dibuka Program Training Online / Webinar !

Tetap bisa training sekalipun #diRumahAja


Kami Bekerjasama dengan hotel bintang di 4 kota Bandung-Jakarta-Bali-Cikarang untuk memberikan kenyamanan peserta public training


Inhouse Training adalah pilihan paling tepat untuk jumlah peserta perusahaan yang banyak dengan mengutamakan efisiensi biaya training.


Inhouse Training Android Application Development di PT. PLN Wilayah Maluku selama 4 hari


Inhouse Training Magento E-Commerce berdurasi 7 hari dibagi 2 sesi Fundamental dan Advanced.

Wednesday, August 11, 2021




Please contact : 0838-0838-0001 for details

Duratons : 4 Days 


Projects are the way organisations/businesses do things and introduce change to their ways of working. This may include process changes or the implementation of new IT systems or software applications.

Either way, Projects bring about change that improves services to customers, increase operational effectiveness and change processes and ways of working.

Employees in all kinds of roles participate in projects, so what exactly is project management and how is it being managed? 

This course takes you through steps of a project, from early conception and scope definition to delivery, evaluation, and lessons learned. Throughout the course, you will learn about Effective project management practices as well as learning about common mistakes that could be made along the way.

This course will help those new to project management to manage and/or contribute to projects more effectively, and for those people who have been involved in project management previously to broaden their skills and knowledge.

What you'll learn

The stages of a project 

How to Manage effectively

How to define business objectives and benefits

How to plan the project

Defining the project budget

Getting the right resources

Monitoring and reporting project progress

Conducting structured testing

Conducting post-implementation

Learning the lessons

Agile Method

... and more


Some basic understanding of project management

Desire to learn more about Effective project management

Who this course is for:

Employees who may be tasked to manage a small project for their employer

Anyone who wants to improve their project management skills and knowledge

Someone who wants to learn about effective project management, best practice and how to avoid mistakes

Course content

Introduction of Project Management

The  Stages of a Effective Project Management

About Manage Effectively 

Clearly define the problem

Invite productive collaboration

Use tools to monitor progress

Effective project management adapts to circumstances

Use Agile Method

Effective Definition Stage

   Establishing Sponsorship and Leadership

Effective Initiation Stage

   Defining Business Objectives and Benefits

Effective Planning Stage

   Planning the Project

   Ensuring the Project is Manageable

   Defining the Project Budget 

   Managing the Project Risks

Effective Execution Stage

   Engaging the Right Project Manager

   Getting Customer Representation

   Defining Team Roles and Responsibilities

   Getting the Right Resources

Effective Monitoring & Control Stage

   Monitoring and Reporting Progress

   Communicating Project Progress

   Consultation and Leadership

   Collecting Realistic User Requirements

   Defining your Approach

   Conducting Structured Testing

   Creating an Implementation Plan    

The Closure Stage

   Conducting the Post Implementation

   Realising the Business Benefits

   Learning the Lessons

   Celebrate the Project Success

Saturday, July 31, 2021



ONLINE/ OFFLINE , For Details Call/Whatsapp : 0838-0838-0001

Certified Information Systems Security Professional (CISSP) 


5 Days (09.00 – 16.00)

Descriptions :

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)².

A CISSP certification validates your skills in IT security. Cybersecurity Ventures predicts a total of 3.5 million Cyber Security jobs by 2021. The global Cyber Security market is expected to reach USD $282.3 Billion by 2024, growing at a rate of 11.1-percent annually.

Objectives :

This Certified Information Systems Security Professional (CISSP) certification course. To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple-choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass.

This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you.

This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flashcards, interactive diagrams, video lessons, and instructor support included with this course, you are equipped with everything you need to successfully pass the exam and earn your CISSP certification.

Participants :

The CISSP Course is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

Chief Information Security Officer

Chief Information Officer

Director of Security

IT Director/Manager

Security Systems Engineer

Security Analyst

Security Manager

Security Auditor

Security Architect

Security Consultant

Network Architect

Prerequisites :

Roughly five years of direct full-time security work experience is recommended, but not required

Outlines :

