Trainings catalog

Comprehensive IT trainings offer

At Eccentrix, our IT trainings catalog is designed to equip organizations and professionals with advanced technical knowledge and specialized skills for today’s digital landscape.

Our catalog spans advanced cybersecurity, cloud infrastructure, project management, and data analysis, leading to globally recognized certifications. You’ll find the ideal IT training to enhance your expertise and career prospects.

We deliver exceptional learning with interactive platforms and certified instructors, ensuring practical, business-ready skills.

Join a dynamic community dedicated to technical excellence and continuous development. Our resources support your growth long after course completion.

Explore the Eccentrix IT trainings catalog today—advance your skills and career with our leading IT training solutions.

DELIVERY STATUS

EN Dates confirmees planifiees

What's new

EN Novi kurs checkbox

DELIVERY MODALITY

EN checkckbox publique private

PROVIDERS AND THEMES

EN Kursevi kategorije checkbox

AUDIENCES

EN Role checkbox

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Expand
Price: $3450
Duration: 5 days / 35 hours

Microsoft AZ-104, also known as the Azure Administrator Associate certification, is an essential course designed to equip individuals with in-depth knowledge of Azure administration. This Microsoft certification training teaches IT professionals how to manage their Azure subscriptions, secure identities, administer infrastructure, configure virtual networking, connect Azure and on-premises environments, manage network traffic, implement storage solutions, create and scale virtual machines, implement web applications and containers, back up and share data, and monitor their solutions.

This training is a comprehensive preparation for the AZ-104: Microsoft Azure Administrator exam for obtaining the Microsoft Certified: Azure Administrator Associate certification.

Expand
Price: $2595
Duration: 4 days / 28 hours

The Certified Ethical Hacker (CEH) certification is one of the most recognized and recommended by employers for cybersecurity and cyber defense specialists. It is one of the most in-demand certifications to enhance the security level of IT infrastructures and service providers. Since the first version of the training in 2003, the CEH program has always been recognized as a standard in the cybersecurity community. Version 13 of the CEH continues this path and introduces the latest hacking techniques with the most advanced tools and exploits used by today’s cybersecurity professionals. The five steps of ethical hacking and the course’s mission remain the same: to acquire knowledge of network attacks to provide an adequate countermeasure to hackers.

Our CEH computer security training will provide you with knowledge of the five phases of hacking, attack vectors, and preventive countermeasures. This rigorous training will help you recognize how a hacker operates to better protect your networks and defend your company against cyber criminals. Understanding a system’s weaknesses and vulnerabilities helps organizations maintain security controls and minimize the risk of incidents. The CEH has been designed to incorporate a practical environment and a systematic methodology across offensive security domains, giving you the opportunity to work on improving your knowledge and ethical hacking skills.

Expand
Price: $4495
Duration: 5 days / 35 hours

Microsoft SharePoint Online is an efficient engine for document management, team collaboration, and streamlined communication. The SharePoint Online Management and Administration (MS55370) course is a comprehensive program designed to equip IT professionals, administrators, and business users with the knowledge and skills needed to harness the full potential of SharePoint Online.

Gain expertise in managing SharePoint environments, optimizing workflows, and ensuring seamless collaboration within your organization. In this immersive course, you will discover the secrets of SharePoint administration, from site installation and configuration to fine-tuning permissions and security. Take advantage of the opportunity to create and customize document libraries, lists, and WebParts, transforming the way your team collaborates and shares information.

Expand
Price: $2595
Duration: 4 days / 28 hours

This course offers a thorough introduction to Microsoft 365, Copilot, and AI-driven agents. Learners will explore the essential concepts, main services, and administrative features of Microsoft 365. Building on this foundation, the course demonstrates how Copilot and AI agents can automate routine tasks, boost collaboration, and deliver personalized user experiences throughout the Microsoft 365 ecosystem.

This course provides comprehensive preparation for the AB-900: Copilot & Agent Administration Fundamentals exam, leading to the Microsoft 365 Certified: Copilot and Agent Administration Fundamentals certification.

Expand
Duration: 1 day / 7 hours

This five-day Microsoft certification training teaches participants how to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies.

The course covers the essentials of modern management, co-management approaches, and integration with Microsoft Intune. It includes application deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance strategies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.

This training is a comprehensive preparation for the Microsoft 365: Endpoint Administrator exam to earn the Microsoft 365 Certified: Endpoint Administrator Associate certification.

