Training Catalog

Year 2020

Digital Marketing Information Technology + Human Resourses Project Management Business Analysis Cyber Security Soft Skills ISO Application Development Languages Milan - Italy About Us Vantisco is an accredited training provider and examination organization located in Milan.

Our training courses cover a broad range of subjects in Information Technology, Digital Marketing, ISO, Cyber Security, Data Analysis, Block chain, Articial Intelligence, Soft Skills, Project Management, Application Development and Languages Center....

Our courses are accredited by renowned exam institutions, including EXIN, BCS, Microsoft, The Open Group, CCC, Wileys, DASA...Taught by Experts in the eld using professionally equipped venues with guaranteed pre and post course support.

Our Delivery Mode: • Self Paced Training • Instructor Led Live Online Training • On-premise classroom Training • Corporate Customized Training Instructor-Led Self Paced Live, Online Training Training

On-Premise Corporate Classroom Customized Training Training

We can deliver a customized program suited to the training needs of your company and employees. We can help you identify training needs and create bespoke programs for training to be delivered by either our training specialists or staff from your own department. To find out more about our corporate offerings, please get in touch with us: [email protected]. Self Paced Training

Security Awareness and Compliance Tehcnology Tehcnology Project Management Project Management Agile and Scrum ApAplgiiclaet aionnd DSecvreulmopment Big Data & Analytics

Blockchain Business & Soft Skills Cloud Computing DevOps IT Compliance and Governance Information Security Financial Management Operating System Service Management Security Awareness and Compliance

Security Awareness Essentials Leading a Secure Organization

Human error continues to be the While cybersecurity is now clearly biggest threat to information security. the purview of the C-suite, the This course aims to mitigate human concepts are often foreign to error by teaching how to classify data, business leaders, who may not know secure mobile devices, secure remote the right questions to ask their IT and home oices, avoid social and cybersecurity professionals. engineering scams like pretexting and Security has to start at the top, and phishing, and create strong passwords. the current threat landscape demands that senior leaders take ownership of the organization’s Anti Phishing Essentials security posture and culture.

General Data Protection Regulation (GDPR

Phishing is the weapon of choice for cybercriminals, it's important to be vigilant and prevent attacks like the infamous "WannaCry" attack of 2017. Covers key facts on the GDPR Avoid becoming a victim of phishing standard and how to apply the data attacks by learning how phishing privacy principles that form the attacks work and how to recognize a backbone of the regulation. Updated phishing email. S e p t e mber 2019 to incorporate the most recent developments in the law. Security Awareness and Compliance

InfoSec Best Practices Module: Privacy and Data Protection Essentials: Securing Your Mobile Devices.

InfoSec Best Practices Module: Securing Your Work at Home

InfoSec Best Practices Module: Working Securely in Public Places

InfoSec Best Practices Module: Securing Information During Travel

Outlines privacy in the workplace, InfoSec Best Practices Module: categories of protected information, Securing Information in the Cloud handling private data and privacy laws in the United States and abroad. InfoSec Best Practices Module: Safe Social Networking Additional Security Awareness and Compliance Courses InfoSec Best Practices Module: Avoiding Spear Phishing Threats Cybersecurity IQ Challenge Social Engineering in Social Networks Privacy and Data Protection

Essentials Voice Phishing or “Vishing” PCI DSS For Retail Security Short: Individual PCI DSS Introduction Responsibility

InfoSec Best Practices Module: Securing Information at the Oice Security Short: Ransomware

InfoSec Best Practices Module: Shock & Awareness Video: Mobile Securing Your Oice Network

Shock & Awareness Video: Phishing Best Practices Module: Setting Up Secure Passwords Posters – Humorous Series InfoSec Best Practices Module: Security Posters – Data Series Browsing the Web Securely

InfoSec Best Practices Module: Avoiding Phishing Message Threats

Technology

AWS CERTIFIED SOLUTIONS ARCHITECT

Fully aligned and updated to the SAA-C01 exam objectives, this invaluable Sybex course covers all relevant aspects of the AWS Solutions Architect job role, including mapping multi-tier architectures to AWS services, loose coupling and stateless systems, applying AWS security features, deploying and managing services, designing large scale distributed systems, and more. Your instructor will walk you through practical examples that illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. This course includes:

Video Lectures & Slides with 15+ hours The Exam Planner allows you to set of high quality, instructional video. your exam date and receive a tailored lesson plan with Interactive Test Bank with 100’s of corresponding assignments for practice questions. Practice questions each day. help you identify where further review is needed. Get more than 90% of the The Mobile App allows you to answers correct, and you’re ready to stream or download all videos, take the exam. review questions, and flash cards on-the-go. Two full-length Mock Exams allow you to simulate the actual exam before the big day. The Partner Until You Pass guarantee means you receive Electronic Flashcards to reinforce access to your course until you learning and last-minute prep before pass the exam.

Key Term Glossary in PDF format gives The Sybex AWS Certified Solutions you instant access to all key terms to Architect Study Guide in either ensure you are fully prepared. print or eBook format. Technology

COMPTIA A+

Based on the CompTIA A+ Exam objectives, these two detailed courses have everything you need to prepare for the CompTIA A+ 220-1001 and 220-1002 Exams. Complete with practical examples that illustrate how these processes play out in real-world scenarios, both courses allow you to immediately translate essential concepts to on-the-job application. A+ certification is a vital step for careers in information technology, allowing current and prospective computer technicians to validate or recertify their skills. An essential component to any A+ exam strategy, each valuable Gold Course includes

The Partner Until You Pass guarantee The Exam Planner allows you to set means you receive access to your your exam date and receive a course until you pass, even if your 12 tailored lesson plan with month subscription is over. corresponding assignments for each day. Interactive Test Bank with practice questions to help you identify where further review is needed. The Mobile App allows you to stream or download all videos, Two 90 question Mock Exams allow you review questions, and flash cards to simulate the actual exam before the on-the-go. big day. 25 hours of Virtual Labs allow for Video Lectures & Slides with hours of practicing skills in a safe and high quality, instructional video. secure virtual environment.

Key Term Glossary in PDF format gives The Sybex A+ Complete Review you instant access to all key terms to Guide in print or eBook format. ensure you are fully prepared. Electronic Flashcards to reinforce 10% off Exam Discount learning and last-minute prep before the exam Technology

COMPTIA Network+

Based on CompTIA Authorized content, this detailed course has everything you need to prepare for the CompTIA Network+ Exam N10-007. Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more. This course includes

The Partner Until You Pass guarantee The Exam Planner allows you to set means you receive access to your your exam date and receive a course until you pass, even if your 12 tailored lesson plan with month subscription is over. corresponding assignments for each day. Interactive Test Bank with over 1400 practice questions. Practice questions help you identify where further review The Mobile App allows you to is needed. Get more than 90% of the stream or download all videos, answers correct, and you’re ready to review questions, and flash cards take the exam. on-the-go.

Virtual Labs allow for practicing Video Lectures & Slides with hours of skills in a safe and secure virtual high quality, instructional video. environment

Key Term Glossary in PDF format gives Two 90 question Mock Exams allow you instant access to all key terms to you to simulate the actual exam ensure you are fully prepared. before the big day. Over 250 Electronic Flashcards to 10% off Exam Discount reinforce learning and last-minute prep before the exam Technology

COMPTIA Security+

Based on CompTIA Authorized content, this detailed course has everything your students need to prepare for the CompTIA Security+ SY0-501 Exam. This academic course is fully aligned to the CompTIA exam objectives and is packed with practical examples that illustrate how these key skills and concepts play out in real-world scenarios. They’ll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while also understanding the role of architecture and design.

13+ hours of high-quality video from Virtual Labs Option: Also available: a leading cybersecurity expert and version of the course which includes 25 veteran instructor, Robb Tracy. hours of Virtual Labs for one year, so students can practice their skills in a safe and secure virtual environment Study guide content from the bestselling Sybex CompTIA Security+ Instructor Resources: additional Study Guide: Exam SY0-501, 7th practice questions and PowerPoint Edition (978-1-119-41689-0). slides featuring all visuals and slides shown in the videos.

Assignable quizzes at the end of each lesson to reinforce students’ learning. Project Management

PRINCE2 Agile Foundation PRINCE2 Agile Practitioner

PRINCE2 Agile® Practitioner combines agile concepts with the world’s most popular approach to project management. This course covers a welcome to Prince2, project Management, 7 themes, what is agile and Using Scrum. This course covers the 7 principles and Agile, Quality, Risk, 7 Processes and Controlling a stage.

iSQI Certified Agile Business PRINCE2 Agile® Practitioner combines Analysis agile concepts with the world’s most popular approach to project management. This course covers a welcome to Prince2, project Management, 7 themes, what is agile and Using Scrum. This course covers the 7 principles and Agile, Quality, Risk, 7 Processes and Controlling a stage. iSQI Scrum Master Pro Certification

Apply your BA skills in an Agile environment! PRINCE2 Accredit your leadership skills for Agile project work! Are you a business analyst working in or moving to an Agile environment? Do you want to condently apply This course prepares you introducing Scrum methodology in your you to the recognised practices in organisations to eectively manage Agile BA. You’ll discover how the work issues and roadblocks? and approach diers from the traditional BA role. By the end of the In this iSQI® Scrum Master Pro course, you will know how to apply course, you will gain an understanding your BA expertise to excel in any of the Scrum philosophy and popular avour of Agile. principles, practical knowledge of Scrum, including roles, meetings and This course is directly mapped to the artefacts.This course will immerse you activities, tasks and skills dened in in the fundamental principles of the Agile Extension to the BABOK® Scrum. By the end of it, you will be Guide published by the IIBA® (July able to condently implement best 2013) and developed in partnership practice and avoid falling into bad with the Agile Alliance. h a b i t s t h a t can signicantly impact project delivery, quality and cost. Project Management

The project framework Essential Project Skills (10 courses) Identifying the project kick-o drivers and constraints. Dening the content of This targeted course bundle oers the the project charter. Dierentiating essential projects skills required to between project stakes and objectives. eectively guide projects to successful outcomes.

