IT & Management Trainings

  1. Home
  2. IT & Management Trainings

    İletişim Formu

    Eğitimler hakkında bilgi almak için formu doldurabilirsiniz.

    Eğitimlerimiz kurumlara ve firmalara yöneliktir.













    IoB – Internet of Behaviors

    The Internet of Behaviors, considered as a subset of the Internet of Things, is an IoT technology focused on sales and marketing. IoB aims to collect data through IoT technologies in order to predict how people will act in which situations and to direct the behaviors as a result of the analysis of the collected...

    IOT – Introduction to Internet of Things

    The Internet of Things (Internet of Things, IoT for short) is a communication network in which physical objects are connected with each other or with larger systems. It is envisaged that objects can be marked with a unique identifier so that they can work together over the Internet infrastructure, thus creating values ​​greater than the...

    .NET Microservices

    Microservice architecture is an architectural model in which different business capabilities are configured independently of each other. In this architecture, large systems are divided into smaller services, each responsible for a different job and independent of each other. Behind the scenes, all of these services are called microservices. Microservice, in short, means a small service that...

    Test Automation – Mobile

    Mobile app test automation is used to test for a number of things, such as functionality, security, and accessibility. Performance testing, stress testing, functional testing, and accessibility testing are a few types of tests that may be conducted on mobile apps. Mobile app testing automation is not for the faint of heart. Complex test creation,...

    Test Automation – Web

    Automated testing is almost mandatory to guarantee the stability of an application. This course teaches you how to test web applications using first a record-and-playback approach with Selenium. At the core of testing any website efficiently is a thorough knowledge of how to do automated testing. In this course, Automated Web Testing with Selenium ,...

    Performance Test

    Performance Testing, also known as Perfect Testing, is a type of testing performed to check how the application or software performs under workload in terms of responsiveness and stability. The purpose of Performance Testing is to identify and eliminate performance bottlenecks in an application. The main purpose of this test is to check whether the...

    The Complete Apache Kafka Practical Guide

    Gain a deep understanding of the architecture, deployment and maintenance of the Kafka platform with Apache Kafka Course. This training will equip candidates with the skills needed to to develop a robust and fault tolerant big data application for their enterprise to process massive real-time data streams. Master Apache Kafka architecture and learn how it...

    COBIT 2019 Foundation

    Over the years, best-practice frameworks have been developed and promoted to assist in the process of understanding, designing and implementing enterprise governance of IT (EGIT). COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. Learners...

    TOGAF Business Architecture

    In the business sector, business architecture is a discipline that “represents holistic, multidimensional business views of: capabilities, end-to-end value delivery, information, and organizational structure; and the relationships among these business views and strategies, products, policies, initiatives, and stakeholders. In application, business architecture provides a bridge between an enterprise business model and enterprise strategy on one...

    MongoDB for Developers

    MongoDb, an open source NoSQL database application, is preferred by many institutions due to its flexible and easy to use. In addition to being document-based and fast, MongoDB’s ability to store NoSQL data in document format and its scalability provides a great advantage in terms of easily analyzing the data. This 3-days MongoDB training for...

    MongoDB for Administrators

    MongoDB is a document-based, fast, scalable and open source NoSQL (Not only SQL) database application.  The fact that MongoDB is flexible and easy to use has strengthened its worldwide popularity in a short time and made it a database system preferred by many institutions. One of the most important advantages of MongoDB is that it...

    Secure Software Development

    Secure software development training is a training program that aims to provide software developers with knowledge and skills in secure software design, development processes and best practices. This course teaches the principles and methods needed to reduce the risks associated with the security of the software, prevent security vulnerabilities, and protect user data. This type of...

    Effective Measures Against Data Leaks

    Participants are provided with the necessary technical information on creating processes to take effective measures against data leaks and preventing data leaks. Delegates will learn Data Leaks Data Leaking from Clients and Servers Data Infiltration from Applications Measures against Data Infiltrations  

    Applied Network And System Security

    Transferring the measures to be taken to increase the aggressive point of view and security level to ensure the security of local network and internet connections and systems connected to them to the organization personnel. With the application of the techniques and tools learned on the third day of the training, it is carried out...

    Threat And Vulnerability Management

    Providing participants with in-depth information about information security threats and provide them with the information necessary to establish a vulnerability management process to maintain the organization's level of information security. Delegates will learn Threat, Risk and Vulnerability Security Vulnerabilities Patch and Update Management Creating a Vulnerability Management Program

    SOME Setup

    Necessary information will be provided for the effective and sustainable establishment of SOME (Cyber Incident Response Team) structures required to be established in public institutions and critical sectors within a successful project. Delegates will learn SOME principles SOME Personnel SOME Processes Cyber Incident Detection SOME Technologies

    Cyber Intelligence

    To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Introduction to Cyber Intelligence and Hacking Internet Research Tools Advanced Search Engine Usage   Who should attend Network and system...

