Search our courses

New

Agile and Scrum

This 2 day Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.

In the Private Training
Code: GTBATL Duration: 2 Days

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

AI

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

Angular JS

Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.

Lab exercises provide essential and practical hands-on experience for each topic.

In the Private Training
Code: GTIT48 Duration: 2 Days

Ansible

This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.

In the Private Training
Code: GTA1 Duration: 4 Days

AWS

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Tuesday 10 December 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Azure

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

BDD

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

Big Data

This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.

In the Private Training
Code: GTDDD Duration: 1 Day

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

Upcoming schedule: Dublin, Tuesday 17 December 2019 at 09:00 to Wednesday 18 December 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Tuesday 10 December 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.

In the Private Training
Code: GTDDVR Duration: 1 Day

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

Blockchain Ethereum

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

C++

This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.

In the Private Training
Code: GTPL18 Duration: 4 Days

Cloud Certification

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Cloud Certifications

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Cloud Computing

Upcoming schedule: Cork, Tuesday 25 February 2020 at 09:00 to Wednesday 26 February 2020 at 17:00 - (Duration: 2 days)

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

Cloud Service Manager

Upcoming schedule: Cork, Tuesday 25 February 2020 at 09:00 to Wednesday 26 February 2020 at 17:00 - (Duration: 2 days)

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

Cyber Security

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training Virtual Training 
Code: GTCS Duration: 3 Hours eLearning Accreditation: Certified CyberSAFE Certificate

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

Data Science

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Tuesday 10 December 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Upcoming schedule: Dublin, Tuesday 17 December 2019 at 09:00 to Wednesday 18 December 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

DevOps Certification

The SRE (Site Reliability Engineering) Foundation℠ course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. The course highlights the evolution of SRE and its future direction and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).

In the Private Training
Code: GTDSRE Duration: TBC - more details to follow soon Accreditation: Site Reliability Engineering Foundation Certification

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

DevOps Certifications

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

DNS

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

Docker

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Thursday 12 December 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

Embedded Linux

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

IoT

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.

In the Private Training
Code: GTIOTBIZ Duration: 4 Hours Accreditation: IoT for Business Professionals Certification

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly.

In the Private Training
Code: GTIOTP Duration: 3 Days Accreditation: IoT Practitioner Certification

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

Java 11

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 2 Day

Kubernetes

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days Accreditation: Certified Kubernetes Application Developer

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Thursday 12 December 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

Kubernetes Certifications

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days Accreditation: Certified Kubernetes Application Developer

Linux Foundation Certification

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days Accreditation: Certified Kubernetes Application Developer

Microservices

Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring.  Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).

In the Private Training
Code: GTWMSBC Duration: 4 Days

This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.

In the Private Training
Code: GTWMKCI Duration: 2 Days

This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.

In the Private Training
Code: GTWTIM Duration: 2 Days

This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.

In the Private Training
Code: GTWMA Duration: 2 Days

More DevOps courses

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.

This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

This drives value and identifies and reduces non-value adding activities.

This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

New

This Machine Learning for Python Developers training course is a hands-on introduction to core Machine Learning techniques. This course will familiarise you with the Machine Learning landscape as well as providing practical experience.

 

In the Private Training
Code: GTMLP1 Duration: 2 Days Practical

This Machine Learning for Java Developers Training course is a hands-on introduction to core Machine Learning techniques, this course will familiarise you with the Machine Learning landscape as well as providing practical experience.

In the Private Training
Code: GTMLJ1 Duration: 2 Days Practical

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWASM Duration: 5 Days

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

In the Private Training
Code: GTLFKAD Duration: 2 Days Accreditation: Certified Kubernetes Application Developer

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring.  Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).

In the Private Training
Code: GTWMSBC Duration: 4 Days

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

Upcoming schedule: Cork, Tuesday 25 February 2020 at 09:00 to Wednesday 26 February 2020 at 17:00 - (Duration: 2 days)

The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint.  Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.

In the Private Training
Code: GTMCMC Duration: 2 Days Accreditation: Professional Cloud Service Manager Certification

This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.

In the Private Training
Code: GTA1 Duration: 4 Days

New course content will be here shortly.

In the Private Training
Code: GTBDSP Duration: 2 Day

IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.

This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.

In the Private Training
Code: GTIPV6F Duration: 3 Days

Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110This document includes instructor led class overview and objectives, identifies target student and prerequisites, course outline, and course specific software and hardware requirements. 

