Search our courses

New

Agile and Scrum

With the impact of the pandemic, students are looking forward to home learning, remote study, and virtual examination becoming at least in part, the norm.
To adapt to this new way of learning and perform their best they need time and task management skills to plan and manage their study effectively, and balance it with work and life.
This Agile Study Skills Webinar training course encourages students to organise themselves and provides a tactile and practical way to help students to map out their study and revision plans, helping them get the best results and reduce the stress of feeling overwhelmed.

In the Private Training Virtual Training 
Code: GTASW Duration: 2 - 2.5 hours

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

Upcoming schedule: Live Online GMT +01:00, Wednesday 17 April 2024 at 09:30 to Wednesday 17 April 2024 at 17:00 - (Duration: 1 days)

This Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.

In the classroom In the Private Training Virtual Training 
Code: GTBATL Duration: 1 Day

This Agile Approaches for Remote Teams training course encourages teams to organise themselves, helping them get the best results,face challenges and continuously improve.  ​Agile gives teams a sense of ownership and control, providing them with ​key practices and tools to support their continued well-being,performance and growth.

In the Private Training Virtual Training 
Code: GTART Duration: Two 90 minute sessions (3 hours)

AI

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

Ansible

This 4-days course starts with the essentials of Ansible: an overview of the components of the Ansible architecture, deploy Ansible on your systems and write playbooks to automate common IT tasks. You’ll get a good picture of the position of Ansible among the other configuration tools and experience first hand how easy it is to use Ansible for your automation tasks. In labs you will learn hands on how to use Ansible. From there on the course goes more in depth, so in the end you can orchestrate your environment with Ansible. Additionally, this course is a good preparation for the Red Hat EX294 exam.

In the Private Training Virtual Training 
Code: GTA1 Duration: 4 Days

AWS

This Advanced Analytics for Structured Data using AWS 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Azure

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

Azure is Microsoft's cloud computing technology. This Azure Development training course explores various techniques for developing applications and storing data in Azure, and helps you understand when each approach is best. The course is deep and broad, and assumes a good working knowledge of .NET and experience in enterprise development.

In the Private Training Virtual Training 
Code: GTNET11 Duration: 3 Days

Big Data

The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improveand expand the success of the business.

This Data Science for Business Professionals training course is also designed to assist learners in preparing for the CertNexus® DSBIZ™ (Exam DSZ-110) credential.

In the Private Training Virtual Training 
Code: GTDSBIZ Duration: 1/2 Day Accreditation: Data Science for Business Professionals DSBIZ Credential

This Advanced Analytics for Structured Data using AWS 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.

In the Private Training
Code: GTDDD Duration: 1 Day

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training Virtual Training 
Code: GTBDP1 Duration: 2 Day

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.

In the Private Training
Code: GTDDVR Duration: 1 Day

Technology and the data that it both collects and makes accessible is now interwoven with businesses and lives. The era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage.Analyzing data to find issues, insights and opportunities, is now a critical part of many job roles. Beyond the analysis, data analysts in all job roles must be able to effectively present and communicate their findings in visually compelling ways.

In the Private Training Virtual Training 
Code: GTDAVM Duration: 2 Days

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Blockchain Ethereum

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training Virtual Training 
Code: GTBCF Duration: 2 Days

C#

C# 8 is new in Visual Studio 2019, and is the latest evolution of Microsoft's primary programming language. This C# 8 Development training course covers the latest language features in C# 8, and includes a comparison of .NET Framework and .NET Core. You'll get a deep and broad understanding of C# as a programming language, and gain confidence to explore the richness of the .NET platform including asynchronous programming, LINQ, and EF.

In the Private Training
Code: GTNET31 Duration: 5 Days

Once you've mastered the core features of C# as a programming language, you're ready to take the next step. The .NET Framework offers an incredibly rich and diverse set of APIs that cover all aspects of contemporary development. This Advanced C# Development training course takes a detailed look at the areas of C# and .NET that have particular resonance to developers today, including asynchrony, creating decoupled and adaptable systems, test-driven development, .NET Core features, and containerization using Docker. The course also covers all the new features in C# 8.

In the Private Training Virtual Training 
Code: GTNET32 Duration: 4 Days

C++

Thought you knew C++? Think again! The C++11 standard saw a huge leap forward in the language and STL. Largely inspired by Boost, the C++11 standard introduced support for lambdas, multithreading, vastly improved object construction mechanisms, and much more beside. This Modern C++ Development training course takes a deep and detailed look at all the new features on offer in C++11, along with the incremental additional changes in C++14, C++17, and C++20.

In the Private Training Virtual Training 
Code: GTPL19 Duration: 5 Days

This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.

In the Private Training Virtual Training 
Code: GTPL18 Duration: 4 Days

Cloud Certification

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training Virtual Training 
Code: GTBCF Duration: 2 Days

Cloud Certifications

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training Virtual Training 
Code: GTBCF Duration: 2 Days

Cloud Computing

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training Virtual Training 
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

Cloud Service Manager

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training Virtual Training 
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

CompTIA Certifications

Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This CompTIA PenTest + training course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.

In the Private Training
Code: GTCPEN Duration: 5 Days

CompTIA Linux Certification

Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This CompTIA PenTest + training course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.

In the Private Training
Code: GTCPEN Duration: 5 Days

Cyber Security

The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improveand expand the success of the business.

This Data Science for Business Professionals training course is also designed to assist learners in preparing for the CertNexus® DSBIZ™ (Exam DSZ-110) credential.

In the Private Training Virtual Training 
Code: GTDSBIZ Duration: 1/2 Day Accreditation: Data Science for Business Professionals DSBIZ Credential

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training Virtual Training 
Code: GTCS Duration: 3 Hours eLearning Accreditation: Certified CyberSAFE Certificate

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training Virtual Training 
Code: GTCSC Duration: 4 Days over 4 Hour Sessions Accreditation: Cyber Secure Coder Certification

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

Data Science

In this two-day Apache Kafka for Developers training course you will experience and learn Kafka in a way that enables you to use it successfully in your company directly afterwards the training. Not only will you gain necessary theoretical knowledge but also practical experience through numerous exercises.

