name,description,duration,Category
Agile - what is it all about,Challenging the Agile Manifesto (some would call it the bible of the agile community..) and revealing what is the REAL meaning of agile. Does it align with YOUR team process?!,1.5 hours,Misc. Courses
The notorious 9 cloud computing threats,Cloud Computing presents major opportunities and benefits for the organization worldwide. It is scalable; flexible and efficient. But along with those major advantages; comes the threats. Most Cloud Computing threats and risks are well documented; but we are missing information regarding how those threats can be put into practice in the real world; what are the attack vector used and what is the risks and results for those events. In the presentation we will elaborate the notorious nine Cloud computing threats as described by the Cloud Security Alliance; and for each threat we will provide recent examples for known incidents; the attack vectors used and the damage resulted from the incident. By understanding the risks and case studies; we can better prepare our organization for cloud adoption.,2 hours,Cyber
CISO Challenges in Cloud Security,In this presentation we will review the challenges CISO from different verticals are facing with cloud computing. We will analyze the different verticals based on their cloud adoption and elaborate on the challenges when increasing cloud adoption.,2 hours,Cyber
How to sell cloud services to security guys,Pitching your SaaS offering is usually fun; until the security guys walks into the room as anyone who try to promote cloud services to organizations probably knows. On the other hand for the CISO sometimes cloud vendors represent the sum of all their greatest fears. So how can providers of cloud based software do better job in satisfying those gate keepers? Learn to speak their language and understand their terminology and way of thinking. In this presentation we will walk through the do's and don'ts when pitching to information security professionals and try to better understand their motivation and how to address their concerns.,2 hours,Cyber
Cloud Security for startups,Infrastructure as a Service can do amazing things for your business - providing young companies access to enterprise level infrastructure with flexibility and ease of use. But the very same advantages of the cloud also possess the greatest threats. The centralization of controls; resources polling and automation capabilities can act as two edged sword if not maintain correctly. In the presentation we will review the challenges facing IaaS consumers; overview important IaaS security features inside OpenStack and other platforms and list the important attack vectors to look out for.,2 hours,Cyber
Git basics,Basic commands and version mangement,3 hours,Misc. Courses
AI in an approachable way,AI is everywhere. We get it. But still many managers (Non-techy) can't understand how they can harvest the enormous leap we did in the field of AI to their own companies or organizations. In order to help people better understand what is AI we have built a special lecture that will give you the whole picture of this important topic. In this lecture you will learn the basics terms of AI; you will be introduced to all the latest technologies in the field and finally you will examine real use cases from global brands that used AI as part of their strategy.,1.5 hours,Misc. Courses
Advanced data anslysis using Tableau,Tableau is considered one of the world's leading tools for data analysis and data visualization and is widely used in the Israeli market. Its ease of use is unmatched and users can generate complex business reports even without a significant mathematical / statistical background.,2 hours,Big Data
Data analysis using Power BI,The Power BI platform is considered Microsoft's flagship in the field of business intelligence. In this workshop participants will see how to import data from a huge variety of sources. They will design and adapt it to their needs and develop a variety of reports - from simple reports to interactive dashboards that are updated at the click of a button - all in a convenient and modern interface.,2 hours,Big Data
Unit testing,Ready to get your feet wet with unit testing? This squeeze-course is for the beginners who want to learn what unit testing is all about. In this squeeze-course we'll cover the following topics: <br/><ul><li>What is a "Unit"</li><li>How unit testing fits into a whole testing strategy</li><li>Unit testing in different environments</li><li>How it fits into continuous integration and deployment </li><li>Frameworks for unit testing and what they give us</li><li>Best practices for unit testing</li></ul>,2 hours,QA
Mocking,You already know about test frameworks right? it's time to learn about the other essential part of unit testing - mocking. In this squeeze-course we'll cover the following topics: <br/><ul><li>What is mocking</li><li>Why we need mocking</li><li>Scenarios where mocking is needed (and not)</li><li>Types of mocking</li><li>Mocking frameworks</li><li>Pros and cons of using mocks</li><li>How to use mocking effectively</li></ul>,2 hours,QA
TDD,Test Driven Development (TDD) is not really about testing - it's a whole new way to write code using tests. The code is clean and arranged in orderly manner and most of all - covered by tests! This squeeze-course is highly-interactive. In this squeeze-course we'll cover the following topics: <br/><ul><li>What is TDD</li><li>Where did it come from</li><li>The rules of TDD</li><li>How TDD affects testability and design</li><li>When to use it (and when not)</li><li>Go through cycles of refactoring of both code and tests for improvement.</li></ul>,2 hours,QA
Spring Testing,Spring and Spring Boot are excellent frameworks that were built with testing in mind. In this squeeze-course we'll discuss the basic testing functionality and how to use it.,2 hours,QA
REST API Testing with Spring,If you already know the foundations for writing tests with Spring - it's time to move on to testing REST APIs of controllers in Spring in different scenarios.,2 hours,QA
BDD,Ready to get your feet wet with BDD? This session is for the beginners who want to learn the basics. In this squeeze-course we'll cover the following topics:<br/><ul><li>What is BDD</li><li>BDD's origins and goals</li><li>When to use BDD effectively</li><li>The Gherkin language and syntax</li><li>How to translate user stories to Gherkin.</li><li>Examples of how to integrate a Gherkin scenario with code.</li></ul>,2 hours,QA
Cucumber,Already know Gherkin? Let's take a look at Cucumber - the Java platform for executing BDD scenarios. In this squeeze-course we'll cover the following topics:<br/><ul><li>The tool set for running Cucumber in the IDE</li><li>Feature and Scenario organization</li><li>Cucumber's configuration</li><li>Simple and complex parameter translation from Gherkin</li><li>Scenario and code maintenance</li><li>Scenario execution inside a continuous integration tool</li></ul>,2 hours,QA
