Find a course

Find the best courses in your region.

Catalogue 225 Courses found

List of sub-fields

Course list

Reference Course Duration Prices
ISC CISSP-001 ISC2 Certified Information Systems Security Professional (CISSP) 5 days
40 hours
PECB IEC 001 ISO/IEC 27001 Lead Implementer 5 days
40 hours
EV8 TECH-021 IT Fundamentals Overview 3 days
24 hours
EV8 TECH-022 Java Programming 3 days
24 hours
KW LSSGB-001 Lean Six Sigma Green Belt 5 days
40 hours
EV8 TECH-024 Machine Learning and Neural Computing. 3 days
24 hours
MS MB-210 MB-210: Microsoft Dynamics 365 Sales Functional Consultant 2 days
16 hours
MS MB-220 MB-220: Dynamics 365 Customer Insights - Journeys 4 days
32 hours
MS MB-230 MB-230: Microsoft Dynamics 365 Customer Service 4 days
32 hours
MS MB-240 MB-240: Microsoft Dynamics 365 Field Service 4 days
32 hours
At the end of the training, participants should be able to:

  • Understand and apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations
  • Understand how to protect assets of the organization as they go through their lifecycle.
  • Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability.
  • Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
  • Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections.
  • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
ISC CISSP-001
5 days (40 hours)
At the end of this training, the participants will be able to:

  • Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001.
  • Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an implementer.
  • Initiate and plan the implementation of an ISMS based on ISO/IEC 27001, by utilizing PECB’s IMS2 Methodology and other best practices.
  • Support an organization in operating, maintaining, and continually improving an ISMS based on ISO/IEC 27001.
  • Prepare an organization to undergo a third-party certification audit.
PECB IEC 001
3 days (24 hours)

At the end of this course, participants should be able to:

  • Describe the internal components of a computer and assemble a computer system.
  • Install and understand operating systems on computers and mobile devices.
  • Connect to the Internet and share resources in a networked environment.
  • Troubleshoot using system tools and diagnostic software.
EV8 TECH-021
3 days (24 hours)

At the end of this course, participants should be able to:

  • Explain what programming language is.
  • State the types of programming language. 
  • Explain java programming. 
  • State the components of programming language.
  • Use variables and data.
EV8 TECH-022
5 days (40 hours)

At the end of the Six Sigma Green Belt course, participants should be able to:

  • Identify project selection and evaluation criteria.
  • Plan and execute Six Sigma projects.
  • Form and effectively lead a Six Sigma project team.
  • Apply DMAIC (Define, Measure, Analyze, Improve, and Control) and various Six Sigma tools in process and quality improvement.
  • Assess and manage project risk.
  • Significantly increase profitability through Six Sigma projects.
  • Avoid pitfalls in implementing Six Sigma.
  • Integrate and enhance innovation and problem-solving skills.
KW LSSGB-001

At the end of the course, participants should be able to:

  • Gain a comprehensive understanding of machine learning concepts, including supervised learning, unsupervised learning, and reinforcement learning.
  • Explore Neural Computing Principles
  • Apply Machine Learning Algorithms
  • Implement Neural Networks
  • Evaluate Model Performance
EV8 TECH-024

At the end of this course, participants should be able to: 

  • configure Dynamics 365 Sales,
  • manage core sales features,
  • configure additional tools and service.
 
MS MB-210
At the end of this course, participants should be able to:

  • Configure marketing applications.
  • Manage segments and lists.
  • Create and manage marketing forms and pages.
  • Manage leads, contacts, and accounts.
  • Create and manage marketing email messages.
  • Manage customer journeys.
  • Manage events and webinars.
  • Configure Dynamics 365 Customer Voice.
MS MB-220

At the end of the course, participants should be able to:

  • Manage cases and Knowledge Management.
  • Manage entitlements and SLAs.
  • Implement scheduling.
  • Implement multi-session experiences for Customer Service.
  • Manage analytics, visualizations, and insights.
  • Implement Microsoft Power Platform, Connected Customer Service and routing.
MS MB-230
At the end of the course, participants should be able to:

  • Configure field service applications.
  • Manage work orders.
  • Schedule and dispatch work orders.
  • Manage the Field Service mobile app.
  • Manage inventory and purchasing by using the built-in inventory management system.
  • Manage Connected Field Service and customer assets.
  • Implement Microsoft Power Platform.
MS MB-240
Items per page :