In the Private Training Virtual Training 
Code: GTDSAKD Duration: 2 Days

This Advanced Analytics for Structured Data using AWS 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training Virtual Training 
Code: GTBDP1 Duration: 2 Day

The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improveand expand the success of the business.

This Data Science for Business Professionals training course is also designed to assist learners in preparing for the CertNexus® DSBIZ™ (Exam DSZ-110) credential.

In the Private Training Virtual Training 
Code: GTDSBIZ Duration: 1/2 Day Accreditation: Data Science for Business Professionals DSBIZ Credential

Python has emerged as a popular and effective language in the world of data science. The dynamic nature of the language, the relative simplicity of the syntax, and the abundance of fast and powerful libraries have all been important contributory factors in this growth.

This Python Data Science training course takes a detailed look at the most popular Python libraries for numeric processing, statistical analysis, machine learning, and visualization. We also show how to make use of common Python data types and algorithms to achieve real-world tasks.

In the Private Training Virtual Training 
Code: GTIT51 Duration: 3 Days

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Kafkas focus on performance and persistence enables companies to rethink their IT architecture. This introduces new challenges for architects and operators.

In this instructor-led course you will not only experience what makes Kafka such a successful streaming platform but also how to identify challenges and obstacles and how to resolve them as easily as possible.

In the Private Training Virtual Training 
Code: GTDSAKF Duration: 2 Days

This two-day Apache Kafka for Operators training course is for administrators and DevOps-engineers who want to set up and operate Kafka successfully in production. In addition to the most important aspects of operation, participants will also deepen their expertise on how to monitor Kafka and how to avoid catastrophic situations.

In the Private Training Virtual Training 
Code: GTDSAKO Duration: 2 Days

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Technology and the data that it both collects and makes accessible is now interwoven with businesses and lives. The era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage.Analyzing data to find issues, insights and opportunities, is now a critical part of many job roles. Beyond the analysis, data analysts in all job roles must be able to effectively present and communicate their findings in visually compelling ways.

In the Private Training Virtual Training 
Code: GTDAVM Duration: 2 Days

DevOps Certification

This Continuous Delivery Ecosystem Foundation (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: Continuous Delivery Ecosystem Foundation (CDEF)

Today’s organisations deal with a higher volume of change in a more complex tech environment leading to a higher risk of outages and incidents. IT teams must improve service reliability and system resiliency. With automation and observability becoming key factors for more efficient and rapid deployments, the SRE profile has become one of the fastest-growing job roles.

In the Private Training Virtual Training 
Code: GTDSRE Duration: 2 Days Accreditation: Site Reliability Engineering Foundation Certification

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Foundation uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Foundation Certification (DSOF)

DevOps Certifications

This Continuous Delivery Ecosystem Foundation (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: Continuous Delivery Ecosystem Foundation (CDEF)

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Foundation uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Foundation Certification (DSOF)

DNS

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

Docker

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

Containerisation has revolutionised the way organisations build, deploy, and operate solutions in the cloud and on-premise. Docker knowledge has become indispensable, and Kubernetes has quickly emerged as the de-facto standard way to manage and orchestrate Docker containers.

This Docker and Kubernetes Development training course provides a thorough grounding in both Docker and Kubernetes. We explain how to create lean and mean containers and how to ensure they operate in a resilient and responsive fashion. We explain how to enforce best practices by applying the principles laid out in the Twelve Factor App methodology.

In the Private Training Virtual Training 
Code: GTDKD Duration: 3 Days

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training Virtual Training 
Code: GTK8SG Duration: 4 Days

Embedded Linux

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

Go Lang

Upcoming schedule: Live Online GMT +01:00, Tuesday 26 March 2024 at 09:30 to Friday 29 March 2024 at 17:00 - (Duration: 4 days)

This Go language programming training course will help you understand how Go works, and immediately be more productive. If you are building a team using Go, this will be a great opportunity to get your team on the same page and speaking the same language. The materials and presentation focus on teaching students how to write clear and robust code to create real-world solutions. Innovative lab exercises and code samples are provided to reinforce skills and quickly master the topics.

In the classroom In the Private Training Virtual Training 
Code: GTGLANG Duration: 4 Days

IoT

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.

In the Private Training
Code: GTIOTBIZ Duration: 4 Hours Accreditation: IoT for Business Professionals Certification

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training Virtual Training 
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

ISO/IEC Certifications

TRECCERT ISO 22301 Lead Implementer is an expert-level course developed to equip trainees with a practical understanding of the Business Continuity Management System (BCMS) implementation approach based on the ISO 22301 standard.

In the Private Training Virtual Training 
Code: GT22301LI Duration: 5 Days Accreditation: ISO/IEC Certifications

TRECCERT ISO/IEC 27001 Foundation is an entry-level course developed to provide trainees with a foundational knowledge of the ISO/IEC 27001 requirements and controls. The training course provides a complete introduction to the Information Security Management System (ISMS) based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GTISO27F Duration: 2 Days Accreditation: ISO/IEC Certifications

The ISO 22301 Lead Auditor training course is an expert-level course developed to equip trainees with a practical understanding of the Business Continuity Management System (BCMS) auditing approach based on the ISO 22301 and ISO 19011 standards.

In the Private Training Virtual Training 
Code: GT22301LA Duration: 5 Days Accreditation: ISO/IEC Certifications

The Data Protection Specialist in Remote Work training course is developed for Data Protection Specialists and any professional who is committed to ensuring conformance to a high level of data security.

In the Private Training Virtual Training 
Code: GTDPSRW Duration: 1 Day Accreditation: ISO/IEC Certifications

This ISO 22301 Foundation training course is an entry level course developed to provide trainees with a foundational knowledge of the ISO 22301 requirements and controls. The training course provides a complete introduction to the Business Continuity Management System BCMS based on the ISO 22301 standard.

