Upcoming Courses
04
Dec
AML/CFT Basics
A Practical Approach to the Fight Against Money Laundering and the Financing of Terrorism and Proliferation: the Establishment of an Internal Control System in the Non-banking Sector
05
Dec
Power Platform
Microsoft Power BI Fundamentals
09
Dec
IT and Data Security
Certified Information Security Manager CISM® Certification
09
Dec
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
AML/CFT Basics
A Practical Approach to the Fight Against Money Laundering and the Financing of Terrorism and Proliferation: the Establishment of an Internal Control System in the Non-banking Sector
Development of internal control systems in the commercial sector: customer identification requirements, research basics, methods of checking and documenting information provided by customers, basic operating principles of the internal control system and procedural arrangements and reporting requirements.
Power Platform
Microsoft Power BI Fundamentals
The Microsoft Power BI Fundamentals course is intended for anyone who wants to get to know one of the most popular, powerful data analysis and visualization tools – Microsoft Power BI. As part of the training, you will have the opportunity to learn all the necessary basic knowledge about this software and its use in your daily work.
IT and Data Security
Certified Information Security Manager CISM® Certification
The CISM (Certified Information Security Manager) course is designed for professionals who manage, design, and oversee an enterprise's information security program. This course covers essential topics like information risk management, governance, incident management, and program development and management. Upon completion, participants will be well-equipped to handle the challenges of securing and protecting valuable information assets within their organizations.
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Course includes over 200 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
Sign up for newsletter
Leave your e-mail and we'll contact you with the most current information about company and our products.