This course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.

In the Private Training
Code: GTIOTSP Duration: 3 Days Accreditation: IoT Security Practitioner Certification

Designing intuitive and effective user interfaces isboth science and art. During this course, partici-pants will learn how to apply research-based andfield-tested Web and application design principlesand methodologies. Initially they will focus on the four foundational layers of the interface: Navigation, Presentation,Content, and Interaction. Participants will then beprovided with the framework and methodologyneeded to support rapid prototyping initiatives.Finally, they will extend their sphere of influencethrough the application of accessibility and cross-cultural design methods.

In the Private Training
Code: GTCUASAE Duration: 3 Days

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly.

In the Private Training
Code: GTIOTP Duration: 3 Days Accreditation: IoT Practitioner Certification

Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.

DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.

This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.

In the Private Training
Code: GTITSM Duration: 2 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.

This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.

The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.

In the Private Training
Code: GTKEA Duration: 2 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.

In the Private Training
Code: GTJM11 Duration: 2 Day

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTSWADTD Duration: 3 Days

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCTEL Duration: 5 Days

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

The SRE (Site Reliability Engineering) Foundation℠ course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. The course highlights the evolution of SRE and its future direction and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).

In the Private Training
Code: GTDSRE Duration: TBC - more details to follow soon Accreditation: Site Reliability Engineering Foundation Certification

Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.

Lab exercises provide essential and practical hands-on experience for each topic.

In the Private Training
Code: GTIT48 Duration: 2 Days

This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.

In the Private Training
Code: GTWTIM Duration: 2 Days

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. This Microsoft® Power BI® Data Analysis Professional training course software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action.

In the Private Training
Code: GTDBIA Duration: 2 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCHEAL Duration: 5 Days

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCFIN Duration: 5 Days

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

In the Private Training
Code: GTLFD8 Duration: 4 Days Accreditation: Linux Foundation

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Thursday 12 December 2019 at 17:00 - (Duration: 4 days)

This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.

 

In the Private Training
Code: GTK8SG Duration: 4 Days

This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.

In the Private Training
Code: GTPL18 Duration: 4 Days

This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.

In the Private Training
Code: GTDDD Duration: 1 Day

In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.

In the Private Training
Code: GTDAE Duration: 2 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.

In the Private Training
Code: GTDSE Duration: 2 Days Accreditation: DevSecOps Engineer Certification (DSOE)

What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.

This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.

This drives value and identifies and reduces non-value adding activities.

This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.

In the Private Training
Code: GTDVSM Duration: 2 Days Accreditation: Value Stream Mapping for DevOps

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.

The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.

In the Private Training
Code: GTDOL Duration: 2 Days Accreditation: Certified DevOps Leader (DOL)

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

In the Private Training Virtual Training 
Code: GTCS Duration: 3 Hours eLearning Accreditation: Certified CyberSAFE Certificate

This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation. 

In the Private Training
Code: GTAIS Duration: 1 Day

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

This User Experience Foundations training course provides participants a research-basedand practical understanding of the foundational models and insights essential to the UX field. Youwill learn that you don’t see the way you think yousee. You don’t make decisions the way you think youdecide. You don’t remember things the way youthink you recall. And you don’t move the way youbelieve you move. Without this foundation, you willdesign based on common sense...which is oftenwrong. Understanding human vision, intellect, memory, andmotor function is the baseline upon which everyskilled UX professional should build their career; weshow clearly how each idea applies directly todesign decisions. This course will help you buildcredibility and improve your results by giving youthe knowledge required to present your ideas froma research-based point of view.

In the Private Training
Code: GTCUAF Duration: 2 Days

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

User-centered analysis provides the basis for design-ing software that makes sense to your users. Useproven, objective datagathering techniques to devel-op a clear understanding of who your users are andhow they will approach your Web site or application. Create effective, usable interfaces—the first time.This seminar walks you through HFI’s process forcollecting and analyzing relevant user and task data,and for developing a conceptual architecture fordesign. Alternating between explanation, discussion,and hands-on exercises, the course offers partici-pants the tools and confidence necessary to planand conduct effective user-centered analysis.

In the Private Training
Code: GTCUAUCA Duration: 3 Days

Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.

In the Private Training
Code: GTDSMA Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.

In the Private Training
Code: GTCASF Duration: 5 Days

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.

