IT & Management Trainings
- Home
- IT & Management Trainings
IoB – Internet of Behaviors
The Internet of Behaviors, considered as a subset of the Internet of Things, is an IoT technology focused on sales and marketing. IoB aims to collect data through IoT technologies in order to predict how people will act in which situations and to direct the behaviors as a result of the analysis of the collected...
- IOT/Blockchain/Industry 4.0
- 2 Days
IOT – Introduction to Internet of Things
The Internet of Things (Internet of Things, IoT for short) is a communication network in which physical objects are connected with each other or with larger systems. It is envisaged that objects can be marked with a unique identifier so that they can work together over the Internet infrastructure, thus creating values greater than the...
- IOT/Blockchain/Industry 4.0
- 2 Days
.NET Microservices
Microservice architecture is an architectural model in which different business capabilities are configured independently of each other. In this architecture, large systems are divided into smaller services, each responsible for a different job and independent of each other. Behind the scenes, all of these services are called microservices. Microservice, in short, means a small service that...
- .NET / Microservices / Microsoft Courses
- 5 Days
Test Automation – Mobile
Mobile app test automation is used to test for a number of things, such as functionality, security, and accessibility. Performance testing, stress testing, functional testing, and accessibility testing are a few types of tests that may be conducted on mobile apps. Mobile app testing automation is not for the faint of heart. Complex test creation,...
- ISTQB Test Courses
- 2 Days
Test Automation – Web
Automated testing is almost mandatory to guarantee the stability of an application. This course teaches you how to test web applications using first a record-and-playback approach with Selenium. At the core of testing any website efficiently is a thorough knowledge of how to do automated testing. In this course, Automated Web Testing with Selenium ,...
- ISTQB Test Courses
- 2 Days
Performance Test
Performance Testing, also known as Perfect Testing, is a type of testing performed to check how the application or software performs under workload in terms of responsiveness and stability. The purpose of Performance Testing is to identify and eliminate performance bottlenecks in an application. The main purpose of this test is to check whether the...
- ISTQB Test Courses
- 2 Days
The Complete Apache Kafka Practical Guide
Gain a deep understanding of the architecture, deployment and maintenance of the Kafka platform with Apache Kafka Course. This training will equip candidates with the skills needed to to develop a robust and fault tolerant big data application for their enterprise to process massive real-time data streams. Master Apache Kafka architecture and learn how it...
- Big Data
- 5 Days
COBIT 2019 Foundation
Over the years, best-practice frameworks have been developed and promoted to assist in the process of understanding, designing and implementing enterprise governance of IT (EGIT). COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. Learners...
TOGAF Business Architecture
In the business sector, business architecture is a discipline that “represents holistic, multidimensional business views of: capabilities, end-to-end value delivery, information, and organizational structure; and the relationships among these business views and strategies, products, policies, initiatives, and stakeholders. In application, business architecture provides a bridge between an enterprise business model and enterprise strategy on one...
- ITIL / TOGAF / COBIT / TOGAF & CITA
- 2 Days
MongoDB for Developers
MongoDb, an open source NoSQL database application, is preferred by many institutions due to its flexible and easy to use. In addition to being document-based and fast, MongoDB’s ability to store NoSQL data in document format and its scalability provides a great advantage in terms of easily analyzing the data. This 3-days MongoDB training for...
- Cassandra & MongoDB / PostgreSQL & MongoDB
- 3 Days
MongoDB for Administrators
MongoDB is a document-based, fast, scalable and open source NoSQL (Not only SQL) database application. The fact that MongoDB is flexible and easy to use has strengthened its worldwide popularity in a short time and made it a database system preferred by many institutions. One of the most important advantages of MongoDB is that it...
- Cassandra & MongoDB / PostgreSQL & MongoDB
- 4 Days
Secure Software Development
Secure software development training is a training program that aims to provide software developers with knowledge and skills in secure software design, development processes and best practices. This course teaches the principles and methods needed to reduce the risks associated with the security of the software, prevent security vulnerabilities, and protect user data. This type of...