 

In the Private Training Virtual Training 
Code: GT22301F Duration: 2 Days Accreditation: ISO/IEC Certifications

This ISO IEC 27001 Lead Implementer training course is an expert level course developed to equip trainees with a practical understanding of the Information Security Management System ISMS implementation approach based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GT27001LI Duration: 5 Days Accreditation: ISO/IEC Certifications

ISO IEC 27001 Lead Auditor training course is an expert level course developed to equip trainees with a practical understanding of the Information Security Management System ISMS auditing approach based on the ISO/IEC 27001 and ISO 19011 standards.

In the Private Training Virtual Training 
Code: GT27001LA Duration: 5 Days Accreditation: ISO/IEC Certifications

Java

Upcoming schedule: Live Online GMT +01:00, Tuesday 16 April 2024 at 09:30 to Thursday 18 April 2024 at 17:00 - (Duration: 3 days)

JavaScript has grown a lot in recent years, and nowadays allows developers to create extremely dynamic and rich client-side Web applications. This course leads you through the latest JavaScript syntax and includes detailed coverage of Dynamic HTML (DTML), the Document Object Model (DOM), and Cascading Style Sheets (CSS). The course also shows how to use jQuery to simplify client-side programming and add Ajax support with ease.

In the classroom In the Private Training Virtual Training 
Code: GTIT50 Duration: 3 Days

Java 11

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 3 Day

JavaScript

Upcoming schedule: Live Online GMT +01:00, Tuesday 16 April 2024 at 09:30 to Thursday 18 April 2024 at 17:00 - (Duration: 3 days)

JavaScript has grown a lot in recent years, and nowadays allows developers to create extremely dynamic and rich client-side Web applications. This course leads you through the latest JavaScript syntax and includes detailed coverage of Dynamic HTML (DTML), the Document Object Model (DOM), and Cascading Style Sheets (CSS). The course also shows how to use jQuery to simplify client-side programming and add Ajax support with ease.

In the classroom In the Private Training Virtual Training 
Code: GTIT50 Duration: 3 Days

Kubernetes

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Wednesday 29 March 2023 at 17:00 - (Duration: -361 days)

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the classroom In the Private Training Virtual Training 
Code: GTLFKAD Duration: 4 Days Accreditation: Certified Kubernetes Application Developer

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training Virtual Training 
Code: GTK8SG Duration: 4 Days

Containerisation has revolutionised the way organisations build, deploy, and operate solutions in the cloud and on-premise. Docker knowledge has become indispensable, and Kubernetes has quickly emerged as the de-facto standard way to manage and orchestrate Docker containers.

This Docker and Kubernetes Development training course provides a thorough grounding in both Docker and Kubernetes. We explain how to create lean and mean containers and how to ensure they operate in a resilient and responsive fashion. We explain how to enforce best practices by applying the principles laid out in the Twelve Factor App methodology.

In the Private Training Virtual Training 
Code: GTDKD Duration: 3 Days

Kubernetes Certifications

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Wednesday 29 March 2023 at 17:00 - (Duration: -361 days)

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the classroom In the Private Training Virtual Training 
Code: GTLFKAD Duration: 4 Days Accreditation: Certified Kubernetes Application Developer

Linux Foundation Certification

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Wednesday 29 March 2023 at 17:00 - (Duration: -361 days)

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the classroom In the Private Training Virtual Training 
Code: GTLFKAD Duration: 4 Days Accreditation: Certified Kubernetes Application Developer

LPI Certification

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Wednesday 29 March 2023 at 17:00 - (Duration: -361 days)

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the classroom In the Private Training Virtual Training 
Code: GTLFKAD Duration: 4 Days Accreditation: Certified Kubernetes Application Developer

Microservices

This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.

In the Private Training
Code: GTWMKCI Duration: 2 Days

Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring.  Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).

In the Private Training
Code: GTWMSBC Duration: 4 Days

This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.

In the Private Training
Code: GTWMA Duration: 2 Days

This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.

In the Private Training
Code: GTWTIM Duration: 2 Days

More DevOps courses

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach. This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

MS SQL Server

This Training in SQL Server 2018 Integration Services course will enable delegates to master SQL Server Integration Services. Delegates also will be able to import and export data using a variety of formats, including Excel spreadsheets and CSV files. The course will cover using the SSIS designer to copy and transforms data.

In the Private Training Virtual Training 
Code: GTPLSQLI Duration: 1 Day

MySQL

4 Top Takeaways from the Course:

    Make your existing data work harder for you
    Get the right report to the right person
    Create eloquent reports from raw data
    Improve communication inside and outside your organisation

In the Private Training Virtual Training 
Code: GTPLSQLS Duration: 2 Days

Developers, analysts and business users need to quickly analyse large amounts of data, get insight into that data, retrieve hidden knowledge inside it, and report against various data sources professionally and effectively. This Training in SQL Server Business Intelligence course will enable them to do this with SQL Server Business Intelligence. The 5 day course will cover the SQL Server components and tools used for B.I. projects. The course will also include the new features in SQL Server B.I. 2018. Reporting Services, Analysis Services and Integration Services will be explored and worked with. Components of Business Intelligence in SQL Server are completely independent from the SQL Server databases, so they can be used over any data sources. Therefore it is not necessary to know the SQL Server itself.

In the Private Training Virtual Training 
Code: GTPLSQL Duration: 5 Days

This Training in SQL Server 2018 Integration Services course will enable delegates to master SQL Server Integration Services. Delegates also will be able to import and export data using a variety of formats, including Excel spreadsheets and CSV files. The course will cover using the SSIS designer to copy and transforms data.

In the Private Training Virtual Training 
Code: GTPLSQLI Duration: 1 Day

New

This PET Architect training course is the most advanced of the HFI Certified User Experience Analyst TM series. It reveals core insights that coordinate methods for crafting an optimal user experience. The goal of the class isto make you an architect of emotion, engagement, conversion, and retention.