In the Private Training
Code: GTCDA Duration: 2 Days Accreditation: DevOps Continuous Delivery Architect (CDA)

This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTWAS Duration: 3 Days

The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.

In the Private Training
Code: GTIOT Duration: 2 Days Accreditation: IoT Foundation Certification

This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.

In the Private Training
Code: GTWMA Duration: 2 Days

This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.

In the Private Training
Code: GTWMKCI Duration: 2 Days

This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence.  The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.

In the Private Training
Code: GTAIM Duration: 1 or 2 Day

This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. 

In the Private Training
Code: GTIRBIZ Duration: 1 Day Accreditation: Incident Response for Business Professionals Certification

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.

In the Private Training
Code: GTIOTBIZ Duration: 4 Hours Accreditation: IoT for Business Professionals Certification

Upcoming schedule: Dublin, Tuesday 17 December 2019 at 09:00 to Wednesday 18 December 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. 

This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.

In the Private Training
Code: GTDULR Duration: 2 Days

Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.

In the Private Training
Code: GTDDVR Duration: 1 Day

DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.

Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.

In the Private Training
Code: GTDNSBW Duration: 5 Days

In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.

In the Private Training
Code: GTLFDY Duration: 4 Days Accreditation: Linux Foundation

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

This 2 day Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.

In the Private Training
Code: GTBATL Duration: 2 Days

DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.

Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.

Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.

In the Private Training
Code: GTDNSBF Duration: 3 Days

The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.

In the Private Training
Code: GTBCF Duration: 2 Days

Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Tuesday 10 December 2019 at 17:00 - (Duration: 2 days)

This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.

 

In the Private Training
Code: GTBD10 Duration: 2 Day

This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.

In the Private Training
Code: GTDNSBA Duration: 2 Days

OpenStack

Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.

In the Private Training
Code: GTLFAO Duration: 4 Days Accreditation: Linux Foundation

Predictive Analytics

This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.

In the Private Training
Code: GTPAF Duration: 1 Day

This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.

In the Private Training
Code: GTPPA Duration: 1 Day

This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.

In the Private Training
Code: GTPAEH Duration: 5 Days

Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.

In the Private Training
Code: GTPPA4 Duration: 1 Day

This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.

In the Private Training
Code: GTPAL Duration: 1 Day

Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.

In the Private Training
Code: GTPPA3 Duration: 1 Day

Python

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Upcoming schedule: Dublin, Tuesday 17 December 2019 at 09:00 to Wednesday 18 December 2019 at 17:00 - (Duration: 2 days)

Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here

This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.

In the Private Training
Code: GTBDP1 Duration: 2 Day

Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.

In the Private Training
Code: GTDSPP Duration: 2 Days

Red Hat

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

In the Private Training
Code: GTSLPA Duration: 3 Day

Secure Coding

This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTWAS Duration: 3 Days

This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.

In the Private Training
Code: GTOSC Duration: 1 Day

This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTWASM Duration: 5 Days

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.

In the Private Training
Code: GTCLS Duration: 3 Days

This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.

In the Private Training
Code: GTWTS Duration: 3 Days

The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.

In the Private Training
Code: GTBEH Duration: 5 Days

The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJSM Duration: 5 Days

The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.

In the Private Training
Code: GTJWA Duration: 3 Days

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.

In the Private Training
Code: GTCPS Duration: 3 Days

Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.

In the Private Training
Code: GTCHS Duration: 3 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced  training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCCP Duration: 4 Days

NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNSM Duration: 5 Days

As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

In the Private Training
Code: GTCSM1 Duration: 5 Days

.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.

In the Private Training
Code: GTNWA Duration: 3 Days

NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.

In the Private Training
Code: GTANS Duration: 3 Days

In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCTEL Duration: 5 Days

Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCHEAL Duration: 5 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTCTS Duration: 3 Days

Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.

In the Private Training
Code: GTSTS Duration: 3 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.

In the Private Training
Code: GTSWADTD Duration: 3 Days

If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.

In the Private Training
Code: GTSCFIN Duration: 5 Days

Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.

In the Private Training
Code: GTNJS Duration: 3 Days

Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.

In the Private Training
Code: GTANW Duration: 3 Days

The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.

In the Private Training
Code: GTPYS Duration: 3 Days

This Secure Coding in PHP training course provides essential skills for PHP developers necessary tomake their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time-and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

In the Private Training
Code: GTPSC Duration: 3 Days

Security Certification

This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. 

