+353 1 402 9423 | email@example.com
In this Agile Testing with Acceptance Test Driven Design (ATDD) and Behavior Driven Development (BDD) training course you will learn how to build quality into your product, while controlling scope and avoiding duplicated efforts. We will learn how to apply a ‘whole-team’ approach to quality and how to orchestrate feedback from your tests in order to be extremely effective. We will learn why the traditional approaches to test automation don’t yield the returns we require and why these approaches do not increase quality despite, being expensive and costly to maintain.
This Improving Agility – Beyond Technical Excellence training course is designed for technical teams looking to improve their performance beyond that of technical excellence. The course will explore agility beyond the development of software, looking at team dynamics, communication and visibility, product ownership, working with the client, agile workspaces and look at the impact of agile software delivery on the wider organisation and how you can work with inter-related teams in an agile way.
Upcoming schedule: Galway, Wednesday 27 November 2019 at 09:00 to Thursday 28 November 2019 at 17:00 - (Duration: 2 days)
This 2 day Being Agile: Teams and Leadership training course is for senior leaders and managers in enterprise organisations. Developed for and delivered to both the Public Sector and Private Organisations, this customised course provides an overview of agile culture and leadership to support implementation of agile within teams, departments and more broadly across an organisation.
In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI.
This Creating an Artificial Intelligence Strategy for your Organisation training course will walk executives, Managers and Business Owners through the process of creating an Artificial Intelligence Strategy for a model organisation.
Advanced Angular 7 Development training course covers advanced topics of this next generation of the Angular framework. This course is intended for those that already have a basic understanding of the Angular 7 fundamentals and now want to cover more advanced features the Angular 7 framework offers.
Lab exercises provide essential and practical hands-on experience for each topic.
This Ansible training course covers all the core Ansible features including: installing and configuring, running ad-hoc commands, understading modules, creating and using playbooks, variables and inclusion, task control, templates, and roles. The course also covers: dealing with sensitive data via Ansible Vault, fundamentals of Ansible Tower, integration with Docker and Vagrant, and troubleshooting.
Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Tuesday 10 December 2019 at 17:00 - (Duration: 2 days)
This AWS Advanced Analytics for Structured Data 2 day course provides a technical introduction to the understanding, creation and digital data supply chains for advanced analytics with AWS.
This Containers and Azure Service Fabric training course takes a detailed look at how to plan, implement, and operate scalable and reliable microservices to Azure Service Fabric. We take a detailed look at the development issues in Web API to create stateful and stateless microservices, and see how to use the actor model to achieve concurrency and re-entrancy. We also cover important practical issues such as orchestration, containerisation, reliability, up-time and instrumentation for DevOps.
Processing big data in real time is challenging due to scalability, information inconsistency, and fault tolerance. Big Data Analysis with Python teaches you how to use tools that can control this data avalanche for you. In this course, you’ll learn practical techniques to aggregate data into useful dimensions for posterior analysis, extract statistical measurements, and transform datasets into features for other systems.
Applied Data Visualization with R training course and GGPLOT2 is an open-source package for the R programming language that employs the concept of the Grammar of Graphics to help users build complex and aesthetic visualizations.This course begins by introducing you to basic concepts, such as the Grammar of Graphics and geometric objects. It then goes on to explain these concepts in detail with examples. Once you are comfortable with basics, you can learn all about the advanced plotting techniques, such as box plots and density plots. With this course, you can transform data into useful material and make data analysis interesting and fun.This course perfectly balances theory and exercises. It contains multiple activities that use real-life business scenarios for you to practice and apply your new skills in a highly relevant context.
New course content will be here shortly.
Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions.
This course begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you’ll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. By working through interesting activities, you’ll explore data encoders and latent variable models.
Data Science for Marketing Analytics training course covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you’ll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.
This Database Design training course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.
Upcoming schedule: Dublin, Tuesday 17 December 2019 at 09:00 to Wednesday 18 December 2019 at 17:00 - (Duration: 2 days)
Public Courses coming soon to Stockholm, Copenhagen and Oslo - Register Your Interest here
This Data Science with Python training course provides theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics. The coverage of the related core concepts, terminology, and theory is provided as well. This intensive training course is supplemented by a variety of hands-on labs (the list of which is provided at the bottom of this outline) that help attendees reinforce their theoretical knowledge of the learned material.
