Koolituse eesmärk:Osalejad saavad teadmised Linuxi /systemd rakendamisest virtualiseerimise vaatenurgast. Samuti esmased teadmised konfiguratsioonihaldusvahenditest (kasutajate/tarkvara tsentraalne haldus).
Sihtrühm ja eelteadmised:Koolitusele on oodatud linuxi kasutajaoskustega süsteemiadministraatorid, kelle tööülesannetele on lisandunud virtualiseerimine ja platvormihaldus. Samuti on oodatud need, kes eelnevalt läbinud kursused “Linux põhikursus” ja “Linux edasijõudnutele”
Õppevahendid: Linuxi operatsioonisüsteemil toimiv arvuti
Turvaküsimusi käsitletakse jooksvalt iga teema juures.
Kursusel õpitav on toeks eksamitel: LPIC-2 201, LPIC-3 300 ja 304
Õppemeetodid:Auditoorne töö klassi- või veebikeskkonnas 24 tundi (sh praktilised harjutused koolikeskkonnas 15tundi) Hindamismeetod:Praktiliste tööde sooritamine klassis Hindamiskriteerium: Õpiväljundite saavutamist kontrollitakse läbi praktiliste harjutuste koolikeskkonnas
Koolituse lõpetamine: Koolituse lõpetaja saab tunnistuse kui sooritab kõik koolituse jooksul antud praktilised harjutused.
Hind sisaldab:
Kohvipause koolituskeskuses ja ühiseid lõunasööke
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
„Koolitaja oskas vastata kõigile küsimustele ja aidata lahendada probleeme, mis tallegi paistsid esmakordsed olevat. Ülikõva!“
Linux edasijõudnutele
Koolituse eesmärk: Osalejad saavad teadmised Linuxi teenustest, ressursijuhtimisest, seadistusmetoodikatest.
Sihtrühm ja eelteadmised:Koolitusele on oodatud süsteemiadministraatorid, kelle tööülesannetele on lisandunud või lisandumas Linuxi serverite teenuste paigaldus ja haldus. Samuti on oodatud need, kes eelnevalt läbinud kursused Linuxi administreerimise algkursus 1 ja 2.
Õppevahendid: Linuxi operatsioonisüsteemil toimiv arvuti
Õppemeetodid:Auditoorne töö klassi- või veebikeskkonnas 24 tundi (sh praktilised harjutused koolikeskkonnas 15tundi) Hindamismeetod:Praktiliste tööde sooritamine klassis Hindamiskriteerium: Õpiväljundite saavutamist kontrollitakse läbi praktiliste harjutuste koolikeskkonnas.
Koolituse lõpetamine:Koolituse lõpetaja saab tunnistuse kui sooritab kõik koolituse jooksul antud praktilised harjutused. Osalejatele, kes õpiväljundeid saavutanud ei ole väljastatakse soovi korral tõend koolitusel osalemisest.
Hind sisaldab:
Kohvipause koolituskeskuses ja ühiseid lõunasööke
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
„Koolitus kus osalesin oli hea lühike kuid sellegipoolest sai piisavalt praktilist kogemust.“
„Palju kasulikku ja huvitavat, asjalik koolitaja ja hea korraldus“
„Väga hea koolitus, annab palju praktilist teadmist.“
Küberturbe spetsialisti koolitusprogramm (ISACA ITCA ja Microsoft SC-900 materjalide baasil)
„Küberturbe spetsialisti koolitusprgoramm“ on täiskasvanute e-kursusena läbiviidav ümberõppeprogramm, mille eesmärgiks on anda osalejatele algteadmised, kuidas rakendada küberturbe kontrollmeetmeid ettevõttes. Osalejad saavad erialaste teadmiste põhialused küberturbe spetsialistina karjääri alustamiseks.
4-kuuline koolitus sisaldab iseseisvat tööd kui ka veebiseminare lektoriga.
Koolituse õppekeel on inglise keel. Veebinarid toimuvad inglise keeles.
Kursuse edukal läbimisel saavad osalejad lisaks BCS Koolituse tunnistusele ka rahvusvahelisel e-õppe keskkonna CBT Nuggets tunnistuse ning võimaluse sooritada rahvusvaheliselt tunnustatud Microsofti sertifikaat.