- Cyber Security
- 3 Days
Effective Measures Against Data Leaks
Participants are provided with the necessary technical information on creating processes to take effective measures against data leaks and preventing data leaks. Delegates will learn Data Leaks Data Leaking from Clients and Servers Data Infiltration from Applications Measures against Data Infiltrations
- Cyber Security
- 1 Day
Applied Network And System Security
Transferring the measures to be taken to increase the aggressive point of view and security level to ensure the security of local network and internet connections and systems connected to them to the organization personnel. With the application of the techniques and tools learned on the third day of the training, it is carried out...
- Cyber Security
- 3 Days
Threat And Vulnerability Management
Providing participants with in-depth information about information security threats and provide them with the information necessary to establish a vulnerability management process to maintain the organization's level of information security. Delegates will learn Threat, Risk and Vulnerability Security Vulnerabilities Patch and Update Management Creating a Vulnerability Management Program
- Cyber Security
- 2 Days
SOME Setup
Necessary information will be provided for the effective and sustainable establishment of SOME (Cyber Incident Response Team) structures required to be established in public institutions and critical sectors within a successful project. Delegates will learn SOME principles SOME Personnel SOME Processes Cyber Incident Detection SOME Technologies
- Cyber Security
- 1 Day
Cyber Intelligence
To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Introduction to Cyber Intelligence and Hacking Internet Research Tools Advanced Search Engine Usage Who should attend Network and system...
- Cyber Security
- 2 Days
LOG Collection And Management
Providing cyber incident detection and post-incident review skills by using records (logs) that can be obtained from the organization network and systems. Delegates will learn Types of Records Generated on the Network Establishment of Record Collection and Retention Structure Processing of Records Use of Records
- Cyber Security
- 3 Days
Wireless Network Security
Wireless networks that facilitate our business processes are also an offensive front for the organization network. Participants will be provided with the necessary information for the safe installation of the wireless network and the execution of the operating processes. Delegates will learn Principles of Wireless Network Security Wireless Network Security Vulnerabilities Ensuring Wireless Network Security...
- Cyber Security
- 1 Day
ISO 27001 Information Security Management System Manager
Training for senior and mid-level managers of companies that have entered or intend to enter the ISO 27001 process includes general information security theory, ISO 27001 contributions, content of the standard, effects of ISO 27001 on business and management processes, ISO 27001 roadmap and important steps. Delegates will learn Introduction to Information Security Introduction to...
- Cyber Security
- 1 Day
Effective Use Of Safety Devices
Transferring the necessary information for the effective use of information security solutions in the organization network. Delegates will learn Safety Devices Information Security Technology Use Scenarios of Information Security Devices Information Security Devices Integration
- Cyber Security
- 1 Day
Disaster Recovery Installation (DRI) Planning, Installation And Operation
Information is provided in order for the organization to maintain its critical functions after a cyber incident or disaster and to keep the impact of the incident to the lowest possible level. Delegates will learn Business Continuity and Disaster Recovery Installation (DRI) DRI Project Management Risk and Business Impact Analysis Disaster Scenario Management
- Cyber Security
- 1 Day
Effective Backup And Backup Management
An effective backup program should be established to ensure the security of organizational information and to ensure that business processes can continue with minimal loss in cases such as cyber attacks or disasters. Participants will be given detailed information about backup technologies and processes and necessary information for an effective backup process will be transferred....
- Cyber Security
- 1 Day
Creating an Effective Information Security Awareness Program
To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Information Security Awareness Programs Principles of an Effective Program Preparation of Information Security Awareness Program Content Ensuring Personnel Adoption...
- Cyber Security
- 2 Days
Ethical Hacking
Throughout the 5-day training, participants practically address the point of view of cyber attackers, the tools and techniques they use. At the end of this period, it is aimed to gain the knowledge and skills to detect and exploit the vulnerabilities of systems, networks and applications. Delegates will learn Introduction to Ethical Hacking Gathering Information...
- Cyber Security
- 5 Days
DoS / DdoS
The scale of decommissioning attacks, which is an easy to organize, difficult to prevent and effective type of attack, is increasing day by day. Detailed information about DoS/DDoS attacks will be provided and necessary techniques will be conveyed to minimize the impact of these attacks on the organization. Delegates will learn Understanding DoS/DDoS Attacks DoS/DDoS...