In the Private Training
Code: GTCDPAPETA Duration: 2 Days

The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. This Microsoft® Power BI® Data Analysis Professional training course software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action.

In the Private Training
Code: GTDBIA Duration: 2 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Thought you knew C++? Think again! The C++11 standard saw a huge leap forward in the language and STL. Largely inspired by Boost, the C++11 standard introduced support for lambdas, multithreading, vastly improved object construction mechanisms, and much more beside. This Modern C++ Development training course takes a deep and detailed look at all the new features on offer in C++11, along with the incremental additional changes in C++14, C++17, and C++20.

In the Private Training Virtual Training 
Code: GTPL19 Duration: 5 Days

Upcoming schedule: Live Online GMT +01:00, Tuesday 16 April 2024 at 09:30 to Thursday 18 April 2024 at 17:00 - (Duration: 3 days)

JavaScript has grown a lot in recent years, and nowadays allows developers to create extremely dynamic and rich client-side Web applications. This course leads you through the latest JavaScript syntax and includes detailed coverage of Dynamic HTML (DTML), the Document Object Model (DOM), and Cascading Style Sheets (CSS). The course also shows how to use jQuery to simplify client-side programming and add Ajax support with ease.

In the classroom In the Private Training Virtual Training 
Code: GTIT50 Duration: 3 Days

This Omni - Channel UX Strategy & Innovation training course will empower you to contribute to your organization’s strategic planning on user-centric strategies and product innovation across channels. You will learn how to lead and direct research for the development of new products, services, and business ideas for a seamless user experience. Maximize your ROI on innovation work with a clear understanding of what it takes to launch successful products in the market.

In the Private Training
Code: GTCXAOSI Duration: 3 Days

Persuasion, emotion, and trust are critical factorsfor creating successful online interactions. While traditional user-centered design focuses on design-ing for usability, it is now essential to leverage thescience of PET to influence users. Whether your site,application, or product is informational, functional,or transactional, PET Design teaches you how tomotivate people to make decisions that lead to conversion.

In the Private Training
Code: GTCDPAPET Duration: 3 Days

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

With the impact of the pandemic, students are looking forward to home learning, remote study, and virtual examination becoming at least in part, the norm.
To adapt to this new way of learning and perform their best they need time and task management skills to plan and manage their study effectively, and balance it with work and life.
This Agile Study Skills Webinar training course encourages students to organise themselves and provides a tactile and practical way to help students to map out their study and revision plans, helping them get the best results and reduce the stress of feeling overwhelmed.

In the Private Training Virtual Training 
Code: GTASW Duration: 2 - 2.5 hours

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Wednesday 29 March 2023 at 17:00 - (Duration: -361 days)

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the classroom In the Private Training Virtual Training 
Code: GTLFKAD Duration: 4 Days Accreditation: Certified Kubernetes Application Developer

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training Virtual Training 
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring.  Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).

In the Private Training
Code: GTWMSBC Duration: 4 Days

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 3 Day

This Machine Learning for Java Developers Training course is a hands-on introduction to core Machine Learning techniques, this course will familiarise you with the Machine Learning landscape as well as providing practical experience.

In the Private Training
Code: GTMLJ1 Duration: 2 Days Practical

This Machine Learning for Python Developers training course is a hands-on introduction to core Machine Learning techniques. This course will familiarise you with the Machine Learning landscape as well as providing practical experience.

 

In the Private Training
Code: GTMLP1 Duration: 2 Days Practical

This Agile Approaches for Remote Teams training course encourages teams to organise themselves, helping them get the best results,face challenges and continuously improve.  ​Agile gives teams a sense of ownership and control, providing them with ​key practices and tools to support their continued well-being,performance and growth.

In the Private Training Virtual Training 
Code: GTART Duration: Two 90 minute sessions (3 hours)

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

Designing intuitive and effective user interfaces isboth science and art. During this course, partici-pants will learn how to apply research-based andfield-tested Web and application design principlesand methodologies. Initially they will focus on the four foundational layers of the interface: Navigation, Presentation,Content, and Interaction. Participants will then beprovided with the framework and methodologyneeded to support rapid prototyping initiatives.Finally, they will extend their sphere of influencethrough the application of accessibility and cross-cultural design methods.

In the Private Training Virtual Training 
Code: GTCUASAE Duration: 2 Days

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.

In the Private Training
Code: GTWTIM Duration: 2 Days

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

This Training in SQL Server 2018 Integration Services course will enable delegates to master SQL Server Integration Services. Delegates also will be able to import and export data using a variety of formats, including Excel spreadsheets and CSV files. The course will cover using the SSIS designer to copy and transforms data.

In the Private Training Virtual Training 
Code: GTPLSQLI Duration: 1 Day

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach. This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training Virtual Training 
Code: GTK8SG Duration: 4 Days

This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWASM Duration: 5 Days

This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTWAS Duration: 3 Days

This Advanced Analytics for Structured Data using AWS 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Developers, analysts and business users need to quickly analyse large amounts of data, get insight into that data, retrieve hidden knowledge inside it, and report against various data sources professionally and effectively. This Training in SQL Server Business Intelligence course will enable them to do this with SQL Server Business Intelligence. The 5 day course will cover the SQL Server components and tools used for B.I. projects. The course will also include the new features in SQL Server B.I. 2018. Reporting Services, Analysis Services and Integration Services will be explored and worked with. Components of Business Intelligence in SQL Server are completely independent from the SQL Server databases, so they can be used over any data sources. Therefore it is not necessary to know the SQL Server itself.

