+353 1 402 9423 | firstname.lastname@example.org
In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.
This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence. The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.
This 2 day Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.
This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation.
In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.
Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.
Lab exercises provide essential and practical hands-on experience for each topic.
This Angular 9 Development training course takes a thorough look at Angular 9, the latest version of the Angular framework. We can also run courses on earlier versions of Angular, if this is what you're looking for - just contact us to discuss the details.
Upcoming schedule: Live Online, Monday 27 April 2020 at 09:00 to Thursday 30 April 2020 at 17:00 - (Duration: 4 days)
This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.
This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.
This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.
Azure is Microsoft's cloud computing technology. This Azure Development training course explores various techniques for developing applications and storing data in Azure, and helps you understand when each approach is best. The course is deep and broad, and assumes a good working knowledge of .NET and experience in enterprise development.
Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions.
This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.
Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.
This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.
Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.
New course content will be here shortly.
Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here
This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.
The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.
Once you've mastered the core features of C# as a programming language, you're ready to take the next step. The .NET Framework offers an incredibly rich and diverse set of APIs that cover all aspects of contemporary development. This Advanced C# Development training course takes a detailed look at the areas of C# and .NET that have particular resonance to developers today, including asynchrony, creating decoupled and adaptable systems, test-driven development, .NET Core features, and containerization using Docker. The course also covers all the new features in C# 8.
C# 8 is new in Visual Studio 2019, and is the latest evolution of Microsoft's primary programming language. This C# 8 Development training course covers the latest language features in C# 8, and includes a comparison of .NET Framework and .NET Core. You'll get a deep and broad understanding of C# as a programming language, and gain confidence to explore the richness of the .NET platform including asynchronous programming, LINQ, and EF.
Thought you knew C++? Think again! The C++11 standard saw a huge leap forward in the language and STL. Largely inspired by Boost, the C++11 standard introduced support for lambdas, multithreading, vastly improved object construction mechanisms, and much more beside. This Modern C++ Development training course takes a deep and detailed look at all the new features on offer in C++11, along with the incremental additional changes in C++14, C++17, and C++20.
This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.
Upcoming schedule: Live Online, Tuesday 21 April 2020 at 09:00 to Wednesday 22 April 2020 at 17:00 - (Duration: 2 days)
The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint. Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This CompTIA PenTest + training course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination.
This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
Python has emerged as a popular and effective language in the world of data science. The dynamic nature of the language, the relative simplicity of the syntax, and the abundance of fast and powerful libraries have all been important contributory factors in this growth.
This Python Data Science training course takes a detailed look at the most popular Python libraries for numeric processing, statistical analysis, machine learning, and visualization. We also show how to make use of common Python data types and algorithms to achieve real-world tasks.
Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.
The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.
The SRE (Site Reliability Engineering) Foundation℠ course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. The course highlights the evolution of SRE and its future direction and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).
This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.
This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.
DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.
Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.
Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.
This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.
This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.
The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.
This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.
IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.
This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.
DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.
Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.
Containerisation has revolutionised the way organisations build, deploy, and operate solutions in the cloud and on-premise. Docker knowledge has become indispensable, and Kubernetes has quickly emerged as the de-facto standard way to manage and orchestrate Docker containers.
This Docker and Kubernetes Development training course provides a thorough grounding in both Docker and Kubernetes. We explain how to create lean and mean containers and how to ensure they operate in a resilient and responsive fashion. We explain how to enforce best practices by applying the principles laid out in the Twelve Factor App methodology.
This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.
In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.
The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.
The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly.
The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.
In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.
Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.
The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.
Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring. Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).
This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.
This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.
This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.
Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.
DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.
This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.
What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.
This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.
This drives value and identifies and reduces non-value adding activities.
This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.
In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.
The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.
The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.
Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110This document includes instructor led class overview and objectives, identifies target student and prerequisites, course outline, and course specific software and hardware requirements.
This course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.
This Machine Learning for Python Developers training course is a hands-on introduction to core Machine Learning techniques. This course will familiarise you with the Machine Learning landscape as well as providing practical experience.
The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.
This Machine Learning for Java Developers Training course is a hands-on introduction to core Machine Learning techniques, this course will familiarise you with the Machine Learning landscape as well as providing practical experience.
The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.
Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.
Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.
This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.
This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.
This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.
Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.
This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.
This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.
This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.
This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.
Designing intuitive and effective user interfaces isboth science and art. During this course, partici-pants will learn how to apply research-based andfield-tested Web and application design principlesand methodologies. Initially they will focus on the four foundational layers of the interface: Navigation, Presentation,Content, and Interaction. Participants will then beprovided with the framework and methodologyneeded to support rapid prototyping initiatives.Finally, they will extend their sphere of influencethrough the application of accessibility and cross-cultural design methods.