- Cyber Security
- 2 Days
DNS Security
We see that DNS servers that are located on the organization network but serve elements outside the organization by their nature have become important targets for attackers. Participants will be given detailed technical information about the attacks against the DNA protocol and the attacks carried out using this protocol and the measures to be taken...
- Cyber Security
- 1 Day
Burgundy Team Cyber Security
For those involved in daily cybersecurity operations, it is a special training program developed to address a significant deficiency in the current training approach. Those who receive cyber-attack-oriented trainings cannot use the knowledge and skills they acquire here in their daily work. Performing an infiltration test between the tasks of the IT unit constitutes very...
- Cyber Security
- 5 Days
Information Security Management
Providing participants with the necessary technical information to make the organizational information security level measurable and manageable. Delegates will learn Principles of Information Security Information Security Management Secure Network Architecture Business Continuity Important Issues of Information Security
- Cyber Security
- 2 Days
Advanced Persistant Threat (APT) And Kill Chain
APT (Advanced Persistent Threat Advanced Continuous Threat) attacks, one of the most effective and most dangerous of the next generation cyber attacks, target especially strategic industries such as public, military, finance, telecom and energy. Understanding the techniques used in APT attacks and the measures that can be taken against these attacks with a very high...
- Cyber Security
- 2 Days
Network and System Security
In order to ensure the security of local network and Internet connections and the systems connected to them, it is ensured that the measures to be taken in order to increase the aggressive point of view and security level to be learned are transferred to the organization personnel. Delegates will learn Basic Network Security Information...
- Cyber Security
- 2 Days
ITIL V3 Foundation
The purpose of the ITIL Foundation training in IT Service Management is to enable the participant to learn the terminology, structure and basic concepts of ITIL, learn about 26 ITIL processes and 4 functions about Service Management. 5 basic ITIL books to be covered in education Service Strategy Service Design Service Transition Service Operation Continual...
IT – Software Project Management
Today, technology creates opportunities for companies as never before. In such an environment, it is possible to make companies advantageous in a global competitive environment, thanks to the effectiveness, experience and management skills of the people who manage and execute IT-based projects in companies. In this training, which we announced under the title of Project...
- Project Management
- 3 Days
Preparation for IIBA® CBAP®-CCBA® Certificate Exams
In this introductory course, you’ll delve into the role and responsibilities of the business analyst (BA)- the communication link between all business areas and a critical player in project success. Learn techniques for ensuring project success every step of the way-from identifying and analyzing potential projects to making sure that the final project product meets...
- Business Analysis /CBAP
- 5 Days
Process And Data Modeling For IIBA® Business Analysts
In the Modeling Training for Analysts, the work flows to the participants will be addressed in terms of modeling processes, data and data flows and end user interfaces. Thus, participants will be able to better understand the complex business processes and business rules and document them in a way that the project team will best...
- Business Analysis /CBAP
- 2 Days
UML Modeling For IIBA® Business Analysts
The objective of this training is to learn how to use UML notation effectively. Who Should Attend Business Analysts, System Analysts, Project Managers, Team Leaders / Managers and Enterprise Architects, Individuals Assuming the Role of Product Owner in Scrum Teams, Those who want to improve their knowledge and increase business performance in the fields...
- Business Analysis /CBAP
- 2 Days
IIBA® Business Analysis Methodology Processes And Concepts
Project Management Institute (PMI®), International Institute of Business Analysis (IIBA®) and all of the leading organizations of the software development industry agree that “Requirements Management” is the most important factor on project success. The purpose of this training is to develop the competencies of the people who are involved in the Business Analysis processes of...
Process Analysis And Process Modeling
Analysis, design and development training of business process provide an opportunity to obtain the knowledge and skills necessary to apply the most effective and up-to-date business analysis techniques, analyze the current situation comprehensively, and then design the future situation, while modeling the processes of your business. Delegates will learn how to Introduction to Process...
- Business Analysis /CBAP
- 2 Days
Digitalization and Industry 4.0 – Advanced
Technological development and digitalization create huge opportunities for your company to increase customer value by streamlining processes, improving quality, creating new revenue streams and reducing production costs. However, it requires a very difficult struggle. Digitalization of a business; It requires a systematic approach, a change in leadership style and a completely new mindset in the production chain. The "Digitalization...
