Course Catalog

Cancel
  • Person mit Brille arbeitet am Laptop in einem Serverraum.
    © istock / anandaBGD

    Prepare for the Cyber Resilience Act! This course covers the fundamental principles of security testing and optimization through risk management.

    more info
  • Person sitzt auf einem Skateboard im Freien und arbeitet konzentriert am Laptop, überlagert von mathematischen Formeln
    © iStock / RossHelen

    Digital transformation refers to profound changes driven by digital technologies. This training provides foundational knowledge and tools to help organizations navigate transformation and leverage innovation.

    more info
  • Detailansicht eines Quantencomputers mit Kühlstruktur und Kupferverkabelung
    © Adobe Stock / Bartek

    This course provides an overview of the fundamentals of quantum mechanics, quantum gates and circuits, as well as quantum programming. It also covers key algorithms and application areas. The course starts on March 17, 2025.

    more info
  • Autoproduktion in moderner Fertigungshalle
    © istock/3alexd

    This course provides an overview of the German certification framework, explores key concepts of the Common Criteria (CC) standard, and outlines the necessary activities for manufacturers. New dates will be announced soon.

    more info
  • Person arbeitet konzentriert an einem Computer in einem hellen Büro
    © iStock / alvarez

    This course covers the fundamentals of audio/video encoding, concepts and formats related to adaptive bitrate (ABR) streaming, and digital rights management (DRM). Dates will be announced soon or can be arranged individually.

    more info
  • Eine Person mit Kopfhörern arbeitet an einem Tablet.
    © iStock / nensuria

    Our basic workplace data protection training helps you act in compliance with legal and data protection regulations, avoiding warnings and fines. The start date is flexible, and the training can be completed anytime and anywhere.

    more info
  • Zwei Personen arbeiten gemeinsam an einem Bildschirm
    © iStock/ skynesher

    This webinar provides an overview of security testing methods, criteria for selecting testing techniques, key elements of the security testing process, individual test steps, and their role in the development lifecycle.

    more info