This 3-day SQL Basics course is suitable for those with little prior knowledge. It teaches about the structure and operating principles of SQL databases, Familiarizes participants with the main SQL commands and functions and practically teaches them how to create simple SQL requests.(veel …)
PRINCE2® Foundation (7th edition)
NB! The last registration day is 04.02.2026
Within the course, we offer the opportunity to master the latest version of PRINCE2® – the 7th edition, enhanced with more contemporary tools, technologies, and processes for all types of projects. PRINCE2® 7th edition Foundation-level training lasts for 3 days and is suitable for anyone looking to start or further their career in project management using a modern and internationally recognized method.
During the training, participants will gain an understanding of the method’s key processes, principles, and themes to ensure that project management aligns with all 21st-century standards and requirements.
Course target
Gain a comprehensive understanding of project management principles developed in accordance with the PRINCE2® 7th edition methodology. The training includes preparation for the PRINCE2® 7th edition Foundation-level certification exam.
PRINCE2® is a registered trademark of AXELOS Limited.
Audience
Existing and aspiring project managers.
Other employees involved in project development and implementation, including:
Project board members;
Team leaders;
Project assurance roles (such as business change analysts);
Project support roles (project and program office staff);
Operational managers/staff.
Course outline
Introduction to PRINCE2®;
Overview of PRINCE2® project management;
People;
Organization;
Starting a project;
Business justification;
Plans;
Quality;
Risk;
Controlling a stage and managing product delivery;
Managing stage boundaries;
Challenges;
Progress;
Closing a project;
Directing a project;
Course review.
At Course Completion
Understand key concepts related to projects and the PRINCE2® 7th edition methodology;
At the end of this course, participants will achieve the following skills:
use a common language for effective communication with other testers and project partners;
understand main testing concepts, the essence of the testing process, testing approaches and principles to achieve testing goals;
plan and prioritize testing tasks using selected testing techniques;
analyze both functional and non-functional specifications;
perform tests according to agreed testing plans, as well as analyze and report test results;
write a clear overview of incidents;
participate in test reports.
Target audience andprior prerequisites:Everyone who is going to participate in software testing process.
Prerequisites: Basic knowledge of system testing and experience in the IT industry.
Technology needed for the course: A Windows operating system computer with permissions to install and configure applications.
Those who do not have the necessary computer can rent it by agreement with BCS Training. Please inform the training company in advance.
Course outline
Introduction to software testing:
Basic elements of testing;
Definitions of testing;
Test objectives;
General principles of testing;
Testing processes;
Psychology of testing.
Testing through the full software development lifecycle:
Software development models;
Verification and validation;
Testing levels – unit testing, integration testing, system testing, and acceptance testing;
Regression testing;
Testing and development.
Static testing techniques:
Types of inspection;
Inspection process (overview);
Roles and responsibilities in reporting;
Reporting success factors;
Static analysis tools.
Test design techniques:
Test development process;
Documentation;
Types of test design techniques;
Specification-based techniques (black box);
Structure-based techniques (white box);
Experience-based techniques;
Criteria for the selection of testing techniques.
Test management:
Organization of testing;
Organization of the team: roles and responsibilities;
Planning and evaluation of testing;
Monitoring and control of testing progress;
Configuration management;
Risk management;
Classification and management of defects.
Test support tools:
Selection considerations;
Types of testing tools;
Effective use of tools: potential benefits and risks;
Classification of tools.
Study methods: You can participate in the study by joining the training through the online environment Teams. The volume of training is 24 hours incl. 12 hours of practical exercises or group work in the training environment.
Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.
Completion of training: Each participant receives a certificate of attendance after the course, the official certificate is awarded only when the exam is taken and passed within one year after the course (exam registration must be done within 6 months after completing the course).
The price includes: Study materials and examination cost (must be registered 6 months after the course and passed 12 months after the course.
Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.
Curriculum group: 0612 Database and network design and management.
