ITIL® 4 Foundation E-Learning Course

Duration: 1 year's access to the training materialPre-Requisites:…

Secure Code Training – SCT22 Protect your Data!

4 days, 4 hours a day, virtual training Secure Code Workshop…

IT Forensics for System Administrators – Part 2

IT forensics have become a vital part in handling security incidents,…
close photo of white and black car license plate

Open Source Software Licensing Workshop for Software Developers

Course Summary Open source is broadly used in almost all…
person holding black iphone 5

School of Software Engineering SSE2022

Design of modular, distributed and event driven systems: a practical…
man in black crew neck shirt beside woman in black long sleeve shirt

School of Software Engineering SSE2021

Introduction In its core, Domain Driven Design (DDD) consists…

Network Vulnerability Scanning

Join WP8 T1 team for the "Network Vulnerability Scanning" live…

Local Vulnerability scanning

Join WP8 T1 team for the "Local vulnerability scanning" live…

IT Forensics for System Admins – Acquisition of Other Evidence

Join WP8 T1 team for the "IT Forensics for System Admins - Acquisition…

Penetration Tests

Join WP8 T1 team for the "Penetration Tests" live online session.…

Break and Attack Simulation – matching attacker behaviour with vulnerabilities

Join WP8 T1 team for the "Break and Attack Simulation - matching…

Responsible Disclosure – Letting the cat out of the bag

Join WP8 T1 team for the "Responsible Disclosure – Letting…