Soovi korral on koolituse järgselt kahel kõige edukamal lõpetanul võimalus 1-kuuliseks tasustamata praktikaks küberturbega tegelevas ettevõttes.
Iseseisev projektitöö – „Ettevõtteküberturbe arhitektuuriplaan“ koostamine.
Esimesed kaks moodulit sisaldavad iseseisvat e-õpet, mida toetavad kord nädalas toimuvad veebinarid eksperdi juhendamisel. Koolitus lõpeb iseseisva projekti koostamise ja kaitsmisega.
Sihtrühm ja eelteadmised:
Koolitusele on oodatud kõik, kes soovivad alustada karjääri küberturbe spetsialistina või soovivad juba olemasoleva töö tarbeks täiendada oma kompetentsi ettevõtte IT-taristu kaitsmisel küberohtude eest.
Valdavad inglise keelt tasemel, mis lisaks suhtlemisele võimaldab iseseisvalt aru saada õppematerjalidest, iseseisvalt õppida ja vajadusel oma mõtteid sõnastada (soovitavalt tase B1).
Koolitus sobib algajale IT teadlikule inimesele või IT spetsialistile, kes soovib omandada teadmisi küberturbe valdkonnas. Spetsiaalseid küberturbealaseid eelteadmisi ei nõuta. Soovitav digioskuste kogemus kasutaja tasemel (testi enda pädevust Digital Skills Assessment Tool).
Õppevahendid:
Osalejal läheb vaja töötava mikrofoni ja kaameraga arvutit, soovitavalt lisaekraani ning stabiilset internetiühendust. Koolitusel on soovitav kasutada Windows operatsioonisüsteemi arvutit. Soovikorral võib kasutada ka Mac OS ja Linux operatsioonisüsteemiga seadmeid.
Neil, kellel puudub vajalik arvuti on võimalik seda rentida kokkuleppel BCS Koolitusega.
Sissejuhatus projektitöösse Küberturbe arhitektuuriplaani loomine (Etteantud IT taristuga ettevõtte jaoks küberturbe staatuse hinnang, peamiste riskide loetlemine, aastase küberturbe meetmete tööplaani koostamine. Näidis ettevõtte jaoks majanduslikult mõistliku turvaarhitektuuri projekti disainimine koos tehnoloogiliste komponentidega ja nende funktsionaalsuse ja koostoimivuse kirjeldusega). Soovikorral võib osaleja valida enda või mõne muu reaalselt eksisteeriva ettevõtte.
Koolitus põhineb ISACA ITCA: „Cybersecurity Fundamentals Online Training“ ja Microsofti SC-900: „Microsoft Security, Compliance, and Identity Fundamentals“ e-õppe koolituste baasil ja materjalidel.
Õppetöö toimub suhtluskanalis Slack
Korralised veebinarid toimuvad veebikeskkonnas Zoom, reedeti, üks kord nädalas, korraga 2 akadeemilist tundi.
Kellaaeg: 15:15-16:45
Erand: sissejuhatav veebinar kestab 1 akadeemiline tund 15:15 – 16:00 ja 15. veebinar – projektitööde kaitsmine koos kokkuvõttega kestab 3 akadeemilist tundi 15:15-17:30
Koolituse kogumaht on 164 tundi (15 õppenädalat), seal hulgas:
28 tundi õppevideosid;
106 tundi iseseisvat tööd koos praktiliste harjutustega;
30 tundi veebiseminari eksperdiga.
Koolituse õppekeel on inglise keel. Veebinarid toimuvad inglise keeles.
Hindamiskriteerium:
Õpiväljundite saavutamist hinnatakse järgmistel alustel:
Koolituse ajal läbi viidud tagasisidestatud praktilised harjutused
“Koolitus andis mulle hea raamistiku küberturbe korralduse põhimõtetest asutustes ja ettevõtetes, vajalikke tehnilisi eelteadmisi ning esmase ülevaate levinumatest küberturbe lahendustest, mida Eestis võiks kasutada. Soovitan seda kursust kõigile, keda huvitab küberturbe valdkond ning küberruumis toimuv ning kinnitan, et see on jõukohane ka mittetehnilistele inimestele.” – Marju
“Mina jäin koolitusprogrammiga rahule ning võin julgelt ka teistele soovitada. Mis mulle antud koolituse juures kindlasti meeldis, oli see, et said kombineeritud erinevad keskkonnad ja viisid info edastamiseks (CBT Nuggets, Microsoft Learn, veebiseminarid, projektitöö+tiimide sees omavaheline koostöö).” – Daniil Gretšnev, Informaatikateenistus, SA Tartu Ülikooli Kliinikum
Cybersecurity Program (Based on ISACA ITCA and Microsoft SC-900 Materials)
The goal of this retraining program is to provide participants with beginner-level knowledge and practical skills on how to implement cybersecurity controls within an organization. Graduates will gain the vocational foundations needed to start a career as a Cybersecurity Specialist.