COMPTIA® CYBERSECURITY ANALYST (CYSA+)
NB! The last registration day is 19.01.2026
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.(veel …)
Business Analysis, CBAP® and CCBA® examination preparation course
NB! The last registration day is 03.03.2026
The CBAP® (Certified Business Analysis Professional) course is designed for business analysts – improving knowledge and strengthening existing competencies necessary to effectively complete their role in the organization. The training covers topics on business analytics planning and monitoring, requirements clarification and collaboration, requirements life cycle management, strategy analysis, requirements analysis and design definition, and solution evaluation.
During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. (veel …)
CISM, Certified Information Security Manager CISM® Certification
NB! The last registration day is 23.01.2026
The CISM (Certified Information Security Manager) course is designed for professionals who manage, design, and oversee an enterprise’s information security program. This course covers essential topics like information risk management, governance, incident management, and program development and management. Upon completion, participants will be well-equipped to handle the challenges of securing and protecting valuable information assets within their organizations.
Upon successful completion of this course, students will be able to:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations;
Identify and manage information security risks to achieve business objectives;
Create a program to implement the information security strategy;
Implement an information security program;
Oversee and direct information security activities to execute the information security program;
Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.
Target audience:
The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security. Also those, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.
Prerequisites:
To ensure your success, the students taking this course should have professional experience in information security in at least one of the following areas:
Information security governance
Information risk management
Information security program development
Information security program management
Incident management and response
Technology needed for the course: A Windows operating system computer with permissions to install and configure applications.
Those who do not have the necessary computer can rent it by agreement with BCS Training. Please inform the training company in advance.
Course outline:
Information security governance
Information risk management
Information security program
Incident management
Study methods: You can participate in the study by joining the training through the online environment Teams. The volume of training is 40 hours incl. 20 hours of practical exercises or group work in the training environment.
Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.
Completion of training: Each participant receives a certificate of attendance after the course, the official certificate is awarded only when the exam is taken and passed within one year after the course (exam registration must be done within 6 months after completing the course).
The price includes: Study materials and examination cost (must be registered 6 months after the course and passed 12 months after the course.
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
Vali Andmetarkus!
„Vali Andmetarkus!“ koolitusprogrammi eesmärk on anda osalejatele vajalik lähtepositsioon – teadmised ja praktilised oskused alustamaks oma karjääri andmevaldkonnas, näiteks andmeanalüütiku, aruandluse spetsialisti või andmehalduri rollis. Samuti annab koolitus võimekuse kasutada andmeanalüüsi teiste rollide edukaks täitmiseks.
Vajadus erinevate andmevaldkonna asjatundjate järele Eesti asutustes ja ettevõtetes on suur. Esmaseks vajaduseks, eriti väikese ja keskmise suurusega ettevõtetes, on üldise andmevõimekuse ja andmete kasutamise oskuse tõstmine. Koolitusprogramm annab tervikpildi ja vajalike töövahendite kasutusoskuse peamistes andmevaldkonna teemades alates – mida tähendab andmepõhine juhtimine ja otsustamine; kuidas andmeid koguda ja tagada nende kvaliteet, privaatsus ja turvalisus; kuidas toimub andmeanalüüs ja tulemuste ilmekas visualiseerimine, kuidas kasutada tehisaru andmeanalüüsi protsessi toetamiseks. Osalejad saavad kogemuse andmete elutsükli juhtimises ning omandavad andmeanalüüsi baasmeetodite ja tööriistade kasutusoskuse.
Koolitusprogrammi üheks osaks on karjäärimoodul, mille eesmärgiks on toetada osalejaid karjäärimuutusel andmete valdkonda. Moodul aitab mõista andmetega seotud töörolle, sõnastada karjäärieesmärgid, hinnata oma tugevusi ja arenguvajadusi ning omandada tööotsinguks vajalikke oskusi. Samuti toetatakse kontaktide loomist tööandjate ja praktikapakkujatega ning luuakse isiklik tegevusplaan edasisteks sammudeks.
Programm annab väärtuslikke andmepädevusi ka teiste erialade spetsialistidele. Nagu teisteski tehnoloogia valdkondades, on andmevaldkonnas eriti nõutud spetsialistid, kes kompetentsed nii andmetöötluses kui ettevõtte tegevusvaldkonnas.
Programmi läbinu:
Mõistab andmeanalüüsi protsessi, andmete elutsüklit ning rolli äriprobleemide lahendamisel;
Oskab lähtudes äriprobleemist leida vajalikud andmeallikad, andmed koondada, töödelda ja analüüsida, kasutades sobivaid meetodeid ja tööriistu (nt SQL, Power BI, Python);
Oskab andmeid tõlgendada ja visualiseerida ning arusaadavalt esitada tulemusi erinevatele sihtrühmadele;
Tunneb võimalusi andmeanalüüsi protsesside automatiseerimiseks ja tehisintellekti kasutamiseks analüüsi tõhustamiseks;
Tunneb andmehalduse ja andmekorralduse põhimõtteid ja töömeetodeid;
Tunneb andmete õigusraamistikku, valdkonna eetilisi ja õiguslikke aluseid, sh andmekaitse ja vastavusnõuded;
Oskab end tööotsingutel sihipäraselt esitleda ja teha teadlikke samme tööle kandideerimisel.
Koolituse teemad:
Andmete väärtus ja roll ettevõttes
Andmekvaliteet ja turvalisus
Andmepõhiste otsuste tegemine
Andmete kogumine ja talletamine
Andmete analüüs
SQL andmete pärimiseks ja kokkuvõtete tegemiseks
Andmete visualiseerimine Power BI abil
Python andeanalüüsi tööriistana
Tehisaru võimalused andmetega töös
Edukas tööle kandideerimine
Sihtgrupp:
Inimesed, kes soovivad asuda tööle andmeanalüütikaga seotud ametikohtadele.
Inimesed, kes soovivad parandada oma tööalast tulemuslikkust, rakendades andmepõhist otsustamist ja andmeanalüüsi tööriistu.
Õppe maht: Koolituse kogumaht on 247 tundi ja koosneb 240 tunnist koolituskeskkonnas ja 7 tundi iseseisvast praktilisest tööst.
Õpitulemuste saavutamise hindamismeetod: Praktiliste ülesannete ja lõpuprojekti sooritamine
Õppekavarühm: 0613 Tarkvara ja rakenduste arenduse ning analüüsi õppekavarühm
Eeldused programmis osalemiseks:
Bakalaureusekraad või tehniline kutseharidus (tase 5)
Vähemalt kaheaastane töökogemus ametikohtadel, mis eeldavad analüütilist mõtlemist.
Küberturbe spetsialisti koolitusprogramm (ISACA ITCA ja Microsoft SC-900 materjalide baasil)
„Küberturbe spetsialisti koolitusprgoramm“ on täiskasvanute e-kursusena läbiviidav ümberõppeprogramm, mille eesmärgiks on anda osalejatele algteadmised, kuidas rakendada küberturbe kontrollmeetmeid ettevõttes. Osalejad saavad erialaste teadmiste põhialused küberturbe spetsialistina karjääri alustamiseks.
4-kuuline koolitus sisaldab iseseisvat tööd kui ka veebiseminare lektoriga. E-õppe moodulid on ingliskeelsed ja veebiseminarid eestikeelsed.
Kursuse edukal läbimisel saavad osalejad lisaks BCS Koolituse tunnistusele ka rahvusvahelisel e-õppe keskkonna CBT Nuggets tunnistuse ning võimaluse sooritada rahvusvaheliselt tunnustatud Microsofti sertifikaat.
Soovi korral on koolituse järgselt kahel kõige edukamal lõpetanul võimalus 1-kuuliseks tasustamata praktikaks küberturbega tegelevas ettevõttes.
Iseseisev projektitöö – „Ettevõtteküberturbe arhitektuuriplaan“ koostamine.
Esimesed kaks moodulit sisaldavad iseseisvat e-õpet, mida toetavad kord nädalas toimuvad veebinarid eksperdi juhendamisel. Koolitus lõpeb iseseisva projekti koostamise ja kaitsmisega.
Sihtrühm ja eelteadmised:
Koolitusele on oodatud kõik, kes soovivad alustada karjääri küberturbe spetsialistina või soovivad juba olemasoleva töö tarbeks täiendada oma kompetentsi ettevõtte IT-taristu kaitsmisel küberohtude eest.
Valdavad inglise keelt tasemel, mis võimaldab iseseisvalt aru saada õppematerjalidest, iseseisvalt õppida ja vajadusel oma mõtteid sõnastada (soovitavalt tase B1).
Koolitus sobib algajale IT teadlikule inimesele või IT spetsialistile, kes soovib omandada teadmisi küberturbe valdkonnas. Spetsiaalseid küberturbealaseid eelteadmisi ei nõuta. Soovitav digioskuste kogemus kasutaja tasemel (testi enda pädevust Digital Skills Assessment Tool).
Õppevahendid:
Osalejal läheb vaja töötava mikrofoni ja kaameraga arvutit, soovitavalt lisaekraani ning stabiilset internetiühendust. Koolitusel on soovitav kasutada Windows operatsioonisüsteemi arvutit. Soovikorral võib kasutada ka Mac OS ja Linux operatsioonisüsteemiga seadmeid.
Neil, kellel puudub vajalik arvuti on võimalik seda rentida kokkuleppel BCS Koolitusega.
Sissejuhatus projektitöösse Küberturbe arhitektuuriplaani loomine (Etteantud IT taristuga ettevõtte jaoks küberturbe staatuse hinnang, peamiste riskide loetlemine, aastase küberturbe meetmete tööplaani koostamine. Näidis ettevõtte jaoks majanduslikult mõistliku turvaarhitektuuri projekti disainimine koos tehnoloogiliste komponentidega ja nende funktsionaalsuse ja koostoimivuse kirjeldusega). Soovikorral võib osaleja valida enda või mõne muu reaalselt eksisteeriva ettevõtte.
Projektitöö koostamine (esitamistähtaeg 04.02 kell 12:00)
12.06.Veebiseminar eksperdiga 13:
Projektitööde kaitsmine
Koolituse kokkuvõte
Õppemeetodid:
Koolitus põhineb ISACA ITCA: „Cybersecurity Fundamentals Online Training“ ja Microsofti SC-900: „Microsoft Security, Compliance, and Identity Fundamentals“ e-õppe koolituste baasil ja materjalidel.
Õppetöö toimub suhtluskanalis Slack
Korralised veebinarid toimuvad veebikeskkonnas Zoom, reedeti, üks kord nädalas, korraga 2 akadeemilist tundi.
Kellaaeg: 9:15-10:45
Erand: sissejuhatav veebinar kestab 1 akadeemiline tund 9:15 – 10:00 ja 15. veebinar – projektitööde kaitsmine koos kokkuvõttega kestab 3 akadeemilist tundi 9:15 – 11:30
Koolituse kogumaht on 164 tundi (15 õppenädalat), seal hulgas:
28 tundi õppevideosid;
106 tundi iseseisvat tööd koos praktiliste harjutustega;
30 tundi veebiseminari eksperdiga.
Hindamiskriteerium:
Õpiväljundite saavutamist hinnatakse järgmistel alustel:
Koolituse ajal läbi viidud tagasisidestatud praktilised harjutused
Automating Administration with PowerShell (AZ-040T00)
This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports.
Prerequisites:
Experience with Windows networking technologies and implementation.
Experience with Windows Server administration, maintenance, and troubleshooting.
Program:
Module 1: Getting started with Windows PowerShell
Module 2: Windows PowerShell for local systems administration
Module 3: Working with the Windows PowerShell pipeline
Module 4: Using PSProviders and PSDrives
Module 5: Querying management information by using CIM and WMI
Module 6: Working with variables, arrays, and hash tables
Module 7: Windows PowerShell scripting
Module 8: Administering remote computers with Windows PowerShell
Module 9: Managing Azure resources with PowerShell
Module 10: Managing Microsoft 365 services with PowerShell
Module 11: Using background jobs and scheduled jobs
Target audience: This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server.
Learning methods: Practical exercise, independent work. Assesment methods: Execution of independent work. Assesment form: Independent practical tasks on relevant topics.
Price includes coffee breaks and lunch
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
Tähelepanu! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.
Attention! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.
Внимание! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.