Training

IT training and more

CloudTeam is one of the leading IT training centres in Poland that specialises in cloud computing at Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP). The scope of training services also includes other solutions offered by Microsoft, Citrix, Veeam, VMware and DASA.

Thanks to cooperation with our partners we offer training in the field of IT, but also GDPR, business skills, management and project management methodologies.

Operating nationwide and on-line, we provide a comprehensive service to support your organisation in preparing employees to effectively use cloud platforms.

We offer remote training (vILT), in a hybrid model and traditional onsite training (ILT). Our services are based on the SUS 2.0 Training and Development Services Standard, which allows us to provide top-class training services and add our training programmes to the Development Services Base (BUR) run by the Polish Agency for Enterprise Development (PARP).

Suggestions for the training program

Business models of enterprises during the green transition

Training Program:

  • Current business models
  • Trends in the business market
  • ESG, circularity - what it is, why it is important
  • Business strategies
  • Trends, Analysis, Legislation
  • Examples of business transformation
  • The future of business
  • Analysis of the business strategy of the selected business - practical part
  • Development of transformational models - practical part
  • Presentation of the idea - practical part

Training Program:

Stage 1: Awareness (what is the awareness stage; introduction; impact of transformation; characteristics of the transformation leader and team; examples of transformation in this category; activities to complete the awareness stage)

Stage 2: targeting (what is the targeting stage; objects and types of transformation activities; criteria for entering transformation; recommended content and services to help with transformation; how to use expertise; activities to complete the targeting stage)

Stage 3: Planning (what is the planning stage; looking for milestones; tools to help with planning; developing a roadmap; looking for funding; actions to complete the planning stage)

Stage 4: testing (what is the testing stage; testing process; forms of testing; entities conducting or supporting testing, activities to complete the testing stage)

5. stage: implementation (what is the implementation stage; implementation process; entities leading or supporting implementation; potential implementation problems)

EU green transformation regulations for businesses

Training Program:

  • European Union guidelines on sustainable economy and sustainable financing (among others: CSRD - Corporate Sustainability Reporting Directive; European Commission Guidelines for Reporting Non-Financial Information: Supplement on Reporting Climate-Related Information)
  • The European Commission's action plan in the area of sustainable growth as an implementation of the Green European Deal standard (e.g., expectations for companies to reorient their activities regarding sustainable financing; Taxonomy as a guideline for building a sustainable economy in the EU - practical aspects)
  • Planned regulations, guidelines, current status of work - presentation and discussion of available information and materials

Training Program:

  • Reporting sustainability issues in the context of the EU Sustainable Finance Framework
  • Corporate Sustainability Reporting Directive (Scope; Covered entities and important deadlines; Key changes to the Non-Financial Reporting Directive)
  • Reporting according to Article 8 of the Taxonomy (Discussion of key performance indicators; Approach to calculating key performance indicators - examples; Qualitative information)
  • EU standards for reporting sustainability issues (Reporting framework - discussion of each category of standards; Double materiality principle as part of defining the scope of disclosure; Discussion of sample indicators)
  • Step-by-step report preparation process (Plan and carry out the report preparation process in accordance with EU regulations)
Green Cloud - the role of cloud technologies in business transformation

Training Program:

  • Presentation of the essence of modern information systems, their role in business and everyday life.
  • Discuss the information system architectures in use today
  • Explain the concepts of virtualization and cloud computing
  • Discussion of virtualization issues, an overview of available technologies and a detailed discussion of selected ones, with application examples and tasks to be performed by the course participant.
  • Implementation of selected services in a publicly accessible environment.
  • Deployment and migration strategy for cloud computing.
  • Security issues in the cloud model
The use of artificial intelligence (AI) and data analytics in the context of Industry 4.0

Training Program:

  • Machine learning, artificial intelligence and the role of advanced analytics in Industry 4.0
  • How to effectively run advanced analytics projects
  • Practical discussion of the basics of data analysis
    • Data, distributions, relationships
    • Data summary
    • Comparing groups
    • Correlation vs. causation
  • Application overview
    • Detecting dependencies and hidden causes
    • Predictive Maintenance
    • Predicting process outcome and optimization
    • Virtual measurement system (Soft sensor)
  • Data preparation
    • Data quality
    • Detection of erroneous and unusual observations
    • Handling data gaps
    • Transformations
  • Process monitoring: detecting changes and trends
  • Modeling relationships between variables
  • Detecting changes and anomalies from multidimensional data