The Blockchain Foundation Certification training course is designed to provide candidates a well-rounded understanding of blockchain concepts. It covers the potential for blockchain applications that can be used for solving real business problems in industry, and an overview of blockchain technology and cryptocurrencies as a use case of blockchain.
This is a blockchain technology course with some practical exercises to experience two of the most popular cryptocurrencies – Bitcoin and Ethereum. Candidates will understand blockchain technology well enough to put their knowledge to use in real life. The course exposes candidates to real-life blockchain and crypto trading with the purpose of using this knowledge in business opportunities. After completing the course, candidates will be equipped with fundamental blockchain knowledge, and comfortable with cryptocurrency concepts. This knowledge can be used as a starting point in the journey of blockchain opportunities.
This C++ Programming for OO Developers 4-day training course is aimed at object-oriented developers (e.g. Java or C#) who need to get up to speed quickly in C++. The course covers the C++ programming constructs and techniques quickly, focussing on the differences between C++ and other OO languages.
Upcoming schedule: Dublin, Tuesday 03 December 2019 at 09:00 to Wednesday 04 December 2019 at 17:00 - (Duration: 2 days)
The Managing Cloud 2-Day Master Class is hands-on, practical and relevant. It is designed to upskill both IT and non-IT professionals in the fundamentals of cloud and cloud-based-services.This Master Class focuses on answering the question ‘What is Cloud?’ This is achieved by understanding the basic fundamentals of cloud and putting these into a wider context for the organisations. Initially, delegates are taken through The Cloud Challenge™. This is the first workshop, where delegates identify how little they actually know about the basics of cloud and their inability to put cloud into context. Benefits of cloud are highlighted and then challenged from an organisation and consumer viewpoint. Several hands-on learning activities are conducted each day to put theory into real-life practice and keep delegates engaged, refreshed and excited throughout the two days.
This CyberSec First Responder training course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frame works such as NIST 800-61r.2(Computer Security Incident Handling),US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
Regardless of your computer experience, this CyberSAFE training class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.This Cyber Secure Coder training course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
Data Science Projects with Python training course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You’ll discover how to tune the algorithms to provide the best predictions on new and, unseen data.
The SRE (Site Reliability Engineering) Foundation℠ course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. The course highlights the evolution of SRE and its future direction and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).
This DevOps Continuous Delivery Architecture (CDA) certification training course includes a practical understanding of the principles of Continuous Integration and Continuous Deployment, Continuous Delivery vs. DevOps, Continuous Integration practices, Engaging Ops in Continuous Delivery and much more. A continuous delivery architect is a a tool-agnostic individual engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and, potentially, Continuous Deployment. A continuous delivery architect is also involved in defining or integrating underpinning processes, metrics, APIs and cultural considerations.
The learning objectives of this DevOps Security certification training course include a practical understanding of the purpose, benefits, concepts and vocabulary of DevSecOps, how DevOps security practices differ from other security approaches, business-driven security strategies and much more. A DevSecOps Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer.
This Developing Embedded Linux Device Drivers training course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.
This Advanced DNS training course focuses on critical topics. These include security topics that are critical in today's Internet. DNS has exotic, out-dated, and rarely implemented features. Those are not covered. This course mixes in-depth lectures and practical hands-on labs, which each student runs on his or her own server, which we provide.
This KEA DHCP Training course is the new open source DHCP-Server from Internet Systems Consortium, ISC. Compared with its predecessor, ISC-DHCP, it is a clean and fast implementation of both DHCPv4 and DHCPv6.
This KEA DHCP 2-day training course gives a complete introduction into the new KEA-DHCP software on Unix and Linux systems. Attendees will learn how to install, configure and maintain the KEA-DHCP system. The course also includes a refresh of the DHCPv4 protocol and explains DHCPv6, the dynamic host configuration protocol for IPv6 networks.
The KKEA DHCP Server training course has been developed in cooperation with ISC and the KEA development team.
