mthree Academy | Graduate Training | Employee Reskilling

mthree Academy


Online, in person or blended, the mthree Academy is where all our custom training for Alumni and Reskill happens.

Female student pointing at computer working with male student
Woman presenting at whiteboard talking to woman

Aligned to

In a world where tech ages faster than yogurt, agility is everything. Traditional education lays the groundwork – but our curriculum adapts to meet ever-changing requirements. 

We start with a skills gap analysis. This sees us collaborating with a client’s teams, from tech to HR, to understand their needs.  

Then we tailor our training to the organization's context. In other words, we don’t just teach production support. We teach production support for an investment bank. Or an insurance provider. Or a government agency.

Core training pathways

Below are some of our most popular pathways. 


In this course, trainees learn the fundamentals of developing a full stack web-application using Java, the Spring Framework, and SQL.  
Participants will learn to leverage Java, object-oriented programming principles, the Spring framework, and SQL databases to create complex back ends.  

Participants will also learn to use Spring Boot, and RESTful services to deliver web pages and data, as well as the use jQuery to make those pages responsive.


  • By the end of this course, trainees will be able to: 
  • Demonstrate professionalism, including communication skills and personal interactions. 
  • Explain market and financial concepts at a high level. 
  • Design, develop, and test a full-stack Java application. 
  • Demonstrate understanding of monitoring, supporting, and troubleshooting and how it ties into good development processes.


In this course, trainees learn tools and concepts needed to build software applications using the programming language Go. The training covers concepts that are essential to the Go language including functions, data structures, error handling, Goroutines and channels, testing, and networking. 

This training also includes an overview of containerized technology and Kubernetes, and how developers can use that technology to deploy, manage, and scale a Go app. In addition, participants will use Go to create APIs that can communicate with Apache Kafka.  


By the end of this course, trainees will be able to: 

  • Use Go to build and test software applications. 
  • Use Goroutines and channels to implement concurrency using Go. 
  • Use Go to access, organize, and analyze data.  
  • Use Go to build APIs able to communicate with Apache Kafka. 
  • Deploy, manage, and scale Go applications on Kubernetes  


In this course, trainees learn the skills necessary to work as an entry-level full-stack web developer using C#/.NET. At the end of the course, participants will build a working full-stack web application using skills and concepts covered throughout the course. 

The course culminates with the student building a capstone full-stack project utilizing all the course concepts. For the capstone project, the student will design and build a fully functional end-to-end full-stack web application.  


By the end of this course, trainees will be able to: 

  • Demonstrate and explain how developers use classes in an object-oriented language to establish separation of concerns in an application.  
  • Demonstrate the use of a layered architecture in a web-based application, including a user interface, a business logic layer, a data layer, and a models layer.  
  • Incorporate appropriate error handling and user input validation in an application.  
  • Explain server-side programming concepts, including how HTTP  requests and responses are handled, how data binding works, how routing works, and the interplay between Models, Views, and Controllers.  
  • Describe and implement data validation, including the use of  jQuery Validate, Data Annotations, and IValidateableObject.  


In this course, trainees learn the technical skills required to use COBOL to create a program that meets a client's specifications. 

By the end of the course participants will be able to develop structured COBOL programs, test these programs using JCL and navigate ISPF to monitor the executing jobs and check output. They will also have a basic understanding of IMS DB. 


By the end of this course, trainees will be able to: 

  • Use COBOL to create a program that meets a client's specifications. 

  • Use appropriate code layout, object names, and comments to write structured code that is readable, maintainable and supportable. 

  • Use JCL to execute and test COBOL programs and basic IBM utilities. 

  • Navigate ISPF and use it to support JCL/Cobol/Data Set creation, execution and testing. 

  • Demonstrate basic uses of IMS DB. 


Alumni trainees in this program will learn the tools and concepts needed to create scripts and applications using Q/KDB+.  
The training covers concepts that are essential to writing applications using Q/KDB+ including functions, syntax, tables, queries, multi-tasking and IPC as well as tooling and background around the KDB+ world  - such as Linux. 


By the end of this course, trainees will be able to: 

  • Demonstrate the use of Q/KDB+, including syntax basics,  
    defining variables, and functions. 

  • Use Q/KDB+ primitive data types, including lists, dictionaries, tables. 

  • Query Q/KDB+ using aggregations, grouping and joins. 

  • Write scripts and applications using Q/KDB+. 

  • Evaluate the performance of Q/KDB+ code. 

  • Use Linux to manage files and applications. 

  • Using create and automate shell scripts. 


In this course, trainees learn the tools and concepts needed to build software applications using C++.  
The training covers concepts that are essential to writing software applications using C++ including functions, pointers and streams, containers, and templates. It also includes a module on Big O notation and common sorting algorithms. 


By the end of this course, trainees will be able to: 

  • Write complex applications using C++ 

  • Implement arrays, C++ vectors, and linked lists. 

  • Use streams to manage data output and input. 

  • Streamline the development process using function and class templates. 

  • Evaluate the efficiency of an algorithm and compare common sorting algorithms. 


This course covers Salesforce administration and application developments. It introduces participants to a variety of tools that they can use to customize the data model of a business, using point-and-click tools and box features. Trainees will also learn how to write queries using the Salesforce Object Query Language to fetch data from a database. 

Additional topics include data security management, customized workflows, the Apex object-oriented programming language, and resources used to integrate Salesforce instances as well as external systems. 


By the end of this course, trainees will be able to: 

  • Customize and set up a data model in Salesforce. 

  • Manage users with the Salesforce user management tools. 

  • Create an application in the Salesforce platform. 

  • Setup and manage data sharing. 

  • Create point-and-click automation using process builders, flows, workflows, and email alerts. 

  • Use APEX to develop an application. 

  • Integrate Salesforce with a REST API. 


In this course, trainees learn the basics of site reliability engineering (SRE), an emerging paradigm in DevOps. The training topics include functions and key tenets of SRE, as well as SRE principles such as service level objectives (SLOs), service level indicators, and how to identify and eliminate toil.  

The training consists of hands-on lab activities where participants will practice functions of SRE.  


By the end of this course, trainees will be able to: 

  • Define site reliability engineering.   

  • Discuss the seven principles of SRE.  

  • Engage in real-world SRE scenarios.  


In this course, trainees learn how to become production support specialists within a financial setting.  

It includes an introduction of financial concepts as well as DevOps, SRE, and Disaster Recovery principles. Participants in the course will learn how to use Linux in a production support environment, how to write programs using Python, and how to use SQL to retrieve and manage data in a database. 


By the end of this course, trainees will be able to: 

  • Discuss at a high-level production support activity including ITIL, monitoring, DevOps, SRE, and disaster recovery. 

  • Discuss common financial topics, including financial markets, equity trading, derivatives, currency, treasury, regulation, and risk. 

  • Write a basic computer program in Python, including user input, common data structures, and flow of control. 

  • Use MySQL to perform CRUD operations on a relational database stored in a MySQL Server. 


This course is designed to provide a systematic and comprehensive analysis of the fundamentals of the financial markets, including the participants, the main products, and the nature of the environment in which those products have traded as well as how that environment has evolved.  

The course will also provide insights into how said environment has significantly impacted banking strategies, the products and services offered, and the exhaustive system of checks and balances embedded within both the industry and individual banks. This will form the basis for illustrating the essential elements of the system of risk management, governance, and internal controls that are embedded in the operations of modern banks.  

The course will be highly interactive and will draw from an extensive historical catalogue of events, bank failures, market disruptions and topical case studies. 


By the end of this course, trainees will be able to: 

  • The events that have critically, shaped the perception of banks from the perspective of their stakeholders, including customers, governments and regulators. 

  • The design on the Basel Capital and Liquidity requirements in response to financial market failures. 

  • The impact of all the above on the risk management, governance and internal control frameworks within banks. 

  • The importance of organizational culture as a key component of enterprise risk management. 

  • The extensive system of policies, processes and procedures and key  
    controls required for the effective and efficient management of  
    today’s banks. 

  • Financial crime as a critical component of risk management 


This course covers the concepts that are essential to data analytics, including software development, databases, data warehousing, data pipelines, extract-transform-load (ETL) processes, and scripting languages.  

In addition, this training introduces participants to a variety of tools and technologies that are essential to data analytics. The course outlines how to leverage these concepts and tools to design and develop software that can organize data in a fast, simple, and effective way. 


By the end of this course, trainees will be able to: 

  • Use Python to analyze datasets and create reports based on the data. 

  • Use MySQL to create and manage data stored in a relational database. 

  • Use PyMySQL to create a Python script that can interact with and manage data stored in a relational database. 

  • Use MongoDB to manage data stored in a non-relational database. 

  • Use PyMongo to create a Python script that can interact with and manage data stored in a MongoDB database. 

  • Create an ETL script in Python that can extract data from an identified data source, transform that data as necessary for the target uses, and load the transformed data into a target database. 