- IOT/Blockchain/Industry 4.0
- 2 Days
Digitalization and Industry 4.0 – İntermediate
Technology development and digitalization create enormous opportunities for your company to increase customer value by streamlining processes, increasing quality, creating new revenue streams, and reducing production costs. But the challenges are significant. Digitalization of business requires a systematical approach, changes in leadership style, and a completely new mind-set in the production chain. The training program...
- IOT/Blockchain/Industry 4.0
- 2 Days
Digitalization and Industry 4.0 – Fundamentals
Technology development and digitalization create enormous opportunities for your company to increase customer value by streamlining processes, increasing quality, creating new revenue streams, and reducing production costs. But the challenges are significant. Digitalization of business requires a systematical approach, changes in leadership style, and a completely new mind-set in the production chain. The training program...
- IOT/Blockchain/Industry 4.0
- 2 Days
Industry 4.0
Industry 4.0 is a term that refers to the fourth industrial revolution and describes the integration of technologies such as digitalization, automation, data analytics, artificial intelligence and the internet of things in industrial production. This concept aims to increase competitiveness by making production processes smarter, more efficient and flexible. Industry 4.0 course is a field of...
- IOT/Blockchain/Industry 4.0
- 3 Days
Business Modeling for an Agile Digital Alignment
This 2 day training course aims at helping delegates to learn how to model their business processes and assets in order to adapt them to digital disruptions based on goals, strategies and impacted capabilities as part of the target architecture. On the basis of the of key elements of business performance (strategies, tactics, KPI, business...
- IOT/Blockchain/Industry 4.0
- 2 Days
Business and IT System Agility in the Digital Age
This introduction seminar provides you with an overview of the digital business models, business and enterprise architecture frameworks as well as methodologies organizations are trying to focus on to increase their agility facing disruptions of the digital age . In particular, this seminar aims at helping you to understand frameworks and reference architectures that are...
Digital Transformation – Guiding the Big Data to Strengthen the Decision-Making
This training “Data-Driven Digital Transformation - Turning Disruptions into Opportunity by Strengthening the Decision Making” aims at helping attendees (CxOs, strategists, business analysts, data analysts, product managers and architects) understand foundations of the Digital Business Models, their connections with the Enterprise Architectures and Value Propositions in order to efficiently integrate "digital value creation and value...
- IOT/Blockchain/Industry 4.0
- 3 Days
Digital Transformation – Impacts on the Business
The emergence of digital technologies, like artificial intelligence, machine learning, blockchain, and the Internet of Things, as well as platform business models and the rise of Internet giants, is changing the dynamics of competition across industries, and uncovering unprecedented opportunities and threats for your business. You know you need to transform, but you are unsure...
- IOT/Blockchain/Industry 4.0
- 2 Days
Google Cloud Platform Fundamentals
This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants get an overview of the Google Cloud platform and a detailed view of the data...
- Cloud Computing
- 1 Day
Cloud Computing Essentials
Cloud computing is a big shift from the traditional way businesses think about IT resources. cloud services offer A pay-as-you-go model with minimal or no initial costs Usage-based pricing, so that costs are based on actual usage Elasticity, so that users can dynamically consume more or less resources Location independence, high availability, and fault tolerance...
- Cloud Computing
- 2 Days
Blockchain – A Practical, Strategic & Commercial Guide
Developments in the FinTech space are transforming financial services and blockchain and distributed ledger technology is at the forefront of this revolution. Both The Wall Street Journal and The Economist have described it as technology that could change the world. Blockchain offers banks, asset managers and other organisations the potential to achieve considerable cost savings,...
- IOT/Blockchain/Industry 4.0
- 2 Days
IoT and Blockchain
In this one day course, you’ll learn about two emerging technologies, the Internet of Things (IoT) and blockchain. Following an overview of these technologies, you’ll learn how blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. Who Should...
Our IT trainings help you to solve real-world practical computing problems and practices for certification exams. Windows, Linux and Mac OS X will fix problems; set up networks, servers and client services; will manage big data; and you will keep your organization’s network safe.