Drawing up a project budget This course is available in the following languages: Arabic, Chinese (simplied), Planning the budget over time: project Dutch (NL), French, French-Canadian, budgeting. Creating a budget German, Italian, Latin American consumption forecast curve. Keeping Spanish, Portuguese, Portuguese control of the project budget. Revising Brazilian, Spanish, US English, UK the budget on the basis of "customer" English decisions. Course contents:

PRINCE2:2017 Foundation Project Management Essentials (A) Project Management Essentials (B) PRINCE2® is a globally recognized The project framework (A) methodology for Project Management The project framework (B) and it is owned by AXELOS. Project planning (A) Project planning (B) Drawing up a project budget (A) Facilitating a brainstorming Drawing up a project budget (B) session Anticipating project risks (A) Anticipating project risks (B) • Starting the brainstorming process • Stimulating ideas Facilitating a project steering Anticipating Project Risks committee meeting • Give the correct project status Dening the notion of risk in a project. • Promote decision-making Mastering the risk management process. Identifying project risks and their possible triggers with your team. Lead meetings remotely Creating the risk register. Assessing risk probability and severity. Adopt best practices when starting a remote meeting. Trigger attention and organize exchanges. Project Management

Project planning Project Management Essentials Dening what a project is. Identifying Choosing an appropriate project the project objectives. Mastering the presentation method: the milestone performance-cost-deadline triangle. diagram or Gantt chart. Listing Organizing the key project phases and activities, identifying the continuity setting milestones. Identifying all the constraints, drawing up a logical project stakeholders. succession of tasks, and determining the duration of activities. From needs to project Project management: Mastering the ve stages of the needs mobilizing team members denition process. Identifying the project stakeholders. Mobilizing the appropriate individuals to dene the • Engagement interview: involve each needs. Identifying the appropriate level team member • Kicko meeting: of eort and obtaining oicial approval. involve the team • Status meeting: keep motivation throughout the project PMP Certification (PMBOK 6) Remote Management : effective With the release of the latest PMBOK® ways to communicate with team Guide - Sixth Edition the PMP certication has been updated! This members next course in the PMP series will continue to discuss what's new and Managing team member’s activity • also provides a great resource in Visiting a team member • Using the preparing for passing the new PMP right tools to inform • Eective remote certication exam. This course talks meetings Boosting each team member scheduling from start to nish it • Avoiding team members’ frustration • contains 6 processes that dene the Choosing the right moment to interact schedule as well as estimate for the • Adopting a circular view on reporting project schedule. This area takes work break down structure and decomposes Remote Management : handle it to schedulable activities. poor performing employees This course covers Cost Management. Creating an employee performance It contains 4 processes that focuses on improvement plan • Choosing between developing and managing the project asynchronous and synchronous budget and the cost management plan. interaction • Finding out the reasons It also covers Project Quality for under-performance • Creating a Management. It has three processes performance improvement plan that focus on the projects quality Setting up a remote performance expectations and producing feedback loop • Deciding when to give deliverables that align with the quality feedback • Deciding how to give expectations. Finally this course covers feedback • Guiding towards Project Resource Management and its performance improvement 6 processes that ensure resources are available to the project. Agile and Scrum

Agile/Scrum Essentials for Practitioners SCRUM Developer

This training series covers the There is a lot of buzz today around concepts of Scrum Developer training. Agile as a dierent approach to Students will get an introduction to managing projects, specically Scrum, and learn about initiating a software development and project and planning and estimating a implementation projects. project. Students will also learn about Unfortunately, when Agile was rst implementing a project, sprint review, being introduced it was set in retrospect and release. opposition to traditional or waterfall project management approaches. This caused an unnecessary and SCRUM Master counterproductive ri that was mostly due to a lack of understanding and a Explore the history of the Waterfall few overzealous evangelists. Today method, a linear software management Agile is more main stream, framework, and discover what projects particularly in IT, and much of this work well with it. Compare Waterfall to division has started to erode. the incremental delivery framework Agile and discover which projects are SCRUM Product Owner conducive to each framework. ,Become familiar with the Agile philosophy, core values, and principles as well as what circumstances Agile shines best in. This training series covers the Explore the three roles, three artifacts, concepts of Scrum Product Owner and four ceremonies to manage training. Students will get an software development that make up introduction to Scrum, and learn about Scrum. Discover how these principles roles and responsibilities, planning, interact with the Scrum managing quality, change, and risk, and implementation of the Agile framework also learn about sprints. with examples of how the ceremonies work. Understand the importance of changing the culture and behavior of the organization to reap the maximum benets from Agile and why it is a key factor in Scrum. Application Development

Android Dev: Graphics, Bluetooth and Introduction to Blockchain Tablets and Ethereum The Advanced Android Development Blockchain applications provide a using Eclipse course will take a single-shared ledger to eliminate trust deeper look into developing issues involving multiple stakeholders. applications for the Android OS. The course will start with Android XML With the help of Introduction to HTTP then continue on to XML-RPC Blockchain and Ethereum, you'll learn Service and more. Android graphics how to create distributed Blockchain for simple 2D graphics are explained. applications which do not depend on a Then the course will cover Bluetooth central server or datacenter. The from accessing the hardware to course begins by explaining Bitcoin, creating web services and nishing up Altcoins, and Ethereum, followed by with Fragments, Adapters, List Views, taking you through distributed and Arrays. programming using the Solidity language on the Ethereum Blockchain. Android Development Using By the end of this course, you'll be able Eclipse to write, compile, and deploy your own smart contracts to the Ethereum The Android platform has entered the Blockchain. market a big way with phones and tablets. As more users adopt this mobile technology many companies Developing Windows are looking at ways to use the Android Applications Using C# platform as a way for their employees to access data and for their customers to see what the company has to oer. Visual Studio 2008/2010 adds a large This course covers the basics of set of new functionality for the Visual developing applications for the Studio developer. From new language Android platform. You will be features, including LINQ (Language introduced to the Android developer Integrated Query), to new client-side tool kit using Eclipse and data support, Visual Studio 2008/2010 programming in Java. Then you will and the .NET Framework 3.5/4.0 make build your rst simple application. As it easier than ever to create robust, the course progresses it will cover enterprise-level applications. You will how to access GPS information, use learn how to build solid applications the Status Bar Notication and move using structured exception handling, into SQLite, a mobile version of a SQL how to use the Visual Studio database. From there the course debugging features, how to use continues with SMS test messaging, MenuStrip and ToolStrip controls, and Web Views, Web services and using a how to add unprecedented exibility to SD card. your user interfaces using the container controls Application Development

SignalR .NET Framework 4.5.1

If you're a Microsoft developer that .NET is a Framework from Microsoft, has wanted to create web applications introduced in 2001 that makes it easier that are highly interactive and event to build applications that cross driven like NodeJs, then SignalR is for platforms and hardware. It does this by you! SignalR is a complete client-side providing a consistent and powerful set and server-side solution with of classes and interfaces that abstract JavaScript on the client and ASP.NET away dierences of architecture and on the back end that allows native allow developers to use the right linking from the client-side to the languages and tools that work for server-side and back again! In this them. Microsoft has been pushing a course, we'll cover getting started with new unied template for web projects SignalR, and get into the connection called OneASP.NET. With this new types and tasks, and then we'll throw template developers can create web some data to the server and then solutions that start with WebForms, but broadcast it to all the connections. include MVC features. Or a WebAPI We'll also look into creating a small site that adds WebForms. Then in this application to show a real-world use of course we'll look at what's new in the SignalR. .NET framework 4.5.1, as well as Visual Studio 2013 for building Windows Programming C# applications, both on the desktop and in what is now called "Modern Windows Apps". You'll learn about the structure of C# code, then will start to learn about C# statements and expressions that let Java EE Programming: Spring you perform complex operations with 3.0 your code. Variables and data types are a core feature of any programming language, and you'll learn about them This Spring course will take an in- in this course. You'll see how to name, depth tour of the basic Spring declare, and initialize variables, as well framework, initially examining as a way to let the compiler determine concepts such as Inversion of Control the appropriate data type, and why you and Dependency Injection, and then may or may not want to do that. Then working with the container and basic you'll learn about many of the built-in components. The improved Spring 3.0 data types provided by C# and the conguration management options .NET Framework, letting you manage centered on the Spring Expression just about any kind of data in memory. Language (SPEL) is covered. The The course wraps up with a look at course then moves into the areas of three advanced types: constants, persistence and transactions, looking at enumerations, and structures. various options including both JDBC and Hibernate. You will then look at options for handling the view portion of MVC web architecture. Application Development

