All Courses
We have courses running in
Thales Luna HSM 7
You'll gain in-depth knowledge of advanced cryptographic solutions, including the latest post-quantum cryptography (PQC) algorithms and quantum-enhanced keys, preparing you to protect your organization's data against emerging cyber threats (Thales CPL) (Thales Trusted Cyber Technologies).
Conflict management. Leader in control
The course helps managers and key employees to recognize potential conflict early and implement solutions to remove it quickly and permanently to maintain a healthy culture of collaboration and support.
Information Security
The Information Security course provides the knowledge and information necessary to understand the notions and concepts associated with an organization's information security and management, as well as the theoretical and practical approaches applicable to it in order to build current awareness of today's cybersecurity threats.
Cybersecurity Essentials
The Cybersecurity Essentials course is designed for IT professionals who want to broaden their knowledge in cybersecurity, with the aim of effectively managing information security within the organization where they work.
Cybersecurity Hygiene
Cybersecurity Hygiene course participants will acquire skills in identifying and understanding the major cybersecurity risks specific to today's interconnected world. The most important topics covered in this course: threat analysis, vulnerability identification and general risk profile assessment, tailored to the specific context of organizations and the modern cyber environment.
Training for Trainers. Advanced module
This hands-on workshop gives experienced trainers the knowledge and skills they need to deliver interactive training programs with "aha" and "wow" elements.
RPA – Robotic Process Automation
The concepts in the course are brought into the realm of immediate applicability, specific to the participants' day-to-day work, through documentation/discussions before the training. Modern tools are used for quick and complete integration of skills.
F5 Training: WAF - Implementation, administration and configuration of BIG-IP security products
The course provides a fundamental understanding of the principles of web application protection using the BIG-IP platform and basic information about the operation of the BIG-IP functional modules.
Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210)
Successful completion of this five-day, instructor-led course should improve the configuration and management of Palo Alto Networks Next-Generation Next-Generation. The course includes hands-on experience with the ability to configure, manage and monitor a firewall in a lab.
SCRUM methodology
The activity is 60% practical workshop. Topics are approached through project simulations, theoretical expositions are illustrated with immediate application in practice. You will learn how to effectively apply the SCRUM framework in managing your activities.
Training for Trainers
The course helps existing Leaders to maximize his and his team's performance and accelerate results growth. After the course, Leaders will be able to initiate and manage change in the company.
Specialist Cyber Security
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Certified Ethical Hacker
The certificate obtained (CEH - EC-Council authorized) gives you the opportunity to work in the field of cybersecurity and to fulfill the responsibilities of an ethical hacker.
Internal Auditor Quality Management System according to ISO 9001:2015
Based on the course you will acquire the knowledge and skills necessary to provide internal audit services.
ISO 9001:2015 Quality Management System Specialist
On the basis of the course you will acquire the knowledge and skills necessary to be a quality professional.
Advanced Leadership
The course helps existing Leaders to maximize his and his team's performance and accelerate results growth. After the course, Leaders will be able to initiate and manage change in the company.
Poligraf
This program of study represents a basic training, modeled after one of the most scientific and modern polygraph schools in the USA associated with the Lafayette Company.
Sustainable and profitable trading
The Profitable and Sustainable Negotiation course is suitable for anyone who is frequently involved in the negotiation process. As a result, you will become more persuasive, be able to support your ideas, use techniques to create profitable relationships.
Emotional Intelligence in Sales
During the Emotional Sales Experience Course you will learn how to apply NLP techniques, how to control your own emotions, as well as those of your clients and enjoy spectacular results.
GDPR Foundation – Data Protection Officer
By completing this course you will learn how to better manage the situation at work so that personal data stored by the institution is secure and cannot be used for illegal purposes.
Customer Experience Management
In the Customer Experience Management course you will understand how important a customer experience culture is for effective customer interaction, building strong customer relationships and customer loyalty.
Telephone sales
In the Telephone Sales Course you will understand the specifics of inside sales, what capabilities are needed to be successful. You will understand what customers expect, what tools to use and how to increase your success rate in telephone sales.
B2C sales - Sales performance
On the B2C Sales - Sales Performance course you will learn and study in depth the stages of the sales cycle to customers, individuals. You will learn how to adapt techniques to the specific market, customer needs and desires.
B2B sales
Each concept is linked to participants' real-life experience in their daily work. It integrates information through debriefing, group coacing, impactful videos and visuals, experiential activities. Participants receive practical, useful tools for planning and running successful B2B Sales activities.
Business Continuity Management ISO 22301:2019
The course aims to prepare you to implement the BCMS Standard, create cybersecurity strategies and develop budgets that are well synchronized with the needs of the organization.
Agile methodology
The Agile with Scrum workshop is a clear and comprehensive introduction to these modern and effective methods of project work. Practice-oriented, with many exercises and examples, the training will be a very useful and enjoyable learning experience at the same time.
