
Using ChatGPT: Full guide
Using ChatGPT: A Complete Guide to the Practical Application of Artificial Intelligence The use of ChatGPT is becoming more and more widespread today, as artificial intelligence has fundamentally reshaped the way

Using ChatGPT: A Complete Guide to the Practical Application of Artificial Intelligence The use of ChatGPT is becoming more and more widespread today, as artificial intelligence has fundamentally reshaped the way
Written by: Fanni Leila Varga, CAPM What project management skills and knowledge are required for novice project managers? What are the skills and competencies that project managers need to be a project manager?

The meaning of phishing: What is phishing and how to defend against it? The number of phishing attacks has increased dramatically in recent years and is now one of the world's leading forms of phishing.

What malware is, what it is and how to remove it Malware is one of the biggest cybersecurity threats today. Whether viruses, Trojans, spyware or ransomware,

How does detection work in cybercrime and how can we defend against it? Before a cyber attack, hackers often spend weeks gathering information about their target. This hidden, preparatory

Extortionist viruses in the digital world: what is ransomware and how to defend against it? Ransomware is one of the most dangerous forms of cybercrime. One wrong click or missed update

The meaning of cyber attack: what types are there and how can we defend against them? As digitalisation evolves, the threats in cyberspace are becoming more sophisticated and targeted. The sophistication and sophistication of cyber-attacks are becoming more sophisticated and sophisticated.

The meaning of social engineering in the world of cyber attacks In the world of cyber security, the focus is often on technical protection: firewalls, antivirus, encryption and strong passwords. But there are

Scrum Guide Expansion Pack: why is it essential literature for organisations? The Scrum Guide Expansion Pack is not just a new document, it is a niche, free resource,

White hat hackers: who are the mysterious white hats? With the rapid evolution of the digital world, the issue of information security is becoming increasingly important. Although the word "hacker"

Managing emotions differently in coaching: "Leading with heart" as a solution-focused brief coach This article was written by: Enikő Tegyi I start with a provocative quote from Pilinszky, Peter Popper, the helper

Grey-box testing step-by-step: techniques, tools, benefits Software testing is not just about debugging, it's also about getting to know the system inside and out
To provide you with the best user experience, we and our partners use technologies such as cookies to store and/or access device information. We do this to improve your browsing experience and to display (non) personalised ads. Consenting to these technologies allows us to process data such as browsing behaviour or unique identifiers on this website. Refusal or withdrawal of consent may adversely affect certain features and services.
Click on the button below to agree to the above or to make more detailed decisions. Your choice only applies to this page. You can change your preferences at any time, including withdrawing your consent, by using the switches in the cookie policy or by clicking on the Manage consent button at the bottom of the screen.

Our office will be closed from 22 December 2025 to 5 January 2026, so during this period, confirmation of training applications and responses to enquiries may take longer than usual. Thank you for your understanding!