Java EE: Web Development Using Entity Framework 6.1 Spring 3.0 n this course you’ll learn some of the The Spring 3.0 framework gives Java basics of object relational mapping developers a strong platform for systems and how they overcome some creating websites and web of the problems when working with applications. This course will cover relational data in an object based many aspects of web development application. You’ll also see how entity starting with Direct Web Remoting objects are a big improvement over (DWR). From there the course will generic data objects, such as the data cover Spring and Struts which covers set and the data tables provided by Model View Controller. After that the ADO.NET. Then you’ll learn specically course moves on to WebFlows and about the Entity Framework, testing with Unit Testing and Spring. Microsoft’s ORM technology and why it The later sections of the course will is a compelling data access technology cover the important subject of in the .NET development space. Then Security. They will cover Enterprise you’ll explore some of the ways that and Web security and then how to you can create data models using the customize web security, securing Java tools provided with Entity Framework code and user versus role based and SQL Server Data Tools in Visual security. Studio. Then we’ll reach down into the guts of the XML that makes up the three Entity Data models, conceptual, Java EE: Integrating Hibernate; storage and mapping. So that you have Spring 3.0 a good understanding of how Entity Framework implements many of its As data models get more complex it features. becomes harder for programmers to create applications to access that data. Node.JS Enter Java Hibernate. Hibernate is a middle-tier developer framework for Object to Relational Mapping (ORM). A This course designed to get you Hibernate tier is used as a go-between developing in the world of node.js. from the data tier to the client tier thus We'll cover getting Node.js downloaded creating an automatic translation and installed, plus look at adding some between the Object Oriented model extra add-ons that make node.js pop and the required relational data model. that much more. Also in this course, This course will take the next step by we'll be going through the showing you the higher functions of fundamentals of node.js, node buers, Hibernate like Mapping Inheritance, event emitters, building http servers Annotations and Composite keys. You and much more. This course is done will then move on to Transactions and from the perspective of a Microsoft Querying, then Spring Hibernate technologies developer getting into Integration foundation and end with node.js and all it has to oer. using Hibernate in Spring. Application Development

Learning Angular JavaScript

This course on Angular 6 will JavaScript is the programming introduce why Angular is useful and language of the World Wide Web, the also how to set it up. Then it will code that makes a Web page come cover how to create a project, alive. The Document Object Model components and bootstrap and run a (DOM) lets you manipulate a page component. It also unlocks the power dynamically and provide instant of Angular by discussing the ng responses to user actions, with or modules of ngIF, ngSwitch as well as without ongoing interactions with the property binding. It then builds on Web server. JavaScript is arguably also using ngIf, ngSwitch, ngFor as well as the most widely used programming how to style with classes. It also language in the world, primarily covers how to start building a service, because of its use in Web browsers. handle error conditions, add styles and The language itself is a prototype- update congurations. See how to based interpreted scripting language create projects, implement that has dynamic and functional components and use forkjoin to show characteristics, is weakly typed and running multiple services. Next, it supports object-oriented programming. creates a controller and shows how to JavaScript long ago outgrew its implement REST API to create update scripting roots to become a solid, and delete data. This course on general-purpose programming Angular 6 implements a 'get products' language, suitable for large-scale service method as well as a development. In this course you will component view. You will see how to learn about the origins of JavaScript implement and test this as well as and its core language features, giving show refactoring. Next, it covers you a solid foundation on which to take routing, and how to add routes, paths advantage of the many benets of this and actions and nally nishes with versatile language. how to use the very powerful feature C++ of Pipes and slicing in Angular. C# Fundamentals Join software development expert Peter Thorsteinson as he covers topics The C# Fundamentals e-Learning related to getting started with the C++ Course is designed to provide an programming language. In this course, overview of C# characteristics and he will show you where and how to basic knowledge of the language. In obtain the necessary development this course you will practice and learn tools and integrated development the basic methods and keywords that environments. Thorsteinson will also are used in C# and at the end you oer a detailed study of C++ language should be able to; syntax including comments, white

space, identiers and the declaration of Explain the key characteristics of C# variables as well as provide code The history of C# examples that demonstrate modern

features of the language. Next we'll Create a new project in Visual Studio examine topics related to data types, and be able to write basic code operators and expressions. Application Development

SQL 2014 Developer Docker: Benefits of Containers

In this course you will explore two There tends to be a lot of confusion kinds of code modules that can be surrounding what exactly Docker is implemented with only .NET code. but, put simply, it’s a fairly new and Those are Aggregates and User continuously rapid-evolving web Dened Types. Then you will learn technology. Explore the possibilities of about a number of useful features in what Docker is, how to best t it into Data Tools, including its use for both your DevOps operations, and some of online and oline database the potential it oers for your development. Then you will see how to development environment. While the ether import an existing database content in this course is current as of schema or create objects from recording (following DockerCon 2017), scratch. You will see how both these the rapid evolution of the technology modes work and see how you can can cause some information contained publish changes to an existing in this course to be superseded by the database. Then you’ll learn about some time you complete the course. So, as advanced T-SQL statements and with any other technology, it’s operators that can dramatically imperative to stay up-to-date on the simplify individual statements to newest changes, news, and updates to perform complex operations and ensure your training can remain as queries. Next you’ll learn about relevant as possible. advanced query techniques, as well as how to safely execute dynamic SQL Jenkins statements, and more. Then you’ll learn about how SQL server executes Jenkins is open source automation queries, taking a behind the scenes software that helps automate software look what it takes to compile your development with continuous beautiful T-SQL code in to a structure integration and facilitating technical that SQL server can execute. Next aspects of continuous delivery. This you’ll learn about a system CLR type, course will introduce Jenkins, go HierarchyID, for storing hierarchical through setup and installation as well data. You’ll also take a look at using as create your rst job. Followed by lestreams, a way to store large using Docker as well as how to use binary objects outside of SQL Server SSH to connect and then an and let SQL Server manage the introduction to Amazon Web Services storage. Then you’ll learn about the as well as creating buckets, users and spatial models used in SQL Server to jobs in Jenkins. This course shows how model both at, or planar, areas as to use Ansible with Jenkins. Ansible is well as the surface of the earth an open-source software provisioning, conguration management, and application deployment tool. you'll use Ansible, make a playbook, and use Nginx. It talks about how to secure Jenkins, how to assign permissions to use it, how to trigger jobs and how to congure Jenkins to trigger email notications. Application Development

ISTQB Foundation Certificate in Bootstrap 3.1 Software Testing - 2018 Syllabus In this course we’ll look at Bootstrap Verify your testing skills with this and how to create a web site without essential accreditation! being a full time designer as well. We’ll Want to establish a solid foundation start with the process of acquiring for your testing career? In this course, Bootstrap – you see how we can you will learn how to apply test download Bootstrap distributions and principles and control your own test sources or use a CDN or front-end activities using test processes and package manager like Bower to get methodologies that are globally Bootstrap. Then we’ll look at what recognised as best practice. basic CSS classes come with Bootstrap The ISTQB® Foundation Certicate is and how to apply them to your site to an essential accreditation for all make it look great. Next we’ll look at testing professionals. Internationally Bootstrap Components – these are recognised, it is the industry standard design elements that are not a part of professional qualication and has HTML proper, but a combination of become a prerequisite among many HTML and CSS that create compelling hiring managers when considering visual design elements to help create testing candidates engaging user interfaces. Bootstrap comes loaded with a ton of great Mobile Development Using JavaScript plug-ins to help us create HTML 5 powerful and engaging sites for our customers and users. We’ll look at the HTML 5 is the new web based code JavaScript plug-ins to make your site that will allow developers to create inactive and dynamic. web applications for Android, iOS, and Windows Phone OS platforms with little to no changes between platforms. HTML5 and CSS3 The course will explore many aspects of HTML 5 mobile development With the advent of multimedia on web starting with an overview of HTML 5, pages it became clear that the then the use of CSS and JavaScript standard HTML4 was no longer with HTML 5. Then it will show the suicient for web page development. building of the standard Hello World Enter HTML5 and CSS3 in connection application and then moving into with JavaScript. This course covers the forms, layouts and the all important changes to HTML that now can embed MVVM. The course will then move audio and video playing without using into data usage with local storage and a plug-in. The course will also cover SQL. Next the course will cover the many new features such as Structural Cloud and related services. Then the Tags, Input Field Types, and Canvas course will start to work with many Elements. The course also includes the dierent features of the phones, new CSS3 Transitions, local storage of working with phone sensors and GEO user preferences, history management, location. At the end of the course it and drawing and animating graphics will touch upon working with contacts, with WebGL. design philosophy, CSS animations and more. Big Data & Analytics

Big Data Strategy Exploring NoSQL and MongoDB

Developing and implementing a Big In this course, we are going to Data strategy is vital if you want to introduce you to the concepts behind stay in business in the coming years. the NoSQL ecosystem, including what Big Data oers so many benets to NoSQL is and isn’t. Next we are going organizations and research indicated to discuss the advantages and that companies leveraging Big Data disadvantages of using a NoSQL nancially outperform their peers by database and the benets of leveraging 20% or more. So, if you do not want to a schemaless database in your be left behind, you should focus on Big applications. Then we are going to set Data now. up the environment we will be using to develop our application. Next we are But what is Big Data? How should you going to implement the basic develop a Big Data strategy? What AngularJS portions of our application. can Big Data do for your organization We will cover some of the basic and how should you deal with the features that AngularJS oers before privacy aspect of Big Data? Important we get into routing, function and questions to ask that can be diicult service integration. Then we are going to answer without suicient to build out more functionality of our knowledge on Big Data. application, focusing on how to leverage Express for Node.js to our This unique Big Data strategy training advantage. We will start by taking a focuses on Big Data from a business look at our server side coding, and perspective and will provide you with eventually move on to our App.js all the knowledge and valuable customization and model setup. Once insights to develop a successful and our server is congured, we will build winning Big Data strategy. This is the out our remaining views and take the only training available that focuses on application live. Finally we are going to Big Data from a strategic point of take a look at how we can incorporate view. Bootstrap into our application to give it a more professional look and feel. Next we’ll go through the basics of installing Bootstrap, how to include it into the project, and also how we can integrate and congure it within the application. Blockchain

Blockchain Trails provide a fun way to learn about Blockchain. Learners follow a guided path and learn about Blockchain through a series of short learning interventions. Every module comprises videos, animations, exciting quizzes/exercises, and downloadable study material. Participants can learn at their own pace, in their own time, engaging with the media format that best ts their learning behavior. After completing all Trails, the participant is ready to take on and pass the Blockchain Foundation exam.