Internal Auditor for Information Security Management System according to SR EN ISO/IEC 27001:2022 and ISO/IEC 27002:2022
The specialization course in Internal Auditor for Information Security Management System gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Specialist in information systems security procedures and tools
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Private: IT Service Management – Foundation
In this course, participants will learn about the key concepts, principles, processes and functions that enable successful IT service delivery. Upon completion of this course, students will know how to improve IT service management by adopting the best ITIL recommendations and principles.
Leading for the first time
The course generates a strong openness and awareness of the role and impact of leadership and the need for newly appointed managers to move from an individual contributor or operational manager mindset to a leadership mindset. A set of concrete, simple, very useful, concrete leadership tools adapted to the situations the new leader is going through is provided. Practical practice.
Lean Six Sigma, Yellow
The course facilitates the discovery and understanding of the principles, objectives and main tools of the Lean Six Sigma methodology, with applicability in processes of any type, strongly changing the perspective of managers and key employees in the organization, stimulating the desire to improve and learn effective methodologies in this regard. 70% practical, learning through process simulation, analysis and redesign of processes.
Performance Management - by Objectives
Performance Management - by Objectives, defines the approach, the work plans and the processes by which they are put in motion, the structure of the organization and the systems for motivating staff. A well developed management produces targeted results.
Information Security
The Information Security course provides the knowledge and information necessary to understand the notions and concepts associated with an organization's information security and management, as well as the theoretical and practical approaches applicable to it in order to build current awareness of today's cybersecurity threats.
Cybersecurity Essentials
The Cybersecurity Essentials course is designed for IT professionals who want to broaden their knowledge in cybersecurity, with the aim of effectively managing information security within the organization where they work.
Cybersecurity Hygiene
Cybersecurity Hygiene course participants will acquire skills in identifying and understanding the major cybersecurity risks specific to today's interconnected world. The most important topics covered in this course: threat analysis, vulnerability identification and general risk profile assessment, tailored to the specific context of organizations and the modern cyber environment.
F5 Training: WAF - Implementation, administration and configuration of BIG-IP security products
The course provides a fundamental understanding of the principles of web application protection using the BIG-IP platform and basic information about the operation of the BIG-IP functional modules.
Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210)
Successful completion of this five-day, instructor-led course should improve the configuration and management of Palo Alto Networks Next-Generation Next-Generation. The course includes hands-on experience with the ability to configure, manage and monitor a firewall in a lab.
Specialist Cyber Security
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Certified Ethical Hacker
The certificate obtained (CEH - EC-Council authorized) gives you the opportunity to work in the field of cybersecurity and to fulfill the responsibilities of an ethical hacker.
Specialist in information systems security procedures and tools
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Poligraf
This program of study represents a basic training, modeled after one of the most scientific and modern polygraph schools in the USA associated with the Lafayette Company.
GDPR Foundation – Data Protection Officer
By completing this course you will learn how to better manage the situation at work so that personal data stored by the institution is secure and cannot be used for illegal purposes.
Business Continuity Management ISO 22301:2019
The course aims to prepare you to implement the BCMS Standard, create cybersecurity strategies and develop budgets that are well synchronized with the needs of the organization.
Internal Auditor for Information Security Management System according to SR EN ISO/IEC 27001:2022 and ISO/IEC 27002:2022
The specialization course in Internal Auditor for Information Security Management System gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Private: IT Service Management – Foundation
In this course, participants will learn about the key concepts, principles, processes and functions that enable successful IT service delivery. Upon completion of this course, students will know how to improve IT service management by adopting the best ITIL recommendations and principles.
Thales Luna HSM 7
You'll gain in-depth knowledge of advanced cryptographic solutions, including the latest post-quantum cryptography (PQC) algorithms and quantum-enhanced keys, preparing you to protect your organization's data against emerging cyber threats (Thales CPL) (Thales Trusted Cyber Technologies).
Cybersecurity Essentials
The Cybersecurity Essentials course is designed for IT professionals who want to broaden their knowledge in cybersecurity, with the aim of effectively managing information security within the organization where they work.
Cybersecurity Hygiene
Cybersecurity Hygiene course participants will acquire skills in identifying and understanding the major cybersecurity risks specific to today's interconnected world. The most important topics covered in this course: threat analysis, vulnerability identification and general risk profile assessment, tailored to the specific context of organizations and the modern cyber environment.
F5 Training: WAF - Implementation, administration and configuration of BIG-IP security products
The course provides a fundamental understanding of the principles of web application protection using the BIG-IP platform and basic information about the operation of the BIG-IP functional modules.
Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210)
Successful completion of this five-day, instructor-led course should improve the configuration and management of Palo Alto Networks Next-Generation Next-Generation. The course includes hands-on experience with the ability to configure, manage and monitor a firewall in a lab.
Specialist Cyber Security
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Certified Ethical Hacker
The certificate obtained (CEH - EC-Council authorized) gives you the opportunity to work in the field of cybersecurity and to fulfill the responsibilities of an ethical hacker.
