Trainer: Blerton Abazi
CEH (Certified Ethical Hacker) training provides an extensive understanding of ethical hacking and cybersecurity, aiming to equip participants with th...
Explore MoreTrainer: Besnik Skenderi
PRINCE2 Practitioner training delves deeper into the application and analysis of the PRINCE2 methodology in real-world project management scenarios. B...
Explore MoreTrainer: Besnik Skenderi
PRINCE2 Foundation training equips individuals with a basic understanding of the PRINCE2 project management methodology. It focuses on the methodology...
Explore MoreTrainer: Besnik Skenderi
Participants will learn the basics of Data Science, key concepts of Programming (with R/Python), Key concepts of Data Management including Probability...
Explore MoreTrainer: Blerton Abazi
This 40-hour Certified Ethical Hacker (CEH) course offers comprehensive training in ethical hacking and information security. You'll learn to identify...
Explore MoreTrainer: Besnik Skenderi
This 24-hour course dives deep into the advanced features of MS Excel, transforming you from an Excel user into an Excel power user. You will learn to...
Explore MoreTrainer: Blerton Abazi
The 40-hour CompTIA Security+ course equips you with the foundational knowledge and skills in multiple security disciplines. It delves into key areas ...
Explore MoreTrainer:
Graphic Design Training Advanced level it is an attractive training with a program adapted to the labor market, it conducts some relevant topics that ...
Explore MoreTrainer: TBD in-house Cacttus Education trainer
The Advanced Web Application Development course builds and concentrates primarily on building rich client web applications in the browser. The course ...
Explore MoreTrainer: TBD in-house Cacttus Education trainer
React is a JavaScript library for building user interfaces. It is maintained by Facebook and a community of individual developers and companies. React...
Explore MoreTrainer: TBD in-house Cacttus Education trainer
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual netw...
Explore More