Blockchain Foundation Trails - Introduction to Blockchain

Blockchain Foundation Trails - Blockchain Consortiums Blockchain Foundation Trails - Blockchain Consortiums Blockchain Foundation Trails - Future of Blockchain

Blockchain Foundation Trails - Working of Blockchain Demystified

Blockchain Foundation Trails - Cryptoeconomics

Blockchain Foundation Trails - Applications of Blockchain

Blockchain Foundation Pro Business & Soft Skills

Basic Professional Skills (5 Essential Professional Courses) Skills (10 courses)

This targeted course bundle oers the This targeted course bundle oers the basic skills all professionals need to essential professional skills that both be successful including assertiveness, new and experienced employees need communications, and interpersonal to be successful in a corporate relations. environment.

Course Contents:

Handling stress Basic Customer Skills (5 Assertiveness : know your prole (A) courses) Assertiveness : know your prole (B) Assertiveness : toolkit (A) This targeted course bundle oers the Assertiveness : toolkit (B) basic customer skills needed to build The three pillars of interpersonal new customer relationships, nurture excellence existing customers, and build Knowing yourself better to customer loyalty to achieve sales communicate better (A) success. Knowing yourself better to communicate better (B) Three routes to good communication Three levers for building winning cooperation Other Courses

Customer relationship: creating commitment Customer relationship: building trust Managing objections – Level 1 & 2 & 3 Identify your communication styles Developing Loyalty through Customer Relationships Successfully adapting your message Evade trick questions at meetings Preparing and structuring the annual performance review The challenges of customer relations Public Speaking: Managing the Q&A Customer relationship: practicing active listening Knowing yourself better to communicate better Cloud Computing

Microsoft Azure Services Microsoft Azure 2017 (AZ-900) This course covers an introduction to Since its initial public release in 2010, Azure as well as to Azure Storage, Microsoft Azure has evolved to Azure Network Services, security become an easy to use, scalable, groups, interfaces and VNets. This reliable, and performant public cloud course will cover Azure Compute, VM platform by adding hundreds of new storage as well as how to Monitor and features, data centers, and types of Backup. This course includes services. Examine the array of new Application Building blocks as well as features and services that have Mobile apps and the Azure continued to make Azure a leading Notication Hub. It also includes cloud computing platform, and Azure Database Services, SQL DB discover how the newest tools will help Monitoring and the Azure Data you deploy, congure, and manage Factory, Azure Big Data Solution, Data applications and services. When rst Bricks and Power BI. This course will released, Microsoft Azure included dive into Azure Enterprise App only one type of compute services: Integration as well as the Azure Cloud Service. Also known as Platform Service bus, Data Gateway, Azure as a Service (PaaS), Cloud Service Internet of Things, the IOT Hub as provided a way to dene the machine well as Stream Analytics and device conguration in a way that made it provisioning. Finally, this course easy for developers to focus on their tackles Azure Security as well as application and business to scale to Conditional Access, policies and meet demand. Now even easier to build Security Center as well as Azure and deploy code, Application Services Monitoring, Activity logs, and gives developers a hosting platform Application Insights which has scaling, settings, monitoring, and deployment features that simplify and accelerate the process of going to market. In this course, we'll explore the CompTIA Cloud+ newest tools available to deliver great software. Explore the world of cloud computing by examining the reasons why more organizations are moving to the cloud. As a cloud professional, the ability to distinguish one service model from another, as well as one cloud delivery method from another, is vital to your success. These key concepts will be examined, as well as an overview of the cloud and object storage terminology necessary to get your foot in the door as you prepare to become a cloud certified professional. Uncover the very foundation of a cloud computing environment: data storage and storage networking. Part of the fabric, the underlying framework on which cloud computing models are built, the fundamentals of storage including disk types, configurations, RAID levels, and redundancy implementation will be examined. DevOps

Foundation Certificate in Chef DevOps The Foundation Certicate in DevOps Chef takes the process of software Foundation course provides an deployment and converts it into code introduction to DevOps – the cultural making managing your infrastructure and professional movement that smoother and more eicient. This stresses communication, collaboration, course starts with an explanation of integration and automation in order to what you can expect from Chef and improve the ow of work between how to setup the environment both software developers and IT operations locally and using an Amazon EC2. This professionals. course covers templates--a cookbook template is used to dynamically This course covers - generate static text les and are a Module 1: Introducing DevOps great way to manage conguration Module 2: CALMS: Culture les. Then it covers remote le Module 3: CALMS: Automation execution, users groups and Module 4: CALMS: Lean notications; plus how to solve Module 5: CALMS: Measurement problems and troubleshoot issues. It Module 6: CALMS: Sharing covers how the Chef server works as a Module 7: Common DevOps Roles central artifact store and distribution Module 8: Product vs. Project mechanism that manages scale, Module 9: The Three Ways of DevOps, complexity, and safeguarding your Methods and Approaches systems. Also, it covers using the Chef Module 10: DevOps Practices Supermarket, an online place to Module 11: Summary and Exam collaborate or get cookbooks written by Preparation other authors. It also covers managing nodes in your infrastructure system, This course will prepare you for the assigning roles to manage groups of BCS Foundation Level Certicate in nodes as well as how to index and DevOps exam search your infrastructure.

DASA - DevOps Fundamentals

The DevOps Agile Skills Association (DASA) is an open, global initiative to develop standards for DevOps competencies that will benefit the individual, team, and organization. ITpreneurs is a DASA Courseware Partner. As a training provider, you can enter into a commercial agreement with ITpreneurs to become a DASA Training Partner.

The DASA DevOps exams are delivered by APMG and iSQI. Exams for DASA DevOps portfolio can be taken on the last day of the course in the classroom or by using a web proctor. IT Compliance and Governance TOGAF® 9 Training Course: COBIT 5 Foundation Level 1 and Level 2

Combined r4.0.0 COBIT5 provides a comprehensive The TOGAF® Standard, Version 9.2 is framework that assists enterprises in an improvement to the TOGAF® achieving their objectives for the Standard, Version 9.1, providing governance and management of improved guidance, xing errors, enterprise IT and it is owned by rening the document structure, and ISACA. removing obsolete content. The TOGAF® 9 Training Course: Level 1 TOGAF® 9 Essentials and Level 2 Combined is an eLearning course based on TOGAF® Standard, Version 9.2. This training provides an TOGAF® certication provides a clear opportunity for architects and aspiring path for professional development and architects to strive for greater credibility to employers industry credibility and better career The TOGAF® Standard, a standard of opportunities by possessing the The Open Group, is the open updated knowledge and skill-set based Enterprise Architecture standard used on TOGAF Standard, Version 9.2. by the world’s leading organizations to improve business eiciency. The Open This eLearning course is a Group TOGAF Certication Program comprehensive ITpreneurs training has enabled more than 70,000 program for TOGAF. Enterprise Architects and trainers around the globe to demonstrate their The Foundation (Part 1) certication proven knowledge of the framework.. provides validation that the candidate has gained knowledge of the TOGAF® is a registered trademark of terminology, structure, and basic The Open Group concepts of TOGAF 9, and ITpreneurs TOGAF® Training Course understands the core principles of 9 is an Accredited TOGAF® Training Enterprise Architecture and TOGAF. Course and complies with the The TOGAF 9 Certied (Part 2) accreditation requirements for The content focuses on the practical Open Group TOGAF® Certication for application of TOGAF framework, People program. building on the foundational knowledge and comprehension of Part 1, using practical scenarios to enforce concepts.

Information Security Cyber Security Awareness Certified Information Systems Basics Security Professional This course will explore types of security threats, both digital and physical. It will start o with an This course is part of a series overview, look at types of threats, covering the ISC(2) Certied social engineering and identity theft. Information Systems Security The course will continue by exploring Professional or CISSP. It covers risk types of security threats, both digital management and authentication. It will and physical. It starts with protecting look at risk from a negative digital information and then discusses perspective or the likelihood of types of malware such as viruses, something bad happening. Topics worms, trojans and phishing as well as covered will be plans, programs and software detection and nishes with infrastructure providing the le extensions. foundation for all other domains including access control, validating, and verifying the use of resources. Information Security and Cyber Access control is the heartbeat of Security Staff Awareness information security. This course will talk about role access, layers of access, control characteristics, administrative controls and technical Oicial GCHQ-approved/ Government access. It will also cover architecture Certied training course computer security concepts. I n less than an hour, boost your sta’s Operations security is where all the awareness of cyber security risks theory and policies are put into action Improve learner engagement with fully interactive, simple and user- friendly content RESILIA Foundation Test learner knowledge and report on learning undertaken for audit purposes AXELOS RESILIA™: Cyber Resilience Personalise your learning by Best Practice is designed to help hosting this course on an LMS commercial and government with your branding and corporate organizations around the world identity p revent, detect and correct any Customise the learner experience by impact cyber attacks will have on the including links to important documents information required to do business (e.g. social media policy) in the LMS