In the Private Training Virtual Training 
Code: GTPLSQL Duration: 5 Days

4 Top Takeaways from the Course:

    Make your existing data work harder for you
    Get the right report to the right person
    Create eloquent reports from raw data
    Improve communication inside and outside your organisation

In the Private Training Virtual Training 
Code: GTPLSQLS Duration: 2 Days

This User Experience Foundations training course provides participants a research-basedand practical understanding of the foundational models and insights essential to the UX field. Youwill learn that you don’t see the way you think yousee. You don’t make decisions the way you think youdecide. You don’t remember things the way youthink you recall. And you don’t move the way youbelieve you move. Without this foundation, you willdesign based on common sense...which is oftenwrong. Understanding human vision, intellect, memory, andmotor function is the baseline upon which everyskilled UX professional should build their career; weshow clearly how each idea applies directly todesign decisions. This course will help you buildcredibility and improve your results by giving youthe knowledge required to present your ideas froma research-based point of view.

In the Private Training
Code: GTCUAF Duration: 2 Days

User-centered analysis provides the basis for design-ing software that makes sense to your users. Useproven, objective datagathering techniques to devel-op a clear understanding of who your users are andhow they will approach your Web site or application. Create effective, usable interfaces—the first time.This seminar walks you through HFI’s process forcollecting and analyzing relevant user and task data,and for developing a conceptual architecture fordesign. Alternating between explanation, discussion,and hands-on exercises, the course offers partici-pants the tools and confidence necessary to planand conduct effective user-centered analysis.

In the Private Training
Code: GTCUAUCA Duration: 3 Days

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Friday 29 March 2024 at 17:00 - (Duration: 4 days)

Rust is an intriguing language. Syntactically similar to C++, it offers higher-order language features to simplify important tasks such as memory management, concurrent execution, and safe vs. unsafe execution.

This course will help you understand what Rust applications look like, how to write Rust applications properly, and how to get the most out of the language and its libraries.

In the classroom In the Private Training Virtual Training 
Code: GTAORP Duration: 4 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

This python in finance training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to solve some common modelling tasks in finance.
 

In the Private Training Virtual Training 
Code: GTIT53 Duration: 1 Day

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Rich functionality is worth little if the user can’t access it. Progressive testing of Web sites and software applications is critical for creating user centered designs.This Practical Usability Testing training course provides quick and practical testing techniques that you can use to help move the design into compliance with the users’ needs, limitations, mental models and cognitive styles. This two-day comprehensive course gives designers and developers tools and techniques to observe how users experience their interfaces. You will learn essential testing techniques ranging from simple paper prototype tests to cutting-edge remote testing using advanced tool sets, so that you can successfully moderate your usability tests.

In the Private Training
Code: GTCUAPUT Duration: 2 Days

This Python training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to pre-process, shape, model and visualize data.
 

 

In the Private Training Virtual Training 
Code: GTIT54 Duration: 3 Days

Python has emerged as a popular and effective language in the world of data science. The dynamic nature of the language, the relative simplicity of the syntax, and the abundance of fast and powerful libraries have all been important contributory factors in this growth.

This Python Data Science training course takes a detailed look at the most popular Python libraries for numeric processing, statistical analysis, machine learning, and visualization. We also show how to make use of common Python data types and algorithms to achieve real-world tasks.

In the Private Training Virtual Training 
Code: GTIT51 Duration: 3 Days

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCFIN Duration: 5 Days

Today’s organisations deal with a higher volume of change in a more complex tech environment leading to a higher risk of outages and incidents. IT teams must improve service reliability and system resiliency. With automation and observability becoming key factors for more efficient and rapid deployments, the SRE profile has become one of the fastest-growing job roles.

In the Private Training Virtual Training 
Code: GTDSRE Duration: 2 Days Accreditation: Site Reliability Engineering Foundation Certification

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

Once you've mastered the core features of C# as a programming language, you're ready to take the next step. The .NET Framework offers an incredibly rich and diverse set of APIs that cover all aspects of contemporary development. This Advanced C# Development training course takes a detailed look at the areas of C# and .NET that have particular resonance to developers today, including asynchrony, creating decoupled and adaptable systems, test-driven development, .NET Core features, and containerization using Docker. The course also covers all the new features in C# 8.

In the Private Training Virtual Training 
Code: GTNET32 Duration: 4 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCTEL Duration: 5 Days

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCHEAL Duration: 5 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTSWADTD Duration: 3 Days

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

This ISO IEC 27001 Lead Implementer training course is an expert level course developed to equip trainees with a practical understanding of the Information Security Management System ISMS implementation approach based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GT27001LI Duration: 5 Days Accreditation: ISO/IEC Certifications

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training Virtual Training 
Code: GTCSC Duration: 4 Days over 4 Hour Sessions Accreditation: Cyber Secure Coder Certification

The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improveand expand the success of the business.

This Data Science for Business Professionals training course is also designed to assist learners in preparing for the CertNexus® DSBIZ™ (Exam DSZ-110) credential.

In the Private Training Virtual Training 
Code: GTDSBIZ Duration: 1/2 Day Accreditation: Data Science for Business Professionals DSBIZ Credential

Upcoming schedule: Live Online GMT +01:00, Wednesday 17 April 2024 at 09:30 to Wednesday 17 April 2024 at 17:00 - (Duration: 1 days)

This Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.

In the classroom In the Private Training Virtual Training 
Code: GTBATL Duration: 1 Day

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training Virtual Training 
Code: GTBCF Duration: 2 Days

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

Technology and the data that it both collects and makes accessible is now interwoven with businesses and lives. The era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage.Analyzing data to find issues, insights and opportunities, is now a critical part of many job roles. Beyond the analysis, data analysts in all job roles must be able to effectively present and communicate their findings in visually compelling ways.

In the Private Training Virtual Training 
Code: GTDAVM Duration: 2 Days

Kafkas focus on performance and persistence enables companies to rethink their IT architecture. This introduces new challenges for architects and operators.

In this instructor-led course you will not only experience what makes Kafka such a successful streaming platform but also how to identify challenges and obstacles and how to resolve them as easily as possible.

In the Private Training Virtual Training 
Code: GTDSAKF Duration: 2 Days

This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.

