• SCADEMY

  • AI for Software Developers

    3 days
    Curious about the potential of AI in software development? Participants of this course will gain a comprehensive understanding of AI coding assistants, prompt engineering, and practical applications through hands-on exercises and real-world case studies. As they progress, participants will employ AI-assisted tools to build an application utilizing the building blocks mastered throughout the program.

    Submit an Inquiry
  • AI Fundamentals

    2 Days
    Embark on an exciting journey to explore the potential of AI in everyday work with our comprehensive AI Fundamentals course. This immersive two-day training program is designed to equip AI enthusiasts with an in-depth understanding of AI assistants, their functionalities, and their transformative potential in optimizing workflows and business processes.

    Submit an Inquiry
  • AI in Product Development

    3 days
    Curious about the potential of AI in product development? Participants of this course will gain a comprehensive understanding of AI coding assistants, prompt engineering, and practical applications through hands-on exercises and real-world case studies. As they progress, participants will employ AI-assisted tools to build an application utilizing the building blocks mastered throughout the program.

    Submit an Inquiry
  • AI Robotics

    3 days
    This intensive course on AI Robotics is designed to immerse participants in the cutting-edge field of robotics, blending foundational knowledge with practical, hands-on exercises. Learners will explore the crucial intersection of hardware and software, understanding how AI connects to robotics and the current landscape. Participants will comprehensively understand how robots perceive and interact with their environment.

    Submit an Inquiry
  • AI Security

    3 days
    The evolving world of artificial intelligence (AI) brings both opportunities and risks. To protect assets, organizations must understand how to secure their AI systems. This in-depth course delves into the AI security landscape, addressing vulnerabilities like prompt injection, denial of service attacks, model theft, and more. Learn how attackers exploit these weaknesses and gain hands-on experience with proven defense strategies and security APIs.

    Submit an Inquiry
  • Angular, React and Front-end Security Follow Up

    1 Day
    This course is the next step for our participants, who completed either our OWASP Top 10, Java Secure Coding or C# Fundamentals course. This is a follow up training, meaning that in order to attend this, everyone must already have the knowledge that is covered in the Fundamentals.

    Submit an Inquiry
  • C# and Web Application Security

    3 Days
    Writing .NET web applications can be rather complex - reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • C# and Web Application Security Master Course

    5 Days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?

    Submit an Inquiry
  • Go and Web Application Security

    2 Days
    Web and mobile applications are built from multiple components, but one statement is true for most of them: they need a backend. Since the performance of Go is on par with C, but its design and syntax are much more developer-friendly, it is a popular choice for backend development. However, with great power comes great responsibility.

    Submit an Inquiry
  • Java and Web Application Security

    3 Days
    Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025