Expand
Price: $3095
Duration: 5 days / 35 hours

In this course, learners will discover how to lead AI transformation throughout their organization. They will gain practical strategies for identifying high-impact AI opportunities, aligning investments with business objectives, and championing responsible AI practices. With a focus on real-world applications and strategic decision-making—no technical background required—this course is ideal for senior leaders who want to confidently drive AI adoption and innovation.

This course provides comprehensive preparation for the AB-731: AI Transformation Leader exam, leading to the Microsoft Certified: AI Transformation Leader certification.

Expand
Duration: 1 day / 7 hours

In this course, learners will discover how to leverage generative AI to streamline daily tasks, enhance decision-making, and achieve meaningful business outcomes. They will learn how to use Microsoft 365 Copilot and its features to boost productivity. Focused on real-world use cases and requiring no coding skills, this course is perfect for anyone looking to confidently integrate AI into their work.

This course provides comprehensive preparation for the AB-730: AI Business Professional exam, leading to the Microsoft Certified: AI Business Professional certification.

Expand
Duration: 1 day / 7 hours

This five-day VMware training is an intensive introduction to VMware vSphere 8.0, including VMware ESXi 8.0 and vCenter 8.0. This course has been fully updated to reflect the latest changes introduced in vSphere 8.0.

Assuming no prior experience with virtualization, the course starts with the basics and quickly progresses to advanced topics. More than 45% of the class time is dedicated to labs, allowing students to gain the skills needed to become effective vSphere administrators. Students use dedicated labs that begin with the installation and configuration of standalone ESXi hosts and progress to shared storage, networking, virtual machine creation, and centralized management. The course continues with rapid virtual machine deployment, hot-pluggable virtual hardware, permissions, alarm resource management, high-availability virtual machine clusters, load-balanced virtual machine clusters, cold, hot, and storage migration of virtual machines, ESXi host update/upgrade, and performance tuning. This course is unique in that by the end of the course, students will have created a complete vSphere 8.0 environment from scratch, including the installation and configuration of ESXi 8.0 hosts and the installation and configuration of vCenter Server Appliance 8.0. We are the only major vSphere training provider where each student must install ESXi and vCenter to succeed.

By the end of the course, participants will have acquired the knowledge, skills, and best practices necessary to deploy, configure, and administer VMware vSphere 8.0.

Expand
Price: $3695
Duration: 5 days / 35 hours

This training program guides participants in mastering effective prompting techniques across the Microsoft 365 ecosystem, including PowerPoint, Word, Excel, Teams, and Outlook. The course also explores Microsoft 365 Copilot Chat capabilities while explaining the crucial distinctions between enterprise data and web-based information.

Expand
Duration: 1 day / 7 hours

The CCNA training complements your knowledge and experience in networking and provides you with expertise equivalent to that of a network administrator. It covers targeted content for the objectives of the Certified Cisco Network Administrator (CCNA 200-301) exam. If you are planning to obtain a Cisco certification, the CCNA 200-301 exam is the first step toward this certification.

  • Explain basic networking principles
  • Switch configuration
  • IP addressing configuration
  • Routing configuration
  • Wireless connectivity configuration
  • IP network services configuration
  • Explain network security principles and practices
  • Explain the use of automation in managing network tasks
  • Diagnose and troubleshoot common network problems
Expand
Price: $4595
Duration: 5 days / 35 hours

The Microsoft PL-300 certification represents a crucial step for professionals seeking to demonstrate their expertise in data analysis with Power BI. This certification attests to a deep understanding and mastery of Power BI tools and techniques, making it a valuable accreditation in the field of data analysis.

This certification training covers various methods and best practices that align with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources, including relational and non-relational sources. Finally, this course will also cover the management and deployment of reports and dashboards for sharing and distributing content.

This three-day Microsoft course provides preparation for the PL-300: Microsoft Power BI Data Analyst exam to earn the Microsoft Certified: Power BI Data Analyst Associate certification.

Expand
Price: $2095
Duration: 3 days / 21 hours

The five-day CompTIA A+ training provides participants with the knowledge and expertise required to prepare for the A+ certification exams.

This training is a great starting point for a career as an IT professional. Participants will have the opportunity to become familiar with computer hardware, operating systems, PC components, networking, computer security, laptops, and printers. Upon completion of the course, participants will have the necessary knowledge to install, configure, secure, and troubleshoot all system components. Customer service and communication skills are also part of this training, teaching participants how to interact appropriately with clients and peers.

Expand
Price: $3995
Duration: 5 days / 35 hours

In this comprehensive four-day Microsoft certification training, we will explore the skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course covers identity and access security, platform protection, data and application security, and security operations. By the end of the course, users will be prepared to tackle all aspects of the Azure Security Engineer Associate certification.