In the Private Training
Code: GTIRBIZ Duration: 1 Day Accreditation: Incident Response for Business Professionals Certification

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.

In the Private Training
Code: GTAIBIZ Duration: 4 Hours Accreditation: AI for Business Professionals Certification

This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

In the Private Training
Code: GTCSFR Duration: 5 Days Accreditation: CyberSec First Responder Certification

Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110This document includes instructor led class overview and objectives, identifies target student and prerequisites, course outline, and course specific software and hardware requirements. 

This course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.

In the Private Training
Code: GTIOTSP Duration: 3 Days Accreditation: IoT Security Practitioner Certification

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly.

In the Private Training
Code: GTIOTP Duration: 3 Days Accreditation: IoT Practitioner Certification

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.

In the Private Training
Code: GTIOTBIZ Duration: 4 Hours Accreditation: IoT for Business Professionals Certification

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

In the Private Training
Code: GTCSC Duration: 3 Days Accreditation: Cyber Secure Coder Certification

TDD

In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.

In the Private Training
Code: GTATA Duration: 2 Days

UX

This User Experience Foundations training course provides participants a research-basedand practical understanding of the foundational models and insights essential to the UX field. Youwill learn that you don’t see the way you think yousee. You don’t make decisions the way you think youdecide. You don’t remember things the way youthink you recall. And you don’t move the way youbelieve you move. Without this foundation, you willdesign based on common sense...which is oftenwrong. Understanding human vision, intellect, memory, andmotor function is the baseline upon which everyskilled UX professional should build their career; weshow clearly how each idea applies directly todesign decisions. This course will help you buildcredibility and improve your results by giving youthe knowledge required to present your ideas froma research-based point of view.

In the Private Training
Code: GTCUAF Duration: 2 Days

User-centered analysis provides the basis for design-ing software that makes sense to your users. Useproven, objective datagathering techniques to devel-op a clear understanding of who your users are andhow they will approach your Web site or application. Create effective, usable interfaces—the first time.This seminar walks you through HFI’s process forcollecting and analyzing relevant user and task data,and for developing a conceptual architecture fordesign. Alternating between explanation, discussion,and hands-on exercises, the course offers partici-pants the tools and confidence necessary to planand conduct effective user-centered analysis.

In the Private Training
Code: GTCUAUCA Duration: 3 Days

Designing intuitive and effective user interfaces isboth science and art. During this course, partici-pants will learn how to apply research-based andfield-tested Web and application design principlesand methodologies. Initially they will focus on the four foundational layers of the interface: Navigation, Presentation,Content, and Interaction. Participants will then beprovided with the framework and methodologyneeded to support rapid prototyping initiatives.Finally, they will extend their sphere of influencethrough the application of accessibility and cross-cultural design methods.

In the Private Training
Code: GTCUASAE Duration: 3 Days

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

“I particularly liked the heavy hands on sessions that went on with the training. Other than that, really liked Mark's training style. His experience in the field really shines through.”

 

Docker - GTDK1

Feb ‘19

“Instructor's ability to demonstrate new features that are not part of the course help show his mastery as well as prepare us for changes in the technology. Great work.

 

Using Docker & Kubernetes in Production - GTK8SG

Oct ‘18


“This course was an excellent insight into the Cloud Service Management world and equips me with the tools to go back to my company and build upon it.”

 

Cloud Service Manager - GTC13

Jan ‘19

 

''Fantastic course, looking forward to applying this in my work and home life. Excellent, practical approach, very motivational. I think the entire company should attend training.''

 

Being Agile in Business - GTBAB

Sept '19

“Excellent instructor. You can tell he really understands the concepts he's presenting and is very passionate about his work. He answered every question we asked and presented the course in an interesting and involving manner.”

 

Spring Boot Development - GTIT40

Nov ‘18

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners

 

  •  
  •  
  •  
  •  
  •  

 

 

 

 

 

Upcoming Courses

Kubernetes Administration

16th - 19th December - Dublin

10th - 13th February - Cork

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

CompTIA Network+ FastTrack

Coming Soon

This fast-paced course teaches the essentials of networking and helps to prepare the student for the CompTIA Network+ certification.

Learn More

Applied Data Science with Python

17th - 18th December - Dublin

Learn about the theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics

Learn More

Introduction to Python 3

11th - 13th February - Cork

Python is a powerful and popular object-oriented programming/scripting language with many high quality libraries.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter