Academy Product ownership – from a backlog to an effective product vision Switzerland 2-day course | Group course (6-12 people) | Proven methods and examples for connecting product vision with requirements…
Academy Quality Assurance in Agile Software Development Switzerland 1-day course | Group course (6-12 people) | Learn how quality assurance helps the whole team develop quality products. …
Academy Requirements Engineering for System and Product Development Switzerland 1-day course | Group course (6-12 people) | Learn how to gather, document, test, and manage requirements - and…
Academy Requirements in agile Software Development Switzerland 2-day course | Group course (6-12 people) | Agile requirements techniques and principles – from needs to the mature…
Academy SAFe DevOps (SDP) Switzerland 2-day course | Group course (6-12 people) | Enabling Release on demand for the Lean Enterprise with a SAFe DevOps…
Academy SAFe for Architects (ARCH) Switzerland 3-day course | Group course (6-12 people) | Enable continuous value flow by aligning technical strategy with business…
Academy SAFe® for Hardware – Agile Methods for Physical and Cyber-Physical Product Development Global 2-day course | Group course (6-12 people)
Academy Scrum Essentials Switzerland 2-day course | Group course (6-12 people) | Develop fundamental Scrum skills, vocabulary, and agile techniques by…
Academy Spring Fundamentals Switzerland 2-day course | Group course (6-12 people) | Discover why Spring is the industry standard. This course offers a clear…
Academy Team Kanban Kickstart Switzerland 1-day course | Group course (6-12 people) | Looking for better cooperation and continuous improvement of added value? A…
Academy The EU Cyber Resilience Act (CRA): everything decision makers need to know Global 1-hour to 1-day course | Group course (6-12 people) | The EU’s Cyber Resilience Act, in effect since November 2024,…
Academy Threat Modeling for Engineers Switzerland 1-day course | Group course (6-12 people) | Spot threats before they hit. Learn how Zühlke uses Threat Modeling to…