Bootstrap is a powerful toolkit – a collection of HTML, CSS, and JavaScript tools for creating and building web pages and web applications. It is a free and open-source project, hosted on GitHub, and originally created by (and for) Twitter. Bootstrap is also the world’s most popular mobile ready web development framework for HTML, CSS and JavaScript. Bootstrap lets you quickly build cool websites that work across devices and browsers.
-
Certified Scrum Master(CSM) certification training from Scrum Alliance is a widely recognized Scrum certificate in the world. Designed to help the team coaches learn how to maximize the potential of the product development teams. Our 2-day CSM Training and classroom workshop delivered by an expert and Certified Scrum Trainer (CST) provides tested and practical techniques for data-based iterative product management within Scrum using videos, activities and exercises, that are conducted by expert trainers.
The Certified Scrum Master certification builds on your foundational scrum knowledge with enhanced implementation skills and helps distinguish yourself in the global marketplace and stand out as a member of the Scrum Alliance community.
-
Product owners have a unique and demanding role on agile teams. A product owner decides what the team will create next in order to deliver more value to the customer. In a Certified Scrum Product Owner (CSPO) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.
You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.
Participants in a CSPO offering should expect that each Learning Objective identified in this document will be covered. Students should also expect that the Scrum Foundations Learning Objectives are covered either before or during the offering.
-
Javafx Programming is intended for software engineers, systems analysts, program managers and user support personnel who wish to make beautiful UI using the Java programming language.
-
Our Sap Hana Training course will help you understand and learn the fundamentals and will also felicitate on training hands-on for the better grasp on the course. Further, we have the highly qualified professionals who will train you about Sap Hana Studio, Modeling, Security features and its various other aspects. This course is designed in such a way that it will make you understand ‘why sap Hana is a fundamentally different database engine.
-
PostgreSQL is the most advanced open source database; it is globally accepted as an incredibly powerful tool for database management. PostgreSQL Administration & Development course offers you the information required to manage your live production database. It handles the administration and performance tuning of PostgreSQL databases. The candidates of PSQL training program are likely to learn the use of specialized PostgreSQL (AKA Postgres) modules such as replication, connection pooling, and full-text searching.
-
The course provides core server-side Java web technologies. Covers topics on core java, JDBC Technology and Servlets. It then shows how JSP is built on the Servlet architecture. Additionally, the class shows how to use JSTL, custom tags and expression language to reduce Java code in web pages while adding tremendous power and capability to those pages. The class will provide hands-on practical skills based on actual project case study.
-
Angular certification course helps you understand the design of single-page applications and how Angular facilities their development. This Angular certification provides knowledge of concepts such as TypeScript, Bootstrap Grid System, dependency injections, SPA, forms, pipes, promises, observables, and Angular class testing.
-
Functional toolkit to design state of the art web applications. This course is a great starting point for those who want to master this framework and make a career in designing web applications with Laravel. You will learn Laravel from scratch and build your own applications.
-
The main objective of this React training course is to help you become familiar with the process and gain the skills you’ll need to become a professional React developer. You will learn the fundamentals of React through self-paced and instructor-led training to understand and build React components and structure applications with Redux.
-
This three-day FDTBF: Fintech and Digital Transformation in Banking and Finance course aims to provide finance professionals with a solid foundation in the rapidly changing world of fintech and digital banking. FinTech, short for financial technology, refers to an emerging financial services sector that is fast becoming indispensable to financial institutions and is constantly impacting the way we view and execute financial transactions.
This course will be pivotal in helping participants grasp the basics of fintech, navigate the mechanisms that facilitate it and comprehend the inevitably complex issues and intricacies that it brings.
Benefits of the workshop are:
- Understand the technologies that are impacting the economy, especially banking
- Theoretical understanding of artificial intelligence (AI), the blockchain and Internet of Things (IoT) within FinTech
- Broad applications grasp of technical/process solution to existing pain points
- Develop business use case to develop/improve a new/existing product
- Develop a competitive corporate strategy through innovative thinking
- Significantly reduce business costs and improve efficiencies
-
This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.
Throughout the whole course, participants will gain in-depth knowledge on the following topics:
- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models
- Smart Cards
- NDES, CEP/CES
- SSL
- OCSP
After completing the PKI course, every individual will be able to successfully design, setup, deploy, Troubleshoot and manage a public key infrastructure (PKI). This is a 5-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organization.
-
This hands-on course provides training on standard UNIX commands and utilities used for day to day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. The course presents the concepts necessary to understand the way UNIX works as well as the system’s most commonly used commands. Data manipulation utilities and shell syntax for synthesizing command pipelines are emphasized. Bourne shell, Bash shell and Korn shell programming techniques are introduced so students will be able to read and modify existing shell scripts as well as create their own. Desktop environments are also introduced from a user’s perspective, including common window managers, Open Office utilities and an introduction to configuration tools. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency.
