Project Management Fundamentals
Project Management Fundamentals
Veeam
Veeam Backup & Replication v12: Configure, Manage and Recover
Oracle DB
SQL Fundamentals
Change Management
Prosci® Change Management Certification Program
Kubernetes
Real-life Kubernetes
Azure Infrastructure
Microsoft Azure Fundamentals
AML/CFT for Professionals
News and Updates 2025 in the Field of AML/CFT and Sanctions
Data & AI
Microsoft Azure Data Fundamentals
VMware
VMware vSphere: Operate, Scale and Secure [V8]
System Testing
ISTQB® Certified Tester Advanced Level – Test Analyst
IT and Data Security
Certified Information Systems auditor (CISA)
Windows
Implementing and Managing Windows 11
- Learning how to install and customize Windows 11 operating systems and apps
- Configuring local and remote network connectivity and storage.
- Configure data security, device security, and network security
- Maintain, update, and recover Windows 11.
Windows
Administering Microsoft Configuration Manager
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
Business and requirements analysis, Usability
Figma Prototyping Basics and Usability Testing
IT infrastructure
Networking Fundamentals with CompTIA® Network+ Certification
PMI
Project Management Professional Examination Preparation Course
IT infrastructure
CompTIA® A+ Comprehensive Approach
CompTIA® A+ is the only industry-recognized certification that includes an assessment of practical skills, certifying that certificate holders are high-level professionals capable of performing the critical IT maintenance tasks assigned to them. The existence of the certificate is appreciated by the heads of companies in various industries all over the world.
System Testing
Systems Tester
Azure Infrastructure
Microsoft Azure Administrator
Programming
Introduction to Programming Using Python
Artificial Intelligence
Business process automation with AI tools
Microsoft Excel
Microsoft Excel Advanced
Digital Marketing
Google Ads and the Google Display Network Fundamentals
Risk Management
Risk Management in the Enterprise
IT and Data Security
Certified Information Systems Security Professional (CISSP) Training Course
AML/CFT for Professionals
AML/CFT Advanced Level Training Module: Dealing with Suspicious and Other Transactions
Digital Marketing
Using the Social Networking Platform Facebook Tools to Build the Company’s Marketing Activities
Risk Management
Compliance Functions and Risks, Their Management in Practice
DevOps
Platform Engineering: The Golden Path
Agile Scrum
Scrum Master Certified (SMC™)
Personal development
Effective time management
VMware
VMware vSphere: Troubleshooting [V8]
CompTIA
Project Management According to the Project+ Standard
PMI
PMI Agile Certified Practitioner (PMI-ACP)®
Business and requirements analysis, Usability
Business Analysis, CBAP® and CCBA® examination preparation course
Artificial Intelligence
Programming with AI and Copilot: Improving Development with Intelligent Tools
AML/CFT for Professionals
AML/CFT Advanced Level Training Module: virtual Currencies, Bitcoin
Business and requirements analysis, Usability
Business Process Management Fundamentals
IT Security Basic Skills
IT and Data Security
Microsoft
Administering Windows Server
ITIL, IT Governance and Service Management
ITIL®4 Foundation
Agile Scrum
Agile Scrum for the Development Team
Power Platform
Microsoft Power BI Data Analyst
IT and Data Security
DORA Lead Manager
Business and requirements analysis, Usability
Design Thinking in Practice
System Testing
ISTQB® Certified Tester Foundation Level
Business and requirements analysis, Usability
Usability and UX Foundation
Join the six-lecture course "Usability and UX Foundation" to be able to use the full potential of your products and services! Valuable user experiences (UX) increase both customer satisfaction and also contribute to long-term business success. Learn how to bridge the gap between people's needs and proposed solutions. This course has been carefully designed to provide a comprehensive and practical learning experience.
Prince2
PRINCE2® Foundation (7th edition)
Power Platform
Microsoft Power BI Fundamentals
VMware
VMware NSX: Install, Configure, Manage [V4.0]
Business and requirements analysis, Usability
CPRE Foundation Level, IREB Requirements Engineering course
Linux
CompTIA® Linux+
ITIL, IT Governance and Service Management
ITIL®4 Specialist: High Velocity IT
Prince2
PRINCE2® Practitioner, 7th edition
IT and Data Security
Security Fundamentals with CompTIA® (Security+)
Within the framework of the training, it is possible to obtain comprehensive information on the 5 main areas of information security. Topics covered in the course include key security concepts, threats, vulnerabilities, risk and mitigation, security architecture, operations and program management.
The curriculum is supplemented with practical exercises and laboratory work to promote a deeper understanding of what was learned within the course, fully preparing for the international certification exam.