The four-month training program includes both independent study and online seminars led by an instructor.
The curriculum is based on the Lifelong learning standard and industry best practices (ISACA ITCA and Microsoft SC-900 materials).
Upon successful completion of the course, participants will receive a certificate from BCS Koolitus, as well as a certificate from the international e-learning platform CBT Nuggets, and the opportunity to take an internationally recognized Microsoft certification exam.
The training program consists of three integrated modules:
An independent project: development of a “Company Cybersecurity Architecture Plan”.
The first two modules consist of independent e-learning, supported by weekly online webinars led by an expert. The training concludes with the completion and presentation of the independent project.
Target audience and prior knowledge (Prerequisites):
The course is intended for Individuals who wish to launch a career as a cybersecurity specialist or enhance their existing competence in protecting an organization’s IT infrastructure against cyber threats. It is suitable for those who:
have basic computer literacy and ability to use common software applications (test your digital skills Digital Skills Assessment Tool);
have at least B2 level in English;
have time to commit to a 4- month course;
have serious interest in the field of Cybersecurity.
Teaching aids: Participants need a computer (Windows, macOS or Linux) with web camera and microphone; permission to install and configure applications, as well as an up-to-date web browser.
Program: Modul 1 – ISACA ITCA: Cybersecurity Fundamentals
(84 academic hours independent study and 19 academic hours mentor meetings)
Week 1
04.09.26 15:15-16:00 (Eastern European Time)
1. Webinar with the mentor – Introduction of the program (1 academic hours)
Week 2
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Defining Security and its Roles
Roles, Governance, Continuity, and Recovery
CIA, Least Privilege, and Privacy
Threat Landscape
11.09.26 15:15-16:45 (Eastern European Time)
2. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 3
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Motivations, Agents, and the Attack Sequence
Malware and its Symptoms
18.09.26 15:15-16:45 (Eastern European Time)
3. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 4
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Common Attack Methods Part 1
Common Attack Methods Part 2
Risk Management
Regulatory Requirements, The Modern Perimeter
25.09.26 15:15-16:45 (Eastern European Time)
4. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 5
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Network Security Controls
Understand Firewall Functions
Endpoint Firewalls and Windows Firewall
02.10.26 15:15-16:45 (Eastern European Time)
5. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 6
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Mac/Linux Firewalls and IDS/IPS
AAA Controls
Cloud Services
Cloud Security and Models
09.10.26 15:15-16:45 (Eastern European Time)
6. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 7
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Data Security
Symmetric Encryption
Asymmetric Encryption, Hashing, Digital Signatures
16.10.26 15:15-16:45 (Eastern European Time)
7. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 8
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
PKI and Applying Cryptography
Security Operations and Vulnerability Management
Penetration Testing and EDR
23.10.26 15:15-16:45 (Eastern European Time)
8. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 9
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Incident Response and Digital Forensics
Network Command-Line Tools
Penetration Testing Tools
06.11.26 15:15-16:45 (Eastern European Time)
9. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Week 10
E-learning and independent study ISACA ITCA: Cybersecurity Fundamentals Online Training
Concluding Tools and Techniques
13.11.26 15:15-16:45 (Eastern European Time)
10. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)
Modul 2 – Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals
(10 academic hours independent study and 2 academic hours mentor meetings)
Introduction to security, compliance, and identity concepts
Introduction to Microsoft Entra
Introduction to Microsoft security solutions
Introduction to Microsoft Priva and Microsoft Purview
20.11.26 15:15-16:45 (Eastern European Time)
11. Webinar with the mentor (2 academic hours)
summary of the course Microsoft SC-900
introduction to the Graduation project work
Modul 3 – Graduation Project
(40 academic hours independent study and 9 academic hours mentor meetings)
Cybersecurity Architecture Plan
The project involves developing a cybersecurity architecture plan for a company with a predefined IT infrastructure. This includes assessing the organisation’s current cybersecurity status, identifying key risks, and preparing an annual action plan for cybersecurity measures. Participants will design an economically viable security architecture for a sample company, including the technological components and a description of their functionality and interoperability.