-
Intensive and hands-on, the course emphasizes becoming productive quickly as a Java application developer. This course quickly covers the Java language syntax and then moves into the object-oriented features of the language. As a participant you will be able to create basic applications using the Java 8 programming language.
The participants will also be able to describe object-oriented concepts, object-oriented programming (OOP) concepts, and Java platforms and technologies. This course will use Eclipse as an IDE.
-
C# is one of the most popular programming languages and can be used for a variety of things, including mobile applications, game development, and enterprise software. In this course, you’ll be exposed to fundamental programming concepts using C# and start writing programs right away.
-
Vue.js is among the world’s most popular language frameworks for applications and interface development. Its relative lightweight platform, ease of understanding, simple integration, and flexibility have given it huge support from developers and organizations such as Alibaba, Xiaomi and others.
-
This course will teach you and your team to use Xamarin. Forms to build fully native Android, iOS and Universal Windows Platform apps with Xamarin and C#. Xamarin. Forms exposes a complete cross-platform UI toolkit for .NET developers
-
CICS Command Level Programming provides an understanding of the CICS system, application environment and typical applications. The structure of CICS pseudo-conversational application programs are discussed and reviewed in detail. The course consists of a series of lectures, discussions and class exercises with hands-on programming sessions.
-
API (Application Programming Interface) endpoints are the connections between your application and the rest of the developer community. In this course you will learn about writing secure, developer-friendly APIs that will make your back-end application thrive and keep your users happy.
The JSON format is used for transmitting and serializing structured data in a network connection.
-
The course also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The course also includes case studies that are useful for deployment scenarios and remote labs.
-
AC helps you understand Business Technology Strategy (BTS) and Iasa IT Architecture Body of Knowledge (ITABoK).
Find out how to apply skills from the five foundational pillars of ITABoK as well as distinguish key architecture concepts, scopes, principles, contexts and roles. Adopt industry frameworks and components alongside basic IT Architect skills and define values, as well as create IT’s business capabilities. Find out what it takes to set up an IT Architecture Office (ITAO) and how to run its day-to-day tasks as an IT Architect. Finally, learn how to select and priorities IT projects, assign resources for them, work hand in hand with the Project Management office and present technology values to stakeholders.
-
The Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 course shows you how to implement Cisco® cloud security solutions to secure access to the cloud, workloads in the cloud, and Software as a Service (SaaS) user accounts, applications, and data. Through expert instruction and hands-on labs, you’ll learn a comprehensive set of skills and technologies including: how to use key Cisco cloud security solutions; detect suspicious traffic flows, policy violations, and compromised devices; implement security controls for cloud environments; and implement cloud security management. This course covers usage of Cisco Cloudlock, Cisco Umbrella™, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch® Cloud and Enterprise, Cisco Firepower® NGFW (next-generation firewall), and more.
-
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.
It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.
This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
ArchiMate, The Open Group Standard, is an open and independent modeling language for enterprise architecture that is supported by different tool vendors and consulting firms.
ArchiMate® provides instruments to enable enterprise architects to describe, analyse and visualise the relationships among business domains in an unambiguous way.
Upon completion, participant can enroll in the following certification exam:
- ArchiMate 3 Foundation
The purpose of this certification is to provide validation that the participant has gained knowledge of the notation, terminology, structure and concepts
of theArchiMate® modeling language. The learning objectives at this level focus on knowledge and comprehension. - ArchiMate® 3 Practitioner
The purpose of this certification is to provide validation that the participant has gained knowledge as in Level 1 and has the capability to use the ArchiMate® language for modeling.
- ArchiMate 3 Foundation
-
This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS
-
This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.
-
Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.
This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.
-
The Information Architect has mastered the management of information across and within their industry.
They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.
Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.
-
The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.
They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.
lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.
-
The Software Architect has mastered the value, use, development and delivery of intensive systems.
They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.
The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.
-
A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.
The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.
-
Organizations are compelled to find effective and cost-efficient data security solutions.
Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.
IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.
z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:
- Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
- New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
- Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
- In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
- In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
- These exercises reinforce the concepts and technologies being covered in the lectures.
-
To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.
-
This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.
You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.
You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.
-
This course is designed to teach you how to use z/OS Job Control Language (JCL) and selected z/OS utility programs in an online batch environment. Both Storage Management Subsystem (SMS) and non-SMS JCL are discussed. Machine lab exercises complement the lecture material.