    LOG Collection And Management

    Providing cyber incident detection and post-incident review skills by using records (logs) that can be obtained from the organization network and systems. Delegates will learn Types of Records Generated on the Network Establishment of Record Collection and Retention Structure Processing of Records Use of Records

    Wireless Network Security

    Wireless networks that facilitate our business processes are also an offensive front for the organization network. Participants will be provided with the necessary information for the safe installation of the wireless network and the execution of the operating processes. Delegates will learn Principles of Wireless Network Security Wireless Network Security Vulnerabilities Ensuring Wireless Network Security...

    ISO 27001 Information Security Management System Manager

    Training for senior and mid-level managers of companies that have entered or intend to enter the ISO 27001 process includes general information security theory, ISO 27001 contributions, content of the standard, effects of ISO 27001 on business and management processes, ISO 27001 roadmap and important steps. Delegates will learn Introduction to Information Security Introduction to...

    Effective Use Of Safety Devices

    Transferring the necessary information for the effective use of information security solutions in the organization network. Delegates will learn Safety Devices Information Security Technology Use Scenarios of Information Security Devices Information Security Devices Integration

    Disaster Recovery Installation (DRI) Planning, Installation And Operation

    Information is provided in order for the organization to maintain its critical functions after a cyber incident or disaster and to keep the impact of the incident to the lowest possible level. Delegates will learn Business Continuity and Disaster Recovery Installation (DRI) DRI Project Management Risk and Business Impact Analysis Disaster Scenario Management

    Effective Backup And Backup Management

    An effective backup program should be established to ensure the security of organizational information and to ensure that business processes can continue with minimal loss in cases such as cyber attacks or disasters. Participants will be given detailed information about backup technologies and processes and necessary information for an effective backup process will be transferred....

    Creating an Effective Information Security Awareness Program

    To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them.   Delegates will learn Information Security Awareness Programs Principles of an Effective Program Preparation of Information Security Awareness Program Content Ensuring Personnel Adoption...

    Ethical Hacking

    Throughout the 5-day training, participants practically address the point of view of cyber attackers, the tools and techniques they use. At the end of this period, it is aimed to gain the knowledge and skills to detect and exploit the vulnerabilities of systems, networks and applications. Delegates will learn Introduction to Ethical Hacking Gathering Information...

    DoS / DdoS

    The scale of decommissioning attacks, which is an easy to organize, difficult to prevent and effective type of attack, is increasing day by day. Detailed information about DoS/DDoS attacks will be provided and necessary techniques will be conveyed to minimize the impact of these attacks on the organization. Delegates will learn Understanding DoS/DDoS Attacks DoS/DDoS...

    DNS Security

    We see that DNS servers that are located on the organization network but serve elements outside the organization by their nature have become important targets for attackers. Participants will be given detailed technical information about the attacks against the DNA protocol and the attacks carried out using this protocol and the measures to be taken...

    Burgundy Team Cyber Security

    For those involved in daily cybersecurity operations, it is a special training program developed to address a significant deficiency in the current training approach. Those who receive cyber-attack-oriented trainings cannot use the knowledge and skills they acquire here in their daily work. Performing an infiltration test between the tasks of the IT unit constitutes very...

    Information Security Management

    Providing participants with the necessary technical information to make the organizational information security level measurable and manageable. Delegates will learn Principles of Information Security Information Security Management Secure Network Architecture Business Continuity Important Issues of Information Security

    Advanced Persistant Threat (APT) And Kill Chain

    APT (Advanced Persistent Threat Advanced Continuous Threat) attacks, one of the most effective and most dangerous of the next generation cyber attacks, target especially strategic industries such as public, military, finance, telecom and energy. Understanding the techniques used in APT attacks and the measures that can be taken against these attacks with a very high...

    Network and System Security

    In order to ensure the security of local network and Internet connections and the systems connected to them, it is ensured that the measures to be taken in order to increase the aggressive point of view and security level to be learned are transferred to the organization personnel. Delegates will learn Basic Network Security Information...

    ITIL V3 Foundation

    The purpose of the ITIL Foundation training in IT Service Management is to enable the participant to learn the terminology, structure and basic concepts of ITIL, learn about 26 ITIL processes and 4 functions about Service Management. 5  basic ITIL books to be covered in education Service Strategy Service Design Service Transition Service Operation Continual...

    IT – Software Project Management

    Today, technology creates opportunities for companies as never before. In such an environment, it is possible to make companies advantageous in a global competitive environment, thanks to the effectiveness, experience and management skills of the people who manage and execute IT-based projects in companies. In this training, which we announced under the title of Project...

    Preparation for IIBA® CBAP®-CCBA® Certificate Exams

    In this introductory course, you’ll delve into the role and responsibilities of the business analyst (BA)- the communication link between all business areas and a critical player in project success. Learn techniques for ensuring project success every step of the way-from identifying and analyzing potential projects to making sure that the final project product meets...

