dibuka Program Training Online / Webinar !

Tetap bisa training sekalipun #diRumahAja

PUBLIC TRAINING - PURNAMA ACADEMY

Kami Bekerjasama dengan hotel bintang di 4 kota Bandung-Jakarta-Bali-Cikarang untuk memberikan kenyamanan peserta public training

REQUEST FOR INHOUSE TRAINING

Inhouse Training adalah pilihan paling tepat untuk jumlah peserta perusahaan yang banyak dengan mengutamakan efisiensi biaya training.

PORTFOLIO : INHOUSE TRAINING ANDROID - PLN MALUKU

Inhouse Training Android Application Development di PT. PLN Wilayah Maluku selama 4 hari

PORTFOLIO : INHOUSE TRAINING MAGENTO - INFOTECH JAKARTA

Inhouse Training Magento E-Commerce berdurasi 7 hari dibagi 2 sesi Fundamental dan Advanced.

Friday, June 17, 2022

TECHNICAL WRITER FOR SOFTWARE/ APPLICATION

 HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  TRAINER - BANDUNG

081-223344-506 

SILABUS TRAINING

 


Technical Writing for Software / Application


DURATIONS :   4 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )


DESCRIPTION : Is the ability to provide relevant information about using your software essential for your customers? Do you find yourself spending hours and hours trying to explain how to use the software? Or are you getting feedback from your clients that your documentation is hard to be followed, inconsistent or maybe even.... confusing? 


If you answered with "Yes!" to any of these questions and you are willing to invest the time and energy needed to go through this practical course then this course is for you!


A software technical writer creates documents to describe how to set up and use software products. Software technical writers make user guides, setup instructions, instruction manuals, online training material, release notes, new feature documents, how-to guides, and quick reference articles

TRAINING OBJECTIVES : This course is designed for beginner technical writers, usually students in IT, and covers the following subjects:

What is technical writing / writer all about?

What are the basics of Software technical writing?

Which are the main principles that you should follow to construct build your documentation?

Which are the common terms you will hear and use in the IT technical writing world?

How to write technical documentation using GitHub wiki? You will, later on, use this material for creating your portfolio that you will want to add to your CV when you apply for a technical writer job or promotion to a senior developer.

What is information architecture from a technical writing point of view?

REQUIREMENTS : You will need a PC or a laptop where you can develop content assignments or install particular software we will be using on trial basis in the course of the training 


PARTICIPANTS : - Software developers who want to gain practical knowledge on how to offer help for the users of software products

- Students who work on their software development projects and now struggle to create the documentation delivery for their app

- If you pursue career as a technical writer, developer, architect, manager or product owner

- Business analysts who want to know the basics of technical writing

- Technical Writers and Information Developers

TRAINING TOPICS : Application Technical Writer Overview

What is Technical Writing

Who is Doing Technical Writing

What is the Result from Technical Writing

The Job of Technical Writer

Types of Documentation

Functional Documentation

Functional Documentation in Application Documentation

Strategy for writing functional Documentation

Task- Oriented Documentation

Srategy for writing task-Oriented Documentation

What is Application Documentation

Technical Writers in the Application Development World

Technical Writing Deliverables for Application


Documentation in the Application Development World

Technical Writer in the Application Development Team

The Technical Writing Process

The Ultimate Purpose of the Technical Writer

Test Your Knowledge Documentation in the Application Development World

Writing Documentation Using GitHub Wiki

Overview - Sample Setup in GitHub

What is GitHub?

Why Writing in GitHub?

Documentation in GitHub

Markup Language in Wiki Pages

Set up Account in GitHub and Create a New Wiki Page

How to Create a Table in GitHub Wiki Using Markdown

How to Create an Image in GitHub Wiki using Markdown

How to Create a Link to a Mail Address in GitHub Wiki Using Markdown

How to Create a Table of Content (TOC) in GitHub Wiki Using Markdown


Style Guide In Technical Writing

How to Use a Style Guide in Technical Writing

What is Style Guide?

Why do we Needs Standards for Writing?

Sample Style Guides

Who Else Needs Rules for Writing?

Results from Using a Style Guide

Structure in Writing

Conciseness

Simplicity

Precision

Verb Choice Can or May?

Verb Choice Must/Must not/Should/Shouldn't/May

Active Voice and Present Tense

Terminology

Consider in Addition

Use Tools!

UI Messages and Text on Screen


Introduction of Strurtured Writing

Structured Writing

Why Do We Need Structure in Writing?

Organizing Large Amounts of Content

Consistency in User Experience

Intuitive and Obvious User Experience

Ensuring Completeness of the Documentation

Targeting Content to Various Audiences

Coordinating Documentation Projects

Increase Understandability of the Documentation

Structured Writing Definition

Common Information Types

DITA XML - a Standard for Structured Writing

How to Structure in an Unstructured Writing Environment?

Structured Writing in Microsoft Word Environment

Details of the Topic Types in the MS Word Template

Structured Writing in GitHub Wiki

Details of the Topic Types in the GitHub Wiki Template


12 Principles of Technical Writing

Principles of Technical Writing

Principle #1 Decide Who are You Writing For

Principle #2 Identify the Information Needs

Principle #3 Decide on the Style

Principle #4 Decide Which Deliverables to Create

Principle #5 Decide Which Tools to Use

Principle #6 Define the Content Structure

Principle #7 Decide Which Information Channels to Use

Principle #8 Write the Documentation

Principle #9 Use Images and Video When Appropriate

Principle #10 Publish the First Version

Principle #11 Collect Feedback and Improve

Principle #12 Repeat!