This course provides comprehensive preparation for the AZ-500: Microsoft Azure Security Technologies exam to obtain the Microsoft Certified: Azure Security Engineer Associate certification.

Expand
Price: $2595
Duration: 4 days / 28 hours

The Cybersecurity Bootcamp training is a two-course package that covers the most important topics in information security. The CEH training provides technical knowledge on securing corporate network infrastructures, while the CISSP training focuses on information security and its management. Both courses prepare you for the prestigious Certified Ethical Hacker and Certified Information Systems Security Professional certifications.

Certified Ethical Hacker (CEHv13) (CS6154)

The Certified Ethical Hacker (CEH) certification is one of the most recognized and recommended by employers for cybersecurity and cyber defense specialists. It is one of the most in-demand certifications to enhance the security level of IT infrastructures and service providers. Since the first version of the training in 2003, the CEH program has always been recognized as a standard in the cybersecurity community. Version 13 of the CEH continues this path and introduces the latest hacking techniques with the most advanced tools and exploits used by today’s cybersecurity professionals. The five steps of ethical hacking and the course’s mission remain the same: to acquire knowledge of network attacks to provide an adequate countermeasure to hackers.

Our CEH computer security training will provide you with knowledge of the five phases of hacking, attack vectors, and preventive countermeasures. This rigorous training will help you recognize how a hacker operates to better protect your networks and defend your company against cyber criminals. Understanding a system’s weaknesses and vulnerabilities helps organizations maintain security controls and minimize the risk of incidents. The CEH has been designed to incorporate a practical environment and a systematic methodology across offensive security domains, giving you the opportunity to work on improving your knowledge and ethical hacking skills.

Download our CEHv13 brochure to view all the details of this exclusive training!

Certified Information Systems Security Professional (CISSP) (CS8502)

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Expand
Price: $6595
Duration: 10 days / 70 hours

Our training on Copilot for Microsoft 365 covers the introduction and operation of Copilot, its main features, and Microsoft’s commitment to responsible AI.

The modules explore document creation, email drafting, presentation design, and data analysis with Copilot in various applications such as Word, Outlook, PowerPoint, Excel, and Teams. The training also addresses managing and extending Copilot with plugins and connectors, as well as user activation and adoption strategies. It highlights the importance of defining a clear strategy, securing stakeholder buy-in, and measuring adoption success. Finally, the training offers approaches to optimize Copilot’s impact, gather user feedback, and effectively integrate Copilot into your organization’s business processes.

Expand
Duration: 1 day / 7 hours

This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course introduces you to Copilot, examines how to implement and administer it, and then explores the fundamentals of Copilot extensibility.

Expand
Duration: 1 day / 7 hours

ITIL® is the world’s leading framework for implementing IT service management best practices. Organizations use ITIL to plan, implement, support, and improve services and create value for their customers. In this course, you will learn the basic knowledge and skills to adopt and adapt IT service management (ITSM) best practices within your organization.

This training is designed for anyone who wants to gain a fundamental understanding of IT service management, its key principles and practices, and how it can help you deliver better value to your customers. It is suitable for all IT staff and management, as well as customers who work closely with IT to meet business needs.

This course is also designed for students who wish to obtain the ITIL 4 Foundation certification and prepare for the ITIL 4 Foundation exam.

This course is accredited by PeopleCert.

Expand
Price: $1800
Duration: 2 days / 14 hours

The SC-200 certification, known as the Microsoft Security Operations Analyst certification, is highly valuable for individuals seeking to acquire skills in security operations analysis within the Microsoft environment. This certification assesses a candidate’s ability to identify, investigate, respond to, and mitigate security threats using Microsoft security tools.

This certification training covers how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course, participants will learn to mitigate cyber threats using these technologies. Specifically, you will configure and use Azure Sentinel and the Kusto Query Language (KQL) to perform detection, analysis, and reporting.

This course provides comprehensive preparation for the SC-200: Microsoft Security Operations Analyst exam to obtain the Microsoft Certified: Security Operations Analyst Associate certification.

Expand
Price: $2595
Duration: 4 days / 28 hours

Rigorously evaluated to ensure coverage of the CompTIA Security+ (SY0-701) exam objectives, this training teaches the knowledge and skills necessary to assess the security posture of an enterprise environment and to recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an understanding of applicable laws and policies, including governance, risk, and compliance principles; and identify, analyze, and respond to security events and incidents.

Expand
Price: $3695
Duration: 5 days / 35 hours

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.