Learn, Understand and Deliver!
As consultants we translate our experience into a comprehensive training offering and show you how to apply this well founded knowledge in practice. ACTL's highly qualified trainers spend around 70% of their time working on projects, where they keep their experience and knowledge up to date.
Interested in learning more? Contact us – we would be pleased to create a tailor-made concept for you.
Click here to see the full list, or view one of the training tracks below.
Training Tracks
Agile SW Engineering
Learn what you need to become a master SW engineer and architect.
Become proficient in UML modeling, crafting flexible SW architectures, usage of Rhapsody or Enterprise Architect and enhance your knowledge in RT C++.
View the Agile SW Engineering Track to learn more.
Requirements and Test Engineering
Learn what you need to effectively manage requirements and perform testing
Acquire knowledge needed to properly specify and manage system requirements and to test systems to assure conformance to its requirements.
Contact us for more information.
Agile Model Based Systems Engineering (A-MBSE)
Model Based Systems Engineering (MBSE) is a systems enngineering approach that applies modeling techniques instead of document driven techniques. It is a cost-effective way to specify requirements and to analysze, design and verify systems prior to construction.
Become proficient in SysML, the process of defining and then translating system requirements into subsystems and subsystem requirements and using Rhapsody or Enterprise Architect for this purpose.
View Agile Model Based System Engineering (A-MBSE) page for more info.
Contact us to learn more.
Agile and SCRUM
Learn how to agilize your organization or project effectively.
Being Agile does not mean just to SCRUM. Come and learn how to agilize your organization and adopt successfully SCRUM and TDD.
Contact us for more information.
Security Engineering
Learn about the threats and challenges of an open world and how to make your systems and applications more secure.
How can you prevent malignant or unintended access to your application and systems? How can you prevent mis-usage of your systems by authorized users? Does security affect the design, implementation or only system deployment.
This track addresses these questions and provides you with the knowledge needed cope with application security aspects.
Contact us for more information.