If desired, participants may choose their own organisation or another real, existing company as the basis for the project.
Week 12
Independent study – Graduation project
27.11.26 15:15-16:45 (Eastern European Time)
12. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)
Week 13
Independent study – Graduation project
04.12.26 15:15-16:45 (Eastern European Time)
13. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)
Week 14
Independent study – Graduation project
11.12.26 15:15-16:45 (Eastern European Time)
14. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)
Week 15
Independent study – Graduation project
18.12.26 15:15 – 17:30 (Eastern European Time)
15. Webinar with the mentor – (3 academic hours)
Graduation project presentation.
Each group has 10 minutes to present their work to the mentor and co-students.
Wrap-up of the course.
Learning methods and volume of the course:
The course is conducted in English.
You can participate in the webinars by joining through the online platform Zoom. Between the online webinars, the main communication platform for interacting with the mentor and fellow students is the course’s learning environment Slack.
The course has three modules.
The total volume of the training is 164 academic hours (within period of 16 weeks) including:
Mentor meetings 30 academic hours.
E-learning and independent study 134 academic hours. e-learning = learning that takes place partially or completely with the help of digital technological means.
Methods used during the course:
E-course lectures
E-course video lectures
Workshops with mentor
Practical exercises
Independent project work
Evaluation method:
Completion of all mandatory e-learning courses.
Participation in at least 75% of the online webinars and workshops.
Completion of the final project.
Graduation criteria: Learners who have achieved the learning outcomes and successfully passed the assessment will be awarded a certificate in accordance with the applicable continuing education standard in Estonia.
If a participant fails to meet at least one of the following conditions, they will receive a certificate of participation instead:
not completing all mandatory e-learning courses;
not attending at least 75% of the workshops;
not completing the graduation project.
The price includes:
Access to the e-learning platform CBT Nuggets;
Access to the Microsoft SC-900 official study materials and labs. Also, for the Microsoft SC-900 certification examination (subsequent attempts not included);
Access to the communication channel Slack and other study materials.
Küberturbe spetsialisti koolitusprogramm (ISACA ITCA ja Microsoft SC-900 materjalide baasil)
„Küberturbe spetsialisti koolitusprgoramm“ on täiskasvanute e-kursusena läbiviidav ümberõppeprogramm, mille eesmärgiks on anda osalejatele algteadmised, kuidas rakendada küberturbe kontrollmeetmeid ettevõttes. Osalejad saavad erialaste teadmiste põhialused küberturbe spetsialistina karjääri alustamiseks.
4-kuuline koolitus sisaldab iseseisvat tööd kui ka veebiseminare lektoriga.
Koolituse õppekeel on inglise keel. Veebinarid toimuvad inglise keeles.
Kursuse edukal läbimisel saavad osalejad lisaks BCS Koolituse tunnistusele ka rahvusvahelisel e-õppe keskkonna CBT Nuggets tunnistuse ning võimaluse sooritada rahvusvaheliselt tunnustatud Microsofti sertifikaat.
Soovi korral on koolituse järgselt kahel kõige edukamal lõpetanul võimalus 1-kuuliseks tasustamata praktikaks küberturbega tegelevas ettevõttes.
Iseseisev projektitöö – „Ettevõtteküberturbe arhitektuuriplaan“ koostamine.
Esimesed kaks moodulit sisaldavad iseseisvat e-õpet, mida toetavad kord nädalas toimuvad veebinarid eksperdi juhendamisel. Koolitus lõpeb iseseisva projekti koostamise ja kaitsmisega.
Sihtrühm ja eelteadmised:
Koolitusele on oodatud kõik, kes soovivad alustada karjääri küberturbe spetsialistina või soovivad juba olemasoleva töö tarbeks täiendada oma kompetentsi ettevõtte IT-taristu kaitsmisel küberohtude eest.
Valdavad inglise keelt tasemel, mis lisaks suhtlemisele võimaldab iseseisvalt aru saada õppematerjalidest, iseseisvalt õppida ja vajadusel oma mõtteid sõnastada (soovitavalt tase B1).
