Private in-house training
Apart from public, instructor-led classes, we also offer private in-house trainings for organizations based on their needs. Call us at +852 2116 3328 or email us at [email protected] for more details.
Delivery Mode

Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring with Azure Machine Learning and MLflow.

4 Days

This course introduces fundamental concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. The course is designed as a blended learning experience that combines instructor-led training with online materials on the Microsoft Learn platform.

1 Day

This course begins by examining the Microsoft Copilot for Microsoft 365 design. Its main focus, however, is on the security and compliance features that administrators must configure in their Microsoft 365 tenant to protect their company’s organizational data before they implement Copilot for Microsoft 365.

1 Day

Discover ways to craft effective and contextual prompts for Microsoft Copilot for Microsoft 365 that create, simplify, transform, and compile content across Microsoft 365 applications. Learn the importance of providing a clear goal, context, source, and expectation in your prompt for the best results. This course covers real world scenarios and examples using Copilot in Microsoft 365 apps like Word, Excel, PowerPoint, Teams, Outlook, OneNote, and Chat.

1 Day

Unlock the full potential of artificial intelligence! Our comprehensive range of courses is designed to equip individuals and organizations with the knowledge and skills needed to thrive in the age of AI. Whether you’re a business leader looking to harness the power of AI, a technical professional seeking to deepen your expertise, or an end user eager to leverage AI solutions, our GenAI programs have got you covered. From executive leadership programs to technical training and user-focused courses, we offer a diverse curriculum tailored to meet your specific needs. Explore our offerings, and embark on a transformative journey that will shape the future of your career and business.

This training course helps to measures your ability to accomplish coding tasks related to the basics of programming in the Python language and the fundamental notions and techniques used in object-oriented programming.


This one-day course is composed of two parts – Getting started with Copilot for Microsoft 365 and Empower your workforce with Copilot for Microsoft 365 Use Cases. The first part of the course introduces you to Copilot for Microsoft 365, examines how you can use Copilot throughout the various Microsoft 365 apps, explores best practices for using Copilot and building effective prompts, and examines how you can extend Copilot with plugins and Graph connectors.

The second part of this training content is really the heart of this course. Students perform a series of hands-on exercises involving seven Use Cases – Executives, Sales, Marketing, Finance, IT, HR, and Operations. These exercises focus on using Copilot in various Microsoft 365 apps (such as Word, PowerPoint, Outlook, and so on) to complete a series of common business-related tasks pertaining to each Use Case. To complete the Use Case exercises in this course, each student must have access to a Microsoft 365 subscription (BYOS) in which they’re licensed to use Copilot for Microsoft 365. Each student must also have a Microsoft OneDrive account, since Copilot requires OneDrive to complete the file sharing tasks used throughout the Use Case exercises.

1 Day

In this two-day executive program, the executives will learn the basics of Generative AI and its applications, as well as how to design, execute, and manage Generative AI projects with
responsibility and ethics. Executives will also get hands-on experience with some of the popular Generative AI tools and platforms, such as ChatGPT and DALL·E. By the end of this course, the
executives will have a solid understanding of Generative AI and its implications for their organizations and be able to leverage it for business transformation and strategy

CFT (Certified Financial Technologist) is built by fintech professionals for fintech professionals, Focus on in-depth fintech knowledge, containing advanced understanding of the technology infrastructure, strategies and applications. This will lead to an increasing industry recognition for members across the region as well as giving them the advantage in a competitive market.

ISC2 developed the Certified in Cybersecurity (CC) credential for newcomers to the field, to recognize the growing trend of people entering the cybersecurity workforce without direct IT experience. Getting Certified in Cybersecurity provides employers with the confidence that you have a solid grasp of the right technical concepts, and a demonstrated aptitude to learn on the job. As an ISC2 certification, those who hold the CC are backed by the world’s largest network of certified cybersecurity professionals helping them continue their professional development and earn new achievements and qualifications throughout their career.

This three-day course is intended for migration engineers who have mastered Huawei cloud migration policies and processes, have knowledge about computing, storage, network, database, container, and middleware usage and migration, and are able to implement cloud migration planning services.

3 Days

Ethical Hacking, also known as “White hats” is a skill to identify vulnerabilities in organization’s network and infrastructure. It involves an authorized attempt to gain unauthorized access to organization’s computer system, application or database. Different from cybersecurity defensive nature, ethical hacker with proactive and offensive nature can provide resolved solution to prevent incidents or attacks by malicious attacker. Certified Ethical Hacker (C l EH) is a global recognized credential issued by EC-council positioned to validate knowledge of investigating the vulnerabilities and weaknesses of a system in a lawful manner and providing a solution to restore it.

Search for a course