-
admin
ISO 27002 Lead Manager Training Course
Overview ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in ISO/IEC 27002. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager […]
-
admin
ISO 22316 Lead Resilience Manager Training Course
Overview The ISO 22316 Lead Resilience Manager training course enables you to develop the necessary expertise to assist an organization in establishing, maintaining, and continually improving an organizational resilience program based on ISO 22316. This training course is designed to prepare its participants establish an organizational resilience program based on the recommendations of the ISO […]
-
admin
ISO 22316 Foundation Training Course
Overview ISO 22316 Foundation training enables you to learn the basic elements to enhance organizational resilience and manage an organizational resilience strategy as specified in ISO 22316. During this training course, you will be able to understand different concepts of resilience which help an organization to cope with today’s dynamic business environment. After completing this […]
-
admin
ISO 22316 Introduction Training Course
Overview The ISO 22316 Introduction training course enables you to comprehend the fundamental elements necessary to support an organization in enhancing organizational resilience. During this training course, you will go through different concepts of resilience, attributes, and the factors that contribute to resilience, which altogether help an organization to cope with the dynamic and ever-changing […]
-
admin
ISO 22301 Lead Implementer Training Course
Overview After attending the training course, you can sit the exam and, if you successfully pass the exam, you can apply for the “Certified ISO 22301 Lead Implementer” credential. The internationally recognized “Certified ISO 22301 Lead Implementer” certificate will prove that you have the professional capabilities and practical knowledge to implement a BCMS based on the […]
-
admin
QMS Auditor / Lead Auditor (ISO 9001) Training Course
Overview QMS Auditor / Lead Auditor (ISO 9001) training course explains what a QMS (Quality Management System) needs to accomplish. It also explains the requirements of a successful QMS Audit. These requirements serve as the basis of Continuous Improvement efforts towards improved products and services for the Customer. In this instructor-led, live training, participants will […]
-
admin
LibreOffice Calc for Data Analysis Training Course
Overview LibreOffice Calc is the spreadsheet component of the LibreOffice software suite. It is a cross-platform and free alternative to Microsoft Excel, providing the full features for advanced analysis. This instructor-led, live training (online or onsite) is aimed at data analysts who wish to use LibreOffice Calc to conduct many forms of data analysis (from […]
-
admin
LibreOffice Training Course
Overview LibreOffice (formerly known as OpenOffice and StarOffice) is a free and open-source set of desktop productivity applications. LibreOffice provides feature-rich tools and a user-friendly interface to enhance creativity and productivity in organizations. This instructor-led, live training (online or onsite) is aimed at IT teams who wish to install, migrate, and use LibreOffice features and […]
-
admin
Kubernetes for App Developers (LFD459) Training Course
Overview This course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster. It also serves as preparation for the Certified Kubernetes Application Developer (CKAD) exam. Starting with a simple Python script, this course will show you: What you will gain during this course? The topics covered are directly […]
-
admin
Linux Security (LFS416) Training Course
Overview This instructor-led course will walk you through the many risks and threats that exist, show you how to use best practices and other open-source tools to mitigate or counteract those threats, and teach you what you need to know to detect and recover from those attacks that do happen. What you will learn? In […]