Scrum for Executives
This instructor-led class is intended to answer three questions commonly asked by executives, managers, and other decision makers: What is Scrum? Why should I care? and What will be expected […]
Scrum for Stakeholders
This instructor-led class is intended to answer three questions commonly asked by Stakeholders: What is Scrum? Why will Scrum be better for me? How will I work differently going forward. […]
Scrum for Product Owners
This one-day course will help take your team and project to the next level. Using a combination of lecture, demonstrations, hands-on activities, and team-based exercises, attendees will experience how to […]
Managing Projects using Scrum
This one-day course will help take your team and project to the next level. Using a combination of lecture, demonstrations, hands-on activities, and team-based exercises, attendees will experience how to […]
DP-100: Designing and Implementing a Data Science Solution on Azure (ESI)

Data Scientist is the central role in developing machine learning models. This role is responsible for solving the business problem that initiated the project. While the Data Engineer will prepare […]
AZ-500: Microsoft Azure Security Technologies (ESI)

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security […]
Moving Up to Modern C++: An Overview of C++11/14/17
This introduction to Modern C++ surveys additions to the C++ language introduced in C++11, C++14 and C++17, featuring support for Increased code clarity (lambdas, uniform initialization, auto, new OOD control) […]
AZ-400: Designing and Implementing Microsoft DevOps Solutions

This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an […]
AZ-500: Microsoft Azure Security Technologies

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security […]