+90 212 282 7700
info@bilginc.com
Trainings
Training Catalog
Vendor Trainings
Red Hat
VMware
ITIL
TOGAF
ISC2
AWS
Oracle
Azure
CBAP
ISTQB
DevOps
Docker
Java
Microsoft
COBIT
PMP
Python
All Vendors
Trainings by Sectors
Training Calendar
Red Hat
Training Catalog
Red Hat Training Calendar
Blogs
VMware
Training Catalog
VMware Training Calendar
Blogs
Corporate
About Us
References
Free webinar
Resources
Blog
Online Academy
Videos
Free Documents
Contact
Philippines
0 212 282 7700
Home
Scademy
Scademy
Search
Job family
Clear
Architects
Data Professionals
Developers
DevOps
Individual Specialists
Information Worker
Security Professionals
Technical Support
Portfolio
Clear
Cyber Security
Skills domain
Clear
Cyber Governance, Risk & Compliance
Cyber Security Operations
Programming Languages
Secure Developer
Subject
Clear
AppSec
Cloud Security
Cyber
Secure Coding
Partner
Clear
Scademy
Clear all
Certified Java and Web application security
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
This NCSC Certified training course offers a blended learning experience combining the Avatao platform with specialist content from our world-renowned Secure Coding partner Scademy. Writing...
Application Security in the Cloud
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common...
Secure Coding in C & C++
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
This training course offers a blended learning experience combining the Avatao platform with specialist content from our world-renowned Secure Coding partner Scademy. To put it bluntly, writ...
Certified C# and Web application security
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
This NCSC Certified training course offers a blended learning experience combining the Avatao platform with specialist content from our world-renowned Secure Coding partner Scademy. Writing...
Post Quantum Cryptography
Level:
Fundamentals |
Duration:
3 Days
Classroom
Virtual Classroom
Online
Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at...
Quantum Computing Fundamentals
Level:
Fundamentals |
Duration:
3 Days
Classroom
Virtual Classroom
Online
As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities...
Application Security Testing
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be...
Quantum Secure Communication
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunit...
AI Assisted Secure Software Development
Level:
Fundamentals |
Duration:
3 Days
Classroom
Virtual Classroom
Online
Artificial Intelligence is here to stay, and those who fight against it will be left behind. This comprehensive course on Artificial Intelligence and Software Development is designed to pr...
AI Fundamentals
Level:
Fundamentals |
Duration:
2 Days
Classroom
Virtual Classroom
Online
Embark on an exciting journey to explore the potential of AI in everyday work with our comprehensive AI Fundamentals course. This immersive two-day training program is designed to equip AI e...
Certified AI Security Engineer
Level:
Intermediate |
Duration:
3 Days
Classroom
Virtual Classroom
Online
Organisations must understand how to secure their AI systems. This in-depth course delves into the AI security landscape, addressing vulnerabilities like prompt injection, denial of service...
load more
Bilginç IT Academy All Rights Reserved
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our
Cookie Policy
.
Accept
Close
No results found!