep understanding of Big Data and Data Science technically by […]
The number of business analysis jobs is predicted to increase 19 percent by 2022. This research indicates a growing need for professionals skilled in effective requirements management. The PMI-PBA® credential spotlights your ability to effectively work with stakeholders to define their business requirements, shape the output of projects and drive successful business outcomes. Through […]
The PMI Agile Certified Practitioner (PMI-ACP)® formally recognizes your knowledge of agile principles and your skill with agile techniques. The PMI-ACP® certification recognizes an individual’s expertise in using agile practices in their projects, while demonstrating their increased professional versatility through agile tools and techniques. In addition, the PMI-ACP® certification carries a higher level […]
Course Objective Formal portfolio management is the most effective way to implement strategic initiatives because it bridges the gap between strategy and implementation. The Portfolio Management Professional (PfMP)® signifies your advanced competency in the coordinated management of one or more portfolios to achieve strategic objectives. The PfMP® certification recognizes advanced experience, skill and performance necessary to manage […]
Overview Prosci’s research reveals that one of the greatest contributors to successful change is the use of structured change management approach. This intensive and interactive program quickly builds your competency in applying a structured change management approach for implementing change in your workplace. During the program, work on your own change project and apply the […]
Overview This highly interactive program provides participants with an understanding of the fundamental concepts and organizational benefits of effective change management. Participants apply five tenets of change management to their change initiatives to build awareness and desire for change management. Who Should Attend Senior leaders evaluating how change management can benefit their organization Members […]
Overview Managers play a critical role during times of change. Prosci’s research reveals that employees look to their managers first to understand both the importance of changes and how they will be personally impacted. The research also reveals that many managers underestimate the importance of their role in change or are unsure how to effectively lead […]
Overview Active and visible executive sponsorship has been identified as the greatest contributor to successful change in all nine of Prosci’s benchmarking studies conducted over the last 18 years. The research also reveals that over half of sponsors have a less than adequate understanding of what they need to do to effectively lead change. The […]
Overview Prosci’s research indicates that integrating change management and project management is one of the greatest contributors to successful change. Yet project managers and change managers often speak different languages and have a lack of mutual understanding and buy-in that ultimately prevents effective integration. Delivering Project Results introduces change management to project managers and project team […]
Overview Prosci’s research identifies employee engagement and participation as key contributors to a successful change initiative. In contrast, employee resistance can derail any initiative, from a small process change to a high-investment strategic initiative. Giving employees the knowledge and ability to achieve successful personal transitions can transform your organization from a culture of resistance to a […]
Course Overview The Spring Framework is the leading Java EE solution for enterprise software. The Core Spring course covers Spring from Version 4 upwards, currently delivered using Version 5. The course comprises sessions dealing with Dependency Injection (DI); Aspect Oriented Programming, (AOP); Spring Web including MVC, REST, and WebSocket; Spring Data including JDBC, ORM, […]
COBIT® 5 logo is a trademark of Information Systems Audit and Control Association® (ISACA®) The COBIT® 5 Implementation course is a 2-day, interactive, classroom-based learning experience. Participants will get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. They will […]
The User Acceptance Testing (UAT) workshop offers training on the methods and procedures required by staff who is engaged in the acceptance phase of an IT project. With the increasing emphasis on the involvement of user staff in the sign-off of systems into production, it is now essential to ensure that they are equipped with […]
About the Course ISTQB® (International Software Testing Qualifications Board) is the standard for international qualifications in software testing at an advanced level. The ISTQB® Certified Tester Advanced Level Test Analyst course, with its large number of practical exercises and practice examination questions, thoroughly prepares attendees for the ISTQB® Certified Tester Advanced Level Test Analyst […]
About the Course ISTQB® (International Software Testing Qualifications Board) is the standard for international qualifications in software testing at an advanced level. The ISTQB® Certified Tester Advanced Level Test Manager course, with its large number of practical exercises and practice examination questions, thoroughly prepares attendees for the ISTQB® Certified Tester Advanced Level Test Manager […]
About the Course The ISTQB Foundation course covers the fundamentals of software testing, providing delegates with the necessary foundations for a career as a software testing professional. This three-day intensive tutor-led course includes exam preparation, and revision. It is fully-accredited by UKTB on behalf of ISTQB and has been rated SFIAplus level 3 […]
This extensive 5 days course covers all knowledge and practices that are needed to achieve the certification for MicroServices Certified Architect. This course provides an easy to understand, end-to-end overview of contemporary service concepts and technologies pertaining to modern-day microservices and service-oriented computing, as well as business and technology-related topics pertaining to service-oriented architecture (SOA). […]
The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle.