Information Security

Certified Ethical Hacker Certified Virtualization Security V 1 & 2 Expert

Hacking has gone from an obscure This series covers everything you term to something that appears in the need to know becoming a Certied daily news. In this course we'll get Virtualization Security Expert. started with what is hacking and Students will learn about routing and understand some of the dierences the security design of VMware, between "white" hat hackers and Remote DataStore security, "black" or "grey" hat hackers. It will Penetration Testing 101, information cover at a high level what are some of gathering, scanning and enumeration, the essential tools a hacker needs to penetration testing and the tools of know about and be procient with as the trade, DMZ virtualization and well as the credentials of a hacker and common attack vectors, hardening what you can expect when becoming your ESX server, hardening your ESXi a Certied Ethical Hacker (CEH), a server, hardening your vCenter server, certication by the EC-Council. We'll and 3rd party mitigation tools. dig deeper into the primary operating systems used for hacking: linux and windows. Automating tasks is critical EC-Council Forensic to your job as a hacker and knowledge Investigator V1, 2 ,3 of shell scripts is key. Learn how to identify threats both external and internal. Perhaps one of the employees T he Cloud is everywhere and along of the business uses a very weak with it comes unique challenges for an password and this is a security threat investigator such as Infrastructure as that a dictionary attack tool can a service, jurisdictional issues, data rapidly nd. It then covers how to gain locations and web applications. Who information or "footprinting" on a owns the data? is it in the same target of ethical hacking. It shows how country? how do you nd it? This to scan and also to mitigate scans to course will guide you through some of acquire information about weak points these challenges, threats and pitfalls and then explains diagramming your of investigating in the cloud. The system from a hacking perspective. proliferation of mobile devices such as There are many dierent types of phones, tablet, laptops means Malware from trojans and worms to investigators will have to deal with viruses and backdoors. Learning about mobile devices, malware, and tools for how each threat is dierent is key and investigation. The second part of this about how to mitigate it. Examples will course covers how do we write be shown with Wireshark and how to reports and summarize an interact with Packets. Also the human investigation eectively. This course is element of Ethical Hacking will be part of a series covering the EC- covered. Perhaps a company is very Council Computer Hacking Forensic good in network security but lacking Investigator (CHFI). in physical security.

Information Security

Certified Information Interconnecting Cisco Systems Auditor (CISA) Networking Devices (CCENT) Our ISACA CISA Certified Information The Interconnecting Cisco Networking Systems Auditor Series provides the student Devices Part 1 (ICND1) is the exam with the knowledge and proficiency to associated with the Cisco Certified Entry prepare for the globally recognized CISA Network Technician certification and a certification exam. The CISA certification tangible first step, second being ICND2, in has become very popular since it originated achieving the Cisco Certified Network in 1978, and is a benchmark for IS audit, Associate certification. Candidates can security, control, and assurance personnel prepare for this exam by taking the to validate their skill set. This course will Interconnecting Cisco Networking Devices immerse the student into the subject, with in- Part 1 (ICND1) course. This exam tests a depth coverage of the information covering candidate's knowledge and skills required to the five domains that make up the "Body of successfully install, operate, and troubleshoot Knowledge" for the CISA exam and will a small branch office network. The exam provide the student the tools to build their includes topics on networking fundamentals; technical skills to develop, manage, and connecting to a WAN; basic security and perform IT security audits. wireless concepts; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and Certified Information Security configuring IOS devices; configuring RIPv2, static and default routing; implementing NAT Manager (CISM) and DHCP; and configuring simple networks.

T he ISACA CISM certification program is d e veloped specifically for experienced Interconnecting Cisco information security managers and those who have information security management Networking Devices (CCNA) responsibilities. CISM is globally recognized as the leading credential for information T he Interconnecting Cisco Networking Devices security managers. Our CISM Certified Part 2 (ICND2) is the exam associated with the Information Security Manager course Cisco Certified Network Associate certification. provides the student with the knowledge and Candidates can prepare for this exam by taking proficiency to prepare for the globally the Interconnecting Cisco Networking Devices recognized CISM certification exam. The Part 2 (ICND2) course. This exam tests a CISM certification combines the candidate's knowledge and skills required to achievement of passing a comprehensive successfully install, operate, and troubleshoot exam with recognition of work, management a small branch office network. The exam and educational experience, providing you covers topics on extending switched networks with greater credibility in the marketplace. with VLANs; VLSM and IPv6 addressing; the This course will immerse the student into the VTP, RSTP, OSPF and EIGRP protocols; subject, with in-depth coverage of the determining IP routes; configuring, verifying information covering the four domains that and troubleshooting VLANs; managing IP traffic make up the "Body of Knowledge" for the with access lists; NAT and DHCP; establishing CISM exam and will provide the student the point-to-point connections and establishing tools to build their technical skills to Frame Relay connections. manage, design, oversee and assess an enterprise's information security.

Financial Management

XBRL Foundation

The importance, benefits and challenges of electronic reporting.

The basic principles of using XBRL for enhanced reporting.

Key technical aspects including XBRL architecture, taxonomies and different specifications.

The impact of XBRL on data collection, validation, use and analysis, Operating System Linux V 1 & 2 Windows 10

This series covers the newest In this course, expert Jordan Hudgens developments in Windows 10 explores the fundamentals of the management and deployment. Students Linux operating system. As well as will learn about the primary features, giving an overview of Linux and the user experience and how to use the touching on its history and evolution, settings app and Cortana. Hudgens will tap into some key areas of Linux including the command line Installation, Storage, and interface, default tools, and managing processes. Finally, he will discuss le Compute with Windows Server 2016 and user management within Linux. This course explores system functions T his series covers how to install as well as managing les and Windows Server 2016 as well as how directories. Hudgens will discuss to navigate the storage and computing working with background jobs and protocols. Students will learn about installing packages from the command installing windows servers in host and line, as well as show the power of the computer environments and Linux Kernel including its exibility maintaining and monitoring server and how it runs the entire OS. Finally environments. Students will also learn he will walk through the shell how to implement storage solutions, programming language and custom Hyper-V virtualization, windows scripts, nishing up with creating containers and high availability. partitions Securing Windows Server

2016 VMware vSphere 6 T his training series focuses on how to s ecure Windows Server 2016 e nvironments. It covers methods and This series covers everything you technologies for hardening server n eed to know about the VMware environments and securing virtual vSphere 6.0 Ultimate Bootcamp. machine infrastructures using Shielded Students will learn about and encryption-supported virtual virtualization, planning and installing machines and Guarded Fabric. In ESXi, using tools to administer a addition, the series covers the VMware environment, vCenter Server protection of Active Directory and 6.0 and licensing, conguring identity infrastructure with the networking, conguring storage, VM Enhanced Security Administrative creation, conguration, and snapshots, Environment (ESAE) Administrative security and permissions, server and Forest design approach and the VM monitoring, advanced ESXi and management of privileged identities vCenter server management, using Just-in-Time (JIT) and Just- patching and upgrading ESXi, and Enough-Administration (JEA) disaster recovery and backup. approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). Operating System Identity with Windows Microsoft Networking with Server 2016 Windows Server 2016 This training series focuses on the identity functionality in Windows In this Course we will look at Server 2016. It covers the installation planning and implementing IPv4 and and conguration of Active Directory IPv6 networks, discussing Domain Services (AD DS), in addition fundamental aspects of networking to Group Policy implementation for and IP addressing schemes and non-Nano Server environments. It also understanding their structure and covers functionality such as Active subnets and the default gateway. This Directory Certicate Services (AD course covers more IPv4 and IPv6 CS), Active Directory Federations conguration. It will discuss Services (AD FS), and Web Application conguring IPv4 and IPv6 hosts and proxy implementations. the tools to use to do this and nally you will understand how to Configuring Windows Devices troubleshoot connectivity and also the complexities of transitioning from This series describes how to congure IPv4 to IPv6. In this course we'll take Windows devices. Students will learn a look at DHCP a TCPIP application a bout what's new in Windows 10 and layer protocol which simplies how to deploy it, conguring device assignment of IP address to manual settings, connecting Windows 10 to or static congurations. it provides networks, sharing data and printers, benets and less prone to error. one managing apps, securing Windows 10 mistake in an address or subnet mask devices, monitoring and maintaining will prevent a system from Windows 10, managing users in the communicating. Getting this enterprise, managing desktops and conguration correct is important applications in the enterprise, and and automatic address assignment is managing devices in the enterprise. a better approach

Microsoft Desktop Infrastructure This course begins with the basics of name resolution. Each system on the

In the course we will look at enterprise network has to have a valid IP desktops and the dierent stages of address. Instead of remembering their life cycle and then go over the www.google.com you'd have to process of the deployment in which we remember the IP address, which is setup an enterprise computer, why name resolution is important for including the installation of operating humans to more easily remember systems and all required applications. user friendly names. Finally DNS will Next we’ll review the various types of be covered. This course will begin deployment images that can be made with discussing Active Directory of a system. We’ll also go over the integration and the use of SRV various phases of preparing the records. Next Advanced Name operating system for the imaging Resolution and the options of capturing process conguring advanced Active Directory Settings. Finally DNS Troubleshooting will be covered. Service Management SIAM Foundation

Service integration and management (SIAM) is a management methodology applied when services are being sourced from a number of service providers; which is the case for many organisations.

Sourcing IT services from multiple service providers allows organisations to access to competitively priced, high quality service, giving them the time and resources to allow them to focus on their core business. However, if the right contracts are not in place, or the supply chain is not managed effectively, then organizations may struggle to get value from those service providers. This is where SIAM can help!

Having a team that understands the common language of SIAM will help everyone to align their goals to the those of the organisation and work together to find the best value for the business.