Exercise on Applying the Principles in Documentation


Application Documentation Development using DITA XML (Oxygen Author)

What is DITA?

Who Defines DITA?

The DITA Specification

Overview of the Specification

Do You Need to Know the Specification by Heart?

Basics of Structured Writing

Understanding DITA Authoring Point of View

Understanding DITA Information Architect Point of View

How to Install the Application for This Section

Oxygen XML Author

Installing a Tool for Writing with DITA

End-to-end Demo

Exercise  Write a Sample Instruction

Exercise  Writing Documentation using Oxygen Author DITA CMS



Using Graphics & Images in Software Documentation

Why Graphics are Important?

When to Use Graphics in Application Documentation?

Types of Graphics in Application Documentation

Process Graphics

Architecture Graphics

Infographics

Rules for Graphics in Technical Writing

Tools for Creating Graphics

Exercise Instructions

Infographic Exercise - Expected Result

Demo - Create Infographic Using Canva

Creating Graphics Using Microsoft PowerPoint

Demo Using Microsoft PowerPoint

Exercise - Creating Graphics Using Google Drive


Strategies and Technical Writing Information Archictecture

What is Information Architecture?

Who is an Information Architect and What Does an IA Do?

Why Should I Care About Information Architecture?

Information Architecture in Technical Writing

How to Apply Information Architecture Principles for the Content?

Structuring Data. Metadata and Taxonomies.

What is Metadata?

What is Taxonomy?

Starting the Classification and Engaging Stakeholders

Define Scenarios

Visualize It!


Next Recommendation  Training : 1. ISTQB CTFL Exam Preparation Training

2. Application Testing Automations with Katalon Studio & Jenkins



IT HELPDESK MANAGEMENT TRAINING, BY CERTIFIED TRAINER

 


HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  TRAINER - BANDUNG 

081223344506

SILABUS TRAINING

 

IT HELPDESK MANAGEMENT


DURATIONS :   3 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )


DESCRIPTION : Your IT Help desk is the center of your customer service team. It helps your business provide customer-centric service through automating and organizing their daily workflow. By doing correct IT Heldesk Management Practices and supplying employees with proper tools they need to quickly response and take actions for any issues and user questions, your company will creates a more powerful service cycle

TRAINING OBJECTIVES : This Course provide an overview of the typical knowledge and skills required,  without focusing on any one technology vendor or platform.


This course does assume the participants already has some technical knowledge that will be utilized in a Help Desk role. The focus of the course is on the high-level Management practices that are important when providing Help Desk support services, including customer service, IT Service Management and the technical activities that will be performed.


The course material also is based on the ITSM best practices

You learn Incident and Request classification, specific features of performing major Incident resolving. You learn and practice on creating Incident and Request models for certain types of user calls.


While Monitoring/Event management studies You learn the best practices of building-in monitoring tools in an IT service, types of events, and management of them.


Problem management is mostly an expert area. At the course students learn and practice best practices of expert analysis such as mind maps, Kepner Tregoe analysis, Five Whys, and others.

REQUIREMENTS : Junior experience at a Help desk/Service desk or other IT junior positions

Basic knowledge in IT management

PARTICIPANTS : - Service Desk/Help desk specialists

- Service/Help desk managers

- IT managers

- Business unit managers which closely collaborate with IT departmen

TRAINING TOPICS : IT Helpdesk Management Overview

What is IT Helpdesk Management

IT Helpdesk Vs IT Service Desk


IT Helpdek Hiring Management Practice

Hiring New Staff & Smart Hiring 

To DO List, Expectations, Technical Skills and Attributs

Have Others Check your List, Legally Complaint, Chart Review and Essentials

Create Job Description and Get the Word Out

Narrow your Application Pool, Prepare for the Interview and Resources

Know Who you are Talking To, Asking the Right Questions, About Discrimination

Open-ended, Relevant to the Position and the Individual & The Interview

Evaluation, In Review, Background Check, Extend the Offer & Steps in Hiring


Topgrading

Introduction and Definition of Topgrading

Definition of A-players, Best of the Rest and Appropriate Compensation

The Big Question, Implementation, Best Practices, Talent Review and Scorecards

Interview Process and Types of Interview


It Helpdesk Team Building

Working in a Team, Types of Team and Teamwork Success

Employee Involvement, Team Conflict and Team Leaders Role in Managing Conflict

Leadership, Learning to be a Leader, LEAD Model & What Sort of a Leader are You

Lead by Example and Management Process

How to Motivate, Coaching Staff and Coaching Skills

Working Together, Why is Training Needed and Contributing to the Team

Learning Organizations, Development Cycle and Performance Appraisals

Cross Training and Poor Management


Managing Your IT Helpdesk Team

Introduction, All About Money, and Reward and Recognition

The Cost, Factors, Challenging Goals and Clear Instruction

Meaningful Tasks, Feedback, Rewards and Incentives

No Single Rewards, Who Benefits and The Bottom Line

Performance Reviews and Avoidance

Tips for a Better Performance Review and Signs of Success

Retention of Quality, What can We Do, Research and Best Workplaces

Motivational Strategies, Rates, Most Important Attributes & Collecting Feedback

Ask, Cluster Surveys, Started Feedback, Stay and Exit Interview Survey


IT Service Management Principles

Introduction, Definition and Good Practice for ITSM?