In the Private Training Virtual Training 
Code: GTPL18 Duration: 4 Days

Containerisation has revolutionised the way organisations build, deploy, and operate solutions in the cloud and on-premise. Docker knowledge has become indispensable, and Kubernetes has quickly emerged as the de-facto standard way to manage and orchestrate Docker containers.

This Docker and Kubernetes Development training course provides a thorough grounding in both Docker and Kubernetes. We explain how to create lean and mean containers and how to ensure they operate in a resilient and responsive fashion. We explain how to enforce best practices by applying the principles laid out in the Twelve Factor App methodology.

In the Private Training Virtual Training 
Code: GTDKD Duration: 3 Days

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

C# 8 is new in Visual Studio 2019, and is the latest evolution of Microsoft's primary programming language. This C# 8 Development training course covers the latest language features in C# 8, and includes a comparison of .NET Framework and .NET Core. You'll get a deep and broad understanding of C# as a programming language, and gain confidence to explore the richness of the .NET platform including asynchronous programming, LINQ, and EF.

In the Private Training
Code: GTNET31 Duration: 5 Days

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.

In the Private Training
Code: GTDDD Duration: 1 Day

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.

In the Private Training
Code: GTWMKCI Duration: 2 Days

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training Virtual Training 
Code: GTBDP1 Duration: 2 Day

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Foundation uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Foundation Certification (DSOF)

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.

In the Private Training
Code: GTDDVR Duration: 1 Day

Azure is Microsoft's cloud computing technology. This Azure Development training course explores various techniques for developing applications and storing data in Azure, and helps you understand when each approach is best. The course is deep and broad, and assumes a good working knowledge of .NET and experience in enterprise development.

In the Private Training Virtual Training 
Code: GTNET11 Duration: 3 Days

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training Virtual Training 
Code: GTCS Duration: 3 Hours eLearning Accreditation: Certified CyberSAFE Certificate

This Certified Internet of Things Security Practitioner instructor led course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.

In the Private Training
Code: GTIOTSP Duration: 3 Days Accreditation: IoT Security Practitioner Certification

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.

In the Private Training
Code: GTWMA Duration: 2 Days

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.

In the Private Training
Code: GTIOTBIZ Duration: 4 Hours Accreditation: IoT for Business Professionals Certification

This ISO 22301 Foundation training course is an entry level course developed to provide trainees with a foundational knowledge of the ISO 22301 requirements and controls. The training course provides a complete introduction to the Business Continuity Management System BCMS based on the ISO 22301 standard.

 

In the Private Training Virtual Training 
Code: GT22301F Duration: 2 Days Accreditation: ISO/IEC Certifications

TRECCERT ISO/IEC 27001 Foundation is an entry-level course developed to provide trainees with a foundational knowledge of the ISO/IEC 27001 requirements and controls. The training course provides a complete introduction to the Information Security Management System (ISMS) based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GTISO27F Duration: 2 Days Accreditation: ISO/IEC Certifications

ISO IEC 27001 Lead Auditor training course is an expert level course developed to equip trainees with a practical understanding of the Information Security Management System ISMS auditing approach based on the ISO/IEC 27001 and ISO 19011 standards.

In the Private Training Virtual Training 
Code: GT27001LA Duration: 5 Days Accreditation: ISO/IEC Certifications

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This CompTIA PenTest + training course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.

In the Private Training
Code: GTCPEN Duration: 5 Days

The ISO 22301 Lead Auditor training course is an expert-level course developed to equip trainees with a practical understanding of the Business Continuity Management System (BCMS) auditing approach based on the ISO 22301 and ISO 19011 standards.

In the Private Training Virtual Training 
Code: GT22301LA Duration: 5 Days Accreditation: ISO/IEC Certifications

TRECCERT ISO 22301 Lead Implementer is an expert-level course developed to equip trainees with a practical understanding of the Business Continuity Management System (BCMS) implementation approach based on the ISO 22301 standard.

In the Private Training Virtual Training 
Code: GT22301LI Duration: 5 Days Accreditation: ISO/IEC Certifications

The Data Protection Specialist in Remote Work training course is developed for Data Protection Specialists and any professional who is committed to ensuring conformance to a high level of data security.

In the Private Training Virtual Training 
Code: GTDPSRW Duration: 1 Day Accreditation: ISO/IEC Certifications

This Continuous Delivery Ecosystem Foundation (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: Continuous Delivery Ecosystem Foundation (CDEF)

Institutionalization (I-19) of usability is a must if you want to move your organization beyond an ad-hoc user-centered design approach to a sustained andmanaged user experience (UX) practice. Make thereal competitive difference. Make UX intelligence and practice a key part of your strategic business decisions.

In the Private Training
Code: GTCXASIM Duration: 2 Days

This 4-days course starts with the essentials of Ansible: an overview of the components of the Ansible architecture, deploy Ansible on your systems and write playbooks to automate common IT tasks. You’ll get a good picture of the position of Ansible among the other configuration tools and experience first hand how easy it is to use Ansible for your automation tasks. In labs you will learn hands on how to use Ansible. From there on the course goes more in depth, so in the end you can orchestrate your environment with Ansible. Additionally, this course is a good preparation for the Red Hat EX294 exam.

In the Private Training Virtual Training 
Code: GTA1 Duration: 4 Days

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

This two-day Apache Kafka for Operators training course is for administrators and DevOps-engineers who want to set up and operate Kafka successfully in production. In addition to the most important aspects of operation, participants will also deepen their expertise on how to monitor Kafka and how to avoid catastrophic situations.

In the Private Training Virtual Training 
Code: GTDSAKO Duration: 2 Days

In this two-day Apache Kafka for Developers training course you will experience and learn Kafka in a way that enables you to use it successfully in your company directly afterwards the training. Not only will you gain necessary theoretical knowledge but also practical experience through numerous exercises.