DNS and BIND Fundamentals training course is a comprehensive introduction to DNS and BIND. In-depth lectures cover DNS concepts in detail, as well as how DNS is implemented in today's Internet. Practical experience is gained through many hands-on labs, which each student runs on his or her own server, which we provide.
Recently, we have added four new sections on DNS Cookies, Response Policy Zones (RPZ), Response Rate Limiting (RRL) and dnstap. Many new labs have been added, including several problem solving and debugging labs along with additional quizzes.
Nothing is taken for granted, and the first lab begins by downloading, compiling, and installing BIND. Students create BIND configuration from scratch for both authoritative and recursive servers. They create zone files from scratch for authoritative masters. DNS tools such as, dig, rndc named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs.
IPv6 networks are real. ISPs and telecommunication companies are switching to the new Internet protocol, and their customers are accessing the Internet using IPv6. It is important to be prepared to be able to communicate with customers and business partners over this protocol.
This IPv6 Fundamentals two-day workshop will teach the fundamentals of the new IPv6 protocol, it gives an introduction for people that start with IPv6.
DNS & BIND Week is very popular course. It is ideal for anyone starting out. It is most commonly attended by those with previous DNS knowledge, and by administrators with BIND experience.
Nothing is taken for granted, and the labs begin by downloading, compiling, and installing BIND. Each student creates BIND configuration from scratch for authoritative and recursive servers. They create zone files from scratch for an authoritative masters. DNS tools such as, dig,rndc, named-checkconf, & named-checkzone, are taught in depth and used extensively in the labs. Those with previous DNS and BIND skills report that the start of the course, which assumes nothing, fills in knowledge gaps, corrects misconceptions, and that it moves on to unknown topics and new material. This DNS & BIND Week training course is hands-on, full of laboratory exercises.
Upcoming schedule: Dublin, Monday 09 December 2019 at 09:00 to Thursday 12 December 2019 at 17:00 - (Duration: 4 days)
This Docker and Kubernetes training course is a fast-paced 4-day hands-on program that combines developer and operators knowledge. It brings you from zero to the main concepts in developing distributed applications and managing them with Kubernetes plus it covers operational knowledge of Kubernetes with security and advanced application configuration.
In this Embedded Linux Development with Yocto Project training course, you’ll obtain a solid understanding of how to build a repeatable embedded target Linux target using the Yocto Project. In addition to learning the build system, you will learn about more advanced tools like toaster, devtool, wic, eSDK, and eclipse IDE integration. This course builds on the Embedded Linux topics learned in the Embedded Linux Development class.
The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand thevarious factors that will drive your decisions. But putting IoT systems into place can be acomplicated proposition with unique considerations distinctly different from traditional ITsolutions. Business professionals often have little or no foundation for understanding of the componentsand design decisions that go into an IoT project. They may have a traditional understanding of ITsolutions which includes knowledgeof networks, cloud computing, and applications running onservers, desktop computers, and mobile devices.
The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed decisions to be made quickly.
The Internet of Things Foundation training course provides an overview and insight into the emerging technology.
The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2020.
In this Java 11 training course, we will guide you through the landscape of Java beyond version 8. We'll see how the release cycle has changed, and why Java 11 is the natural upgrade from Java 8. Hands-on labs to introduce Java Platform Modules will be combined with an architectural discussion of the strengths and trade-offs of modules and how best to adopt them for your projects.
The new language and JVM features will be introduced, including enhanced type inference, Nestmates, Compact Strings, VarHandles, JShell and the new library features.
Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This Kubernetes for App Developers training course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.
The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.
This Introduction to Microservices Architecture training course will help the attendees understand the value proposition and technical aspects of microservices. You will learn about the pros and cons of breaking up the monolithic type of applications prevalent in the enterprise space and converting them into microservices-based solutions. Detailed analysis of some of the common patterns and motivation for using them in microservices architecture is also provided.
This two-day DevOps training class is loaded with practical real-world information. From the foremost Service-Oriented-Architecture/DevOps/Agile development training company, comes a course to move the dial on your organizations’ journey with this workshop. You will leave this course loaded with knowledge on the usage of this stack for Microservices. This class combines instructor-led and hands-on lab exercises.