Koolitus sobib algajale IT teadlikule inimesele või IT spetsialistile, kes soovib omandada teadmisi küberturbe valdkonnas. Spetsiaalseid küberturbealaseid eelteadmisi ei nõuta. Soovitav digioskuste kogemus kasutaja tasemel (testi enda pädevust Digital Skills Assessment Tool).
Õppevahendid:
Osalejal läheb vaja töötava mikrofoni ja kaameraga arvutit, soovitavalt lisaekraani ning stabiilset internetiühendust. Koolitusel on soovitav kasutada Windows operatsioonisüsteemi arvutit. Soovikorral võib kasutada ka Mac OS ja Linux operatsioonisüsteemiga seadmeid.
Neil, kellel puudub vajalik arvuti on võimalik seda rentida kokkuleppel BCS Koolitusega.
Sissejuhatus projektitöösse Küberturbe arhitektuuriplaani loomine (Etteantud IT taristuga ettevõtte jaoks küberturbe staatuse hinnang, peamiste riskide loetlemine, aastase küberturbe meetmete tööplaani koostamine. Näidis ettevõtte jaoks majanduslikult mõistliku turvaarhitektuuri projekti disainimine koos tehnoloogiliste komponentidega ja nende funktsionaalsuse ja koostoimivuse kirjeldusega). Soovikorral võib osaleja valida enda või mõne muu reaalselt eksisteeriva ettevõtte.
Koolitus põhineb ISACA ITCA: „Cybersecurity Fundamentals Online Training“ ja Microsofti SC-900: „Microsoft Security, Compliance, and Identity Fundamentals“ e-õppe koolituste baasil ja materjalidel.
Õppetöö toimub suhtluskanalis Slack
Korralised veebinarid toimuvad veebikeskkonnas Zoom, reedeti, üks kord nädalas, korraga 2 akadeemilist tundi.
Kellaaeg: 15:15-16:45
Erand: sissejuhatav veebinar kestab 1 akadeemiline tund 15:15 – 16:00 ja 15. veebinar – projektitööde kaitsmine koos kokkuvõttega kestab 3 akadeemilist tundi 15:15-17:30
Koolituse kogumaht on 164 tundi (15 õppenädalat), seal hulgas:
28 tundi õppevideosid;
106 tundi iseseisvat tööd koos praktiliste harjutustega;
30 tundi veebiseminari eksperdiga.
Koolituse õppekeel on inglise keel. Veebinarid toimuvad inglise keeles.
Hindamiskriteerium:
Õpiväljundite saavutamist hinnatakse järgmistel alustel:
Koolituse ajal läbi viidud tagasisidestatud praktilised harjutused
“Koolitus andis mulle hea raamistiku küberturbe korralduse põhimõtetest asutustes ja ettevõtetes, vajalikke tehnilisi eelteadmisi ning esmase ülevaate levinumatest küberturbe lahendustest, mida Eestis võiks kasutada. Soovitan seda kursust kõigile, keda huvitab küberturbe valdkond ning küberruumis toimuv ning kinnitan, et see on jõukohane ka mittetehnilistele inimestele.” – Marju
“Mina jäin koolitusprogrammiga rahule ning võin julgelt ka teistele soovitada. Mis mulle antud koolituse juures kindlasti meeldis, oli see, et said kombineeritud erinevad keskkonnad ja viisid info edastamiseks (CBT Nuggets, Microsoft Learn, veebiseminarid, projektitöö+tiimide sees omavaheline koostöö).” – Daniil Gretšnev, Informaatikateenistus, SA Tartu Ülikooli Kliinikum
Certified Agile Facilitator (CAF)
The Certified Facilitator (CF) program is to grow participants’ mindset, knowledge and ability in the area of professional facilitation. Effectively facilitating a group or team toward co-created, meaningful and committed outcomes is a core agile coaching competency as well asa a skill necessary for effective leadership.
The Certified Facilitator (CF) program is to grow participants’ mindset, knowledge and ability in the area of professional facilitation. Effectively facilitating a group or team toward co-created, meaningful and committed outcomes is a core agile coaching competency as well asa a skill necessary for effective leadership.
The Certified Agile Scaling Professional (CASP) is tailored to organizational leaders, managers, and anyone wanting to ramp up agile scaling results.