This User Experience Foundations training course provides participants a research-basedand practical understanding of the foundational models and insights essential to the UX field. Youwill learn that you don’t see the way you think yousee. You don’t make decisions the way you think youdecide. You don’t remember things the way youthink you recall. And you don’t move the way youbelieve you move. Without this foundation, you willdesign based on common sense...which is oftenwrong. Understanding human vision, intellect, memory, andmotor function is the baseline upon which everyskilled UX professional should build their career; weshow clearly how each idea applies directly todesign decisions. This course will help you buildcredibility and improve your results by giving youthe knowledge required to present your ideas froma research-based point of view.
User-centered analysis provides the basis for design-ing software that makes sense to your users. Useproven, objective datagathering techniques to devel-op a clear understanding of who your users are andhow they will approach your Web site or application. Create effective, usable interfaces—the first time.This seminar walks you through HFI’s process forcollecting and analyzing relevant user and task data,and for developing a conceptual architecture fordesign. Alternating between explanation, discussion,and hands-on exercises, the course offers partici-pants the tools and confidence necessary to planand conduct effective user-centered analysis.
Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.
This PET Architect training course is the most advanced of the HFI Certified User Experience Analyst TM series. It reveals core insights that coordinate methods for crafting an optimal user experience. The goal of the class isto make you an architect of emotion, engagement, conversion, and retention.
This Omni - Channel UX Strategy & Innovation training course will empower you to contribute to your organization’s strategic planning on user-centric strategies and product innovation across channels. You will learn how to lead and direct research for the development of new products, services, and business ideas for a seamless user experience. Maximize your ROI on innovation work with a clear understanding of what it takes to launch successful products in the market.
Persuasion, emotion, and trust are critical factorsfor creating successful online interactions. While traditional user-centered design focuses on design-ing for usability, it is now essential to leverage thescience of PET to influence users. Whether your site,application, or product is informational, functional,or transactional, PET Design teaches you how tomotivate people to make decisions that lead to conversion.
The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. This Microsoft® Power BI® Data Analysis Professional training course software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action.
Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.
Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.
Rich functionality is worth little if the user can’t access it. Progressive testing of Web sites and software applications is critical for creating user centered designs.This Practical Usability Testing training course provides quick and practical testing techniques that you can use to help move the design into compliance with the users’ needs, limitations, mental models and cognitive styles. This two-day comprehensive course gives designers and developers tools and techniques to observe how users experience their interfaces. You will learn essential testing techniques ranging from simple paper prototype tests to cutting-edge remote testing using advanced tool sets, so that you can successfully moderate your usability tests.
In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.
Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.
Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.
NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.
If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.
The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.
This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.
The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.
Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.
As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.
As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.
Institutionalization (I-19) of usability is a must if you want to move your organization beyond an ad-hoc user-centered design approach to a sustained andmanaged user experience (UX) practice. Make thereal competitive difference. Make UX intelligence and practice a key part of your strategic business decisions.
Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.
NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.
This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.
Technical ICT learning & mentoring services
Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.
Learn more about our Private Team Training
“I particularly liked the heavy hands on sessions that went on with the training. Other than that, really liked Mark's training style. His experience in the field really shines through.”
Docker - GTDK1
“Instructor's ability to demonstrate new features that are not part of the course help show his mastery as well as prepare us for changes in the technology. Great work.
Using Docker & Kubernetes in Production - GTK8SG
“This course was an excellent insight into the Cloud Service Management world and equips me with the tools to go back to my company and build upon it.”
Cloud Service Manager - GTC13
''Fantastic course, looking forward to applying this in my work and home life. Excellent, practical approach, very motivational. I think the entire company should attend training.''
Being Agile in Business - GTBAB
“Excellent instructor. You can tell he really understands the concepts he's presenting and is very passionate about his work. He answered every question we asked and presented the course in an interesting and involving manner.”
Spring Boot Development - GTIT40
"Intelligence is the ability to avoid doing work, yet
getting the work done"
Linus Torvalds, creator of Linux and GIT
GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials
20th - 23rd April - Galway
25th - 28th May - Cork
22nd - 25th June - Dublin
This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster
This fast-paced course teaches the essentials of networking and helps to prepare the student for the CompTIA Network+ certification.
Learn about the theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics
21st - 23th April - Dublin
19th - 21st May - Cork
16th - 18th June - Galway
Python is a powerful and popular object-oriented programming/scripting language with many high quality libraries.
View All Scheduled Courses
Stay up to date, receive updates on scheduled dates, new courses, offers, and events.
+353 1 402 9423