Upcoming Courses
05
Jan
ITIL, IT Governance and Service Management
ITIL®4 Foundation
05
Jan
IT and Data Security
Certified Information Security Manager CISM® Certification
05
Jan
Artificial Intelligence
Business process automation with AI tools
05
Jan
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
ITIL, IT Governance and Service Management
ITIL®4 Foundation
The ITIL®4 Foundation course is designed for professionals who want to utilize ITIL®4 framework in their professional work, enhancing and developing both IT and other service processes, performance, and quality.
Within the scope of the training, the main concepts and process models of the ITIL®4 framework for ensuring the quality of IT Service Management (ITSM) will be acquired.
By participating in discussions and completing practical tasks, participants gain an understanding and the necessary skills in analyzing best practice examples, with the ability to integrate them into their company's IT Service Management processes.
IT and Data Security
Certified Information Security Manager CISM® Certification
The CISM (Certified Information Security Manager) course is designed for professionals who manage, design, and oversee an enterprise's information security program. This course covers essential topics like information risk management, governance, incident management, and program development and management. Upon completion, participants will be well-equipped to handle the challenges of securing and protecting valuable information assets within their organizations.
Artificial Intelligence
Business process automation with AI tools
This 3-day training course is designed for participants who want to use artificial intelligence tools to streamline their work and automate business processes. During the course, participants will learn about approaches that can be used to implement AI solutions and will get hands-on experience with several tools to solve practical tasks to streamline processes.
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Course includes over 200 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
Clients reviews
Our partners