In the Private Training Virtual Training 
Code: GTDSAKD Duration: 2 Days

Upcoming schedule: Live Online GMT +01:00, Tuesday 26 March 2024 at 09:30 to Friday 29 March 2024 at 17:00 - (Duration: 4 days)

This Go language programming training course will help you understand how Go works, and immediately be more productive. If you are building a team using Go, this will be a great opportunity to get your team on the same page and speaking the same language. The materials and presentation focus on teaching students how to write clear and robust code to create real-world solutions. Innovative lab exercises and code samples are provided to reinforce skills and quickly master the topics.

In the classroom In the Private Training Virtual Training 
Code: GTGLANG Duration: 4 Days

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training Virtual Training 
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

Virtual classrooms can be just as engaging as traditional classrooms when you have the right skills and knowledge of the technology. This event will help you prepare to deliver engaging lessons on any subject in a virtual classroom using non-verbal and verbal tools that are available on all common delivery platforms. You will learn best practices around lesson preparation, keeping students engaged, and what do when you need to troubleshoot. For this event, we will be using Zoom as the delivery platform and showcasing how it can be used to keep students engaged, but these skills will work on any platform.

In the Private Training Virtual Training 
Code: GTCVE Duration: 4 Hours

This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. 

In the Private Training
Code: GTIRBIZ Duration: 1 Day Accreditation: Incident Response for Business Professionals Certification

OpenStack

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Predictive Analytics

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

Python

Python has emerged as a popular and effective language in the world of data science. The dynamic nature of the language, the relative simplicity of the syntax, and the abundance of fast and powerful libraries have all been important contributory factors in this growth.

This Python Data Science training course takes a detailed look at the most popular Python libraries for numeric processing, statistical analysis, machine learning, and visualization. We also show how to make use of common Python data types and algorithms to achieve real-world tasks.

In the Private Training Virtual Training 
Code: GTIT51 Duration: 3 Days

This python in finance training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to solve some common modelling tasks in finance.
 

In the Private Training Virtual Training 
Code: GTIT53 Duration: 1 Day

This python in finance training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to solve some common modelling tasks in finance.
 

In the Private Training Virtual Training 
Code: GTIT53 Duration: 1 Day

Python has emerged as a popular and effective language in the world of data science. The dynamic nature of the language, the relative simplicity of the syntax, and the abundance of fast and powerful libraries have all been important contributory factors in this growth.

This Python Data Science training course takes a detailed look at the most popular Python libraries for numeric processing, statistical analysis, machine learning, and visualization. We also show how to make use of common Python data types and algorithms to achieve real-world tasks.

In the Private Training Virtual Training 
Code: GTIT51 Duration: 3 Days

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training Virtual Training 
Code: GTBDP1 Duration: 2 Day

This Python training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to pre-process, shape, model and visualize data.
 

 

In the Private Training Virtual Training 
Code: GTIT54 Duration: 3 Days

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

This Python training course offers a short but intensive hands-on introduction to the use of Python and the most popular data analytics packages and how to apply this to pre-process, shape, model and visualize data.
 

 

In the Private Training Virtual Training 
Code: GTIT54 Duration: 3 Days

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Red Hat

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

Rust

Upcoming schedule: Live Online GMT +00:00, Tuesday 26 March 2024 at 09:30 to Friday 29 March 2024 at 17:00 - (Duration: 4 days)

Rust is an intriguing language. Syntactically similar to C++, it offers higher-order language features to simplify important tasks such as memory management, concurrent execution, and safe vs. unsafe execution.

This course will help you understand what Rust applications look like, how to write Rust applications properly, and how to get the most out of the language and its libraries.

In the classroom In the Private Training Virtual Training 
Code: GTAORP Duration: 4 Days

Secure Coding

This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTWAS Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWASM Duration: 5 Days

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCFIN Duration: 5 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTSWADTD Duration: 3 Days

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCHEAL Duration: 5 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCTEL Duration: 5 Days

Security Certification

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. 

In the Private Training
Code: GTIRBIZ Duration: 1 Day Accreditation: Incident Response for Business Professionals Certification

This Certified Internet of Things Security Practitioner instructor led course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.

In the Private Training
Code: GTIOTSP Duration: 3 Days Accreditation: IoT Security Practitioner Certification

TRECCERT ISO/IEC 27001 Foundation is an entry-level course developed to provide trainees with a foundational knowledge of the ISO/IEC 27001 requirements and controls. The training course provides a complete introduction to the Information Security Management System (ISMS) based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GTISO27F Duration: 2 Days Accreditation: ISO/IEC Certifications

This ISO IEC 27001 Lead Implementer training course is an expert level course developed to equip trainees with a practical understanding of the Information Security Management System ISMS implementation approach based on the ISO/IEC 27001 standard.

In the Private Training Virtual Training 
Code: GT27001LI Duration: 5 Days Accreditation: ISO/IEC Certifications

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training Virtual Training 
Code: GTCSC Duration: 4 Days over 4 Hour Sessions Accreditation: Cyber Secure Coder Certification

SQL

Developers, analysts and business users need to quickly analyse large amounts of data, get insight into that data, retrieve hidden knowledge inside it, and report against various data sources professionally and effectively. This Training in SQL Server Business Intelligence course will enable them to do this with SQL Server Business Intelligence. The 5 day course will cover the SQL Server components and tools used for B.I. projects. The course will also include the new features in SQL Server B.I. 2018. Reporting Services, Analysis Services and Integration Services will be explored and worked with. Components of Business Intelligence in SQL Server are completely independent from the SQL Server databases, so they can be used over any data sources. Therefore it is not necessary to know the SQL Server itself.

In the Private Training Virtual Training 
Code: GTPLSQL Duration: 5 Days

This Training in SQL Server 2018 Integration Services course will enable delegates to master SQL Server Integration Services. Delegates also will be able to import and export data using a variety of formats, including Excel spreadsheets and CSV files. The course will cover using the SSIS designer to copy and transforms data.

