Search our courses

New

Agile and Scrum

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

AI

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

Angular JS

Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.

Lab exercises provide essential and practical hands-on experience for each topic.

In the Private Training
Code: GTIT48 Duration: 2 Days

Ansible

This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.

In the Private Training
Code: GTA1 Duration: 4 Days

AWS

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Tuesday 08 October 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Azure

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

BDD

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

Big Data

Upcoming schedule: Dublin, Tuesday 10 September 2019 at 09:00 to Wednesday 11 September 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Tuesday 08 October 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

Blockchain Ethereum

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Cloud Certification

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Cloud Certifications

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Cloud Computing

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days

Cloud Service Manager

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days

Cyber Security

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training
Code: GTCS Duration: 3 Hours Accreditation: Certified CyberSAFE Certificate

Data Science

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Tuesday 08 October 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Upcoming schedule: Dublin, Tuesday 10 September 2019 at 09:00 to Wednesday 11 September 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

DevOps Certification

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

DevOps Certifications

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

DNS

Upcoming schedule: Dublin, Monday 11 November 2019 at 09:00 to Friday 15 November 2019 at 17:00 - (Duration: 5 days)

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

Upcoming schedule: Dublin, Monday 16 September 2019 at 09:00 to Tuesday 17 September 2019 at 17:00 - (Duration: 2 days)

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

Upcoming schedule: Dublin, Thursday 14 November 2019 at 09:00 to Friday 15 November 2019 at 17:00 - (Duration: 2 days)

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

Upcoming schedule: Dublin, Monday 11 November 2019 at 09:00 to Wednesday 13 November 2019 at 17:00 - (Duration: 3 days)

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

Upcoming schedule: Dublin, Monday 14 October 2019 at 09:00 to Wednesday 16 October 2019 at 17:00 - (Duration: 3 days)

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

Docker

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Thursday 10 October 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

Embedded Linux

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

IoT

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

Java 11

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 2 Day

Kubernetes

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Thursday 10 October 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

More DevOps courses

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.

This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

This drives value and identifies and reduces non-value adding activities.

This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

New

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Thursday 10 October 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

This Machine Learning for Python Developers training course is a hands-on introduction to core Machine Learning techniques. This course will familiarise you with the Machine Learning landscape as well as providing practical experience.

 

In the Private Training
Code: GTMLP1 Duration: 2 Days Practical

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all theprogrammerswho aredeveloping applications that are exposed to the threats of the web.

In the Private Training
Code: GTWSC Duration: 3 Days

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

Upcoming schedule: Dublin, Monday 16 September 2019 at 09:00 to Tuesday 17 September 2019 at 17:00 - (Duration: 2 days)

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This advanced Web Application Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWSM Duration: 5 Days

This Machine Learning for Java Developers Training course is a hands-on introduction to core Machine Learning techniques, this course will familiarise you with the Machine Learning landscape as well as providing practical experience.

In the Private Training
Code: GTMLJ1 Duration: 2 Days Practical

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.

This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

This drives value and identifies and reduces non-value adding activities.

This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTITEL Duration: 5 Days

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTIFINT Duration: 5 Days

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTIHEAL Duration: 5 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTWDT Duration: 3 Days

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 2 Day

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Upcoming schedule: Dublin, Monday 14 October 2019 at 09:00 to Wednesday 16 October 2019 at 17:00 - (Duration: 3 days)

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.

In the Private Training
Code: GTA1 Duration: 4 Days

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training
Code: GTCS Duration: 3 Hours Accreditation: Certified CyberSAFE Certificate

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Upcoming schedule: Dublin, Tuesday 10 September 2019 at 09:00 to Wednesday 11 September 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

Upcoming schedule: Dublin, Monday 07 October 2019 at 09:00 to Tuesday 08 October 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

Upcoming schedule: Dublin, Monday 11 November 2019 at 09:00 to Friday 15 November 2019 at 17:00 - (Duration: 5 days)

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

Upcoming schedule: Dublin, Monday 11 November 2019 at 09:00 to Wednesday 13 November 2019 at 17:00 - (Duration: 3 days)

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.

Lab exercises provide essential and practical hands-on experience for each topic.

In the Private Training
Code: GTIT48 Duration: 2 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

Upcoming schedule: Dublin, Thursday 14 November 2019 at 09:00 to Friday 15 November 2019 at 17:00 - (Duration: 2 days)

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

OpenStack

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Predictive Analytics

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

Python

Upcoming schedule: Dublin, Tuesday 10 September 2019 at 09:00 to Wednesday 11 September 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

Red Hat

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

Secure Coding

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all theprogrammerswho aredeveloping applications that are exposed to the threats of the web.

In the Private Training
Code: GTWSC Duration: 3 Days

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This advanced Web Application Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWSM Duration: 5 Days

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTIHEAL Duration: 5 Days

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTIFINT Duration: 5 Days

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTITEL Duration: 5 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTWDT Duration: 3 Days

Security Certification

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

TDD

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

“I particularly liked the heavy hands on sessions that went on with the training. Other than that, really liked Mark's training style. His experience in the field really shines through.”

 

Docker - GTDK1

Feb ‘19

“Instructor's ability to demonstrate new features that are not part of the course help show his mastery as well as prepare us for changes in the technology. Great work.

 

Using Docker & Kubernetes in Production - GTK8SG

Oct ‘18


“This course was an excellent insight into the Cloud Service Management world and equips me with the tools to go back to my company and build upon it.”

 

Cloud Service Manager - GTC13

Jan ‘19

 


“The course was great. The instructor is true Kubernetes Ninja. Loved the hands on approach. Very happy with the course.”

 

Using Docker & Kubernetes in Production - GTK8SG

Oct ‘18

“Excellent instructor. You can tell he really understands the concepts he's presenting and is very passionate about his work. He answered every question we asked and presented the course in an interesting and involving manner.”

 

Spring Boot Development - GTIT40

Nov ‘18

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners

 

  •  
  •  
  •  
  •  
  •  

 

 

 

 

 

Upcoming Courses

Kubernetes Administration

16th - 19th September - Cork

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

CompTIA Network+ FastTrack

11th - 14th November - Cork

This fast-paced course teaches the essentials of networking and helps to prepare the student for the CompTIA Network+ certification.

Learn More

Applied Data Science with Python

10th - 11th September - Dublin

17th - 18th December - Dublin

Learn about the theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics

Learn More

Introduction to Python 3

8th - 10th October - Dublin

5th - 7th November - Cork

Python is a powerful and popular object-oriented programming/scripting language with many high quality libraries.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter