PECB Certified ISO/IEC 27001 Lead Implementer

ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

(veel …)

Naised veebiarendajaks!

Koolituse eesmärgiks on õpetada naisi looma ja arendama veebirakendusi. Koolitus on naiste jaoks ideaalne esimene samm IKT sektori suunas. Koolituse läbinu omandab oskused, et asuda tööle veebirakenduste juuniorarendajana, front-end juuniorarendajana, IT-rakenduste administraatorina, IT-projektijuhtina või IT-nooremspetsialistina. (veel …)

SQL Fundamentals

This 3-day SQL Basics course is suitable for those with little prior knowledge. It teaches about the structure and operating principles of SQL databases, Familiarizes participants with the main SQL commands and functions and practically teaches them how to create simple SQL requests.  (veel …)

The Ultimate Agile Product Ownership program – Certified Scrum Product Owner (CSPO) and Advanced Certified Scrum Product Owner (A-CSPO)

Cultivate vital skills in agile product ownership through Scrum practices via the CSPO program, and elevate agile product ownership through advanced product discovery, strategy and roadmap, product prioritisation, stakeholder management and more via the Advanced CSPO program.

The Ultimate Agile Product Ownership program contains two modules both ending with the unique separate certification.

Product owners have a unique and demanding role on agile teams.

A product owner decides what the team will create next to deliver more value to the customer. In The Ultimate Agile Product Ownership program (CSPO® + A-CSPO® ) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.

You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.

What are the benefits of The Ultimate Agile Product Ownership program?

By earning a Certified ScrumMaster® certification you:

  • Learn the foundation of Scrum and the scope of the Certified Scrum Product Owner’s role from the best minds in Scrum.
  • Demonstrate to employers and peers your attainment of core Scrum knowledge.
  • Expand your career opportunities by staying relevant and marketable across all industry sectors adopting Agile practices.
  • Engage with a community of recognized Scrum experts who are committed to continuous improvement.

As a CSPO, you will be able to fulfil the role of Product Owner on a Scrum team. You will also have access to a 2-year membership with Scrum Alliance. Through this membership, you can join local user groups, and online social networks, and gain access to deep discounts on gatherings, and additional member-only resources. In addition, CSPOs can use a specially designed logo to highlight their credentials.

Who should take the course?

Anyone who enjoys (or wants to become more familiar with) the business side of projects can benefit from participating in The Ultimate Agile Product Ownership program (CSPO + A-CSPO).

CSPOs decide what the team will create, ordering the work to ensure that the most valuable, impactful products reach customers at a regular cadence.

The training will be beneficial to:

  • Product owners or product owner candidates;
  • Product and portfolio managers;
  • Business representatives;
  • Business experts;
  • Executives, managers, and support staff who are interested in improving product development through an in-depth hands-on workshop;
  • Anyone curious about how to enhance products;

MODULE 1 – Certified Scrum Product Owner (CSPO) 04 – 05.02.2025

Course content: 

  • Understanding Customers and Users
    • Why product discovery
    • Segmenting customers and users
    • Creating a shared understanding of customer needs
    • Prioritizing conflicting customers’ needs
    • Persona concepts and application
  • Validating Product Assumptions
    • How to validate within Scrum Framework
    • Validation methods and selection
  • Product Purpose and Strategy
    • Create and describe Product Vision
    • Product Strategy
    • Roadmap and Release planning
  • Prioritization
    • Define and measure the value for products
    • Models and techniques for prioritizing product features
  • Product Backlog and Product Goal
    • Product backlog and its characteristics
    • Product Backlog Item (PBI) and its characteristics
    • User Stories
    • Product Backlog Refinement – a powerful vehicle
      • when, why and how
      • Methods for slicing larger needs into smaller product backlog items
  • Scrum Framework Introduction
    • Scrum framework overview
    • How to benefit from Scrum framework to build a fantastic product
    • Agile estimation and release planning
  • Summary of Product Ownership
    • Core competencies of a product owner
    • Key benefits of Product Ownership
    • Differentiating outcome and output
    • Collaboration with stakeholders
    • Collaboration with developers
    • Working with multiple Scrum teams
  • Next steps to be a great Product Owner

MODULE 2 – Advanced Certified Scrum Product Owner (A-CSPO) 03 – 05.03.2025

As a Certified Scrum Product Owner® (CSPO®), you’ve been taught the Scrum terminology, ceremonies, and principles that enable you to fulfil the role of Product Owner on a Scrum team. You’re focused on maximizing business value and prioritization and understand how to do the best possible job to satisfy key stakeholders. One of your priorities should be your own success! Becoming Agile is a lifelong journey and incorporating Scrum values and Agile principles into your world of work takes diligence, patience, and a commitment to continuous improvement.

Now, to further enhance your knowledge and skills, the next step is achieving an Advanced Certified Scrum Product Owner™ (A-CSPO™) certification from Scrum Alliance®.

All attendees of this module must have the Certified Scrum Product Owner certification (CSPO) and some practice prior to this workshop.

Course content:

  • Product Essentials
    • Product basics
    • Product life cycle concept and corresponding strategy
  • Empathizing Customers and Users
    • Perform customer research
    • Interview and tips for an insightful interview
  • Advanced Product Assumption Validation
    • Cognitive biases and their impacts on product
    • Hypothesis Driven Development (HDD)
    • Compare different HDD approaches
    • Incorporating HdD into Scrum framework
    • Develop HDD and design validation plans
  • Advanced Purpose and Strategy
    • Developing product vision and strategies
    • Advanced road mapping and its development
    • Advanced product planning and forecasting
    • Release planning
  • Advanced Product Backlog Management
    • Model and measure the value for a product
    • Advanced Product Backlog Ordering
    • Linking Product Backlog Ordering to product Strategy
    • Enhancement of slicing user story techniques
  • Product Owner Core Competencies
    • Skills, capabilities, and practices of a Product Owner
    • A mindset of a Product Owner
      • Maximizing outcome and minimizing output
    • Facilitation skills of a Product Owner
    • Advanced stakeholder collaboration
      • Identify stakeholders and key stakeholder groups
      • Stakeholder management techniques
      • Collaboration methods and decision-making with stakeholders
    • Advanced Development Team collaboration
      • Define technical debts
      • Technical practices to help improve quality and ways of working
      • Practice value maximization per sprint
    • Collaboration with multiple development
      • Recognize scaling manifestos
      • List scaling frameworks
      • Working with dependencies
  • Next steps for product owners

As a Product Owner, you know there are rarely enough hours in the day to do what really matters — building great products for your customers and end users. With our new role-specific educational program, you’ll learn specific tools and techniques so you can truly deliver the business value that matters. You’ll gain new skills and deepen your knowledge in these areas, and most importantly, you’ll learn how to say “yes” to your career by saying “no.”

Assessment method:
The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises carried out during the training.

Graduation criteria:
A graduate of the training receives a certificate if he performs all the practical exercises given during the training.  Participants who have not achieved the learning outcomes will be issued a certificate of participation in the training upon request.

Õppekavarühm: 0413 Juhtimine ja haldus

Lecturer’s LinkedIn

Certified Agile Leadership 2 (CAL-2)

After Certified Agile Leadership (CAL-1) program, you start to practice and dance, and you build deeper desire to understand agile capabilities to dominate the market, deliver maximum value to customers, and achieve their goals.

Support your organization with agile leadership skills that drive those capabilities.

In the Certified Agile Leader® 2 course, you’ll find out how to expand your earlier agile leadership learning to organizational structure, design, strategy, delivery, and further advance your own professional growth.

Certified Agile Leadership 2 (CAL 2)

In CAL 2, you’ll deepen your understanding of the key capabilities, behaviors, and practices of agile leadership, learning how to drive rapid adaptation, customer focus, and responsiveness to change across your organization.

Building on the foundation of CAL 1, the CAL 2 program helps you understand how to deliver greater value to customers, execute organizational strategies effectively, and lead people and teams toward desired outcomes using agile leadership principles.

This workshop is designed for passionate leaders looking to elevate themselves, their teams, and their organizations to the next level.

Who should take this workshop?

The program is beneficial to:

  • Managers in organizations where agile and scrum transformation takes place
  • Product leaders, delivery leads, project leaders, and leaders of all kinds who are passionate about growing self-leadership and supporting teams, products and organizations
  • Agile Coaches, change leaders who want to develop themselves and support their leaders and organizations
  • Pre-requisite – participants to CAL 2 should have completed CAL 1 program. If you don’t have CAL 1 yet, please reach out to us for Certified Agile Leadership pathway program, which includes both CAL 1 and CAL 2 programs.

Inclusives:

1. Scrum Alliance CAL 2 certifications.

2. 18 PDUs and/or SEUs that can be used to renew PMP and SA membership respectively

Workshop Topics

  • Organizational Structure and Design
    • Vision, Mission, Values, Culture and Org Performance
    • Org strategy and execution
    • Org structure and design principles and application
    • Org culture and value delivery
  • Organization Transformation
    • Org structure and transformation
    • Value and metrics for continuous value delivery and structure enhancements
    • Change management to achieve strategy execution
  • Leadership Competencies
    • People management and development
    • Decision-making to a collaborative leader
    • Advance with feedback for others and self-improvement
    • Navigating through conflicts
    • Influence for outcome
    • Taking self-leadership to the next level
  • Next steps

Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.

Lecturer’s LinkedIn

Business Analysis, CBAP® and CCBA® examination preparation course

The CBAP® (Certified Business Analysis Professional) course is designed for business analysts – improving knowledge and strengthening existing competencies necessary to effectively complete their role in the organization. The training covers topics on business analytics planning and monitoring, requirements clarification and collaboration, requirements life cycle management, strategy analysis, requirements analysis and design definition, and solution evaluation.

(veel …)

ISTQB® CERTIFIED TESTER FOUNDATION LEVEL 

This training provides an opportunity to gain basic knowledge in the field of software testing – process management, planning and test reporting. At the end of the training, after successfully passing the final examination, the international ISTQB® certificate – ISTQB Foundation Level Exam for ISTQB CTFL Certification – ISTQB Official Registration (astqb.org) is obtained.

Training dates: 10, 11, 12, 13, 14 and 17 December

At the end of this course, participants will achieve the following skills:

  • use a common language for effective communication with other testers and project partners;
  • understand main testing concepts, the essence of the testing process, testing approaches and principles to achieve testing goals;
  • plan and prioritize testing tasks using selected testing techniques;
  • analyze both functional and non-functional specifications;
  • perform tests according to agreed testing plans, as well as analyze and report test results;
  • write a clear overview of incidents;
  • participate in test reports.

Target audience andprior prerequisites:Everyone who is going to participate in software testing process.

Prerequisites: Basic knowledge of system testing and experience in the IT industry.

Technology needed for the course: A Windows operating system computer with permissions to install and configure applications.

Those who do not have the necessary computer can rent it by agreement with BCS Training. Please inform the training company in advance.