Business, IT Alignment, Definition of Services and Process & the Generic Process

Function and Process Owner vs Service Owner

Service Lifecycle

IT Financial Management

Demand Management

Request Fulfillment

Access Management


Service Operations Process

INCIDENT Management & tasks

Problem management

Problem management assignment

Event management - Service monitoring and control

Serving user requests (RFS)

Develop a Request model


Selecting A Help Desk Tools

Importance of Supporting Technology, Common Features and Additional Features

Selection Process and Knowledge Management Integration

Workflow Management and Major Tool Vendors


IT Helpdesk Support Services

How to Properly Trouble Shoot PC Issues

How to Properly Trouble Shoot Printer Issues

Screen Sharing with Team Viewer

Active Directory Users and Computers Demostrated and explained

Introduction to Microsoft Outlook

Common Password Locations : Credential Manager

Common Password Locations : Google Chrome

Commong Password Locations : Wifi

What is the Internet

Basic Networking : IPconfig, Ping, Pathping


Next Recommendation  Training : 1. ITIL V.4

2. ISO 20000 IT Service Management (ITSM)

3. ICT Governance



SOFTWARE QUALITY ASSURANCE (SQA) TRAINER

HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  TRAINER - BANDUNG

SILABUS TRAINING

 


SOFTWARE QUALITY ASSURANCE (SQA)


DURATIONS :   4 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )


DESCRIPTION : This program is designed for Software Quality Control and Assurance Manager, Project Manager and Software Development Team Member who is interested in increasing the likelihood of project success. The course looks at software quality control and assurance processes and practices, as well as support disciplines such as software project management, software configuration management and release management. Successful software quality assurance is the result of the combination and integration of these practices, and complements SE practices.

TRAINING OBJECTIVES : Write a software quality plan

Define software quality metrics

Prepare software quality checklists

Develop an overall process improvement plan

Understand how to best help your colleagues with the quality of their outputs

Ensure the highest possible quality products

Deliver value-added products

Help your company win more business by delivering higher quality

REQUIREMENTS : Have a general knowledge of software development life cycles.

Does not require knowledge of any programming languages 


PARTICIPANTS : - Learners and practionares of quality control, quality assurance and quality management.

- software developers

- software project managers and team leaders

- Example: Beginner level course ideally suited for someone who knows very little about software quality assurance

TRAINING TOPICS : Chapter 1  Quality Assurance Basics   

Connotations of the Word Quality   

What Is Quality? 

Specifications 

Definition of Quality from the Standpoint of the Provider 

Quality and Reliability 

Evolution of the Concepts of Quality 

Quality Gurus 

Total Quality Management 

Are We Giving Adequate Importance to Quality in Organizations? 

Organizational Goals and Quality Goals

Is a Quality Department in Software Development Organizations Really Needed? 

The Present Scenario in Software Development Organizations 


Chapter 2  Four Dimensions of Quality 

Background 

Specification Quality 

Design Quality 

Development (Software Construction) Quality 

Conformance Quality 

Ensuring Quality in Specifications 

Ensuring Quality in Design 

Ensuring Quality in Development (Software Construction) 

Ensuring Conformance Quality 


Chapter 3  Software Product Quality 

Functionality Standpoint 

White Box (Glass Box) Standpoint 

Presence of Defects in the Product 

Program Quality 

Measurement of Product Quality 


Chapter 4  Organizational Environment that Fosters a Quality

Culture 

Quality and Organizational Environment    

Need for an Independent Quality Assurance Department    

The Role of the Quality Assurance Department    

The Position of the Quality Assurance Department in an Organization    

Organization of the Quality Assurance Department    

Organization and Staffing of the Quality Assurance Department    

A Well-Defined and Institutionalized Software Development Process    

Explicit System of Rewards and Recognition for Achieving Excellence in Quality    

Commitment and Involvement of Senior Management in Fostering a Culture of Quality in the Organization    

    


Chapter 5  Software Verification    

Verification    

Walkthroughs (Peer Reviews)    

Inspections     

Audits     

Verification Process     

Implementation of Verification Activities in Projects 

    

Chapter 6  Validation     

Definition of Validation     

Validation of Software Designs     

Validating the Product Specifications     

Validating the Software Product     

Testing Different Types of Software Products     

Testing Basics     

Approaches to Testing     

Test Case Design     

Test Environment     

Testing Scenarios     

Project Testing or Embedded Testing     

Product Testing     

Best Practices in Testing     

Automation of Testing and Use of Testing Tools     

Final Words about Software Testing     


Chapter 7   Software Product Quality: Reliability     

Software Disasters     

Software Reliability     

Cause of Software Failures     

Prediction of Software Reliability     

Software Reliability Improvement     


Chapter 8   Process Quality     

Process Quality Evolution     

Aligning the Process with a Process Model     

Process Improvement     

Process Stabilization     

Software Development Process     

Components of a Process     

Process Certification   

  

Chapter 9  New Paradigm for Software Quality     

Current Certification Paradigms     

The Fallacy of Certifications     

Criticisms of Maturity Models     

A New Paradigm for Software Quality Assurance     


Next Recommendation  Training : 1. ISTQB CTFL Exam Preparation Training

2. Software Testing Automations with Katalon Studio & Jenkins



BUSINESS PROCESS MODEL TRAINER - BPMN TRAINING

HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

SILABUS TRAINING

 BUSINESS PROCESS MODEL WITH BPMN 



DURATIONS :  4 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )


DESCRIPTION : Business process modeling in business process management and systems engineering is the activity of representing processes of an enterprise, so that the current business processes may be analyzed, improved, and automated

TRAINING OBJECTIVES : Create clear, correct and expressive BPMN 2.0 Models with clear process logic

The full vocabulary of BPMN 2.0 Level 1: the descriptive modelling pallet

The context of BPMN, BPM and Business Analysis in general

Best practices approach with tips and tricks to model any real-world process

How to improve real-world processes using BPMN 2.0

How to adhere a common modelling method to create consist diagrams for both Business and IT

REQUIREMENTS : This training is tool independent, just like BPMN itself. You can use your own tool or use the free web-based one


PARTICIPANTS : - Business Analysts

- Aspiring Business Analyst

- Managers

- Technical Developers

- Consultants

- External teams and third parties

- Process Improvers

TRAINING TOPICS : Introduction to BPMN

What is BPMN

Practice the core elements 

The Advantages of BPMN .

BPMN . versus Traditional Flowcharts

BPMN . and BPM Suites

Why BPMN . is Important


Getting Started with BPMN 

Tooling BPMN . Setup & Tips and Tricks

BPMN for Practitioners

Model your First BPMN

Using XOR Gateways correctly

Practical Example Model a webshop order proces.

Practice with XOR gateways and conventions


Pools, Lanes, Subprocess, Hierarchical Model

Pools in BPMN

How To Creating Pools in Lucidchart

Lanes and Pools in BPMN

How To Create Lanes in Lucidchart & replicate the model

Different Task Types User and Service

Subprocesses, Nesting and Inline or Hierarchical Expansion

Parallel Gateways, Terminate End Events and Timer Trigger Events


Collaborations, Message Flows, data Objects & Events

Collaboration, Blackbox pools, message events & Flows

Collaborations in practice

Data Objects, Data Stores and Call Activities

Annotation Options in BPMN

Exercise Practice with Message End Events


Summary the All of Elements

Starts & Events

Activities and subprocesses

Gateways, Connectors. Pools, lanes and black boxes

Data objects

Annotation


Quality, Best Practices and Methodology

About Good BPMN

Seven Best Practices to create good BPMN . Models

Agile methodology to go from a blank piece of paper to a full BPMN diagram


Practice & Case Study

Business Case Assignment Description

Business Case The Scenario

Step 1 Assignment Scope of the high level Business Process

Step 1 Solution Scope the high level business process

Step 2 Part I Assignment Model the happy path scenario

Step 2 Part I Solution of the happy path scenario

Step 2 Part I How to draw the happy path scenario Lucidchart

Step 2 Part II Assignment Add exception flows

Step 2, Part II Solution of adding the exception flows

Step 2 , Part II How to model the exception flows in Lucidchart

Step 2,  Part III Assignment Add all detail to the high level process

Step 2,  Part III Solution of Adding all detail to the Model

Step 2 , Part III How to add all detail to the model in Lucidchart

Step 3 Improve The Process

Step 3  Assignment Model the improvement

Step 3 Solution

Step 3 How to model 'to be' or 'target' business process models 

Step  4 Scope sublevel processes; scenario and assignment.

Step  4 Solution of scoping the sublevel processes

Step  5 Model subprocesses assignment

Step  5 Solution of the subprocess

Step  5 How to model the subprocess in Lucidchart.


Next Recommendation  Training : 1. S.A.D with UML

2. Enterprise Architect with TOGAF 9



IT CYBER RISK SECURITY MANAGEMENT TRAINER

HERY PURNAMA, SE.,MM.

MCP, PMP, CISM, CISSP, CISA, ITILF, CTFL, CDMP

CERTIFIED  IT TRAINER - BANDUNG

 SILABUS TRAINING

 


IT CYBER RISK SECURITY MANAGEMENT


DURATIONS :  3 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )


DESCRIPTION : In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.


You will learn how to identify, assess and articulate risk as well as options available for treating cyber security risk and which may be most appropriate for your situation.


This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization

TRAINING OBJECTIVES : Develop an understanding of what risk is and how it can be managed.

How to create a risk management framework within your organisation.

How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.

How to perform detailed analysis of risk and develop risk treatment plans.

How to apply risk management concepts in practice including developing a risk register, Cyber Security Strategy Plan, governance models, risk bowties and reporting.

REQUIREMENTS : No special requirements

PARTICIPANTS : - Information Technology Managers

- Information/Cyber Security Managers

- Information Security Professionals

- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security

TRAINING TOPICS : Introduction

What Is Risk?

