ROLE DEVELOPMENT
- Equip your tech teams with the specific capabilities they’re missing.
- Bring people with variable skill levels up to the same baseline.
- Improve performance with an understanding of the latest industry knowledge.
We can help you future-proof your workforce by building skills in technology and other high-demand disciplines.
Read below to find out more.
In this course, trainees learn the fundamentals of developing a full stack web-application using Java, the Spring Framework, and SQL.
Participants will learn to leverage Java, object-oriented programming principles, the Spring framework, and SQL databases to create complex back ends.
Participants will also learn to use Spring Boot, and RESTful services to deliver web pages and data, as well as the use jQuery to make those pages responsive.
LEARNING OUTCOMES
In this course, trainees learn tools and concepts needed to build software applications using the programming language Go. The training covers concepts that are essential to the Go language including functions, data structures, error handling, Goroutines and channels, testing, and networking.
This training also includes an overview of containerized technology and Kubernetes, and how developers can use that technology to deploy, manage, and scale a Go app. In addition, participants will use Go to create APIs that can communicate with Apache Kafka.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
In this course, trainees learn the skills necessary to work as an entry-level full-stack web developer using C#/.NET. At the end of the course, participants will build a working full-stack web application using skills and concepts covered throughout the course.
The course culminates with the student building a capstone full-stack project utilizing all the course concepts. For the capstone project, the student will design and build a fully functional end-to-end full-stack web application.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
In this course, trainees learn the technical skills required to use COBOL to create a program that meets a client's specifications.
By the end of the course participants will be able to develop structured COBOL programs, test these programs using JCL and navigate ISPF to monitor the executing jobs and check output. They will also have a basic understanding of IMS DB.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Use COBOL to create a program that meets a client's specifications.
Use appropriate code layout, object names, and comments to write structured code that is readable, maintainable and supportable.
Use JCL to execute and test COBOL programs and basic IBM utilities.
Navigate ISPF and use it to support JCL/Cobol/Data Set creation, execution and testing.
Demonstrate basic uses of IMS DB.
Alumni trainees in this program will learn the tools and concepts needed to create scripts and applications using Q/KDB+.
The training covers concepts that are essential to writing applications using Q/KDB+ including functions, syntax, tables, queries, multi-tasking and IPC as well as tooling and background around the KDB+ world - such as Linux.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Demonstrate the use of Q/KDB+, including syntax basics,
defining variables, and functions.
Use Q/KDB+ primitive data types, including lists, dictionaries, tables.
Query Q/KDB+ using aggregations, grouping and joins.
Write scripts and applications using Q/KDB+.
Evaluate the performance of Q/KDB+ code.
Use Linux to manage files and applications.
Using create and automate shell scripts.
In this course, trainees learn the tools and concepts needed to build software applications using C++.
The training covers concepts that are essential to writing software applications using C++ including functions, pointers and streams, containers, and templates. It also includes a module on Big O notation and common sorting algorithms.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Write complex applications using C++
Implement arrays, C++ vectors, and linked lists.
Use streams to manage data output and input.
Streamline the development process using function and class templates.
Evaluate the efficiency of an algorithm and compare common sorting algorithms.
This course covers Salesforce administration and application developments. It introduces participants to a variety of tools that they can use to customize the data model of a business, using point-and-click tools and box features. Trainees will also learn how to write queries using the Salesforce Object Query Language to fetch data from a database.
Additional topics include data security management, customized workflows, the Apex object-oriented programming language, and resources used to integrate Salesforce instances as well as external systems.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Customize and set up a data model in Salesforce.
Manage users with the Salesforce user management tools.
Create an application in the Salesforce platform.
Setup and manage data sharing.
Create point-and-click automation using process builders, flows, workflows, and email alerts.
Use APEX to develop an application.
Integrate Salesforce with a REST API.