Internal Auditor Quality Management System according to ISO 9001:2015
Based on the course you will acquire the knowledge and skills necessary to provide internal audit services.
ISO 9001:2015 Quality Management System Specialist
On the basis of the course you will acquire the knowledge and skills necessary to be a quality professional.
Poligraf
This program of study represents a basic training, modeled after one of the most scientific and modern polygraph schools in the USA associated with the Lafayette Company.
GDPR Foundation – Data Protection Officer
By completing this course you will learn how to better manage the situation at work so that personal data stored by the institution is secure and cannot be used for illegal purposes.
Business Continuity Management ISO 22301:2019
The course aims to prepare you to implement the BCMS Standard, create cybersecurity strategies and develop budgets that are well synchronized with the needs of the organization.
Internal Auditor for Information Security Management System according to SR EN ISO/IEC 27001:2022 and ISO/IEC 27002:2022
The specialization course in Internal Auditor for Information Security Management System gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Specialist in information systems security procedures and tools
The specialization course in information systems security procedures and tools gives you the opportunity to work in the field of cybersecurity, based on the internationally recognized certificate obtained at the end of the course.
Private: IT Service Management – Foundation
In this course, participants will learn about the key concepts, principles, processes and functions that enable successful IT service delivery. Upon completion of this course, students will know how to improve IT service management by adopting the best ITIL recommendations and principles.
Information Security
The Information Security course provides the knowledge and information necessary to understand the notions and concepts associated with an organization's information security and management, as well as the theoretical and practical approaches applicable to it in order to build current awareness of today's cybersecurity threats.
Performance Management - by Objectives
Performance Management - by Objectives, defines the approach, the work plans and the processes by which they are put in motion, the structure of the organization and the systems for motivating staff. A well developed management produces targeted results.
Conflict management. Leader in control
The course helps managers and key employees to recognize potential conflict early and implement solutions to remove it quickly and permanently to maintain a healthy culture of collaboration and support.
Training for Trainers. Advanced module
This hands-on workshop gives experienced trainers the knowledge and skills they need to deliver interactive training programs with "aha" and "wow" elements.
Training for Trainers
The course helps existing Leaders to maximize his and his team's performance and accelerate results growth. After the course, Leaders will be able to initiate and manage change in the company.
Advanced Leadership
The course helps existing Leaders to maximize his and his team's performance and accelerate results growth. After the course, Leaders will be able to initiate and manage change in the company.
Leading for the first time
The course generates a strong openness and awareness of the role and impact of leadership and the need for newly appointed managers to move from an individual contributor or operational manager mindset to a leadership mindset. A set of concrete, simple, very useful, concrete leadership tools adapted to the situations the new leader is going through is provided. Practical practice.
RPA – Robotic Process Automation
The concepts in the course are brought into the realm of immediate applicability, specific to the participants' day-to-day work, through documentation/discussions before the training. Modern tools are used for quick and complete integration of skills.
SCRUM methodology
The activity is 60% practical workshop. Topics are approached through project simulations, theoretical expositions are illustrated with immediate application in practice. You will learn how to effectively apply the SCRUM framework in managing your activities.
Agile methodology
The Agile with Scrum workshop is a clear and comprehensive introduction to these modern and effective methods of project work. Practice-oriented, with many exercises and examples, the training will be a very useful and enjoyable learning experience at the same time.
Lean Six Sigma, Yellow
The course facilitates the discovery and understanding of the principles, objectives and main tools of the Lean Six Sigma methodology, with applicability in processes of any type, strongly changing the perspective of managers and key employees in the organization, stimulating the desire to improve and learn effective methodologies in this regard. 70% practical, learning through process simulation, analysis and redesign of processes.
Customer Experience Management
In the Customer Experience Management course you will understand how important a customer experience culture is for effective customer interaction, building strong customer relationships and customer loyalty.
Sustainable and profitable trading
The Profitable and Sustainable Negotiation course is suitable for anyone who is frequently involved in the negotiation process. As a result, you will become more persuasive, be able to support your ideas, use techniques to create profitable relationships.
Emotional Intelligence in Sales
During the Emotional Sales Experience Course you will learn how to apply NLP techniques, how to control your own emotions, as well as those of your clients and enjoy spectacular results.
Telephone sales
In the Telephone Sales Course you will understand the specifics of inside sales, what capabilities are needed to be successful. You will understand what customers expect, what tools to use and how to increase your success rate in telephone sales.
B2C sales - Sales performance
On the B2C Sales - Sales Performance course you will learn and study in depth the stages of the sales cycle to customers, individuals. You will learn how to adapt techniques to the specific market, customer needs and desires.
B2B sales
Each concept is linked to participants' real-life experience in their daily work. It integrates information through debriefing, group coacing, impactful videos and visuals, experiential activities. Participants receive practical, useful tools for planning and running successful B2B Sales activities.