As voice over IP (VoIP) systems are vulnerable to the same threats as data networks – like viruses, identity theft, spam, fraud, privacy invasion, and denial of service attacks –, aim of this training is to teach programmers, software architects, network engineers and project managers to the VoIP security features, the various security issues of […]
The course gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL) with a focus on web application security. It provides a level 100 overview of the fundamental building blocks of SDL, followed by design techniques to apply to detect and fix flaws in early stages of the development […]
Testing plays a very important role in ensuring security and robustness of web applications. Various approaches – from high level auditing through penetration testing to ethical hacking – can be applied to find vulnerabilities of different types. However if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned and […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the […]
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal […]
Protecting applications that are accessible via the web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of web applications. One should not only be aware of the security issues relevant to these platforms, but also of all […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
“Money makes the world go round…” – remember? And yes: it is your responsibility to secure all that. As a fintech company you have to take up the challenge, and beat the bad guys with bomb-proof, secure applications! If there is a domain where security is critical, it is definitely fintech. Vulnerability is not an […]
The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, […]
The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, […]
Since all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of […]
The Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design techniques to apply to detect and fix flaws in early stages of the development process. Dealing with the […]
The course provides a brief management level overview on Microsoft Security Development Lifecycle (SDL) by introducing essential concepts, tackling secure design and the nature of the most common vulnerabilities. Selected secure coding topics of various platforms show the importance of proper design and implementation. Test methodologies and most important concepts regarding privacy are also addressed. […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
iOS is a mobile operating system distributed exclusively for Apple hardware and designed with security at its core; key security features including sandboxing, native language exploit mitigations or hardware supported encryption all offer a very effective environment for secure software development. The devil is however in the details – a programmer can still commit plenty […]
The biggest challenge for professionals working on design and development of crypto chip-sets is to be continuously up-to-date regarding the attack methods and their mitigation. Serving them, this course explains various physical and logical attacks on security chips, possible countermeasures and best practices. Regarding physical attacks, the passive attacks are detailed through optical reverse engineering […]
Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
Serving teams that use managed code (.NET and ASP.NET typically written in C#) together with native code development (typically C/C++), this training gives a comprehensive overview of the security issues in both environments. Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus […]
To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
As a developer, your duty is to write bulletproof code. However… What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How […]
The training explains in details the mechanisms underlying typical C/C++ security relevant programming bugs – the common security vulnerabilities. The root causes of the problems are explained through a number of easy-to-understand source code examples, which at the same time make clear how to find and correct these problems in practice. The real strength of […]
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring […]
Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the […]
Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the […]
Are you looking to start your journey towards becoming a security champion? Despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed. You will be provided with all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling […]
Enterprise Architecture (EA) is more than the collection of the constituent architectures (Business, Application, Technology, and Information). It is a conceptual tool that assists organizations with the understanding of their own structure and the way they work. It provides a map of the enterprise and is a route planner for business and technology change. The […]
This course takes the participants on an intensive 3-day journey starting with the basics of strategy, learning how to formulate great strategies, how to plan for executing these strategies, and practical ways for the best chances for success. Audience § Persons in positions of leadership and supervisory responsibility in the public and private sector § […]
This training course covers the fundamentals of solution architecture concepts and techniques. The course covers stakeholder identification, including identifying the stakeholder viewpoints. It covers the concept of architecturally significant that drives the architecture artifacts, including system process models, system use cases, change cases, and architecture requirements. The course material and techniques are based on industry […]
The class is intended to help developers and solution architects design and build effective, high quality applications using the Microsoft platform and the .NET Framework more quickly and with less risk; it provides guidance for using architecture principles, design principles, and patterns that are tried and trusted. The guidance is presented in sections that correspond […]