Course outline 

  • Introduction to software testing:
    • Basic elements of testing;
    • Definitions of testing;
    • Test objectives;
    • General principles of testing;
    • Testing processes;
    • Psychology of testing.
  • Testing through the full software development lifecycle:
    • Software development models;
    • Verification and validation;
    • Testing levels – unit testing, integration testing, system testing, and acceptance testing;
    • Regression testing;
    • Testing and development.
  • Static testing techniques:
    • Types of inspection;
    • Inspection process (overview);
    • Roles and responsibilities in reporting;
    • Reporting success factors;
    • Static analysis tools.
  • Test design techniques:
    • Test development process;
    • Documentation;
    • Types of test design techniques;
    • Specification-based techniques (black box);
    • Structure-based techniques (white box);
    • Experience-based techniques;
    • Criteria for the selection of testing techniques.
  • Test management:
    • Organization of testing;
    • Organization of the team: roles and responsibilities;
    • Planning and evaluation of testing;
    • Monitoring and control of testing progress;
    • Configuration management;
    • Risk management;
    • Classification and management of defects.
  • Test support tools:
    • Selection considerations;
    • Types of testing tools;
    • Effective use of tools: potential benefits and risks;
    • Classification of tools.

Study methods: You can participate in the study by joining the training through the online environment Teams. The volume of training is 24 hours incl. 12 hours of practical exercises or group work in the training environment.

Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.

Completion of training: Each participant receives a certificate of attendance after the course, the official certificate is awarded only when the exam is taken and passed within one year after the course (exam registration must be done within 6 months after completing the course).

The price includes: Study materials and examination cost (must be registered 6 months after the course and passed 12 months after the course.

Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.

Curriculum group: 0612 Database and network design and management.

PRINCE2® Foundation (7th edition)

Training schedule (every day 08:45-12:00):
21.01.2025
22.01.2025
23.01.2025
28.01.2025
29.01.2025
30.01.2025

Within the course, we offer the opportunity to master the latest version of PRINCE2® – the 7th edition, enhanced with more contemporary tools, technologies, and processes for all types of projects. PRINCE2® 7th edition Foundation-level training lasts for 3 days and is suitable for anyone looking to start or further their career in project management using a modern and internationally recognized method.

During the training, participants will gain an understanding of the method’s key processes, principles, and themes to ensure that project management aligns with all 21st-century standards and requirements.

Course target

Gain a comprehensive understanding of project management principles developed in accordance with the PRINCE2® 7th edition methodology. The training includes preparation for the PRINCE2® 7th edition Foundation-level certification exam.

PRINCE2® is a registered trademark of AXELOS Limited.

Audience

Existing and aspiring project managers.

Other employees involved in project development and implementation, including:

  •   Project board members;
  •   Team leaders;
  •   Project assurance roles (such as business change analysts);
  •   Project support roles (project and program office staff);
  •   Operational managers/staff.

Course outline

  • Introduction to PRINCE2®;
  • Overview of PRINCE2® project management;
  • People;
  • Organization;
  • Starting a project;
  • Business justification;
  • Plans;
  • Quality;
  • Risk;
  • Controlling a stage and managing product delivery;
  • Managing stage boundaries;
  • Challenges;
  • Progress;
  • Closing a project;
  • Directing a project;
  • Course review.

At Course Completion

  • Understand key concepts related to projects and the PRINCE2® 7th edition methodology;
  • Understand PRINCE2® 7th edition principles, themes, processes;
  • Understand the importance of the human factor in successful project management;
  • Understand practical application of PRINCE2® 7th edition throughout the project lifecycle.

Prerequisites

No preconditions are necessary, but experience in project management is preferred.

Training materials

Participants will receive PeopleCert official training material and a preparation test for the exam.

Certification Exam

PRINCE2 Foundation Certification Exam (exam fees are already included in the training price).

Reseller Statement:
“The PRINCE2® Foundation (7th edition) course is provided by Baltijas Datoru Akadēmija, an ATO of PeopleCert.”

Acknowledgement Statement:
“PRINCE2®is a registered trademark of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.”

Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.

Hands-on Hacking Advanced (HOHA)

Hands-on Hacking Advanced (HOHA) is a follow-up course to our Hands-on Hacking Essentials (HOHE)training.

Target audience: System administrators, information security specialists and -managers and any other IT personnel that is not afraid of the shell or command prompt.

Pre-requisites : Prior HOHE participation is required to take this course to ensure minimum same level of participants.