This Introduction to Microservices training course will help you understand the value proposition and technical aspects of microservices, a new and rather fuzzy concept used to describe rapidly provisionable, independently deployable services with narrow and distinct functionality. For IT professionals, developers, software engineers, and DevOps practitioners – our microservices training provides the technical practices and tooling fundamentals necessary to begin realizing the benefits of microservices as a foundation for IT architecture, software engineering, and service/release delivery. Upon completion of this Microservices training course, students will have fundamental understanding of microservices and practical experience in implementing microservices using different technology stacks.
Rapid advancements in cloud-based software delivery and virtualization have caused many developers to question the wisdom of a “Big Server” approach to deploying web applications. Spring Boot is a technology stack that builds on the popular Spring Framework to allow Spring-based applications as stand-alone jar files that host their own web servers. This approach works nicely with deployment automation and rapid scaling. Cloud-based, highly-distributed applications face additional challenges in supporting a dynamic environment – especially around configuration, service discovery, service resilience and monitoring. Spring Cloud embraces and extends the popular suite of open source cloud tools published by Netflix (Eureka, Hystrix, Ribbon, etc).
Organizations adopting a DevOps culture and practices are able to deliver high-quality software faster, which means the business can deliver value to customers faster. ITSM processes are vital to organizations achieving this success.
DevOps doesn’t eliminate the need for controls and data. Regulatory controls and audits still exist and risks and impacts must still be managed. ITSM for DevOps introduces ways to achieve both speed and control while driving value across the IT value stream and focuses specifically on ITSM in a DevOps context and supports those organizations with mature ITSM programs who are struggling to accelerate and modernize ITSM in support of DevOps. The course helps organizations introduce new ways of thinking and new ways of working.
This ITSM for DevOps non-certification DrillDown describes how to adapt IT service management (ITSM) processes in support of DevOps. Learners will gain and practice pragmatic approaches for streamlining and automating existing ITSM processes and for handling compliance as code.
The DevOps Leader training course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization.
The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping.
In this DevOps for the Agile Enterprise training course, you’ll gain an understanding of the role of DevOps in a Scaled Agile organization. Unlike other training that focuses only the mechanics of DevOps, Icon’s DevOps for the Agile Enterprise course explores the role of DevOps in the context of the entire IT value stream, and prepares you to successfully plan and implement DevOps capabilities that significantly extend the benefits of Agile transformations. This includes understanding the fullspectrum software delivery ecosystem, where Agile transformations typically are and are not effective, how Agile and DevOps are “better together,” and what people, processes and technology must be aligned throughout the organization, to achieve true enterprise agility.
What is the value stream? All of the steps that are currently performed to deliver products and services to end-users and customers, whether they add value or not. Value stream mapping has been identified as a critical skill for organizations adopting a DevOps approach.
This Value Stream Mapping for DevOps training course is focused on Value Stream Mapping specifically in a DevOps context. Participants will learn how to create current and future state value stream maps in DevOps environments, and how to use value stream maps as a vehicle of sustained DevOps continuous improvement. Participants also gain an understanding of where streamlining and automating core processes drive quality, lessen costs and mitigate risks to align business services with IT.
This drives value and identifies and reduces non-value adding activities.
This DrillDown provides a practical understanding and hands-on experience with Value Stream Mapping. It was built in partnership with Mike Orzen, a recognized and prominent Lean thought leader and author.
The Java and Web Application Security training course targets experienced Java developers who use the Java platform to develop web applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The course also introduces the basic security solutions provided by the Java language and the runtime environment. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.
The training targets experienced Java developers who use the Java platform and Java-related technologies to develop web or desktop applications. Aligned to this, it tackles general web-related security issues –including both server-and client-side vulnerabilities –in the context of Java, as well as vulnerabilities specific to the Java language and platform itself. The Java and Web Application Security Mastercourse training course also introduces the basic security solutions provided by the Java language and the runtime environment, including the different security-related services of the Java Enterprise Edition, Spring, Hibernate and many others. The use of the components is explained through numerous exercises, while the risks posed by the various vulnerabilities are demonstrated through committing attacks and then applying the relevant protection methods. Understanding security solutions of Java, Java EE, Spring and the latest web-and Java-related vulnerabilities is a must for all programmers using Java to develop applications for the web.