IT & Cyber Security Risk

Components of a Risk

Articulating Risk



Risk Management

What is Risk Management

Objectives of Risk Management

Risk Management vs Risk Minimisation

Risk Management Principles

Risk Management Framework

Mandate & Commitment

Designing your framework

Designing your framework – Organisational Context

Designing your framework - Establish Policy

Designing your framework - Accountability

Designing your framework - Organisational Integration

Designing your framework - Communication & Reporting

Designing your framework - Implementation

Designing your framework - Monitoring & Review

Designing your framework - Continual Improvement

The risk management process

The risk management process - Communication & Consultation

The risk management process - Context Establishment

The risk management process - Risk Assessment

The risk management process - Risk Treatment

The risk management process - Monitoring & Review

The risk management process - Auditability and Traceability

Risk Management - Maturity Models


Risk Management - Risk Assessment & Measurement

Risk Assessment & Measurement - Terminology

The risk management process (recap)

Risk Identification

Risk Analysys

Risk Analysis - Likelihood

Risk Analysis - Consequence/Impact

Risk Analysis - Consequence Examples

Risk Analysis - Risk Matrix

Risk Analysis - Analysis Example 

Risk Evaluation

Risk Treatment

Risk Treatment Plan Example 

Risk Treatment Considerations


Cyber Security Risk management in Practice

Creating an IT risk register

Example Excel risk register

Risk governance -   lines of defence model

Developing Cyber Security Strategy Plan 

Risk bowties

 



Next Recommendation  Training : 1. CISM Exam Preparation Training

2. CISSP Exam Preparation Training

3. ISO 27001 Training

4. ISO 31000 Training



Wednesday, June 1, 2022

CDMP DMBOK2 Exam Preparation Training in Jakarta, Bandung by Purnama Academy.

Informasi biaya dan Harga training ,Durasi, Ujian  : CDMP DMBOK Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

DMBOK2 has been in the making for nearly 30 years. The contributors are all experienced practitioners and many of whom you see as contributors have recognizable names. This is not a theoretical book, although it has authoritative theoretical substance. It is primarily a book of practice, experience, expression of what actually works by the very best practitioners in the industry today.



The DAMA Dictionary of Data Management (2nd edition) includes over 2000 terms defining a common data management vocabulary for IT professionals, data stewards and business leaders. Over 40 topics including finance and accounting, knowledge management, architecture, data modeling, XML, and analytics.


The DAMA Dictionary of Data Management (2nd edition) includes over 2000 terms defining a common data management vocabulary for IT professionals, data stewards and business leaders. Over 40 topics including finance and accounting, knowledge management, architecture, data modeling, XML, and analytics.


Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001


Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT


CDMP TRAINING AT

PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


CTFL ISTQB Exam Preparation Training in Jakarta, Bandung by Purnama Academy.

Informasi biaya dan Harga training ,Durasi, Ujian  : CTFL ISTQB Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

CTFL stands for ISTQB Certified Tester Foundation Level For software testers, ISTQB CTFL is valuable because it establishes a base knowledge of software testing vocabulary and principles.

Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001



Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT


CTFL TRAINING AT

PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


CISM Exam Preparation Training in Jakarta, Bandung by Purnama Academy.

Informasi biaya dan Harga training ,Durasi, Ujian  : CISM Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

ISACA's Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.

Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001



Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT


CISM TRAINING AT

PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


PMBOK PROJECT MANAGEMENT Training in Jakarta, Bandung at Purnama Academy.

 PMBOK PROJECT MANAGEMENT Training in Jakarta, Bandung at Purnama Academy.

Informasi biaya dan Harga training ,Durasi, Ujian  : PMBOK , PMP/CAPM Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

The Project Management Body of Knowledge (PMBOK) is a set of standard terminology and guidelines (a body of knowledge) for project management

Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001



Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT


PMBOK TRAINING AT

PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


COBIT 2019 Exam Preparation Training in Jakarta/ Bandung at Purnama Academy

Informasi biaya dan Harga training ,Durasi, Ujian - COBIT 2019 Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 



COBIT (Control Objectives for Information and Related Technologies) is a framework created by ISACA for information technology (IT) management and IT governance.

The framework is business focused and defines a set of generic processes for the management of IT, with each process defined together with process inputs and outputs, key process-activities, process objectives, performance measures and an elementary maturity model.

Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001


Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT



PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


ITIL V.4 Exam Preparation Training in Jakarta/ Bandung at Purnama Academy

Informasi biaya dan Harga training ,Durasi, Ujian - ITIL Version 4 Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

ITIL version 4 was launched in February 2019. The main changes were: to consider end-end Service Management from holistic and value-centric perspectives, to align with philosophies such as Agile, DevOps and Lean, and to reduce the emphasis on IT Service Management in favour of general Service Management

Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001



Other Training Topics : 


• ITIL v.3 2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) Foundation

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT



PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


CISA Exam Preparation Training in Jakarta/ Bandung at Purnama Academy

Informasi Biaya dan Harga training ,Durasi, Ujian - CISA Exam Preparation Training in Jakarta/ Bandung at Purnama Academy, 

ISACA's Certified Information Systems Auditor (CISA) is the standard of achievement for those who audit and assess an organization's information technology.