DAY 1 

CISSP Introduction


Understand and Apply Concepts of Confidentiality, Integrity, and Availability

Information Security

Evaluate and Apply Security Governance Principles

Alignment of Security Functions to Business Strategy, Goals, Mission,

and Objectives

Vision, Mission, and Strategy


Due Care

Determine Compliance Requirements

Legal Compliance


Legal Tradition

Legal Compliance Expectations

Understand Legal and Regulatory Issues That Pertain to Information Security in a

Global Context

Cyber Crimes and Data Breaches


Understand, Adhere to, and Promote Professional Ethics

Ethical Decision-Making

Established Standards of Ethical Conduct

(ISC)² Ethical Practices

Develop, Document, and Implement Security Policy, Standards, Procedures,

and Guidelines

Organizational Documents

Policy Development

Policy Review Process

Identify, Analyze, and Prioritize Business Continuity Requirements

Contribute to and Enforce Personnel Security Policies and Procedures

Understand and Apply Risk Management Concepts

Understand and Apply Threat Modeling Concepts and Methodologies

Apply Risk-Based Management Concepts to the Supply Chain

Establish and Maintain a Security Awareness, Education, and Training Program

Questions & Answers


Asset Security Concepts

Data Policy

Data Governance

Data Quality

Data Documentation

Data Organization

Identify and Classify Information and Assets

Asset Classification

Determine and Maintain Information and Asset Ownership

Asset Management Lifecycle

Software Asset Management

Protect Privacy

Cross-Border Privacy and Data Flow Protection

Data Owners

Data Controllers

Data Processors

Data Stewards

Data Custodians

Data Remanence

Data Sovereignty

Data Localization or Residency

Government and Law Enforcement Access to Data

Collection Limitation

Understanding Data States

Data Issues with Emerging Technologies

Ensure Appropriate Asset Retention

Retention of Records

Determining Appropriate Records Retention

Retention of Records in Data Lifecycle

Records Retention Best Practices

Determine Data Security Controls

Technical, Administrative, and Physical Controls

Establishing the Baseline Security

Scoping and Tailoring

Standards Selection

Data Protection Methods

Establish Information and Asset Handling Requirements

Marking and Labeling


Declassifying Data


Questions & Answers



Implement and Manage Engineering Processes Using Secure Design Principles

Saltzer and Schroeder’s Principles


Defense in Depth

Using Security Principles

Understand the Fundamental Concepts of Security Models

Select Controls Based upon Systems Security Requirements

Understand Security Capabilities of Information Systems

Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and

Assess and Mitigate Vulnerabilities in Web-Based Systems

Assess and Mitigate Vulnerabilities in Mobile Systems

Insecure Devices

Mobile Device Management

Assess and Mitigate Vulnerabilities in Embedded Devices

Apply Cryptography

Cryptographic Lifecycle

Cryptographic Methods

Public Key Infrastructure

Key Management Practices

Digital Signatures



Understand Methods of Cryptanalytic Attacks

Digital Rights Management

Apply Security Principles to Site and Facility Design

Implement Site and Facility Security Controls

Physical Access Controls

Wiring Closets/Intermediate Distribution Facilities

Server Rooms/Data Centers

Media Storage Facilities

Evidence Storage

Restricted and Work Area Security

Utilities and Heating, Ventilation, and Air Conditioning

Environmental Issues

Fire Prevention, Detection, and Suppression

Questions & Answers


Implement Secure Design Principles in Network Architectures

Open Systems Interconnection and Transmission Control

Internet Protocol Networking

Implications of Multilayer Protocols

Converged Protocols

Software-Defined Networks

Wireless Networks

Internet, Intranets, and Extranets

Demilitarized Zones

Virtual LANs

Secure Network Components


Network Address Translation

Intrusion Detection System

Security Information and Event Management

Network Security from Hardware Devices

Transmission Media

Endpoint Security

Implementing Defense in Depth

Content Distribution Networks

Implement Secure Communication Channels According to Design

Secure Voice Communications

Multimedia Collaboration

Remote Access

Data Communications

Virtualized Networks

Questions & Answers



Control Physical and Logical Access to Assets





Manage Identification and Authentication of People, Devices, and Services

Identity Management Implementation

Single Factor/Multifactor Authentication


Session Management

Registration and Proofing of Identity

Federated Identity Management

Credential Management Systems

Integrate Identity as a Third-Party Service




Implement and Manage Authorization Mechanisms

Role-Based Access Control

Rule-Based Access Control

Mandatory Access Control

Discretionary Access Control

Attribute-Based Access Control

Manage the Identity and Access Provisioning Lifecycle

User Access Review

System Account Access Review

Provisioning and Deprovisioning

Auditing and Enforcement

Questions & Answers



Design and Validate Assessment, Test, and Audit Strategies

Assessment Standards

Conduct Security Control Testing

Vulnerability Assessment

Penetration Testing

Log Reviews

Synthetic Transactions

Code Review and Testing

Misuse Case Testing

Test Coverage Analysis

Interface Testing

Collect Security Process Data

Account Management

Management Review and Approval

Key Performance and Risk Indicators

Backup Verification Data

Training and Awareness

Disaster Recovery and Business Continuity

Analyze Test Output and Generate Report

Conduct or Facilitate Security Audits

Internal Audits

External Audits

Third-Party Audits

Integrating Internal and External Audits

Auditing Principles

Audit Programs

Questions & Answers


Understand and Support Investigations

Evidence Collection and Handling

Reporting and Documentation

