
Scademy
Scademy guides you through the complexities of advanced tech solutions with expert-led courses in Cyber Security, AI, and Quantum Computing.
AI for Software Developers
SCA-AI-301
Curious about the potential of AI in software development? Participants of this course will gain a comprehensive understanding of AI coding assistants, prompt engineering, and practical applications through hands-on exercises and real-world case studies. As they progress, participants will employ AI-assisted tools to build an application utilizing the building blocks mastered throughout the program.
AI Fundamentals
SCA-AIF-201
Embark on an exciting journey to explore the potential of AI in everyday work with our comprehensive AI Fundamentals course. This immersive two-day training program is designed to equip AI enthusiasts with an in-depth understanding of AI assistants, their functionalities, and their transformative potential in optimizing workflows and business processes.
AI in Product Development
SCA-AIPD-301
Curious about the potential of AI in product development? Participants of this course will gain a comprehensive understanding of AI coding assistants, prompt engineering, and practical applications through hands-on exercises and real-world case studies. As they progress, participants will employ AI-assisted tools to build an application utilizing the building blocks mastered throughout the program.
AI Robotics
SCA-AIR-301
This intensive course on AI Robotics is designed to immerse participants in the cutting-edge field of robotics, blending foundational knowledge with practical, hands-on exercises. Learners will explore the crucial intersection of hardware and software, understanding how AI connects to robotics and the current landscape. Participants will comprehensively understand how robots perceive and interact with their environment.
C# and Web Application Security
SCA-CWAS-301
Writing .NET web applications can be rather complex - reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This course will change the way you look at code. A hands-on training during which we will teach you all of the attackers' tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.
C# and Web Application Security Master Course
SCA-CWASM-501
As a developer, your duty is to write bulletproof code. However, what if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This combined course will change the way you look at code. A hands-on training during which we will teach you all of the attackers' tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.
Go and Web Application Security
SCA-GWAS-201
Web and mobile applications are built from multiple components, but one statement is true for most of them: they need a backend. Since the performance of Go is on par with C, but its design and syntax are much more developer-friendly, it is a popular choice for backend development. However, with great power comes great responsibility.
Java and Web Application Security
SCA-JWAS-301
Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed? This course will change the way you look at your Java code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself.
Java and Web Application Security Master Course
SCA-JWASM-501
Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed? This course will change the way you look at your Java code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We cover typical Web vulnerabilities with a focus on how they affect Java web apps on the entire stack – from the Java runtime environment to modern AJAX and HTML5-based frontends. In addition, we discuss the security aspects of the Java platform itself as well as typical Java programming mistakes you need to be aware of. We present the entire course through live practical exercises to keep it engaging and fun.
Network Security and Secure Communication
SCA-NSSC-301
Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity.
Node.js and Web Application Security
SCA-NWAS-201
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
OWASP Top 10, Secure Coding Fundamentals
SCA-OWASP-201
Writing web applications can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?
Quantum Communication
SCA-QC-301
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents. The course covers the fundamental concepts of quantum communication, including the properties of qubits and quantum registers, the manipulation of quantum states through quantum gates, and the principles and implementations of quantum key distribution.
Quantum Computing Fundamentals
SCA-QCF-301
As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents. This comprehensive course is designed to provide participants with a thorough understanding of the fundamental principles and practical applications of quantum computing.
Security Testing
SCA-ST-301
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Web Application Security
SCA-WAS-301
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? This Web application security course will change the way you look at code. A hands-on training during which we will teach you all of the attackers' tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.
