The role of Product Owner is key to the success of any Scrum project: The Product Owner provides the vision & guidance to the
...In this two-day course, you will apply the Scrum framework to build a new product. You will learn what it feels like to be on
...This accelerated CSSLP certification course provides IT professionals with a fully-immersed, zero-distraction CSSLP training
...The CSTA training course provides a comprehensive grounding in the methodology, techniques & culture of ethical hacking.
...The course introduces delegates to commercial penetration testing software & exploitation frameworks commonly used by professionals
...On this 3 day practical computer forensics training course, gain an understanding of static computer forensics analysis by learning
...Do your meetings regularly overrun or go off-topic? Do you wish you were better at controlling the outcomes of your meetings?
...This is the ideal package for senior staff in residential care / nursing homes & those providing care in the community who may
...This course unites the concepts & practices from the foundation & other advanced Core Courses. It is pitched at a senior management
...Appreciate the reasons for change. Describe how to plan the involvement of the team in the changes required. Demonstrate how to
...On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will be guided through the process of conducting malware analysis, from the principles surrounding the different analysis environments
On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will be guided through the process of conducting malware analysis, from the principles surrounding the different analysis environments & malware investigation methodology to investigating network activity stemming from malicious software infection.
This training may be available onsite; please contact us if you are interested.