This fully accredited SIAM Foundation course provides an introduction to service integration and management. This includes its history, roles, business drivers,challenges and the processes that support SIAM models. Service Management

ITIL 4 Trails

ITIL 4 Trails provide a fun way to learn about ITIL 4. Learners follow a guided path and learn about ITIL 4 through a series of short learning interventions. Every module comprises of short 2-minute videos, interactive tutorials, exciting quizzes, exercises and downloadable podcasts. Participants can learn at their own pace, in their own time, engaging with the media format that best fits their learning behavior. Completing all 8 Trails, means the participant is ready to take on and pass the ITIL 4 Foundation exam.

The Four Dimensions of Service Management discusses the four perspectives that are critical to the efficient and effective facilitation of value for customers and other stakeholders in the form of products and services. These perspectives are: Organization and People, Information and Technology, Partners and Suppliers, and Value System and Processes.

As this is an ITpreneurs Pro learning product, it also means that the training program is enhanced with a case study (based on the famous Axle Car Hire story), pre- and post- course reading materials, and a set of quick reference cards. Service Management

ITIL v3 Foundation - Pro Full Course

ITIL v3 Practitioner - Pro Full Course

ITIL® is de facto best practice for IT Service Management and it is owned by AXELOS Onlive Live Instructor Training & On premise Training DIGITAL TRANSFORMATION DevOps Tehcnology Project Management Project Management Networking & Telecommunication Agile and Scrum Cloud Architect Microsoft 365 ISO Courses Digital marketing Soft Skills Office Products Human Resources These Courses are Delivered either Online or in a Classroom.

For details about the delivery mode and date of delivery Check our Academy Website: https://academy.vantisco.it/

For Corporate and Tailored Training you can Contact us on : [email protected] DIGITAL TRANSFORMATION

Blockchain Foundation Artificial Intelligence

The EXIN Blockchain Foundation Artificial Intelligence (AI) is a methodology certification validates a professional’s for using a non-human system to learn knowledge about blockchain as a ledger from experience and imitate human with potential as a worldwide intelligent behavior. The EXIN BCS decentralized record for the registration, Artificial Intelligence Essentials exam tests inventory, and transfer of assets. The a candidate’s knowledge and certification covers the basic concepts of understanding of the terminology and the blockchain, the potential fields of general principles. This syllabus covers the application, the potential value for the potential benefits; types of Artificial organization and the technology driving Intelligence; the basic process of Machine the blockchain. Learning (ML); the challenges and risks associated with an AI project, and the future of AI and Humans in work.

Data Centre Professional Certified Information Certified Data Centre Professional is designed to test a candidate’s Technology Manager understanding of the key components of data centers. This certification addresses Certified Information Technology Manager how to set up and improve key operations (CITM®) is designed to teach the skills, and maintenance aspects that are knowledge, and competencies required of a required to ensure high availability. modern IT specialist working at team-leader, supervisor or management level.

DIGITAL TRANSFORMATION

Cloud Technology

The CCC’s vendor-neutral certications are designed to enable IT professionals, to support vendor-specic technical training and/or generic IT best practices. IoT, Blockchain, Big Data, and Cloud principles bridge the gap between technical skills and the desired business outcomes encountered in practice.

Cloud Certifications

Cloud Technology Associate Certification Professional Cloud Administrator Certification Professional Cloud Developer Certification Professional Cloud Security Manager Certification Professional Cloud Service Manager Certification Professional Cloud Solutions Architect Certification

DIGITAL TRANSFORMATION

Internet Of Things Foundation Privacy and Data Protection Certification Essentials

The Internet of Things Foundation Privacy & Data Protection Essentials certification (IoTF) covers the basic has been created specifically to test concepts, terminology, and key candidates on their basic understanding of components of IoT. It explains the data protection in the context of the business perspectives of IoT including the General Data Protection Regulation advantages of early adoption and (GDPR), including the definitions, the monetization models. It further expands requirements to process data and the rights on the technologies enabling IoT and the of data subjects. The exam also covers various challenges to expect. Several how to organize data protection and the scenarios describe the use cases and practice of data protection. applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The certification provides future insights in IoT and forecasts the status of the connected world.

Cyber and IT Security

Foundation

T he ISACA CISM certification program is developed specifically for experienced information security managers and those Ethical Hacking Foundation who have information security management responsibilities. CISM is Ethical Hacking Foundation certification globally recognized as the leading provides IT professionals with a solid credential for information security understanding and technical knowledge of managers. Our CISM Certified the principles behind Ethical Hacking. The Information Security Manager course exam explains the different methods used to provides the student with the knowledge test and determine the security of the IT and proficiency to prepare for the globally infrastructure within an organization. recognized CISM certification exam. The CISM certification combines the achievement

DIGITAL TRANSFORMATION

VeriSM™ Foundation Certificate in Business Analysis VeriSM™ Foundation focuses on the Certificate in Business Analysis covers VeriSM™ model which emphasizes a range of fundamental knowledge the focus on value, on outcomes and needed for a business analysis role. an organization’s goals. It also This includes the roles and includes a unique management competencies required as well as mesh, the guidance for choosing the strategic analysis, business system, appropriate management practices to process modeling, and business case establish the product or service. It development. gives context to Service Management in the digital age and looks at how emerging technologies and progressive management practices can be applied to add value for the consumer.

Green IT Foundation

Green IT Foundation looks at how to implement sustainability practices in an organization. Candidates are shown Big Data Foundation where and how to apply green IT in their Service Management Processes. Certification They also learn how to apply the maximum amount of green IT solutions The CCC Big Data Foundation in their organization, and continuously Certification (CCC-BDF) is essential improve them. for everyone working with Big Data. This certification provides an understanding of Big Data, potential data sources that can be used to solve real-world problems, and an overview of data mining and its capabilities. Certification will help you become a Big Data Ready Professional DevOps

DASA DEVOPS FUNDAMENTALS

DASA DEVOPS FUNDAMENTALS Provides an extensive introduction to the core Agile DevOps principles covering the essential knowledge and skill competences that have been defined by DASA.

DevOps Fundamentals is the starting point for anyone involved in an Agile and/or DevOps team. Improved workflows and faster deployment start with a core understanding of DevOps fundamentals by all team members.

The DevOps Fundamentals Certification is designed to provide the core education necessary to build your DevOps vocabulary and to understand its principles and practices. With the help of key DevOps concepts and terminology, real life case studies, examples and interactive group discussions and extensive exercises in each module you will acquire a fundamental understanding of DevOps.

Project management

Project Management Professional (PMP)

What is the PMP? Wherever you are in your career, the globally recognized Project Management Professional (PMP) certification tells employers, peers, and the world you know what you’re doing in project management.

Even if “project manager” isn’t part of your title, the PMP applies to anyone who helps bring a project to completion. Just like a CPA validates expertise for accountants, the PMP recognizes your ability to manage projects—and the hard work you’ve done so far.

Why the PMP The PMP delivers value far into your career. CIO magazine ranked the PMP as the top project management certification because it proves you have the specific skills and experience employers seek. Certified PMPs report earning up to 25% more than non-certified project management professionals.

The Course is delivered 35 contact hours of

by a Certified PMP formal project Trainer. management education.

Agile Scrum Foundation

Agile Scrum Foundation offers professionals a unique certification that combines agile principles and scrum practices. The exam tests candidates on their understanding of key concepts and their application.

Who is this certification for? Agile Scrum Foundation is designed to test a professional’s fundamental understanding of agile principles and scrum methodology. It is especially useful for those leading or participating in projects. This certification is especially interesting for professionals who work in areas including project management, software development, IT service management and business management.

Networking & Telecommunication

CCNA (Cisco Certified Network Associate)

The Cisco CCNA program offers comprehensive associate- level training and certification focused on the solutions and technologies you need to implement and administer a broad range of modern networking and IT infrastructure.

Achieving CCNA certification is the first step in preparing for a career in IT technologies. To earn CCNA certification, you pass one exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles.

The new CCNA certification replaces the current CCNA certifications for:

CACgNiAle CSlcoruudm Foundation CCNA Collaboration CCNA Data Center CCNA Industrial CCDA CCNA Routing and Switching CCNA Security CCNA Service Provider CCNA Wireless

New exam goes live on February 24, 2020 Networking & Telecommunication

CCNP Data Center

The CCNP Data Center certification and training program offers comprehensive certification and Professional-level skills focused on the data center solutions, technologies and best practices to design, implement, and manage a modern data center infrastructure.

IT practitioners who are Cisco trained and certified are uniquely qualified for key roles in complex data center environments, with expertise utilizing technologies including policy-driven infrastructure, virtualization, automation and orchestration, unified computing, data center security, and integration of cloud initiatives. CCNP Data Center certified professionals are highly qualified for senior roles chartered with enabling digital business transformation initiatives.

SAoglilaer WScinrudms FCoeurntidfiaetdio nP rofessional

Becoming a SolarWinds Certified Professional® (SCP) helps ensure you have the technical expertise to effectively use and maintain SolarWinds® network and systems management products. Earn a SolarWinds Certified Professional certificate to improve your marketability as an IT professional and stand out from the crowd.

Networking & Telecommunication

What is 5G? The Next-Gen network explained

5G is the next generation of mobile broadband that will eventually replace, or at least augment, your 4G LTE connection. With 5G, you’ll see exponentially faster download and upload speeds. Latency, or the time it takes devices to communicate with the wireless networks, will also drastically decrease.

Networking Essentials Agile Scrum Foundation Networking is at the heart of the digital transformation. This course teaches the basic networking concepts and the skills that you can put to use right away. Its underlying principles can help you set-up a SOHO (small-office/home-office) network or even put you on the path to managing a larger- scale business network. Cloud Architect

Microsoft Azure Azure Solutions Architect Administrator Associate Expert

Azure Administrators implement, Microsoft Azure Solutions monitor, and maintain Microsoft Architects must have expertise in Azure solutions, including major compute, network, storage, and services related to compute, security so that they can design storage, network, and security. solutions that run on Azure.