Certified Internet of Things Security Practitioner (CIoTSP™): Exam ITS-110This document includes instructor led class overview and objectives, identifies target student and prerequisites, course outline, and course specific software and hardware requirements.
This course is designed for practitioners who are seeking to demonstrate a vendor-neutral,cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem.
Expanding on the Step 2 training, this classroom and labs based session introduces you to the world of Machine Learning.
This Pathway to Predictive Analytics – Step 2 Statistics training course, classroom and lab based training, expands upon the foundational training to introduce you to the world of predictive analytics via statistics.
This Pathway to Predictive Analytics Foundation Step 1 Foundation training course combines classroom and lab based exercises that will give you all the foundational knowledge you need to start your predictive analytics journey.
Expanding on the Step 3 training, this classroom and labs based session introduces you to the world of Deep Learning.
Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one single exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned, properly executed, and thus needs a strong security expertise. This is why this Security Testing Native Code training course is a must-attend for all testers of security-sensitive applications.
This training course is based on the OWASP Top 10 Principles. Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. This Web Application Security training course introduces web-based security technologies like web services, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all the programmers who are developing applications that are exposed to the threats of the web.
This Web Application Security Testing training course first gives an overview of the most important web-related security problems, attacks, recommended coding techniques and mitigation methods. After getting familiar with the vulnerabilities andthe attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. They also learn to use various tools that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute various tools to analyze the already discussed vulnerable codes. This training is a must-attend for testers of security-sensitive web applications.
This advanced Web Application Security Master Course will change the way you look at code. During a hands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
This Predictive Analytics Landscape training course is a level set for executives, managers and business owners, who need to understand the impact that Artificial Intelligence, Machine Learning and Predictive Analytics will have on their business.
This Predictive Analytics Educational Hack training course covers the four steps of the Pathway to Predictive Analytics and culminates, on the Friday, with a day long hack, combining everything you’ve learned in order to solve a predictive analytics problem. Each group will then present their methodology and findings to the class.
This Secure Coding Landscape training course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code. A training that primarily targets managers and engineers involved in secure coding issues, giving them an overview on software security problems through a number of demonstrations.
Testing plays a very important role in ensuring security and robustness of applications. Various approaches –from high level auditing through penetration testing to ethical hacking –can be applied to find vulnerabilities of different types. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find asingle exploitable vulnerability to reach their goals. Therefore, if you want to go beyond the easy-to-find low-hanging fruits, security testing should bewell planned, properly executed, and thus needs a strong security expertise. This is why this course is a must-attend for all testers of security-sensitive applications.
Since all applications today heavily rely on communication and networks, there is no application security without network security. This Network Security and Secure Communication training course gives a strong foundation on design principles as well as practical answers on how to use various cryptographic primitives and security protocols properly, while also focusing on the two most critical areas in that domain from a developer's point of view: network communication and practical cryptography. It covers network-level threats and countermeasures from the Data Link to the Application layer, and gives an overview of the most critical implementation-level attacks against crypto implementations as well as the security issues related to XML. The course is recommended for developers of interoperating networked applications –giving them the essential knowledge to design and implement secure network software.
The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. This Microsoft® Power BI® Data Analysis Professional training course software is designed for this purpose. Power BI was built to connect to a wide range of data sources, and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Power BI's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action.
Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied. In the context of Node.js, this course deals with the security of some relevant technologies,and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. An essential secure coding course for all programmers developing applications that are exposed to the threats of the web.
This Machine Learning for Python Developers training course is a hands-on introduction to core Machine Learning techniques. This course will familiarise you with the Machine Learning landscape as well as providing practical experience.
This Machine Learning for Java Developers Training course is a hands-on introduction to core Machine Learning techniques, this course will familiarise you with the Machine Learning landscape as well as providing practical experience.
In today's connected world, the security of telecommunication is more important than ever. Vulnerabilities in telecom equipment enable attacks on subscribers as well as companies and services on a global scale, and thus dealing with them is absolutely crucial. Standards such as ITU-T X.805 or the GSMA IoT Security Guidelines for Network Operators give important guidance about building secure telecom systems. This training program exclusively targets engineers developing software and equipment for the telecom sector. Our dedicated trainers share their experience and expertise throughhands-on labs, and give real-life case studies from the telecom industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.