Training disertai sejumlah latihan / practice Bank Soal menggunakan Online CBT (Computer Based Testing) 



Further more information regarding syllabus and training cost , please contact our sales representatives (Direct call/ whatsapp) : 0838-0838-0001


Other Training Topics : 


• ITIL v.3/2011 Foundation (IT Infrastructure Library)

• COBIT 5.0 (Control Objectives for Information and Related Technology) 

• TOGAF (The Open Group Architecture Framework) PART 1 & PART 2

• PMBOK (PMP/ CAPM) (Project Management Body of Knowledge) 

• CRISC (Certified in Risk and Information System Control) 

• PMO (Project Management Office) 

• ISTQB (International Software Testing Qualification Board)

• SQA (Software Quality Assuarance)

• PRINCE2 (Projects IN Controlled Environments) 

• CISA (Certified Information Systems Auditor) 

• RDBMS Concept 

• DATA MANAGEMENT BODY OF KNOWLEDGE (DMBOK)

• SAD UML (System Analysis Design with UML 2.0

• BUSINESS ANALYSIS WITH BABOK V.2

• SEO & Digital Marketing 

• e-Filling with EDMS (Electronic Document Management System)

• ISO/IEC 27001:2013 (Information Security),

• ISO/IEC 20000 (IT Service Management)

• ISO/IEC 38500:2008 (Corporate Governance of Information Technology)

• ISO/IEC 90003:2014 (Software Engineering)

• ISO 28000:2007 (Supply Chain Security Management)

• INDEKS KAMI (KEAMANAN INFORMASI) – KOMINFO INDONESIA

• Six SIGMA Foundation (Green Belt)

• IIoT (Industrial 4.0 Internet of Things)

• Managerial Skills and Leadership 

• KMS - Knowledge Management System

• eLMS – Electronic Learning Management System

• DEVOPS (DEVELOPMENT & OPERATIONS )

• CCISO (Certified Chief Information Security Officer)

• CISM (Certified Information Security Manager)

• CISSP (Certified Information Systems Security Professional)

• CDPSE (Certified Data Privacy Solution Engineer)

• COBIT 2019 Foundation 

• COBIT 2019 Design & Implementation

• ITIL V4 Foundation

• ITAM – (IT Asset Management)

• Data Storytelling

• Operations - Capacity Management

• HDFCNA - HDF CERTIFIED NIFI ARCHITECT



PURNAMA ACADEMY

IT & Management Training

JAKARTA - BANDUNG - BALI

HOTLINE/WA : 0838-0838-0001

www.purnamaacademy.com


Monday, May 2, 2022

Godot Game Engine with farebase Fundamental Training Jakarta Bandung

Training Godot Game Engine with firebase in jakarta bandung (online / offline ) training

Duration : 5 days (09.00-16.00)
Training Price : 6.900.000/ pax

(Min. 3 pax)

What you'll learn

  • Build games
  • Program in GDScript
  • Use the Godot Game Engine
  • Be familiar with other game engines and programming languages

Welcome to the Godot Game Engine course!

Godot is a free open-source game engine that is gaining traction due to it's multi-platform capability and ability to make both 2D and 3D games.

In this course, you will learn Godot's scripting language GDScript and learn all the basic features so you can start making games.

Whether you want to make games or learn to code, you will learn both in this course.

The Godot game engine is gaining traction with more and more people deciding to use a free game engine, it's necessary to understand it well so you can make great games.


Apakah Godot Game  Engine itu :


Godot Engine adalah cross-platform game engine yang memiliki fitur untuk membuat game 2D dan 3D. Game engine ini menyediakan banyak tools umum yang komprehensif. Sehingga dapat memudahkan pengguna dalam mengembakan sebuah game.


Untuk informasi dan pendaftaran training godot di Purnama Academy jakarta bandung, hubungi whatsapp 0838-0838-0001



Wednesday, August 11, 2021

EFFECTIVE PROJECT MANAGEMENT TRAINING JAKARTA, BANDUNG, SILABUS

 EFFECTIVE PROJECT MANAGEMENT

PURNAMA ACADEMY TRAINING (JAKARTA, BANDUNG)

Please contact : 0838-0838-0001 for details


Duratons : 4 Days 

Description

Projects are the way organisations/businesses do things and introduce change to their ways of working. This may include process changes or the implementation of new IT systems or software applications.

Either way, Projects bring about change that improves services to customers, increase operational effectiveness and change processes and ways of working.

Employees in all kinds of roles participate in projects, so what exactly is project management and how is it being managed? 

This course takes you through steps of a project, from early conception and scope definition to delivery, evaluation, and lessons learned. Throughout the course, you will learn about Effective project management practices as well as learning about common mistakes that could be made along the way.

This course will help those new to project management to manage and/or contribute to projects more effectively, and for those people who have been involved in project management previously to broaden their skills and knowledge.


What you'll learn

The stages of a project 

How to Manage effectively

How to define business objectives and benefits

How to plan the project

Defining the project budget

Getting the right resources

Monitoring and reporting project progress

Conducting structured testing

Conducting post-implementation

Learning the lessons

Agile Method

... and more

Requirements

Some basic understanding of project management

Desire to learn more about Effective project management

Who this course is for:

Employees who may be tasked to manage a small project for their employer

Anyone who wants to improve their project management skills and knowledge

Someone who wants to learn about effective project management, best practice and how to avoid mistakes

Course content


Introduction of Project Management

The  Stages of a Effective Project Management

About Manage Effectively 

Clearly define the problem

Invite productive collaboration

Use tools to monitor progress

Effective project management adapts to circumstances

Use Agile Method

Effective Definition Stage

   Establishing Sponsorship and Leadership

Effective Initiation Stage

   Defining Business Objectives and Benefits

Effective Planning Stage

   Planning the Project

   Ensuring the Project is Manageable

   Defining the Project Budget 

   Managing the Project Risks

Effective Execution Stage

   Engaging the Right Project Manager

   Getting Customer Representation

   Defining Team Roles and Responsibilities

   Getting the Right Resources

Effective Monitoring & Control Stage

   Monitoring and Reporting Progress

   Communicating Project Progress

   Consultation and Leadership

   Collecting Realistic User Requirements

   Defining your Approach

   Conducting Structured Testing

   Creating an Implementation Plan    

The Closure Stage

   Conducting the Post Implementation

   Realising the Business Benefits

   Learning the Lessons

   Celebrate the Project Success


Saturday, July 31, 2021

CISSP EXAM PREPARATION TRAINING SYLLABUS

PURNAMA ACADEMY TRAINING PROGRAM  (BANDUNG, JAKARTA, SURABAYA)

ONLINE/ OFFLINE , For Details Call/Whatsapp : 0838-0838-0001


Certified Information Systems Security Professional (CISSP) 



Durations 


5 Days (09.00 – 16.00)


Descriptions :

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)².