This course begins with an introduction to data and how we can use data to solve business problems. It then explores options for storing and working with large amounts of data, including architecture and warehousing.  

Trainees learn how to manage both structured and unstructured data using distributed systems and cloud-based tools, as well as analyze streamed data. By the end of the program, they will be able to build and automate ETL processes, machine learning algorithms, and deploy big data projects. 


By the end of this course, trainees will be able to: 

  • Describe approaches and methodologies used by data scientists to solve business problems. 

  • Apply current principles and tools to software development processes, including testing, version control, UI, and UX. 

  • Describe a variety of options for data warehousing, including large-scale and unstructured databases. 

  • Design, build, and manage data stored in a relational database. 

  • Discuss available options and technologies for distributed computing and managing data in a distributed environment. 

  • Perform real-time big data processing using Apache Spark, Apache Kafka, and related tools. 

  • Build a machine learning algorithm using cloud-based tools such as Amazon Cognito, Amazon Comprehend, and Snowflake. 

  • Deploy a bid data project using current DevOps practices, including performance, security, and privacy considerations. 


The field of data science is vital in today's world where large datasets are collected and used by companies to derive business intelligence.  

This training covers topics essential to the enterprise environment, including professional skills, industry orientation, as well topics essential to data science including SQL, Exploratory Analytics, Python, and Machine Learning 


By the end of this course, trainees will be able to: 

  • Describe approaches and methodologies used by data scientists to solve business problems. 

  • Create software processes to move copy, and manipulate data, including managing large datasets. 

  • Create, retrieve, update, and delete data stored in both relational and unstructured databases. 

  • Apply statistical methods to data analysis and interpretation of data. 

  • Use Python and Python packages to manipulate, manage, and analyze data. 

  • Create a machine learning algorithm using specific models. 

  • Generate data visualizations and use those visualizations to tell a story based on data. 


Trainees learn how to identify threats and vulnerabilities to an organization’s security posture. They understand how to categorize, assess, and manage organizational risk, and how to evaluate security controls to mitigate residual risk. 

Key competencies covered during the training: 

  • Information Assurance 
  • Vulnerabilities Assessment 
  • Information Systems/Network Security 
  • Information Technology Assessment 
  • Legal, Government, and Jurisprudence 
  • Risk Management 
  • Systems Testing and Evaluation 

We provide the skills required to become a junior: 

  • Cyber Risk Analyst 
  • Vulnerability Analyst 
  • Information Security Compliance Analyst 
  • Security Assessments and Authorization Analyst 
  • Information Assurance (IA) Auditor 


Trainees will understand how to analyze and test the security of new or existing computer applications, software, or specialized utility programs and provide actionable results. 

Key competencies covered during the training: 

  • Software Development 
  • Systems Testing and Evaluation Vulnerabilities Assessment 
  • Data Privacy and Protection 
  • Information Assurance 
  • Information Systems/Network Security 
  • Operating Systems 
  • Risk Management 

We provide the skills required to become a junior: 

  • Information Assurance (IA) Software Developer 
  • Secure Software Engineer 
  • Application Security Analyst/Engineer 
  • Application Security Tester 
  • Software Quality / Quality Assurance Engineer 


Trainees learn how to deploy, configure, and maintain security baselines in accordance with an organization’s cloud security posture. They understand how to research, evaluate, design, test, recommend or plan the implementation of new or updated cloud-centric information security controls. 

Key competencies covered during the training: 

  • Enterprise Architecture 
  • Identity Management 
  • Information Assurance 
  • Information Systems/Network Security 
  • Infrastructure Design 
  • Systems Integration 

We provide the skills required to become a junior: 

  • Cloud Security Architect 
  • Cloud Security Analyst 
  • Cloud Support Engineer I - Security 
  • Cloud Security Engineer 
  • Associate Cloud Security Engineer 


Trainees learn how to implement information security architecture /designs, plans, controls, processes, standards, policies, and procedures that adequately address all aspects necessary to protect the organization’s missions and processes. 

Key competencies covered during the training: 

  • Enterprise Architecture 
  • Systems Integration 
  • Business Continuity 
  • Client Relationship Management 
  • Computer Network Defense 
  • Data Analysis 
  • Information Technology Assessment 

We provide the skills required to become a junior: 

  • Cybersecurity Architect 
  • Information Security Architect 
  • Security Solutions Architect 
  • Enterprise Architect 
  • Information Security Analyst 
Group of professionals laughing working together

Meet the
Academy team

At mthree, “expert” is more than just a buzzword. Everyone at our Academy has at least a decade’s experience in the field – spanning industry, education, or both.  