Simple Design,What do we mean when we say "design"? We all agree that simple is better understandable. But how can we achieve simpler design? This squeeze-course is highly interactive and will teach you how to think about code in a new way. In this squeeze-course we'll cover the following topics:<br/><ul><li>What is design</li><li>What properties make it simple</li><li>Coding by intention</li><li>Break down requirements into readable bits of code</li><li>Live-design a system that will read as if it was meant for reading and maintenance</li><li>How to use these principles in both code and tests</li></ul>,2 hours,QA
SOLID principles,The SOLID principles help design a cleaner code. While they originate in object-oriented languages - they apply to any language and design. In this squeeze-course we'll cover the following topics:<br/><ul><li>What are the SOLID Principles and their effectiveness<li>Single Responsibility</li><li>Open Closed</li><li>Liskov Substitution</li><li>Interface segregation</li><li>Dependency Inversion</li></li><li>Pitfalls and solutions</li><li>Application in functional languages</li></ul>,2 hours,QA
Refactoring for testability,Adding tests to legacy code is hard and many times requires risky changes to the underlying code. How can we make un-testable code testable and do it safely? In this highly-interactive squeeze course we'll do just that. In this squeeze-course we'll cover the following topics:<br/><ul><li>Code smells and code anti-patterns</li><li>What is refactoring</li><li>Seams</li><li>Refactoring patterns for a cleaner and testable code.</li><li>Benefits and risks in different scenarios.</li><li>Live refactor a legacy code and prove it's testable</li></ul>,2 hours,QA
Story slicing,How do you slice work into deliverable pieces? In this highly-interactive squeeze-course we'll cover the following topics:<br/><ul><li>Why smaller stories are better</li><li>What is small enough</li><li>The SFDIPOT method of slicing stories</li><li>Slice small stories down an application from high level requirements</li></ul>,2 hours,QA
Estimation,Do you want to learn about better estimation techniques? In this squeeze-course we'll cover the following topics:<br/><ul><li>Why planning and estimation are important (and to whom)</li><li>Dealing with the uncertain and unknown</li><li>Estimation methods (relative; story points; cumulative flow)</li><li>Performance metrics used for projection</li><li>Projection techniques and tools (with Monte-Carlo simulations)</li></ul>,2 hours,QA
Cyber and hacking overview,The "Cyber" term is becoming more and more prominent in the last few years and it seems we keep hearing it almost on a daily basis. Even so - it appears that most of us don't really understand what "Cyber" really means and what it encompasses. In this course we are going to cover various topics included in this term - from the world of hacking and phising to the world of cyber attacks against computer networks and web sites. We will get familiar with common industry terms and attack techniques used by attackers as well as security experts - for protection purposes.,4 hours,Cyber
Don't help the attacker - insider awareness,For many years now one of the leading ways for hackers to infiltrate an organization's computer systems and bypassing the various security measures set forth by the IT is by taking advantage of employees of the target organization. These are not necessarily malicious employees; but sometimes just indifferent or negligent. Remember - an attacker needs only one employee to break the rules in order to infiltrate the network and wrack havoc. In this lecture we are going to cover basic and advanced techniques employed by attackers and most importantly - we will see what we must and mustn't do in order to keep our critical infrastructure safe from harm.,1.5 hours,Cyber
Automation for QA,As applications become larger and more complex and as development cycles become shorter - we as quality assurance personal find it harder to perform all the testing needed in the short amount of time given. We have to find a better way to manage and perform our tests - but is Automation really the answer? Will it help us cope with the ever growing list of demands from our quality team? In this lecture we will understand what automation can and can't give us - its benefits and shortcomings. We will get a taste of what automation is all about and how it is relatively simple to incorporate it in our testing environment and maybe make it your next step in your long running career in the software world. Bring your laptops as we are going to try some hands-on automation!,2 hours,QA
Quality assurance for software project success,One of the main keys for a software project success is to provide a high quality product to the customers - a product that does its job well while being efficient and doing it smoothing while staying easy to use.<br/>The problem is that too many organizations think of quality as an "add-on" - they do their testing in the last quick phase to map out the bugs; which usually results in too many issues detected very closely to the release date. This results in an unstable release with many issues and an unhappy customer.<br/>It is vital to understand that quality is a process that goes hand in hand with the various development phases - for every development action there is a corresponding quality action. Correctly implementing this usually results in detection of critical issues even before one line of code is written; a better product; less time spent on bug fixes and more on adding new capabilities - thus saving the organization time and money and making for a satisfied customer and management.<br/>In this lecture we will go over the basics of how to correctly incorporate quality into our project in each and every phase of development - regardless of development methodology - classic V or modern Agile.,2 hours,QA
Selenium Infrastructure - local to Docker,In this lecture we will cover the process and advantages of moving from local test execution to remote execution based on selenium grid capabilities combined with Docker. We will also examine Selenoid - a free grid alternative that provides important capabilities to our infrastructure such as dynamic container management; mp4 test recording; live VNC control and more,2 hours,QA
Selenium Windows UI testing,Selenium is one of the leading tools in our arsenal for testing web apps and it sure does a great job at it!<br/> But did you know that Selenium can be also used to test windows applications? Be that UWP/WPF/WinForms or even Win32 applications. In this lecture we will see two different technologies that extend the original Selenium to allow for windows native applications testing.,2 hours,QA