The role of the architect involves more than technical expertise. The soft skills workshop is designed to ensure that trainees are aware of the challenges and the many demands that are placed upon the architect from an organizational perspective. Attention is given to the subject of leadership, project management, communication, and navigating the troublesome political […]
An accelerated program that takes you to ITIL Service Transition Certification using innovative learning methods andenergizedclassroom sessions. The combination of instructor-supported e-learning and classroom course allows students to manage study time whilst reducing the number of classroom days. This course immerses learners in the overall concepts, processes, policies and methods associated with the Service Transition […]
An accelerated program that takes you to ITIL Service Strategy Certification using innovative learning methods andenergizedclassroom sessions. The combination of instructor-supported e-learning and classroom course allows students to manage study time whilst reducing the number of classroom days. This course immerses learners in the overall concepts, processes, policies and methods associated with the Service Strategy […]
An accelerated program that takes you to ITIL Service Operation Certification using innovative learning methods andenergizedclassroom sessions. The combination of instructor-supported e-learning and classroom course allows students to manage study time whilst reducing the number of classroom days. This course immerses learners in the overall concepts, processes, policies and methods associated with the Service Operation […]
An accelerated program that takes you to ITIL Service Design Certification using innovative learning methods andenergizedclassroom sessions. The combination of instructor-supported e-learning and classroom course allows students to manage study time whilst reducing the number of classroom days. This course immerses learners in the overall concepts, processes, policies and methods associated with the Service Design […]
Course Fact Sheet v1.2– ITIL® 3 Credits in the ITIL Qualification Scheme This 2- day course offers practical guidance for professionals on how to adopt and adapt ITIL for their organization. ITIL Practitioner is the next logical step for individuals who have earned the ITIL Foundation certificate and are familiar with the ‘what’ and ‘why’ […]
An accelerated Bootcamp covering all 5 ITIL Lifecycle modules using innovative learning methods and energized classroom sessions. This intensive Program allows practitioners to Fast-Track in completing five ITIL Lifecycle modules; ITIL Service Strategy (SS), Service Design (SD), Service Transition (ST), Service Operation (SO), and Continual Service Improvement (CSI). The combination of 40 hours instructor-supported e-learning […]
An accelerated program that takes you to ITIL Continual Service Improvement Certification using innovative learning methods andenergizedclassroom sessions. The combination of instructor-supported e-learning and classroom course allows students to manage study time whilst reducing the number of classroom days. This course immerses learners in the overall concepts, processes, policies and methods associated with the Continual […]
This course introduces the students to the fundamentals of Solution and Software Architecture. Within the broader strategic vision that Enterprise Architecture (EA) provides, there is a need to provide structure and guidance around the more tactical solution architecture capabilities that are developed to ensure they are consistent with the broader EA strategy. Within the context […]
This course examines the relationship between the Agile methodology and the practice of Architecture. It is a mixture of lectures and exercises. The lectures provide instruction on the concepts and open up meaningful discussions; the exercises have students work through a case study to help deepen their knowledge. The course begins with defining what the […]
Create an information accountability framework that reduces costs, manages risk, and optimizes value. In this era of social, mobile, cloud and big data, your information assets are growing faster than you can digest them. Struggle no more! This course provides a dynamic framework that allows for constant changes in regulations, business, and technology. Most of […]
Overview This 5-day course addresses all of the Information Management disciplines as defined in the DAMA body of knowledge (DMBoK). Taught by an industry recognized DAMA instructor. This course provides a solid foundation across all of the disciplines across the complete Information Management spectrum. By attending the course, delegates will get a firm grounding of […]
This course is for architects of all types (EA, solution architecture, technical architecture, etc.). It covers core architecture concepts: Architecture Principles, Stakeholders, Views & Viewpoints, Quality Attributes, Nonfunctional requirements, Tactics, Patterns, and Techniques. Audience Architects. Prerequisites None. Duration 2 days. Outline ARCHITECTURE OVERVIEW § Architecture § Architects § Importance of Architecture § Communications Vehicle Among […]
This training course covers a wide range of integration solutions based on proven enterprise integration patterns that will aid the students in designing the architecture of complex interconnected business systems. Objectives This class combines theory with labs for hands-on, practical experience. After completing this class, the students will be able to apply the acquired knowledge […]
Information is at the heart of all organizations, like blood flowing through its arteries and veins. However, all too often Information is not professionally managed with the rigour and discipline that it demands. Nonetheless the implications of poorly managed information can be catastrophic, from legal and other regulatory sanctions ultimately to business collapse. Professor Joe […]
Learn best practices and technologies for managing content in an era of social, mobile, and cloud computing. Enterprise content management combines analytics, collaboration, governance and processes with anywhere, anytime access to deliver value to your customers, partners, and employees. Learn technologies and best practices for managing content as an asset for your organization. Overview AIIM’s […]