Training Program:

  • Technologies and concepts to support building a Data-driven organization - from self service to enterprise scale analytics.
  • Systems integration and data flow.
  • From data to information or BI in practice.
  • Data management and data quality.
  • Artificial Intelligence Technology.
  • Examples of machine learning algorithms:
    • decision trees
    • neural networks.
  • Data Science and Model Development in Practice.
  • Effective implementation of AI solutions in the organization.
  • What is Data Governance?
    • The Idea of Data Governance
    • Data Management
    • New posts
    • What does "arranging" the data provide?
  • Artificial intelligence in organizations:
    • Effective implementation
    • Maintaining solutions
  • AI deployment and solution maintenance process (ML Operations).
  • Legal aspects of data use.
  • Case study:
    • The application of artificial intelligence in Industry 4.0,
    • Anomaly detection and predictive maintenance,
    • Forecasting,
    • What-if analysis.
Sustainable project management

Training Program:

  • Introduction. GPM
  • Principles for sustainable projects
  • CSR - Corporate Social Responsibility
  • Sustainability vs CSR
  • Sustainability:
    • introduction
    • global sustainability challenges
    • Triple Wire Rope
    • Models of sustainable development
    • An example of sustainable design and product development
  • Closed loop economics
  • UN Global Compact
  • Sustainability reporting
  • UN Sustainable Development Goals (SDGs)
  • Project and project management
  • Project within the organization
  • Product range and working range
  • Contents of the project plan
  • Fundamentals of methodology and project life cycle:
    • PRiSM Philosophy
    • Phases and stages of phases in the PRiSM
  • Business case
  • P5 impact analysis
    • Impact on society
    • Environmental impact
    • Economic impact
  • Design and requirements document
  • Sustainability Management Plan (SMP).
  • Criteria for project success
  • Preparation before the exam
  • GPM-b exam
Digital transformation in relation to universities

Training Program:

  • the concept and stages of building a digital transformation strategy
  • Digital maturity of the enterprise and the factors shaping it
  • diagnosis of the level of digital maturity
  • The organization's value chain and the elements where implementing digital transformation can have the greatest impact
  • Digital transformation roadmap and the principles of its preparation
  • Business continuity of the organization in the process of digital transformation
  • Building the organization's digital transformation strategy, goals and metrics for its implementation
  • Activities to increase digital maturity in strategic areas
  • Potential risks in the implementation of the digital strategy, solutions to ensure the mitigation of these risks
  • Digital strategy implementation plan and its communication to employees
  • Communicating changes in the company to employees, selection of channels, techniques and content of messages
  • Presenting the digital transformation strategy, explaining its goals and projected results of implementations

Training Program:

  • Basics of i-management
  • Human collaboration with technology
  • Technologies to support employees
  • Data collection and visualization
  • Digital transformation in management (case study)
  • Communication in a virtual environment
  • Cloud solutions
  • Digital leadership
  • Workshop
Cyber Security

Training Program:

  • Cyber security basics
    • Introduction to cyber security: definition, meaning and current threats.
    • types of cyber attacks: malware, phishing, ransomware, DDoS attacks, etc.
    • Basic concepts related to cyber security: confidentiality, integrity, availability, secrecy, non-repudiation.
    • Regulators and standards related to cyber security: GDPR, ISO 27001.
  • Network security
    • Threats associated with computer networks.
    • Network architecture and principles of secure network design.
    • Firewalls: types, configuration and management.
    • Securing wireless networks: authentication, encryption, MAC address filtering.
    • Password and authorization management: rules for creating strong passwords, managing user accounts.
  • Security of operating systems
    • Updates to operating systems and applications: importance and procedures.
    • Antivirus and antimalware: installation, configuration and system scanning.
    • Secure use of the system: rules for creating user accounts, managing permissions.
    • System monitoring: logs, security event analysis, anomaly detection.
  • Application security
    • Penetration testing: principles, tools, and techniques.
    • Protection against SQL injection and cross-site scripting attacks.
    • Web application security: input filtering, session security, data validation.
    • Mobile application security: authentication, data encryption, privilege management.
  • Incident management and attack response
    • Incident response planning: creation of procedures, response teams.
    • Security event analysis: tools and techniques for identifying and analyzing attacks.
    • Incident response: isolating systems, recovering data, restoring operations.
    • Security audit: review of systems, assessment of security compliance.
  • Security policy and user awareness
    • Creating a security policy: goals, principles, and procedures.
    • Training for employees: education on safe use of technology.
    • Risk management: risk assessment, incident management, business continuity planning.
    • Cloud security: risks and best practices associated with cloud services.