A CISSP certification validates your skills in IT security. Cybersecurity Ventures predicts a total of 3.5 million Cyber Security jobs by 2021. The global Cyber Security market is expected to reach USD $282.3 Billion by 2024, growing at a rate of 11.1-percent annually.


Objectives :

This Certified Information Systems Security Professional (CISSP) certification course. To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple-choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass.


This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you.


This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flashcards, interactive diagrams, video lessons, and instructor support included with this course, you are equipped with everything you need to successfully pass the exam and earn your CISSP certification.


Participants :


The CISSP Course is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

Chief Information Security Officer

Chief Information Officer

Director of Security

IT Director/Manager

Security Systems Engineer

Security Analyst

Security Manager

Security Auditor

Security Architect

Security Consultant

Network Architect


Prerequisites :

Roughly five years of direct full-time security work experience is recommended, but not required



Outlines :

DAY 1 

CISSP Introduction

DOMAIN 1 : SECURITY AND RISK MANAGEMENT

Understand and Apply Concepts of Confidentiality, Integrity, and Availability

Information Security

Evaluate and Apply Security Governance Principles

Alignment of Security Functions to Business Strategy, Goals, Mission,

and Objectives

Vision, Mission, and Strategy

Governance

Due Care

Determine Compliance Requirements

Legal Compliance

Jurisdiction

Legal Tradition

Legal Compliance Expectations

Understand Legal and Regulatory Issues That Pertain to Information Security in a

Global Context

Cyber Crimes and Data Breaches

Privacy

Understand, Adhere to, and Promote Professional Ethics

Ethical Decision-Making

Established Standards of Ethical Conduct

(ISC)² Ethical Practices

Develop, Document, and Implement Security Policy, Standards, Procedures,

and Guidelines

Organizational Documents

Policy Development

Policy Review Process

Identify, Analyze, and Prioritize Business Continuity Requirements

Contribute to and Enforce Personnel Security Policies and Procedures

Understand and Apply Risk Management Concepts

Understand and Apply Threat Modeling Concepts and Methodologies

Apply Risk-Based Management Concepts to the Supply Chain

Establish and Maintain a Security Awareness, Education, and Training Program

Questions & Answers

DOMAIN 2 : ASSET SECURITY

Asset Security Concepts

Data Policy

Data Governance

Data Quality

Data Documentation

Data Organization

Identify and Classify Information and Assets

Asset Classification

Determine and Maintain Information and Asset Ownership

Asset Management Lifecycle

Software Asset Management

Protect Privacy

Cross-Border Privacy and Data Flow Protection

Data Owners

Data Controllers

Data Processors

Data Stewards

Data Custodians

Data Remanence

Data Sovereignty

Data Localization or Residency

Government and Law Enforcement Access to Data

Collection Limitation

Understanding Data States

Data Issues with Emerging Technologies

Ensure Appropriate Asset Retention

Retention of Records

Determining Appropriate Records Retention

Retention of Records in Data Lifecycle

Records Retention Best Practices

Determine Data Security Controls

Technical, Administrative, and Physical Controls

Establishing the Baseline Security

Scoping and Tailoring

Standards Selection

Data Protection Methods

Establish Information and Asset Handling Requirements

Marking and Labeling

Handling

Declassifying Data

Storage

Questions & Answers

DAY 2

DOMAIN 3: SECURITY ARCHITECTURE AND ENGINEERING

Implement and Manage Engineering Processes Using Secure Design Principles

Saltzer and Schroeder’s Principles

ISO/IEC

Defense in Depth

Using Security Principles

Understand the Fundamental Concepts of Security Models

Select Controls Based upon Systems Security Requirements

Understand Security Capabilities of Information Systems

Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and

Assess and Mitigate Vulnerabilities in Web-Based Systems

Assess and Mitigate Vulnerabilities in Mobile Systems

Insecure Devices

Mobile Device Management

Assess and Mitigate Vulnerabilities in Embedded Devices

Apply Cryptography

Cryptographic Lifecycle

Cryptographic Methods

Public Key Infrastructure

Key Management Practices

Digital Signatures

Non-Repudiation

Integrity

Understand Methods of Cryptanalytic Attacks

Digital Rights Management

Apply Security Principles to Site and Facility Design

Implement Site and Facility Security Controls

Physical Access Controls

Wiring Closets/Intermediate Distribution Facilities

Server Rooms/Data Centers

Media Storage Facilities

Evidence Storage

Restricted and Work Area Security

Utilities and Heating, Ventilation, and Air Conditioning

Environmental Issues

Fire Prevention, Detection, and Suppression

Questions & Answers

DOMAIN 4 : COMMUNICATION AND NETWORK SECURITY

Implement Secure Design Principles in Network Architectures

Open Systems Interconnection and Transmission Control

Internet Protocol Networking

Implications of Multilayer Protocols

Converged Protocols