Scaling agile has been one of the hottest topics over the past decades, one of the most invested areas by companies and individuals, and scaling skills is one of the most thought-after skills across industries globally.
Unlike prescriptive scaling frameworks or scaled methodologies, this program equips participants with the skills and knowledge to help them identify and explore pattern-based and principle-informed approaches that apply to your organization’s unique and evolving context. Suppose you are curious about agile at scale, and puzzled with current prescriptive frameworks implemented in your organization. In that case, you have come to the right place – join the Certified Agile Scaling Professional (CASP) program.
What can you expect from this program?
First, this is NOT yet another framework or another methodology about scaling, and it doesn’t come with a long list of certified programs. This program is not as simple as “picking”, or “implementing” a new framework or a methodology.
Instead, this program is a very hands-on workshop which focuses on pattern-based and principle-informed approaches where organizations draw from recognized and proved scaling patterns.
No matter what your situation is today, this program helps you learn from established and proved patterns, select patterns for your unique contexts, solve your current challenges, and evolves agility at scale, through hands-on exercises and case studies.
You will be able to –
Build the right mindset for scaling
Develop the skills needed to evaluate approaches to scaling
Decide when to Scale and why to Scale
Equip you with the foundational toolkit
Understand the need to evolve your scaling approach
Appreciate pattern-based approach in enhancing the effectiveness of current framework and methodology adoption
Evaluate and select patterns in organizations
Relate patterns, scaffolds and frameworks to advance to the desired next step
Explore the use of ‘scaffolding’ to aid organizations in moving in the desired direction
Lead large-scale product development efforts
Evolving agility at scale in an agile way
Live, immersive exercises to build scaling skills
Membership with the Scrum Alliance
Who should take this course?
This course is for:
Managers at all levels in companies that might have implemented a prescriptive framework
Program and project managers, and/or agile delivery leads
Agile coaches and consultants
Portfolio managers, product managers and product owners
Anyone who works on agile adoption
Anyone who embodies change
Although the program does not require prior learning, participants should go through the preparation materials to maximise everybody’s learning experience during the workshop. The more hands-on experience participants have, the more passion and curiosity participants bring, the more beneficial the workshop will be!
Commitments
Preparation prior to the workshop requires approximately 60 minutes (or 120 minutes if no prior learning) on average
2-day (or 3 half day) workshop with full engagements and practices in workshops
Course Content
Scaling Essentials
What is Scaling? What and Why?
When to Scale and When Not to Scale?
Scaling Scenario
ScalED vs ScalING vs DEScaling
Scaling Philosophy
Patterns, Scaffolds and Scaling Agility
What is a pattern? Why patterns?
Introduction to Established and Proved Patterns
Hands-on: Evaluate and Select Patterns for Your Context
Recognizing Anti-Patterns
Scaffolds and Scaling Agility
Hands-on: Appraise and Create Scaffolds for Your Context
Lifecycle of Patterns and ScaffoldsAssessing Group’s Context and Needs
Scaling Frameworks
Relationship between frameworks and patterns
Advancing with pattern-based approaches
Scaling Challenges
Challenges and complexity
Organizational Uniqueness
Case Studies to learn to overcome challenges at scale
Organizational Change Management and Scaling Agility
Scaling successfully and sustainably
Align scaling efforts with your enterprise strategy
Design and Summarize Next Steps for Your Organization
Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.
Certified Scrum Professional – Product Ownership (CSP-PO)
Certified Scrum Professionals challenge their teams to improve the way Scrum and other Agile techniques are applied. They have demonstrated experience, documented training, and proven knowledge in the art of Scrum.
Are you ready to take your knowledge and skillset in your role as Product Owner to the next level? If so, it’s time to elevate your career further by earning the Certified Scrum Professional®-Product Owner (CSP®-PO) certification. Solidify your approaches for validating product assumptions, learn advanced interactions with customers and users and master advanced Product Backlog management.
Who should take this course?
This course is for
Advanced Certified Scrum Product Owners (A-CSPO) who are looking for the next level of growth of your Product Ownership
Participants who want to advance themselves on the path to Product Owner
Agile Coaches with product ownership as a speciality
Participants should be passionate in advancing as a Product Owner, and/or a ScrumMaster or Agile coach, and therefore be willing to challenge their own thinking and approaches within this course.