Understanding basic safety rules

  • Confidentiality; integrity; availability; threat and risk impact; principle of least privilege; social engineering; attack surface analysis; threat modeling

Understand a company or organization's cyber security structures, processes and audits

  • Areas of specialization in cyber security; roles on the security team; cyber security audits; resources and internal and external audits

Understanding physical security

  • Facility security; computer security; removable devices; access control; mobile device security; keyloggers

Understanding Internet security

  • Browser security settings; secure websites

Understanding wireless security

  • Advantages and disadvantages of specific types of security; Keys; SSIDs; MAC filters.

Understanding computer security

  • Understanding user authentication
  • Multi-component authentication; physical and virtual smart cards; Remote User Authentication Service (RADIUS); biometrics; use of "Run As" option, to perform administrative tasks

Understanding the powers

  • File system permissions; sharing permissions; enabling and disabling inheritance; behavior when moving or copying files on the same drive or to another drive; multiple groups with different permissions; basic and advanced permissions; taking ownership; delegation; inheritance; the importance of Registry and Active Directory;

Understanding password policies

  • Password complexity; account lockout; password length; password history; time between password changes; enforcement via group policy; common attack methods; password reset procedures; password protection for domain user accounts

Understanding the principles of protocol

  • Types of protocols; what can be logged; enabling logging; what to log for specific purposes; where to log information; how to secure information

Understanding encryption

  • File Encryption System (EFS); impact of EFS-encrypted folders on file transfer / copying; BitLocker (To Go); TPM; software-based encryption; email encryption and signing; virtual private network (VPN); public key / private key; encryption algorithms; certificate properties; certification services; PKI infrastructure / certification services; hardware tokens, restrict devices to run only trusted applications

Understanding malware

  • Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; back doors; zero day attacks

Understanding dedicated firewalls

  • Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software-based firewall; state and stateless inspection

Understanding network isolation

  • Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation

Understanding protocol security

  • Protocol spoofing; IPsec; tunneling; DNSsec; network eavesdropping; DoS attacks; common attack methods

Understanding the protection of client stations

  • Antivirus; protection against unwanted software installations; User Account Control (UAC); client operating system and client software updates; offline folder encryption; software restriction rules; principle of least privilege

Understanding email security

  • Anti-spam, anti-virus software, spoofing, phishing and pharming; Client protection vs. server protection; Sender Policy Framework (SPF) records; PTR records

Understanding server protection

  • Unbundling of services; hardening; server updates; secure dynamic domain name system (DNS) updates; deactivation of unsecured authentication protocols; read-only domain controllers (RODCs)

CloudTeam is the only training company in Poland that belongs to the prestigious Leading Learning Partners Association (LLPA).

The LLPA brings together 33 IT training companies operating in Europe, Africa, South America and Australia. Membership in the LLPA requires meeting very strict criteria. The organisation accepts only the most innovative training centres from each country, demanding the highest level of service and the best marketing and sales competence.

Thanks to the membership in the LLPA, CloudTeam has the opportunity to exchange knowledge, resources and specialisation with the best and the biggest IT training companies in Europe in order to achieve the most complete package of offered training to meet the rapidly growing needs of the IT industry in Poland.

The LLPA received the Microsoft Partner of the Year - Learning Award in 2020. The award was given for providing exceptional learning solutions and services around the world.

Do you want to check out what we offer?