Healthcare is one of the business domains where security is absolutely crucial. Vulnerability is not an option when working with life-saving devices, while your systems and applications need to comply with Health Information Portability and Accountability Act (HIPAA) requirements. This Secure Coding Master Course for Healthcare training program exclusively targets engineers developing applications or maintaining networks for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the healthcare industry –engaging participants in live hacking fun to reveal all consequences of insecure coding.
Web applications are continuously exposed to attacks due to being open and accessible via the Internet. Developers must therefore be extremely cautious in how to use different technologies, and should have a deep understanding in secure coding techniques applied, while testers should be able to look for these security problems. This Secure Web Application Development and Testing for Devops training course introduces web-based security technologies, and presents the security vulnerabilities of web applications based on the OWASP Top Ten list. Participants also learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities, as well as how to use various tools that can be applied in order to automate security evaluation of software products. The course gives comprehensive insights into software security to both web application developers and testers.
NET and ASP.NET provide a plethora of different solutions and tools to support security development. This Secure Desktop Application Development in C# training course gives a comprehensive overview of these techniques by focusing on both language-specific issues and the desktop runtime environment. Common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of managed code security.
This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.
The Python language is used in many different settings –from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls. This Python Security training course covers the most critical security issues in Python applications. We cover vulnerabilities from the OWASP Top Ten list for the web as they concernPython web applications as well as the Django framework. The course also encompasses the most significant security issues for Python code in general (including many Python-specific issues such as function hijacking), while also presenting security solutions provided by the Python ecosystem –such as authentication, access control and encryption. Understanding the security solutions provided by Python as well as the various security issues and vulnerabilities is a must for all programmers using these technologies to develop web, desktop or server applications.
If you happen to be an IT security manager in the fintech industry, recent news of the sector might have caused you serious nightmares about PCI security. Manage your anxiety with our professional master course on securecoding and keep your company the first in line on the market! We designed the Secure Coding Master Course specifically for companies of the fintech industry who provide the most sensitive data transmission: all types of money transfer. Therefore our program offers pragmatic assimilation of knowledge and experience on secure coding issues. We deal with threats and vulnerabilities of systems and applications through hands-on labs, real-life case studies from the banking industry, even engaging participantsin live hacking fun to reveal all consequences of insecure coding.
As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?This Comprehensive C and C++ Secure Coding advanced training course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
The training targets experienced developers who use various development platforms and environments to develop applications (both desktop and web). Aligned to this, it tackles web-related security issues–including both server-and client-side vulnerabilities –, general security issues of various technologies –including Java, .NET, web services and XML –as well as the consequences of typical coding mistakes in different environments, platforms and programming languages. Even though the starting point is ethical hacking, the main goal of demonstrating the techniques used on the dark side is the protect against them and thus mitigate the risks. This Advanced Software Security - Beyond Ethical Hacking training course is the best selection of our “negative security” subjects: lots of live-hacking fun, with a single purpose to learn how to avoid the exploitable security-relevant programming bugs and flaws.
Secure systems operating in hostile environment usually rely on crypto chip-sets, whose security is essential as they are not only logically, but also physically exposed to attacks. This Crypto Chip - Set Security training course deals with the security chipset design as well as with various implementation issues, presenting IC-level attack possibilities and the relevant prevention and protection techniques. The subject also tackles security relevant low-level programming bugs, firmware vulnerabilities and their mitigation.A special course for professionals who are working on secure hardware development.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likelywould they be to succeed?This C and C++ Secure Coding training course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and –more importantly –best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack –take a step and be a game-changer in the fight against cybercrime.
