Our case study driven ITIL Practitioner course offers practical guidance for professionals on how to adopt and adapt ITIL for their organization. This course is the next logical step for individuals who have earned the ITIL Foundation Certificate and are familiar with the ‘what’ and ‘why’ of ITIL. ITIL Practitioner will focus on the ‘how.’
This immersive case study driven course is developed by practitioners for practitioners! During the two-day course, individuals, teams, and organizations will learn to address the challenges faced by them due to IT Service Management (ITSM) improvement initiatives.
The course is packed with interactive assignments, tools, checklists, and guidance on how to make the improvement changes happen. You will learn to describe, explain, and distinguish among the various elements of being an ITIL Practitioner.
Examination fees are included in the course price.
The NIST CyberSecurity Foundation certification course is developed to teach the basic information security concepts and techniques. The knowledge captured and communicated in this course can be immediately applied by organizations around the globe to ramp up to meet their legal obligations defined by newly introduced statutory and regulatory acts.
This course is designed exclusively for learners who have successfully completed the KT Foundation course and is the next step in developing expertise in the area of Advanced Problem Management towards becoming a high performance “trouble-shooter.”
The EXIN Agile Scrum Foundation is a certification provided by the EXIN certification and accreditation body that validates a professional’s blended knowledge in Agile methodologies and Scrum practices. In this course the benefits and practices of Agile frameworks in general and Scrum in particular will be explored.
AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process and technology.
The aim of this course is to explore relevant concepts related to security, risk, and compliance within the cloud computing environment. The objectives for this course are to enable the candidates to apply the underpinning security concepts into an enterprise cloud computing environment.
The 2-day Kepner-Tregoe® Foundation course introduces a systematic process of problem solving when responding to incidents and problems. The course is designed for individuals who work in trouble shooting environments.
This sixteen (16) hour course provides an introduction to DevOps – the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals.
AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business.
Cloud computing has become a reality and organizations across the globe are looking for a training solution in order to build cloud competencies in their organization to properly manage, utilize and govern new technologies. This exciting and dynamic 3-day course, fully updated for ITIL 2011, introduces learners to the lifecycle of managing IT services to deliver to business expectations.
The Professional Cloud Developer course is designed for application developers who are designing and developing applications for cloud environments. This training is delivered as a 3-day classroom or virtual classroom program. The training covers best practices on application design for cloud environments and supports many vendor technology solutions, covering Open Source and major Vendor Standards. The principles covered in the course apply to the entire application lifecycle, and are relevant to any technology or platform.
Cloud computing is not just a technology, but also a new model for organizing, contracting and delivering information technology systems. This model has great potential for benefits but also new risks. The certification course is an excellent way to prepare professionals who are considering cloud computing in their organizations.
This course is aimed at people who work, or would like to work, on projects on a daily basis. It provides practical knowledge on how to manage projects using the PRINCE2 method. Successful delegates will gain certification at the Practitioner level.
This course covers the Foundation level certification of the Lean IT Association. Further Lean IT qualifications are Lean IT Kaizen Lead, Lean IT Coach and Lean IT Leadership. The Lean IT Foundation is the entry level certification. This certification is mandatory for the other certifications.
PRINCE2® (Projects IN Controlled Environments) provides common processes, management products, roles, and language for use throughout an organization’s projects. PRINCE2 is the most successful Project Management method in the world — it has become the de facto standard in both the private and public sectors.
This 1.5-day course immerses learners in the overall concepts, processes, policies and methods associated with the Service Transition phase of the Service Lifecycle. The course covers the management and control of the activities and techniques within the Service Transition stage, but not the detail of each of the supporting processes.
Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.