Info-Tech

Private in-house training
Apart from public, instructor-led classes, we also offer private in-house trainings for organizations based on their needs. Call us at +852 2116 3328 or email us at [email protected] for more details.
Certification
Role
Delivery Mode
Tags

CISA® is a globally recognized standard of achievement among information systems (IS) audit, control and security professionals. The certification examination is designed to assess and certify individuals in the IS audit, control, assurance and security professionals.

Holder of a CISA® credential demonstrates proficiency and signifies commitment to serving an organization and the IS audit, control and security industry with distinction.

This programme is specifically designed according to the CISA® syllabus.

Information Technology Infrastructure Library, famously know is as ITIL, has ever been evolving to help the IT industry to do a better job and to cope with the increasingly business dependency on IT for business success. While previous ITIL frameworks enable the IT professional on processes, value to business, and continual improvement, ITIL 4 brings in the management piece. It is an enriching new piece for all IT professionals.

ITIL 4 new elements are the service management framework, namely the Seven Guiding Principles, Four Dimension of Service Management, Service Value System, Service Value Chain which includes all the practices. It also embraces others such as Agile, LEAN, DevOps.

This instructor-led course is specially designed for participants to attempt the ITIL Foundation Certificate level, a new way to look at IT Service Management through a Service Value System, with that, IT professionals may choose the best service management approach for maximum business value.

As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSP, a credential which denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security.

 

CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure

Agile project management is an iterative method of determining requirements of projects in a highly flexible and interactive manner. It is a method of doing projects by empowering and trusting people, acknowledging change as norm, and promoting constant feedback. For organizations adopting agile approaches to project management, they place importance on individual and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation and responding to change over following a plan.

PMI-ACP® is positioned to recognize and validate knowledge of agile principles, practices and tools and techniques across agile methodologies.

 

PMI Agile Certified Practitioner (PMI-ACP) is a registered mark of the Project Managment Institute, Inc.

Globally Recognized Expertise in the Field of Information Security if you plan to build a career in information security – one of today’s most visible professions – the Certified Information Systems Security Professional (CISSP®) credential should be your next career goal.

A CISSP® is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP® apart. They credential demonstrates a globally recognized level of competence provided by the (ISC)²® CBK, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

CISSP® was the first credential in the field of information to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP® an objective measure of excellence, but also a globally recognized standard of achievement.

AI-102T00

AI-102 Designing and Implementing a Microsoft Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework. The course will use C# or Python as the programming language.

4 Days
HK$11,200
DP-203T00

In this course, the student will learn about the data engineering patterns and practices as it pertains to working with batch and real-time analytical solutions using Azure data platform technologies. Students will begin by understanding the core compute and storage technologies that are used to build an analytical solution. They will then explore how to design an analytical serving layers and focus on data engineering considerations for working with source files. The students will learn how to interactively explore data stored in files in a data lake. They will learn the various ingestion techniques that can be used to load data using the Apache Spark capability found in Azure Synapse Analytics or Azure Databricks, or how to ingest using Azure Data Factory or Azure Synapse pipelines. The students will also learn the various ways they can transform the data using the same technologies that is used to ingest data. The student will spend time on the course learning how to monitor and analyze the performance of analytical system so that they can optimize the performance of data loads, or queries that are issued against the systems. They will understand the importance of implementing security to ensure that the data is protected at rest or in transit. The student will then show how the data in an analytical system can be used to create dashboards, or build predictive models in Azure Synapse Analytics.

4 Days
HK$11,200
PL-300T00

This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will also show how to access and process data from a range of data sources including both relational and non-relational data. This course will also explore how to implement proper security standards and policies across the Power BI spectrum including datasets and groups. The course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Finally, this course will show how to build paginated reports within the Power BI service and publish them to a workspace for inclusion within Power BI.

3 Days
HK$8,400
AZ-500T00

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

4 Days
HK$11,200
AZ-400

This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms.

5 Days
HK$14,000
AZ-305

This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.

4 Days
HK$11,200
AZ-204

This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.

5 Days
HK$14,000

Search for a course