Information is at the heart of all organizations, akin to blood flowing through its arteries and veins. However, all too often Information is not professionally managed with the rigour and discipline that it demands. Nonetheless the implications of poorly managed information can be catastrophic, from ICO and other regulatory sanctions ultimately to business collapse. Professor […]
COBIT® 2019, developed by ISACA, is the best-known framework for the enterprise governance of IT (EGIT). COBIT 2019 builds on, and integrates, more than 25 years of development in the EGIT field, not only incorporating new insights from science, but operationalizing these insights as practice. Course attendees will gain insight in the COBIT framework, including: […]
This hands-on workshop explores the subject of Business Architecture, providing teams with a solid foundation for execution. The truth is, that your business has an architecture. You are either in the driver’s seat defining your business’s structure and roadmap to success (i.e. your Business Architecture) or you are at the mercy of the ad-hoc architecture […]
This workshop focuses on the Business Architecture (BA) Domain.The workshop walks through the development of the key domain catalogs, matrices, and diagrams. It also reviews the related TOGAF® metamodel entities. Objectives This workshop provides a working knowledge of key TOGAF® BA artifacts that comprise the BA building blocks. Audience The target audience for this workshop […]
This course provides the students with the prerequisite knowledge necessary to use JEE in order to architect robust and maintainable enterprise applications. Objectives Upon completion of this course, you should be able to: § Use JEE to solve common architectural problems § Apply JEE patterns effectively § Define the architect role and the deliverables § […]
Soft Skills Training Program Consists of the following courses: Time Management Presentation Skills Communication Skills Customer Care Duration Each of the courses will be conducted over 1 day. Course Details Day 1 Time Management AIM To highlight a range of techniques and good practice leading to more effective management of time, personal productivity and prioritization […]
The User Acceptance Testing (UAT) workshop offers training on the methods and procedures required by staff who is engaged in the acceptance phase of an IT project. With the increasing emphasis on the involvement of user staff in the sign-off of systems into production, it is now essential to ensure that they are equipped with […]
About the Course ISTQB® (International Software Testing Qualifications Board) is the standard for international qualifications in software testing at an advanced level. The ISTQB® Certified Tester Advanced Level Test Manager course, with its large number of practical exercises and practice examination questions, thoroughly prepares attendees for the ISTQB® Certified Tester Advanced Level Test Manager examination. […]
About the Course Following on from the ISTQB® Certified Tester Foundation Level training, this workshop covers the increasing technical challenges faced by system testing in particular. Defined tasks need to be structured according to the technical requirements and the internal structure of the system needs to be analysed in detail in order to achieve the […]
About the Course ISTQB® (International Software Testing Qualifications Board) is the standard for international qualifications in software testing at an advanced level. The ISTQB® Certified Tester Advanced Level Test Analyst course, with its large number of practical exercises and practice examination questions, thoroughly prepares attendees for the ISTQB® Certified Tester Advanced Level Test Analyst examination. […]
About the Course The ISTQB Foundation course covers the fundamentals of software testing, providing delegates with the necessary foundations for a career as a software testing professional. This three-day intensive tutor-led course includes exam preparation, and revision. It is fully-accredited by UKTB on behalf of ISTQB and has been rated SFIAplus level 3 by the […]
CMAP Certified Mobile App Professional is a SIG brought together by iSQI, which is made up of international IT leaders that are working hard to establish standards in the area of mobile technologies. The first course to be developed by CMAP is “Mobile App Testing – Foundation Level” and will give its participants an excellent […]
Course Description This learning course serves to help participants prepare for the Project Management Institute’s (PMI®) Risk Management Professional (RPM®) exam with the understanding of project risk management according to the Project Management Body of Knowledge (PMBOK®) Guide – Fourth Edition. Aligned with the PMI Risk Management Professional (PMI-RMP®) certification, this course provides the skills […]
Why Project Management? Project Management was and still one of the fastest growing management disciplines over the past decades; there is no better proof than the increase in the number of people who obtained and trying to obtain Professional Project Management accreditation over that period. Project Management is a combination of science and art. The […]
This extensive 5 days course covers all knowledge and practices that are needed to achieve the certification for SOA Architect. This course provides an easy to understand, end-to-end overview of contemporary service concepts and technologies pertaining to modern-day microservices and service-oriented computing, as well as business and technology-related topics pertaining to service-oriented architecture (SOA). This […]
Course description Angular is the successor of the popular AngularJS 1.x framework. It provides several new features, better performance, but also a completely new syntax. An Angular-app is basically a collection of components brought together within modules. The key to learning Angular is understanding how Components are built and how they interact with each other […]
Course Description As per PMI®, “Programs are group of related Projects managed in a coordinated way to obtain benefits and control not available from managing them individually” Projects in the Program are oriented towards benefit conferment and capability development/enhancement of the Organization. PgMP® credential from the PMI® addresses the community of professionals who manage Programs- […]