In this course, trainees learn the basics of site reliability engineering (SRE), an emerging paradigm in DevOps. The training topics include functions and key tenets of SRE, as well as SRE principles such as service level objectives (SLOs), service level indicators, and how to identify and eliminate toil.
The training consists of hands-on lab activities where participants will practice functions of SRE.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Define site reliability engineering.
Discuss the seven principles of SRE.
Engage in real-world SRE scenarios.
In this course, trainees learn how to become production support specialists within a financial setting.
It includes an introduction of financial concepts as well as DevOps, SRE, and Disaster Recovery principles. Participants in the course will learn how to use Linux in a production support environment, how to write programs using Python, and how to use SQL to retrieve and manage data in a database.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Discuss at a high-level production support activity including ITIL, monitoring, DevOps, SRE, and disaster recovery.
Discuss common financial topics, including financial markets, equity trading, derivatives, currency, treasury, regulation, and risk.
Write a basic computer program in Python, including user input, common data structures, and flow of control.
Use MySQL to perform CRUD operations on a relational database stored in a MySQL Server.
This course is designed to provide a systematic and comprehensive analysis of the fundamentals of the financial markets, including the participants, the main products, and the nature of the environment in which those products have traded as well as how that environment has evolved.
The course will also provide insights into how said environment has significantly impacted banking strategies, the products and services offered, and the exhaustive system of checks and balances embedded within both the industry and individual banks. This will form the basis for illustrating the essential elements of the system of risk management, governance, and internal controls that are embedded in the operations of modern banks.
The course will be highly interactive and will draw from an extensive historical catalogue of events, bank failures, market disruptions and topical case studies.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
The events that have critically, shaped the perception of banks from the perspective of their stakeholders, including customers, governments and regulators.
The design on the Basel Capital and Liquidity requirements in response to financial market failures.
The impact of all the above on the risk management, governance and internal control frameworks within banks.
The importance of organizational culture as a key component of enterprise risk management.
The extensive system of policies, processes and procedures and key
controls required for the effective and efficient management of
today’s banks.
Financial crime as a critical component of risk management
This course covers the concepts that are essential to data analytics, including software development, databases, data warehousing, data pipelines, extract-transform-load (ETL) processes, and scripting languages.
In addition, this training introduces participants to a variety of tools and technologies that are essential to data analytics. The course outlines how to leverage these concepts and tools to design and develop software that can organize data in a fast, simple, and effective way.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Use Python to analyze datasets and create reports based on the data.
Use MySQL to create and manage data stored in a relational database.
Use PyMySQL to create a Python script that can interact with and manage data stored in a relational database.
Use MongoDB to manage data stored in a non-relational database.
Use PyMongo to create a Python script that can interact with and manage data stored in a MongoDB database.
Create an ETL script in Python that can extract data from an identified data source, transform that data as necessary for the target uses, and load the transformed data into a target database.
This course begins with an introduction to data and how we can use data to solve business problems. It then explores options for storing and working with large amounts of data, including architecture and warehousing.
Trainees learn how to manage both structured and unstructured data using distributed systems and cloud-based tools, as well as analyze streamed data. By the end of the program, they will be able to build and automate ETL processes, machine learning algorithms, and deploy big data projects.
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Describe approaches and methodologies used by data scientists to solve business problems.
Apply current principles and tools to software development processes, including testing, version control, UI, and UX.
Describe a variety of options for data warehousing, including large-scale and unstructured databases.
Design, build, and manage data stored in a relational database.
Discuss available options and technologies for distributed computing and managing data in a distributed environment.
Perform real-time big data processing using Apache Spark, Apache Kafka, and related tools.
Build a machine learning algorithm using cloud-based tools such as Amazon Cognito, Amazon Comprehend, and Snowflake.
Deploy a bid data project using current DevOps practices, including performance, security, and privacy considerations.
The field of data science is vital in today's world where large datasets are collected and used by companies to derive business intelligence.
