Introduction to scrum

course code : 214-4-106

...

This course is  provided by our experienced facilitators with extensive knowledge of Scrum/Agile methodology with innovative methods of course delivery to provide a practical understanding of Scrum/Agile concepts.

Successful candidates will be awarded the Scrum Master Certified (SMC™) certification by SCRUM study after passing the certification exam.class description ...



Introduction to Data protection and privacy

course code : 214-4-102

...

class description...



Excel mastery

course code : 214-4-107

...

n this Introduction to Microsoft Excel training course, you gain the knowledge and skills to create and edit worksheets, use formulas and functions, sort and filter detail data visually and present summary information in a consumable and professional format.n...



Cobit 5 masterclass

course code : 214-4-103

...

class description ...Become COBIT® qualified with our three-day training course. Understand the key principles of COBIT 5 and how it aligns IT goals with strategy objectives. Instructor has over 10 years experience and licensed by ISACA to train COBIT 5.

This is the official three-day COBIT 5 Foundation Course using content with the permission of ISACA. It includes the official certified COBIT 5 Foundation exam from APMG.  It is an interactive classroom-based training course based on the latest version, COBIT 5.



Business continuity masterclass

course code : 214-4-104

...

class description... This BCP training provides you with the practical insight to build a mature , comprehensive and reliable business continuity plan with significant value added materials to assist you long after the course is over.

 



Introduction to Information security ( Infosec 101)

course code : 214-4-105

...

This course teaches the basic concepts and principles of information security and the fundamental approaches to secure computers and networks. Its main topics include: security basics; security management and risk assessment; software security; operating systems security; database security; cryptography algorithms and protocols; network authentication and secure network applications; malicious malware; network threats and defenses; web security; mobile security; legal and ethical issues; and privacy.