Software-Defined Networks

Wireless Networks

Internet, Intranets, and Extranets

Demilitarized Zones

Virtual LANs

Secure Network Components

Firewalls

Network Address Translation

Intrusion Detection System

Security Information and Event Management

Network Security from Hardware Devices

Transmission Media

Endpoint Security

Implementing Defense in Depth

Content Distribution Networks

Implement Secure Communication Channels According to Design

Secure Voice Communications

Multimedia Collaboration

Remote Access

Data Communications

Virtualized Networks

Questions & Answers

DAY 3

DOMAIN 5 : IDENTITY AND ACCESS MANAGEMENT

Control Physical and Logical Access to Assets

Information

Systems

Devices

Facilities

Manage Identification and Authentication of People, Devices, and Services

Identity Management Implementation

Single Factor/Multifactor Authentication

Accountability

Session Management

Registration and Proofing of Identity

Federated Identity Management

Credential Management Systems

Integrate Identity as a Third-Party Service

On-Premise

Cloud

Federated

Implement and Manage Authorization Mechanisms

Role-Based Access Control

Rule-Based Access Control

Mandatory Access Control

Discretionary Access Control

Attribute-Based Access Control

Manage the Identity and Access Provisioning Lifecycle

User Access Review

System Account Access Review

Provisioning and Deprovisioning

Auditing and Enforcement

Questions & Answers

DAY 4

DOMAIN 6 : SECURITY ASSESSMENT AND TESTING

Design and Validate Assessment, Test, and Audit Strategies

Assessment Standards

Conduct Security Control Testing

Vulnerability Assessment

Penetration Testing

Log Reviews

Synthetic Transactions

Code Review and Testing

Misuse Case Testing

Test Coverage Analysis

Interface Testing

Collect Security Process Data

Account Management

Management Review and Approval

Key Performance and Risk Indicators

Backup Verification Data

Training and Awareness

Disaster Recovery and Business Continuity

Analyze Test Output and Generate Report

Conduct or Facilitate Security Audits

Internal Audits

External Audits

Third-Party Audits

Integrating Internal and External Audits

Auditing Principles

Audit Programs

Questions & Answers

DOMAIN 7: SECURITY OPERATIONS

Understand and Support Investigations

Evidence Collection and Handling

Reporting and Documentation

Investigative Techniques

Digital Forensics Tools, Techniques, and Procedures

Understand Requirements for Investigation Types

Administrative

Criminal

Civil

Regulatory

Industry Standards

Conduct Logging and Monitoring Activities

Define Auditable Events

Time

Protect Logs

Intrusion Detection and Prevention

Security Information and Event Management

Continuous Monitoring

Ingress Monitoring

Egress Monitoring

Securely Provision Resources

Asset Inventory

Asset Management

Configuration Management

Understand and Apply Foundational Security Operations Concepts

Need to Know/Least Privilege

Separation of Duties and Responsibilities

Privileged Account Management

Job Rotation

Information Lifecycle

Service Level Agreements

Apply Resource Protection Techniques to Media

Marking

Protecting

Transport

Sanitization and Disposal

Conduct Incident Management

An Incident Management Program

Detection

Response

Mitigation

Reporting

Recovery

Remediation

Lessons Learned

Third-Party Considerations

Operate and Maintain Detective and Preventative Measures

White-listing/Black-listing

Third-Party Security Services

Honeypots/Honeynets

Anti-Malware

Implement and Support Patch and Vulnerability Management

Understand and Participate in Change Management Processes

Implement Recovery Strategies

Backup Storage Strategies

Recovery Site Strategies

Multiple Processing Sites

System Resilience, High Availability, Quality of Service, and Fault Tolerance

Implement Disaster Recovery Processes

Response

Personnel

Communications

Assessment

Restoration

Training and Awareness

Test Disaster Recovery Plans

Read-Through/Tabletop

Walk-Through

Simulation

Parallel

Full Interruption

Participate in Business Continuity Planning and Exercises

Implement and Manage Physical Security

Physical Access Control

The Data Center

Address Personnel Safety and Security Concerns

Travel

Duress

Questions & Answers

DAY 5

DOMAIN 8: SOFTWARE DEVELOPMENT SECURITY

Understand and Integrate Security in the Software Development Lifecycle

Development Methodologies

Maturity Models

Operations and Maintenance

Change Management

Integrated Product Team

Identify and Apply Security Controls in Development Environments

Security of the Software Environment

Configuration Management as an Aspect of Secure Coding

Security of Code Repositories

Assess the Effectiveness of Software Security

Logging and Auditing of Changes

Risk Analysis and Mitigation

Assess the Security Impact of Acquired Software

Acquired Software Types

Software Acquisition Process

Relevant Standards

Software Assurance

Certification and Accreditation

Define and Apply Secure Coding Standards and Guidelines

Security Weaknesses and Vulnerabilities at the

Security of Application Programming Interfaces

Secure Coding Practices

Questions & Answers


Other Trainings Topics : ITIL V.4, CISA, CISM, CDPSE, CRISC, PMBOK, CMMI, ISO 27001, BABOK, DMBOK, ISTQB, COBIT