This training covers topics essential to the enterprise environment, including professional skills, industry orientation, as well topics essential to data science including SQL, Exploratory Analytics, Python, and Machine Learning
LEARNING OUTCOMES
By the end of this course, trainees will be able to:
Describe approaches and methodologies used by data scientists to solve business problems.
Create software processes to move copy, and manipulate data, including managing large datasets.
Create, retrieve, update, and delete data stored in both relational and unstructured databases.
Apply statistical methods to data analysis and interpretation of data.
Use Python and Python packages to manipulate, manage, and analyze data.
Create a machine learning algorithm using specific models.
Generate data visualizations and use those visualizations to tell a story based on data.
Trainees learn how to identify threats and vulnerabilities to an organization’s security posture. They understand how to categorize, assess, and manage organizational risk, and how to evaluate security controls to mitigate residual risk.
Key competencies covered during the training:
We provide the skills required to become a junior:
Trainees will understand how to analyze and test the security of new or existing computer applications, software, or specialized utility programs and provide actionable results.
Key competencies covered during the training:
We provide the skills required to become a junior:
Trainees learn how to deploy, configure, and maintain security baselines in accordance with an organization’s cloud security posture. They understand how to research, evaluate, design, test, recommend or plan the implementation of new or updated cloud-centric information security controls.
Key competencies covered during the training:
We provide the skills required to become a junior:
Trainees learn how to implement information security architecture /designs, plans, controls, processes, standards, policies, and procedures that adequately address all aspects necessary to protect the organization’s missions and processes.
Key competencies covered during the training:
We provide the skills required to become a junior:
There aren’t enough people in the market – and hiring the wrong talent can be devastating.
Tony Hsieh, CEO of Zappos
Investing in your workforce is not only great for morale and motivation, it boosts your brand and positions you as an employer of choice due to the development opportunities.
When recruitment fails – and even when it doesn’t – training up the people you know and trust may be more efficient and more effective than replacing them.
Through our global pool of trainers, Academies and online platforms, we can deliver Reskill programs anytime, anywhere.
Business acumen is hard to acquire and even harder to replace. With reskilling, you don’t have to lose it.
Reskilling opens up a new demographic because you’re fishing in a different pond. Diversify in all dimensions, from gender and ethnicity to age, education, socioeconomic background.
Gathering requirements is only half the picture. Our technical experts work with you on a skills gap analysis to understand which knowledge areas will add most value to your teams.
We create your training program. On top of the custom curriculum, we tailor the content to your industry, infrastructure and environment.
Our expert instructors deliver the training through the Wily Edge Academy (online, in person or blended).
We assess the trainees’ performance throughout the training, as well as capturing their feedback on us.
New skills take time to bed in once the training is over, and there’s always more to learn. That’s why lifelong learning is a part of every program.
Welcome to the home of all our custom training – online, in person or blended – for Wiley Edge Alumni.
Aligned to industry, our Academy curriculum adapts to meet ever-changing requirements, connecting education to the working world.
Our training pathways, including Software Development, Production Support, Data Science, Anti-Financial Crime and more, are created by our team of instructors. Everyone has at least a decade’s experience in the field.
On one side, you’re reskilling your existing employees. On the other side, you’re bringing in custom-trained graduates. Together, Reskill and Alumni let you build sustainable pipelines of diverse talent over the short and long term, complementing traditional hiring strategies like internal graduate programs and reactive recruitment.
In 2020 Wiley Edge joined Wiley (NYSE: JWA). Wiley is a global leader in research and education, unlocking human potential by enabling discovery, powering education, and shaping workforces. For over 200 years, Wiley has fueled the world’s knowledge ecosystem. Today, their high-impact content, platforms, and services help researchers, learners, institutions, and corporations achieve their goals in an ever-changing world.
Learn more about Wiley & Wiley Edge >>Wiley Edge brings together all of our capabilities in education, quite literally bridging the skills gap by connecting education to real career outcomes.
Want to find out more about how we can help you build the skills you need in-house?