top of page
Back to top
Teacher Writing a Formula on a Blackboar

Training Service

Tell me and I forget.

Teach me and I remember.

Involve me and I learn.

Benjamin Franklin

With 20 years of software quality and risk experience, we have seen many of the problems that face organisations. We specialise in tailoring learning to solve these problems. We can create out of the box training packages including both on site and online delivery specifically focusing on a need.

Why do a 5 day Test Management course to learn how to estimate better?

We also offer the standard certification training courses...

Bespoke Courses

Certification Courses

Performance Testing

Quality Risk Management

Security Testing

Bespoke courses

Bespoke Courses

If you have a specific problem, contact us.

We build training courses following a three step process:

  1. We work with you to establish Learning Objectives (rather than a list of subjects and a number of days).

  2. We design the training package based on the Learning Objectives.

  3. We build and deliver the training

After each step, a review is held to involve you in the process to ensure the problem is solved.

Certification courses

Certification Courses

We run certification courses onsite and online via virtual instructor led training with GoTo Webinar. A full list of courses will appear soon...

Performance testing

Performance Testing

Performance testing has matured over the last 20 years. But you know when a test type has finally made it when there's an ISTQB course! Specific courses also exist for non-performance testers in performance test management.

Quality risk management

Quality Risk Management

Quality risk management courses look at the combination of testing (quality risk mitigation) in combination with the other elements of risk management:

  • Defining the scope of risk

  • Risk identification

  • Risk assessment

  • Risk mitigation

  • Risk monitoring

Security testing

Security testing

Security testing covers a huge range of areas - it's not just about the technology! Almost all hacks involve, at some point, hacking the people and processes.

bottom of page