    Process And Data Modeling For IIBA® Business Analysts

    In the Modeling Training for Analysts, the work flows to the participants will be addressed in terms of modeling processes, data and data flows and end user interfaces. Thus, participants will be able to better understand the complex business processes and business rules and document them in a way that the project team will best...

    UML Modeling For IIBA® Business Analysts

    The objective of this training is to learn how to use UML notation effectively.   Who Should Attend Business Analysts, System Analysts, Project Managers, Team Leaders / Managers and Enterprise Architects, Individuals Assuming the Role of Product Owner in Scrum Teams, Those who want to improve their knowledge and increase business performance in the fields...

    IIBA® Business Analysis Methodology Processes And Concepts

    Project Management Institute (PMI®), International Institute of Business Analysis (IIBA®) and all of the leading organizations of the software development industry agree that “Requirements Management” is the most important factor on project success. The purpose of this training is to develop the competencies of the people who are involved in the Business Analysis processes of...

    Process Analysis And Process Modeling

    Analysis, design and development training of business process provide an opportunity to obtain the knowledge and skills necessary to apply the most effective and up-to-date business analysis techniques, analyze the current situation comprehensively, and then design the future situation, while modeling the processes of your business.   Delegates will learn how to Introduction to Process...

    Digitalization and Industry 4.0 – Advanced

    Technological development and digitalization create huge opportunities for your company to increase customer value by streamlining processes, improving quality, creating new revenue streams and reducing production costs. However, it requires a very difficult struggle. Digitalization of a business; It requires a systematic approach, a change in leadership style and a completely new mindset in the production chain. The "Digitalization...

    Digitalization and Industry 4.0 – İntermediate

    Technology development and digitalization create enormous opportunities for your company to increase customer value by streamlining processes, increasing quality, creating new revenue streams, and reducing production costs. But the challenges are significant. Digitalization of business requires a systematical approach, changes in leadership style, and a completely new mind-set in the production chain. The training program...

    Digitalization and Industry 4.0 – Fundamentals

    Technology development and digitalization create enormous opportunities for your company to increase customer value by streamlining processes, increasing quality, creating new revenue streams, and reducing production costs. But the challenges are significant. Digitalization of business requires a systematical approach, changes in leadership style, and a completely new mind-set in the production chain. The training program...

    Industry 4.0

    Industry 4.0 is a term that refers to the fourth industrial revolution and describes the integration of technologies such as digitalization, automation, data analytics, artificial intelligence and the internet of things in industrial production. This concept aims to increase competitiveness by making production processes smarter, more efficient and flexible. Industry 4.0 course is a field of...

    Business Modeling for an Agile Digital Alignment

    This 2 day training course aims at helping delegates to learn how to model their business processes and assets in order to adapt them to digital disruptions based on goals, strategies and impacted capabilities as part of the target architecture. On the basis of the of key elements of business performance (strategies, tactics, KPI, business...

    Business and IT System Agility in the Digital Age

    This introduction seminar provides you with an overview of the digital business models, business and enterprise architecture frameworks as well as methodologies organizations are trying to focus on to increase their agility facing disruptions of the digital age . In particular, this seminar aims at helping you to understand frameworks and reference architectures that are...

    Digital Transformation – Guiding the Big Data to Strengthen the Decision-Making

    This training “Data-Driven Digital Transformation - Turning Disruptions into Opportunity by Strengthening the Decision Making” aims at helping attendees (CxOs, strategists, business analysts, data analysts, product managers and architects) understand foundations of the Digital Business Models, their connections with the Enterprise Architectures and Value Propositions in order to efficiently integrate "digital value creation and value...

    Digital Transformation – Impacts on the Business

    The emergence of digital technologies, like artificial intelligence, machine learning, blockchain, and the Internet of Things, as well as platform business models and the rise of Internet giants, is changing the dynamics of competition across industries, and uncovering unprecedented opportunities and threats for your business. You know you need to transform, but you are unsure...

    Google Cloud Platform Fundamentals

    This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants get an overview of the Google Cloud platform and a detailed view of the data...

    Cloud Computing Essentials

    Cloud computing is a big shift from the traditional way businesses think about IT resources. cloud services offer A pay-as-you-go model with minimal or no initial costs Usage-based pricing, so that costs are based on actual usage Elasticity, so that users can dynamically consume more or less resources Location independence, high availability, and fault tolerance...

    Blockchain – A Practical, Strategic & Commercial Guide

    Developments in the FinTech space are transforming financial services and blockchain and distributed ledger technology is at the forefront of this revolution. Both The Wall Street Journal and The Economist have described it as technology that could change the world. Blockchain offers banks, asset managers and other organisations the potential to achieve considerable cost savings,...

    IoT and Blockchain

    In this one day course, you’ll learn about two emerging technologies, the Internet of Things (IoT) and blockchain. Following an overview of these technologies, you’ll learn how blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating.   Who Should...

    Our IT trainings help you to solve real-world practical computing problems and practices for certification exams. Windows, Linux and Mac OS X will fix problems; set up networks, servers and client services; will manage big data; and you will keep your organization’s network safe.