Course description AngularJS is a client sided JavaScript framework for the realization of web applications following the MV * pattern ( “Model-View-whatever). AngularJS, also known as Angular 1, was originally developed at Google, but we’ve seen a large and active open source community grown around AngularJS. Angular is currently used in large enterprise environments like […]
Introduction Project Management is a combination of science and art. The Guide to Project Management Body of Knowledge, widely known as the PMBOK and which is developed by the Project Management Institute (PMI) became the ultimate standard for Project Management. It provides a number of best practices in project management that can be used by […]
This ICAgile accredited course examines the roles and responsibilities of team members working on Agile projects, delves into the specific practices which are used on Agile projects, explains the theory and concepts behind the Agile approach and prepares team members to be immediately productive working in an Agile software development team. This is a two-day […]
Successful Project Leadership in Agile environments This ICAgile accredited course will help you learn the skills, techniques and mindset needed to orchestrate a team effort, collaborate with stakeholders, and support self-organising teams in continuously adjusting and refining their efforts to increase efficiency and effectiveness. While some organizations using Agile development do not use the title of “Project Manager” […]
CompTIA Network+ Course Description CompTIA® Network+® is a five-day course designed to prepare students to pass the CompTIA Network+ certification exam. Students will describe the major networking technologies, systems, skills, and tools in use in modern networks. What’s Included Comprehensive study materials, including Boson ExSim-Max for CompTIA Network+ N10-005 Continental breakfast, assorted snacks and beverages […]
Overview In this course, students install, configure, upgrade, maintain, and troubleshoot servers, and learn information and skills that will be helpful on the job, and prepare for the CompTIA Server+ certification examination, 2009 objectives. Who Should Attend The CompTIA® Server+® certification exam is targeted at IT professionals, network support technicians, and server hardware specialists having […]
Course Description This five-day course is designed to prepare students to pass the CompTIA Security+ SY0-301 certification exam. The students will build on prior knowledge and professional experience with computer hardware, operating systems, and networks as they acquire the specific skills required to implement basic security services on any type of computer network as well […]
Overview The CompTIA Healthcare IT Technician will provide students with the knowledge and skills required to implement, deploy, and support Health IT systems in various clinical settings. Successful candidates will understand regulatory requirements, healthcare terminology/acronyms, and possess a basic understanding of practice workflow while adhering to code of conduct policies and security best practices. Who […]
CompTIA Cloud Essentials Course Description The CompTIA Cloud Essentials specialty certification demonstrates an individual knows what cloud computing means from a business and technical perspective, as well as what is involved in moving to and governing the cloud. The Cloud Essentials exam objectives were originally developed by ITpreneurs in cooperation with the Cloud Credential Council, […]
Overview In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Who Should Attend If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer […]
Description We can argue that it is not a matter of whether cloud computing will become ubiquitous—because the economic forces are inescapable—but rather what can we do to assess enterprise governance, risk assessment and development of strong internal controls, in the implementation and management of ever increasing cloud computing environments. This program will begin […]
Overview Students will learn to install, configure, operate, and troubleshoot a small enterprise network, focusing on redundant topologies, configuring EIGRP and multi-area OSPF, understanding Wide Area Network technologies, device management and Cisco licensing. Who Should Attend This course is intended for entry-level network administrators, network support, and help desk technicians. Duration […]
Overview Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. Duration Classroom Learning – 5 Day(s) Exam 100-101 ICND1 Course Content Lesson 1: Building a Simple Network Exploring the Functions […]
About the Course Many of the problems encountered in business information system implementations are the direct result of shortcomings in the processes and practices used to gather, understand, and document requirements for the system. Requirements are often not reflective of the real business need(s), they are all too often incomplete, vague and disconnected and consequently […]
On this 5-day course, participants learn to use a structured, disciplined approach to understanding business systems, eliciting, analysing, documenting and validating business system requirements. Particular emphasis is placed on identifying the need for information systems within the business, and ensuring that the resulting, engineered systems provide benefit to the business in meeting defined goals and objectives. […]
Overview In today’s fast-paced, fiercely competitive world of new product development, speed and flexibility are essential for Agile business analysis. Companies are increasingly realizing that the old sequential approach to developing new products simply won’t get the job done. This Agile business analyst training provides the skills to drive product development with more productive and […]
Business Process Modeling is the activity of analyzing and presenting an end to end business process. There are several reasons an organization may want to do this, for example, if they are looking to make improvements to the way they do things. This course will teach you how to elicit, analysis, document and validate business […]