Training methods: Trainers will engage participants with lectures, live attack demonstrations and practical examples followed by individual hands-on exercise scenarios. Training is interactive,
practical, and besides active participation also full of attack stories that help to change the perspective and understanding of real life security threats.

Ideology of this training: The main differences between hacking and penetration testing are the intent and (imposed) limitations. Therefore, the idea behind this training is to see practical
information security from the attacker’s or “opposing team’s” point of view and to deliver first-hand experience or running attacks. Everyone will walk through the phases of an attack until successfully owning various systems and services. There are plenty of attack scenarios to play through and to complete scored objectives. Since the expected participants’ skill and experience level is varying to a large degree, we cover a mix of *nix and Windows world and focus on explaining key concepts and on showing real attacks even to those who have never compiled or launched any exploits before.

Training objectives: During the 3 days hands-on training experience the participants should build upon HOHE training in understanding of current attacker tool-sets, attack types and methods. By experiencing the attacker mindset and point of view via hands-on exercises the participants will use Tuoni C2 and other tools from a Red Teaming perspective in order to understand what it takes in terms of individual skills to be a red team member.

Intended outcome: During the 3 day hands-on training experience the participants should form a good understanding of current attacker tool-set, attack types and methods. By experiencing the
attacker mindset and point of view via hands-on exercises the participants not only will gain much higher appreciation for attack threats, but will be much more alert and better prepared for their own IT systems defense.

Day 1

Warm-up scenario – Introduction to C2 frameworks using Tuoni. Learn to create and deliver client-side attacks that are not recognized as malicious neither by the user nor various security
products. Examples of common initial access vectors. Since all participants are expected to have completed our HOHE (Hands-on Hacking Essentials) course, we pick up speed fast and there is no time for much “spoon feeding”.

Mission: Your mission, should you choose to accept it, is to help a victim of ransomware attack. From the darknet ransomware site you discover that there is an actual company offering ransomware as SaaS and you dig deeper…

Iron Argon Development – a company “Network Takeover ” scenario of fully patched and properly configured networks. After initial reconnaissance of the target domain and public facing services we gain an initial foothold by sending phishing e-mail. Using in memory execution of different tools we gather information from infected workstation and set up persistence.

Day 2

Iron Argon Development – a company “Network Takeover ” scenario (continues)
Explanation of common .NET offensive tools for enumeration. Using Python and Tuoni API we enhance our C2 user experience. Explanation of kerberoasting. Side mission to recover domain accounts passwords from kerberoasted hashes with Hashcat. Enumeration of AD using Bloodhound. Discovering next targets and potential attack paths from Bloodhound. Lateral movement using different tunneling and C2 features inside the organization network. Bypassing applocker restrictions to execute our malware.

Day 3

Iron Argon Development – a company “Network Takeover ” scenario (continues)
We continue moving around inside the network, elevating our privileges using common misconfiguration. We steal kerberos ticket from the owned system and implant it into memory to
gain more access inside the domain. ADCS misconfigurations are common and Iron Argon Development network is not an exception here. We abuse ADCS misconfiguration to gain even more
access inside the domain and then laterally move with new permissions inside the isolated development network segment relaying our C2 traffic via SMB beacon. Side mission to take over other
servers including source code repository and backdoor the ransomware.

Mission ending
Having obtained the ransomware binary, we reverse engineer it and discover a decryption key for the victims. We finish the course with the final feedback round, re-iterate what we learned in the process and ask your opinion of the course to continuously improve the content and learning experience.

Delivery: We can deliver on-site at group pricing anywhere in the world where good broadband connection is available. Ask us for the group pricing or for times and locations of our public courses.

More information: read from here.

Hunt the Hacker (HtH)

Participants will understand what threat hunting is, be utterly convinced of the need for it, know what infrastructure is required to facilitate it, and be able to start doing it with confidence within their own organizations.

(veel …)