In the Private Training Virtual Training 
Code: GTPLSQLI Duration: 1 Day

4 Top Takeaways from the Course:

    Make your existing data work harder for you
    Get the right report to the right person
    Create eloquent reports from raw data
    Improve communication inside and outside your organisation

In the Private Training Virtual Training 
Code: GTPLSQLS Duration: 2 Days

UX

This Omni - Channel UX Strategy & Innovation training course will empower you to contribute to your organization’s strategic planning on user-centric strategies and product innovation across channels. You will learn how to lead and direct research for the development of new products, services, and business ideas for a seamless user experience. Maximize your ROI on innovation work with a clear understanding of what it takes to launch successful products in the market.

In the Private Training
Code: GTCXAOSI Duration: 3 Days

This User Experience Foundations training course provides participants a research-basedand practical understanding of the foundational models and insights essential to the UX field. Youwill learn that you don’t see the way you think yousee. You don’t make decisions the way you think youdecide. You don’t remember things the way youthink you recall. And you don’t move the way youbelieve you move. Without this foundation, you willdesign based on common sense...which is oftenwrong. Understanding human vision, intellect, memory, andmotor function is the baseline upon which everyskilled UX professional should build their career; weshow clearly how each idea applies directly todesign decisions. This course will help you buildcredibility and improve your results by giving youthe knowledge required to present your ideas froma research-based point of view.

In the Private Training
Code: GTCUAF Duration: 2 Days

User-centered analysis provides the basis for design-ing software that makes sense to your users. Useproven, objective datagathering techniques to devel-op a clear understanding of who your users are andhow they will approach your Web site or application. Create effective, usable interfaces—the first time.This seminar walks you through HFI’s process forcollecting and analyzing relevant user and task data,and for developing a conceptual architecture fordesign. Alternating between explanation, discussion,and hands-on exercises, the course offers partici-pants the tools and confidence necessary to planand conduct effective user-centered analysis.

In the Private Training
Code: GTCUAUCA Duration: 3 Days

Designing intuitive and effective user interfaces isboth science and art. During this course, partici-pants will learn how to apply research-based andfield-tested Web and application design principlesand methodologies. Initially they will focus on the four foundational layers of the interface: Navigation, Presentation,Content, and Interaction. Participants will then beprovided with the framework and methodologyneeded to support rapid prototyping initiatives.Finally, they will extend their sphere of influencethrough the application of accessibility and cross-cultural design methods.

In the Private Training Virtual Training 
Code: GTCUASAE Duration: 2 Days

Persuasion, emotion, and trust are critical factorsfor creating successful online interactions. While traditional user-centered design focuses on design-ing for usability, it is now essential to leverage thescience of PET to influence users. Whether your site,application, or product is informational, functional,or transactional, PET Design teaches you how tomotivate people to make decisions that lead to conversion.

In the Private Training
Code: GTCDPAPET Duration: 3 Days

Institutionalization (I-19) of usability is a must if you want to move your organization beyond an ad-hoc user-centered design approach to a sustained andmanaged user experience (UX) practice. Make thereal competitive difference. Make UX intelligence and practice a key part of your strategic business decisions.

In the Private Training
Code: GTCXASIM Duration: 2 Days

This PET Architect training course is the most advanced of the HFI Certified User Experience Analyst TM series. It reveals core insights that coordinate methods for crafting an optimal user experience. The goal of the class isto make you an architect of emotion, engagement, conversion, and retention.

In the Private Training
Code: GTCDPAPETA Duration: 2 Days

Rich functionality is worth little if the user can’t access it. Progressive testing of Web sites and software applications is critical for creating user centered designs.This Practical Usability Testing training course provides quick and practical testing techniques that you can use to help move the design into compliance with the users’ needs, limitations, mental models and cognitive styles. This two-day comprehensive course gives designers and developers tools and techniques to observe how users experience their interfaces. You will learn essential testing techniques ranging from simple paper prototype tests to cutting-edge remote testing using advanced tool sets, so that you can successfully moderate your usability tests.

In the Private Training
Code: GTCUAPUT Duration: 2 Days

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

"Absolutely fantastic training. Thoroughly enjoyed it thanks to our highly enthusiastic tutor.  It wouldn't be an understatement to say that it was the best professional training that I have ever received."

 

Customised Linux with Networking

Live Online -  February 2022

 

"The course content was very good. When needed, the Instructor was extending the content of the course with hints and tips to help us understand different topics that were covered in the course."

 

Kubernetes Administration Certification - GTLFK

Live Online June 2021

 

 

 

“The course was held at the highest possible standards, the instructor was excellent, well prepared, well informed, and clearly an SME. Top marks.”

 

Professional Cloud Service Manager - GTC13

Live Online December 2021

 

“Very engaging and practical course so hope to be able to put the learning into practice.”

 

Being Agile in Business - GTBAB

Live Online September 2021

 

“Great instructor, who encouraged active participation. The breakout groups and exercises kept the group engaged and the content relevant to our own products”.

 

Site Reliability Engineering Foundation - GTDSRE

Live Online January 2022

 

 

 

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners
  •  
  •  
  •  

 

Upcoming Courses

Kubernetes Administration

11th - 14th March 2024

26th - 29th March 2024

Live Online

 

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

RUST

11th - 14th March 2024

26th - 29th March 2024

 Live Online

This course will help you understand what Rust applications look like, how to write Rust applications properly, and how to get the most out of the language and its libraries.

Learn More

Introduction to Python 3 

19th - 21st March 2024

9th - 11th April 2024

7th - 9th May 2024

   4th - 6th June 2024

 

Live Online

This Introduction to Python 3 training course is designed for anyone who needs to learn how to write programs in Python or support/modify existing programs.

 

Learn More

 GO LANG TRAINING

11th - 14th March 2024

26th - 29th March 2024

 

Live Online        

 

This Go language programming training course will help you understand how Go works, and immediately be more productive. If you are building a team using Go, this will be a great opportunity to get your team on the same page and speaking the same language. Innovative lab exercises and code samples are provided to reinforce skills and quickly master the topics.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter