Upcoming Courses
16
Jan
AML/CFT for Professionals
AML/CFT Advanced Level Training Module: Transaction Supervision, Monitoring. Transaction Research and Analysis. Signs of Suspicious Transactions
20
Jan
System Testing
Systems Tester
21
Jan
Prince2
PRINCE2® Foundation (7th edition)
27
Jan
IT and Data Security
Certified Information Security Manager CISM® Certification
AML/CFT for Professionals
AML/CFT Advanced Level Training Module: Transaction Supervision, Monitoring. Transaction Research and Analysis. Signs of Suspicious Transactions
Within the framework of the training, it is possible to acquire theoretical and practical knowledge about the process of monitoring customer transactions by examining practical methods for monitoring transactions before and after transaction execution. You will be able to learn about the signs of suspicious transactions, their current typologies and current legislation in this area.
System Testing
Systems Tester
As part of the training, it is possible to get both a theoretical and a practical idea of the tester's daily work, duties, responsibilities and necessary knowledge to successfully start a career in the IT industry.
Prince2
PRINCE2® Foundation (7th edition)
Within the course, we offer the opportunity to master the latest version of PRINCE2® – the 7th edition, enhanced with more contemporary tools, technologies, and processes for all types of projects. PRINCE2® 7th edition Foundation-level training lasts for 3 days and is suitable for anyone looking to start or further their career in project management using a modern and internationally recognized method.
During the training, participants will gain an understanding of the method's key processes, principles, and themes to ensure that project management aligns with all 21st-century standards and requirements.
IT and Data Security
Certified Information Security Manager CISM® Certification
The CISM (Certified Information Security Manager) course is designed for professionals who manage, design, and oversee an enterprise's information security program. This course covers essential topics like information risk management, governance, incident management, and program development and management. Upon completion, participants will be well-equipped to handle the challenges of securing and protecting valuable information assets within their organizations.
Sign up for newsletter
Leave your e-mail and we'll contact you with the most current information about company and our products.