The Certified Scrum Professional Product Owner (CSP-PO) workshop requires previous Scrum Product Owner knowledge and experience. All attendees must have the Advanced Certified Scrum Product Owner certification (A-CSPO) and some practice prior to this workshop
Through the CSP-PO course, you’ll learn:
Growing in the Role of Product Owner
Product Owner as Product Champion
Product Ownership and Organization Setup
Product Owner manifesto
Advanced Stakeholder Management
Facilitating sessions with conflicting opinions
Working with difficult stakeholders
Enhancing stakeholder collaboration techniques
Working with multiple Scrum Teams
Launching multiple Scrum Teams
Quality expectations while working with multiple teams
Competence growth and expectations
Product backlog management across multiple teams
Facilitating large scale participatory meetings
Designing interactive learning contents about product ownership
Implement Purpose and Strategy
Market-Driven Product Strategy Practices
Analyze different business models
Develop your own business model
Calculate opportunity size
Construct competitive analysis
Product Economics
Determining profitability
Calculating the cost of delay (CoD)
Funding of agile product development
Complex Product Planning and Forecasting
Developing a product plan
Defining a strategic and multi-team product roadmap
Developing a release strategy
Advanced Interactions with Customers and Users
Advanced Customer Research
Customer development
Integrating customer into product development
Advanced Product Discovery
Comparing different customer research and product discovery techniques
Complex Product Assumption Validation
Evaluating different validation plans
Continuous revising plans based on validation results
Advanced Product Backlog Management
Further differentiating outcome and output
Defining value – strategy and options
Ordering product backlog
Comparing various prioritization techniques
Deciding prioritization strategy for your product
Refining product backlog to deliver customer value
Competence, risks, uncertainties, and efficiency
Improving customer engagement to refine Product Backlog
More information: Read more about the course from here
Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.
Certified Scrum Professional – ScrumMaster (CSP-SM)
Certified Scrum Professionals challenge their teams to improve the way Scrum and other Agile techniques are applied. They have demonstrated experience, documented training, and proven knowledge in the art of Scrum.
Are you ready for the next level of experience and expertise in the art of Scrum? If so, it’s time to elevate your career further by earning the Certified Scrum Professional®-ScrumMaster (CSP®-SM) certification.
Learn to find practical solutions and improve your implementation of Scrum in the workplace.
Who should take this course?
This course is for:
Advanced Certified ScrumMasters (A-CSM) who are are looking for the next level of growth.
ScrumMasters who have Scrum experience for close to two years;
Managers who want to better support their teams;
Individuals who want to develop themselves on the path of Agile Coach
Our CSP-SM program is designed with deep learning for those who want to advance themselves to the next level of agile coaching, including the practitioners who want to advance to Certified Team Coach (CTC) and/or Certified Enterprise Coach (CEC).
Participants should be passionate in advancing as a ScrumMaster and an Agile coach, and therefore be willing to challenge their own thinking and approaches within this course.
All attendees must have the Advanced Certified ScrumMaster certification (A-CSM) and with practice prior to the Certified Scrum Professional ScrumMaster (CSP-SM) workshop.
Course content
Advanced Coaching
Advanced Coaching Skills and their application
Coaching Tools
Advanced Coaching + Advanced Facilitation
Coaching Application with Responsibility Process
Coaching Assumptions and Agreement
Alternatives to Open Discussion
Visual Facilitation
Remote Facilitation
A deeper dive into Lean, Agile and Scrum
Key Lean Principles and Concepts
Assessing Waste at All Levels
Applications in Scrum Framework and Organization Transformation
Services to Development Team
Different Methods to Assess Existing Teams
Team Performance Curve (and Tuckman Model comparison)
Coaching Team via Team Development Profile
Coaching Team via Drexler-Sibbet Model
5 Dysfunctions of Teams
Starting and Growing New Agile Teams
Coaching Team on Software Craftsmanship
Services to Product Owner
Creation and Revision of Product Vision and Strategy
Complex Product Backlog Management
Product Owner Support
Services to Organization
Complex Adaptive System
Effective Culture Change (concepts and tools)
Organization Change via contrasting different models
Organization Change Pattern Analysis
Scaling – Growing Organization
Personal Development
Case Study – how to approach different coaching scenarios (theory into practice)
Coaching practices for personal growth actions
Design of Individual Learning and Capability Goals and Follow-up
Next Steps
Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.
Tähelepanu! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.
Attention! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.
Внимание! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.