Microsoft Certified Azure Data Engineer Azure Fundamentals Associate

This learning path is intended for Azure Data Engineers design and individuals who are looking to implement the management, build and validate overall monitoring, security, and privacy understanding of the AWS Cloud. of data using the full stack of This path is useful for individuals Azure data services to satisfy in technical, managerial, sales, business needs. purchasing, or financial roles who work with the AWS Cloud. AWS Architect

AWMSic Crolsoouft dA zPurrae ctitioner Administrator Associate This learning path is designed for solutions architects, solution This learning path is intended for design engineers, and anyone who individuals who are looking to wants to learn how to design build and validate overall applications and systems on AWS. understanding of the AWS Cloud. Build technical skills as you This path is useful for individuals progress along the path toward in technical, managerial, sales, AWS Certification. purchasing, or financial roles who work with the AWS Cloud. Microsoft 365

Microsoft 365 Certified Microsoft 365 Certified: Security Fundamentals Administrator Associate

Prove that you understand the Microsoft 365 Security options available in Microsoft 365 Administrators proactively secure and the benefits of adopting cloud Microsoft 365 enterprise and services, the Software as a hybrid environments, implement Service (SaaS) cloud model, and and manage security and implementing Microsoft 365 cloud compliance solutions, respond to service. threats, and enforce data governance. Microsoft 365 Certified: Enterprise Administrator Expert Microsoft Office Specialist: Expert (Office Microsoft 365 Enterprise 365 and Office 2019) Administrators evaluate, plan, migrate, deploy, and manage Demonstrate that you have the Microsoft 365 services. advanced skills needed to get the most out of Office by earning a Microsoft Office Specialist: Expert MCSE Productivity certification in multiple Office Solutions Expert program programs.

This certification validates that Microsoft 365 Certified: you have the skills needed to Enterprise Administrator move your company to the cloud, increase user productivity and Expert flexibility, reduce data loss, and improve data security for your Microsoft 365 Enterprise organization. This certification Administrators evaluate, plan, can be used to satisfy one of the migrate, deploy, and manage requirements to become a Microsoft 365 services. Microsoft 365 Certified Enterprise Administrator Expert ISO Courses

ISO/IEC 27001 Information Security

ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system. This framework serves as a guideline towards continually reviewing the safety of your information, which will exemplify reliability and add value to services of your organization

ISO/IEC 27032 Cyber Security

The international standard ISO/IEC 27032 is intended to emphasize the role of different securities in the Cyberspace, regarding information security, network and internet security, and critical information infrastructure protection (CIIP). ISO/IEC 27032 as an international standard provides a policy framework to address the establishment of trustworthiness, collaboration, exchange of information, and technical guidance for system integration between stakeholders in the cyberspace.

Risk Assessment Methods Cybersecurity Audit

Agile Scrum Foundation Understanding how to effectively Understanding how to effectively assess risk may be a challenge for assess risk may be a challenge for many industries. The risk many industries. The risk assessment methods: OCTAVE, assessment methods: OCTAVE, EBIOS, and MEHARI, will provide EBIOS, and MEHARI, will provide you with the sufficient knowledge you with the sufficient knowledge on how to successfully identify on how to successfully identify and assess risk in your and assess risk in your organization organization ISO Courses

Penetration Testing

Pen testing professionals are able to uncover different aspects of cybersecurity frameworks in the computer systems and provide detailed solutions to the cybersecurity risks. The goal of a Lead Pen Testinging Professional is to master a repeatable, and documentable penetration testing methodology that can be used in an ethical penetration testing.

Computer Forensics

Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective of finding any digital evidence that can be used for legal proceedings, but also to discover the cause of an incident. Computer forensics is the process of extracting data and information from computer systems to function as digital evidence for civic purposes, or in most cases to prove and legally impeach cybercrime.

Communications Security Agile Scrum Foundation Communications Security as a discipline, addresses the prevention of unauthorized access to telecommunications traffic or any information that is either transferred or transmitted in by electrical means. Communications Security serves as a protective shield for electronic emissions associated with sensitive information: a process involving the usage of specialized technical, operational and physical security measures. Hence, effective and secure communication can deliberately lead to creating trust for both internal and external parties within the organizational reach. ISO Courses

Digitalization and Electronic Archiving

Any document management project, whether for a public or private archive, needs to incorporate digitalization as an essential instrument to achieve an effective and secure electronic file management system. Digitalization and Electronic Archiving as a discipline, addresses the issues and trends in document and records keeping in the digital age. This involves digital curation, web archiving, personal information management and managing records in digital repositories. Hence, it covers the essential elements to know to tackle a project of digitalization and archiving of digital data, in particular, security techniques, the risks and the legal and regulatory issues of such a project, without forgetting the contractual and insurance aspects

Human Resources Security

By following the guidelines of this framework, organizations will be able to maintain a stable human resource management system that is suitable to their conditions and ensures the availability, integrity and confidentiality of the information related to human resources activities

ISO 22301 Business Continuity Management System

ISO 22301 enables you to respond effectively and promptly based on the procedures that apply before, during and after the event. Implementing a Business Continuity plan within your organization means that you are prepared for the unexpected. Business Continuity Plan assures you that your organization will continue to operate without any major impacts and losses. ISO Courses

Disaster Recovery

Disaster Recovery includes policies and procedures aimed at protecting an organization from human or naturally triggered disruptions on the IT infrastructure. It plays a significant role in the prevention of data losses, financial consequences, loss of trustworthiness and organizational reputation. A Disaster Recovery Plan includes the measures that an organization should take to swiftly recover its IT systems.

ISO 22317 Business Impact Analysis

This international standard is a technical specification which provides detailed guidance on how to establish, implement, and maintain a Business Impact Analysis (BIA) process. It does not suggest a uniform process for performing a Business Impact Analysis but assists the organization to design a BIA process that meets their requirements. Organizations cannot certify their BIA to ISO 22317; however, they can use it as a guidance to effectively implement a BIA process. ISO 22317 is the first and the only standard which solely addresses the Business Impact Analysis. It is designed to complement ISO 22301; nonetheless, it can be used as a stand-alone standard. The aim of Business Impact Analysis processes is to analyze the actual impact of a disruptive event on the organization.

Ethical Hacking

Ethical Hacking refers to the act of penetrating computer systems, networks or applications with the intention to exploit vulnerabilities that may lead to potential threats and risks. The main aim of Ethical Hacking is the improvement of the overall security of organizations by fixing the gaps and vulnerabilities found during penetration tests. Ethical hackers are allowed to use the same hacking techniques as malicious hackers with the permission of the organization which is to be tested.

Certified Financial Manager for IT Services

The objective of this training is to provide candidates with a way of acquiring practical skills that gives them an edge over other candidates. Certified Financial Managers for IT Services will have valuable financial information at their fingertips which will be employed to help organizations lower the cost of their IT Services, while simultaneously taking into account the quality and risk factors. ISO Courses

ISO 21001 Educational Organizations Management

ISO 21001 is an international standard developed by the International Organization for Standardization which provides management tools for organizations that offer educational products and services. It intends to help educational providers meet students requirements and needs. ISO 21001 is based on ISO 9001 - Quality Management Systems, but it provides a specific framework for educational organizations that aim to enhance the satisfaction of their learners by improving the educational processes and ensuring conformity to learners’ requirements. The standard can be applicable to all organizations that provide a curriculum for the development of knowledge, skills and attitudes by means of different lecturing methods. Outsourcing Trainings

In today’s world outsourcing has a significant role and value in organizations since it helps them to increase their efficiency, to mitigate risk and reduce their costs. Outsourcing refers to the acquisition of an organization’s products or services from external third-parties. ISO 37500 includes the main processes and phases of outsourcing, despite the size and sectors of the operating industry. The main aim is to provide an establishment to enable organizations to successfully outsource arrangements within the contractual phase.

ISO/IEC 38500 IT Governance

ISO/IEC 38500 provides principles, definitions, and a model to help the governing bodies understand the importance of Information Technology (IT).This standard is intended to help all types of organizations in evaluating, directing and monitoring the use of Information Technology (IT), regardless of the degree of IT usage. It consists of management practices and decisions associated with the current and future use of IT. The purpose of this standard is to promote an effective, efficient and acceptable use of IT in all organizations by informing and guiding governing bodies in governing the IT use and establishing an IT governance vocabular MS products Courses

Microsoft Office Word 2016 Core

Microsoft Office Excel 2016 Core

Microsoft Office PowerPoint 2016

Microsoft Office Access 2016

Microsoft Outlook 2016

Microsoft Office Word 2016 Expert

Microsoft Office Excel 2016 ExApgeirlet Scrum Foundation Microsoft Excel 2016 Data Analysis Microsoft Excel 2016 Data Analysis

Excel Statistics Essential Training

Microsoft Visio Business Application Crystal Reports Training

Crystal Reports is the ultimate business intelligence application. Used to design and generate reports, Crystal Reports can work with a range of data sources, including Microsoft Excel spreadsheets, Oracle databases, Microsoft SQL Server, Microsoft Access databases, Business Objects Enterprise, and Local file system information.

Crystal Reports training and certification provides a strong knowledge base for the following careers:

Crystal Reports Developer Database Developer Crystal Reports Writer Business Analyst

Salesforce Training

Salesforce.com has a friendly interface, which often hides just how complex the software can be. There are almost as many exceptions as there are rules, and the nuances can be difficult to pick up on without guidance.