As a team, our instructors bring a blend of expertise to the table. Their backgrounds range from subject matter experts who’ve done hands-on leadership roles at tier one investment banks to qualified practitioners in the art and science of teaching. 

It’s this combination that enables us to shorten the time to competency in our training delivery. Getting organizations the skills they need, quickly.

We’re driven by the capacity in people to do great things. In my years leading departments at University of Phoenix I saw the unbearable challenge of emerging talent trying to keep up with skills, jobs and technology. The clock of academia and the clock of industry run at different speeds – our goal at mthree Academy is to synchronize the two. We react to the industry, we create the training content, we align it around what you’d actually use it for. All the practical assignments, all the testing, it’s tied to a real project.

Dennis Bonilla

Dean of
mthree Academy

Instead of us saying ‘here’s what we think your company should learn, now here’s a course’, it’s ‘tell us what you want to learn and we’ll make it happen’”. We have instructors who bring a vast pool of skills from different companies. But you can’t just take a regular software developer and put them in a classroom. Being a teacher is like being a psychologist… you have to motivate people. Yes, we’re technologists, but we also love education.

Haythem Balti

Associate Dean of mthree Academy

Some of our academy team

Charity Jennings

Associate Dean 


Charity is a strategic education leader with a record of achieving measurable results as a dean, director, and professor. Focused in the areas of program and course design, change management, academic operations, accreditation, and product management.

Ronnie Jones

Java Instructor


Ronnie has 30+ years’ development experience in education as well as the Auto and Insurance industries. Using his understanding of both teaching and the industry, he’s taught 100s of Developers how to become Software Systems Engineers.


Cyber Security Product Manager


Maurice leads the Cyber Security practice at mthree. With over 10 years’ experience in industry and education at the likes of Fortinet and The University of Phoenix, he’s designed our courses to equip grads with the latest in-demand skills.

Dr. Al-Ajrawi

Java/C++/.NET Instructor 


Dr. Al Ajrawi earned her Ph.D. in Electrical and Computer Engineering from the University of San Diego and San Diego State University (JDP). She’s now teaching Java, C++ and .NET to graduates at the mthree Academy.

Feyzullah (Feyz) Egriboyun

Banking Services Instructor 


Feyz has extensive experience across investment and retail banking. He’s worked at international banks as a quantitative analyst, trader and a banking executive. Most recently, Feyz was the CFO and Director of a UK digital bank start-up.

Amir Gill 

.NET/C# Instructor 


Amir graduated from Houston Baptist University with a Bachelor’s degree in Computer Information Systems Management. He then worked in Tech at a Bank before graduating from The Software Guild in 2014. Since then, he has been teaching Software Development.

Woman smiling working at laptop

Online, in person,

The mthree Academy exists wherever you need it to.  

In person training is a popular choice for intensive programs. We have training rooms at all our physical offices – or we can create pop-up Academies 
globally by renting space on demand.  

We also have full online capabilities, so we can support today’s ever more distributed workforces. 

It’s about meeting the learner where they're at, as well as achieving a client’s location strategy. 

Woman smiling on call at laptop


How do we design our training, then manage it and monitor it? How do we ensure our content works not only for the objective of the program but for each individual trainee and instructor too?  

This is the job of our proprietary Learning Technology Ecosystem. It includes live virtual instructor-led classes, recorded videos, self-paced assignments, curated content and feedback loops, drawing on our collective decades of experience across industry, technology and education.

Professional woman clapping and laughing at conference

further learning

Learning never stops. That’s why everyone we train on a Reskill or Alumni program gets access for life to our global mthree community on Slack. They’ll find channels to ask questions, get recommendations for further learning and interpersonal development, and more. 

Training example

Our training ranges from 4 to 8 weeks (or longer for part-time learning). Below you’ll see a recent curriculum for Software Development using Java. Clients always have the option to tailor the training content, but this is one of our core pathways. 

Module 1

Professional skills and industry concepts

Module 2

Java basics

Module 3

Classes and objects

Module 4

Intermediate Java

Module 5

Advanced Java

Module 6

Relational databases and SQL

Module 7

Spring Boot REST with JDBC templates

Module 8

REST web services via jQuery

Module 9

Spring Boot full-stack web apps

Module 10

Group project aligned to real-world scenario

Professional man talking

Get in touch

Have questions about mthree Academy? Interested in our Reskill or Alumni training programs? We’d love to hear from you.