
This course provides a comprehensive introduction to securing CI/CD systems and enables participants to implement secure systems right from the start.
more infoThis course provides a comprehensive introduction to securing CI/CD systems and enables participants to implement secure systems right from the start.
more infoJoin our free webinar on Wednesday, May 7, 2025, from 12:00 to 1:00 PM, and engage in a discussion on software architecture with us.
more infoThis course provides an overview of the fundamentals of quantum mechanics, quantum gates and circuits, as well as quantum programming. It also covers key algorithms and application areas. The course starts on March 17, 2025.
more infoThis course provides an overview of the German certification framework, explores key concepts of the Common Criteria (CC) standard, and outlines the necessary activities for manufacturers. New dates will be announced soon.
more infoLearn how to tackle mobility challenges with Eclipse MOSAIC. Join our informative, free webinar on March 20, 2025, from 12:30 to 1:30 PM (CET, UTC+1).
more infoThis course covers the fundamentals of audio/video encoding, concepts and formats related to adaptive bitrate (ABR) streaming, and digital rights management (DRM). Dates will be announced soon or can be arranged individually.
more infoOur basic workplace data protection training helps you act in compliance with legal and data protection regulations, avoiding warnings and fines. The start date is flexible, and the training can be completed anytime and anywhere.
more infoThis webinar provides an overview of security testing methods, criteria for selecting testing techniques, key elements of the security testing process, individual test steps, and their role in the development lifecycle.
more infoThis course covers security testing methods, criteria for selecting security testing techniques, individual test steps, and their role in the development lifecycle. Dates available upon request.
more infoPrepare for the Cyber Resilience Act! After completing this course, you will be able to select, plan, execute, and analyze key activities within a security process. Please contact us for a customized offer.
more info