Get your whole team of Salesforce users—including sales and support reps, marketing managers, and executives—up to speed quickly. Whether you're brand new or an experienced Administrator, get the core knowledge you need to get up to speed, perform at your best and get the most out of Salesforce. New Horizons offers the full suite of Salesforce.com training and certifications. Digital marketing

Modern Digital Marketing

Fundamentals of Digital Marketing

Social media Marketing

Google AdSense

Google Analytics

Web Marketing Specialist

Personal Branding

Soft Skills Courses

Communication skills Presentation skills

Negotiation skills Time management

Leadership management Body Language

Advanced Sales Emotional Intelligence

Public Speaking Creative Thinking

Business and Social Conflict Resolution Etiquette

Effective Business writing People Management Human Recourses

Career development and succession planning

Interviewing Skills

Learning and Development

HR Policies and Procedures

Performance Management

Agile Scrum Foundation Other Courses

Product Management and Development

Virtual Sales & E-Commerce

Product Launches and Go To Market

Android OS Evolution

People Management

Agile Scrum Foundation Game Kits and Simulations

The Phoenix Project DevOps seems to be the latest 'buzzword' and trend in the IT industry. Driven by the business need for ever faster deployment of new functionality and frustration with the time and effort it takes to get new systems into Operations. It is no longer a question of 'should we adopt DevOps' ,but 'when and how'. However DevOps represents a significant cultural and behavioral change and many organizations fail to address this in their adoption. This game can be used to help explore and understand DevOps, and to identify and agree concrete actions for adopting and deploying DevOps practices

The Phoenix Project for business Tehcnology If you want to run a short, quick DevOps simulation with a small team of managers from IT or Business. Game Kits and Simulations

UABpaonllQo 1- 3a ntr IaTin4IeTr™ g abmuseiness simulation

The simulation is designed for roles inside and outside of IT. Since this simulation is aimed at exploring and experiencing a new way of working this simulation does not require any specific knowledge to participate.

Employees of IT (Operations) teams can explore how an end-to-end way of working can make their work more enjoyable and better – and find their way in these new value streams.

IT managers and team leaders can learn how to implement the IT4IT principles in their own organization.

Development teams can experience how to integrate their work into the newT veahluce nchoalionsg yto maximize their efforts in line with business needs.

Business roles can learn how to manage the portfolio of programs and projects and make the right decisions to lower the IT costs and increase value to their customers. Project Management All roles can learn the importance of the end-to-end alignment and integration of data in an increasingly complex landscape of tools and frameworks. Game Kits and Simulations

CAhpaolllleon 1g3e t roafi Engeyr pgta -m Treaditional

Between 60 - 80% of projects fail to realize the required results. Despite the enormous amount of PM certificates in PMI or Prince2. This is generally not because of the lack of education or theory, but lack of understanding of how to translate theory into practice, or the lack of the right behaviors within the team. If you want to learn how to translate theory into practice, assess your project behavior and processes, and identify how to improve your project management performance, this simulation can help.

Tehcnology

The Challenge of Egypt – AGILE Project Management

theP rsiomjuelacttio Mn awnilla bgee cmusetonmti zed towards your own specific needs and learning objectives. But in general these are the main objectives:

Learn how to apply AGILE principles and processes. Learn how to create Customer Value in a dynamics Learn how to work together in a team focused on running an Agile project. Game Kits and Simulations

Apollo 13 trainer game

Many IT organizations are struggling to deliver quality services. Despite the massive investment in training, ITSM improvement initiatives are failing to deliver the hoped for value. The services are too unpredictable, unrepeatable, expensive and pose unacceptable business risks. The IT organization is still not Customer or Service focused. This simulation will help translate ITSM theory into practice, create buy-in and capture concrete improvement actions, helping to realize a customer focused culture and improve service quality..

Tehcnology

Apollo13 - ISM

This is the ISM variant of Apollo13, Learn about the ISM method and appProraochj,e Ecxtp Meriaencaeg heomw eton atp ply this ISM approach and increase ITSM performance. Based on Apollo13 - an ITSM case experience. Game Kits and Simulations

GArpaobll@o P13iz tzraainer game

70% of the IT departments are unable to demonstrate value to their business. The business and IT relationship is under strain, both parties blaming the other. IT is under increasing pressure to improve. New, disruptive technologies such as Cloud and social media, are emerging rapidly and businesses are demanding more and more IT. How can IT align with the business to ensure investments in emerging technologies deliver value, without negatively impacting existing services and capabilities? How can IT and business improve their relationship and gain a better understanding of each other? This simulation can be played by both business & IT people and can help create a better understanding and a shared commitment for improving business & IT alignment capabilities. Tehcnology Game Kits and Simulations

TAOpPoMlloe e1t3i ntrgainer game

Project organizations are continually faced with too many projects and too few resources. Continually changing project demands. Project organizations must learn to balance these demands and quickly and effectively allocate resources, manage projects to deliver value. In this simulation a team must manage multiple projects, facing unforseen set-backs, changing business and market demands. The team must demonstrate control, present information and proposals for balancing demands and priorities and steer on realizing project value and mimizing business risks.

2020 Change is the norm. Financial pressures, globalizations, increasing and changing consumer and customer demands are forcing many organizations to initiate complex programs of change, requiring a need to also manage the organizational aspects of creating buy-in, overcoming resistance and embedding new ways of working into existing operational departments and teams. Most changes fail to realize their aims, most meet with resistance and delays, creating frustration, wasted time, effort, energy and costs and a demotivated work force. This simulation will help you develop the capabilities to effective manage organizational change. Game Kits and Simulations

ACpaorWlloo 1r3k strainer game

Words like LEAN, LEAN SIX SIGMA, AGILE are words we hear often. But what do they mean? How can they help to both reduce wastage & costs and improve the performance of your organizations processes and your teams. Time to market is crucial at this moment to stay ahead of the competition. Reducing costs and wastage is important in a climate of financial uncertainty. The need to align with and deliver value to customers is a must have capability. If you want to learn how to achieve this through effective process improvement approaches and improved team capabilities then this simulation can teach you how.

The Greatest Move

The rapidly changing global market and increased competition is forcing many organizations to reengineer and design new processes to become more agile, to drive out costs or to become more customer driven. However many organizations fail to gain the hoped for results from investments in Business Process Management (BPM) and process reengineering initiatives.This simulation will teach you the critical success factors to ensure your initiative succeeds. Helping bring people together, create dialogue, buy-in, shared understanding and capture concrete improvement initiatives. Vantisco Languages Center

Group Online Language Classes Vantisco Language center is the ideal option to fit around your busy life. We offer live, online language class that allows you to learn at home or in the office, on your own personal schedule.

Learn a language online

In Vantisco’s Language Center you’ll be taught by Professional, native Speakers online language tutors in real-time. It is personal, convenient, cost-effective and keeps you motivated with consistent reporting so that you can track your progress. Group sizes are small to allow for a tailored experience as well as increased engagement with group members.

The Program Includes: Top benefits of our online language • Small group class size (5 to 8 classes: students), online learning environment • Learn with a live instructor wherever – learn anywhere you have a stable you are. internet connection • Get immediate feedback • Pre-course orientation to Vantisco’ s • Practice online with a group and your Classroom set-up, process and instructor at a more affordable cost platform interface • Track your progress in real-time • Recorded sessions for further • Our Courses are based on the practice and review Common European Framework of • Schedule 1: 10 weeks, 120-minute Reference for Languages (CEFR) is an sessions, twice per week (20 hrs. international standard for describing Course) language ability. It describes language • Schedule 2: 20 weeks, 120-minute ability on a six-point scale, from A1 for sessions, twice per week (40 hrs. beginners, up to C2 for those who have Course) mastered a language. • Digital materials

if you are looking for a private language Classes customized according to your needs you can reach us : [email protected] Vantisco Languages Center

Group Online Language Classes

Spanish Language with Adela Alonso, Patricia Bauer and Cindy Centeno

Italian Language with Alice Pilotto and Caterina Imola

French Language with Isabel Ojea, Sara Eisa and Marie-Laure

German Language with Johanna Müllerschön, Violetta Los,, Katarina Obradovic, Patricia Bauer and Menna Hossam.

Russian Language with Violetta Los and Liza Zhitnikova

English Language with Alice Pilotto

Japanese Language with Atsuko Numazawa

Chinese Language with Rosa Lu and Danny

Korean Language with Soona Lee

Arabic Language with Rana Makhlouf (lavent) and Samar Mohamed (Egyptian)

Greek Language with Samar Mohamed

Turkish Language with Leyla Turkman

Portuguese Language with Giulia Conci and Flavia Troiano Vantisco Languages Center

Classroom Languages Classes Only in Milan, Italy

Languages that we teach:

English based on Cambridge curriculum.

Location: - Via Caldera, 21, Edificio F (Palazzina Servizi / Easypoint), 1 ° piano, Milano

- V PIETRO PALEOCAPA 7 MILANO

CIRCA IL CORSO

Questo corso di livello 1 (QCER A1) copre tutte le competenze: ogni unità prevede una sezione di grammatica, lessico, pronuncia, ascolto, lettura, scrittura e soprattutto si concentra sul parlato.

Time to speak e Real-world strategy sono due attività durante le quali metterete alla prova le vostre capacità decisionali e di risoluzione dei problemi.

In più tante attività da svolgere direttamente sul vostro smartphone a casa e durante la lezione con esempi creati da veri studenti di tutte le nazionalità.

Let’s Evolve! Vantisco a Company Registered in Milano, Italy No: MI-2128772 and VAT no. 10026760966

Via Pietro Paleocapa 7, 7th floor, Milan Italy

Phone: +39 02 8736 8316 FAX: +39 02 9544 1319

E-Mail: [email protected]