Artificial Intelligence
Introduction to AI Agents
As part of the training, we provide an opportunity to gain a comprehensive understanding of artificial intelligence (AI) agents, focusing on their design, implementation and practical application in various industries. During the course, you will have the opportunity to learn more about how AI agents process information, make decisions and perform various actions autonomously.
VMware
VMware vSphere: Install, Configure, Manage [V8]
Azure Infrastructure
Administering Windows Server Hybrid Core Infrastructure
IT and Data Security
Certified Information Security Manager CISM® Certification
Microsoft 365
Microsoft 365 Administrator
Power Platform
Microsoft Power BI Fundamentals
Oracle DB
SQL Fundamentals
CompTIA
Project Management According to the Project+ Standard
ITIL, IT Governance and Service Management
ITIL®4 Foundation
IT and Data Security
Certified Information Security Manager CISM® Certification
Other Tools
Presentation mastery with Canva.com
AML/CFT for Professionals
AML/CFT Advanced Level Training Module: Transaction Supervision, Monitoring. Transaction Research and Analysis. Signs of Suspicious Transactions
IT and Data Security
CompTIA® Cybersecurity Analyst (CySA+)
As part of the training, you will have the opportunity to learn more about tools and tactics for more effective management of cyber security risks, identification of various threats, assessment of the organization's security level, as well as collection and processing of data related to cyber security, being able to promptly deal with security incidents at the moment of a threat or an actual attack.
ITIL, IT Governance and Service Management
Enterprise Architecture Foundation with TOGAF® 10 Standard
Microsoft Excel
Microsoft Excel Advanced
Microsoft Excel
Microsoft Excel Fundamentals
Project Management Fundamentals
Project Management Fundamentals
Artificial Intelligence
AI: effective creation of presentation slides
Artificial intelligence (AI) and generative tools that create content (written and visual) are becoming increasingly relevant for more effective communication and more productive work.
They offer us opportunities to push the boundaries of what we can do, which is definitely useful when creating presentation slides. The training offers an opportunity to learn about the AI features of Microsoft PowerPoint, still the most used presentation design program in the world, which facilitates and improves the creation of our presentation design.
It will also provide an opportunity to learn about the main presentation platforms created by AI (available to users free of charge) – their differences and opportunities to use in work by integrating their results into the PowerPoint environment.
Other Tools
Fundamentals of Data Literacy, Critical and Analytical Thinking
Personal development
Objections and cold calls
Agile Scrum
Scrum Product Owner Certified (SPOC™)
Artificial Intelligence
AI for personal development and coaching
You will be able to learn more about the transformative role of artificial intelligence (AI) in personal development and coaching as well as gain useful knowledge about how AI technologies complement self-improvement strategies and coaching methodologies. By performing various practical tasks, as well as by participating in interactive lectures and workshops, you will learn how to use AI tools for setting goals, analyzing behavior and making decisions.
Azure Infrastructure
Automating Administration with PowerShell
Data & AI
Microsoft Azure Data Fundamentals
Azure Infrastructure
Configuring Windows Server Hybrid Advanced Services
Microsoft 365
Microsoft 365 Endpoint Administrator
System Testing
ISTQB® Certified Tester Foundation Level
Azure Infrastructure
Microsoft Azure Administrator
Business and requirements analysis, Usability
Business Analysis, CBAP® and CCBA® examination preparation course
Digital Marketing
Instagram Platform for Business Promotion – expert level course
Azure Infrastructure
Microsoft Azure Fundamentals
IT and Data Security
Certified Ethical Hacker v.13 AI (CEH)
IT and Data Security
Security Fundamentals with CompTIA® (Security+)
Within the framework of the training, it is possible to obtain comprehensive information on the 5 main areas of information security. Topics covered in the course include key security concepts, threats, vulnerabilities, risk and mitigation, security architecture, operations and program management.
The curriculum is supplemented with practical exercises and laboratory work to promote a deeper understanding of what was learned within the course, fully preparing for the international certification exam.
Power Platform
Microsoft Power BI Data Analyst
IT and Data Security
CompTIA® Advanced Security Practitioner (CASP)
Microsoft Excel
Microsoft Excel Advanced
System Testing
Systems Tester
IT and Data Security
CompTIA® Cybersecurity Analyst (CySA+)
As part of the training, you will have the opportunity to learn more about tools and tactics for more effective management of cyber security risks, identification of various threats, assessment of the organization's security level, as well as collection and processing of data related to cyber security, being able to promptly deal with security incidents at the moment of a threat or an actual attack.