.NET and ASP.NET provide a plethora of different solutions and toolsto support security development. This C# and Web Application Security training course gives a comprehensive overview of these techniques focusing on the web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. Web-related vulnerabilities as well as some common coding mistakes in .NET and ASP.NET are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. This Application Security in the Cloud training course deals with the various security aspects of cloud computing, starting off from discussing cloud-specific threats and risks, followed by legal and contractual basics, as well as how a cloud application should be audited and evaluated from a security perspective. Core cloud security is discussed in multiple areas: from securing the infrastructure –issues like hardening, configuration, authentication, authorization and identity management –to application security issues as the culmination of the course. The course gives application developers essential knowledge with respect to application security challenges and solutions when developing in a cloud environment.
NET and related technologies provide an environment and a number of different solutions and tools to support security development. The course gives a comprehensive overview of these techniques, starting off from Web application security –both on the server-and on the client-side –, and presents the most frequent security vulnerabilities stemming from both language-specific issues and the runtime environment. The Web-related vulnerabilities as well as some common coding mistakes in C# are introduced through a number of practical exercises. By understanding the operation of the security components, executing attacks and applying protection methods one can gain a complete picture of security of web applications implemented in managed code.
As a developer, your duty is to write bulletproof code. However...What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This advanced C and C++ Security Master Course will change the way you look at code. During ahands-on training we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
This Incident Response for Business Professionals Certification training course covers incident response methodsand procedures are taught in alignmentwith industry frameworkssuch as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirementsregarding incident response, and for executing standardized responses to such incidents. The course introduces proceduresand resources to comply with legislative requirements regarding incident response.This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.
Learn about internals of various vendor specific OpenStack distributions and their installations and setups from engineers who have contributed to OpenStack releases, deployed and configured several OpenStack distributions and have combined their knowledge in producing this course. This Advanced OpenStack Administration training course caters to developers, deployers, and troubleshooters.
This Data Wrangling with Python training course starts with the absolute basics of Python, focusing mainly on data structures. It then delves into the fundamental tools of data wrangling like NumPy and Pandas libraries. You’ll explore useful insights into why you should stay away from traditional ways of data cleaning, as done in other languages, and take advantage of the specialized pre-built routines in Python. This combination of Python tips and tricks will also demonstrate how to use the same Python backend and extract/transform data from an array of sources including the Internet, large database vaults, and Excel financial tables. To help you prepare for more challenging scenarios, you’ll cover how to handle missing or wrong data, and reformat it based on the requirements from the downstream analytics tool. The course will further help you grasp concepts through real-world examples and datasets.
In this SQL Querying training course you learned the basics of SQL querying. In this course, you will build on this foundation, learning advanced querying techniques, such as writing nested queries, using JOINs to combine data from multiple tables, summarizing query results, using advanced filtering, and using views to simplify repetitive querying tasks. You will also learn how to perform common database administration tasks such as duplicating tables, modifying table structures, inserting, updating, or deleting data, and indexing tables to optimize query performance. You will also learn how to work with multiple tasks as a transaction.
Technical ICT learning & mentoring services
Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.
Learn more about our Private Team Training
“I particularly liked the heavy hands on sessions that went on with the training. Other than that, really liked Mark's training style. His experience in the field really shines through.”
Docker - GTDK1
“Instructor's ability to demonstrate new features that are not part of the course help show his mastery as well as prepare us for changes in the technology. Great work.
Using Docker & Kubernetes in Production - GTK8SG
“This course was an excellent insight into the Cloud Service Management world and equips me with the tools to go back to my company and build upon it.”
Cloud Service Manager - GTC13
''Fantastic course, looking forward to applying this in my work and home life. Excellent, practical approach, very motivational. I think the entire company should attend training.''
Being Agile in Business - GTBAB
“Excellent instructor. You can tell he really understands the concepts he's presenting and is very passionate about his work. He answered every question we asked and presented the course in an interesting and involving manner.”
Spring Boot Development - GTIT40
"Intelligence is the ability to avoid doing work, yet
getting the work done"
Linus Torvalds, creator of Linux and GIT
GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials
16th - 19th December - Dublin
This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster
This fast-paced course teaches the essentials of networking and helps to prepare the student for the CompTIA Network+ certification.
17th - 18th December - Dublin
Learn about the theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics
Python is a powerful and popular object-oriented programming/scripting language with many high quality libraries.
View All Scheduled Courses
Stay up to date, receive updates on scheduled dates, new courses, offers, and events.
+353 1 402 9423