Investigative Techniques

Digital Forensics Tools, Techniques, and Procedures

Understand Requirements for Investigation Types





Industry Standards

Conduct Logging and Monitoring Activities

Define Auditable Events


Protect Logs

Intrusion Detection and Prevention

Security Information and Event Management

Continuous Monitoring

Ingress Monitoring

Egress Monitoring

Securely Provision Resources

Asset Inventory

Asset Management

Configuration Management

Understand and Apply Foundational Security Operations Concepts

Need to Know/Least Privilege

Separation of Duties and Responsibilities

Privileged Account Management

Job Rotation

Information Lifecycle

Service Level Agreements

Apply Resource Protection Techniques to Media




Sanitization and Disposal

Conduct Incident Management

An Incident Management Program







Lessons Learned

Third-Party Considerations

Operate and Maintain Detective and Preventative Measures


Third-Party Security Services



Implement and Support Patch and Vulnerability Management

Understand and Participate in Change Management Processes

Implement Recovery Strategies

Backup Storage Strategies

Recovery Site Strategies

Multiple Processing Sites

System Resilience, High Availability, Quality of Service, and Fault Tolerance

Implement Disaster Recovery Processes






Training and Awareness

Test Disaster Recovery Plans





Full Interruption

Participate in Business Continuity Planning and Exercises

Implement and Manage Physical Security

Physical Access Control

The Data Center

Address Personnel Safety and Security Concerns



Questions & Answers



Understand and Integrate Security in the Software Development Lifecycle

Development Methodologies

Maturity Models

Operations and Maintenance

Change Management

Integrated Product Team

Identify and Apply Security Controls in Development Environments

Security of the Software Environment

Configuration Management as an Aspect of Secure Coding

Security of Code Repositories

Assess the Effectiveness of Software Security

Logging and Auditing of Changes

Risk Analysis and Mitigation

Assess the Security Impact of Acquired Software

Acquired Software Types

Software Acquisition Process

Relevant Standards

Software Assurance

Certification and Accreditation

Define and Apply Secure Coding Standards and Guidelines

Security Weaknesses and Vulnerabilities at the

Security of Application Programming Interfaces

Secure Coding Practices

Questions & Answers


Wednesday, June 9, 2021


Apakah TOGAF ? . Open Group Architectural Framework (TOGAF) pertama kali dikembangkan pada tahun 1995 dan didasarkan pada Kerangka Arsitektur Teknis Departemen Pertahanan untuk Manajemen Informasi. TOGAF berfokus pada aplikasi bisnis missioncritical yang menggunakan blok bangunan sistem terbuka. "Elemen kunci TOGAF adalah Metode Pengembangan Arsitektur (ADM) yang menentukan proses untuk mengembangkan arsitektur perusahaan". TOGAF menjelaskan aturan untuk mengembangkan prinsip-prinsip yang baik, daripada menyediakan seperangkat prinsip arsitektur. Tiga tingkat prinsip mendukung pengambilan keputusan di seluruh perusahaan, memberikan bimbingan sumber daya TI, dan mendukung prinsip arsitektur untuk pengembangan dan implementasi. 
Anda bisa dapat mengikuti pelatihan / Training TOGAF PART 2 di Purnama Academy dengan materi silabus sebagaimana berikut ini :

TOGAF 9.2 PART 2 Certified Enterprise Architect

Duration              : 2 Days (09.00 – 16.00)


Description :

The Open Group has defined a free and public standard for this method for almost 10 years now, and over 400 companies and government agencies have been involved in crafting that standard. It is called TOGAF - The Open Group Architecture Framework.

If you are a software developer, this is your chance to learn the proper techniques for assessing the requirements of an enterprise, and designing the right solutions for today and tomorrow

Specifically, this course will teach you:

·         The details of the TOGAF 9.1 Certified Part 2 exam (OG0-092), including how to book it, and my experiences taking the exam

·         How to apply advanced concepts of TOGAF

·         Every requirement of the exam covered in its own lesson

·         The key deliverables of the ADM

·         Customizing the TRM and III-RM for use

What you'll learn :

·         Pass the TOGAF 9.1 Part 2 Exam

·         Understand the advanced topics of the TOGAF specification

·         Know how to apply the parts of TOGAF to your architecture work

·         Know how to apply iteration with the ADM

Who this course is for:

·         Enterprise architects, of all levels

·         People wishing to get into enterprise architecture

·         Anyone who wants to pass the TOGAF 9 certification exam


Prerequisites :

·         Not needed to have passed Part 1, but must understand the TOGAF model

·         An interest in enterprise architecture and how business systems are designed

Details :


About TOGAF 9.2 Part 2

·         TOGAF 9.2 Review

·         Introduction

TOGAF . Specification for Part 2 lectures • 

·         The Role of the ADM in Change Management

·         Applying the ADM Phases to Enterprise Architecture

·         Applying Architecture Governance

·         Applying the Architecture Content Framework

·         Applying the Concept of Building Blocks

·         Applying the Stakeholder Management Technique

·         Applying the TOGAF Content Metamodel

·         Customizing the Technical Reference Model (TRM)

·         Customizing the III-RM

·         Half Way Mark

Advanced Topics for TOGAF Part 2  lectures • 

·         Key Deliverables of the ADM Cycle

·         Key Deliverables of the ADM Cycle Part I

·         Key Deliverables of the ADM Cycle Part II

·         Key Deliverables of the ADM Cycle Part III

·         Partitioning Enterprise Architecture

·         The Purpose of the Architecture Repository

·         Iteration

·         Adapting the ADM for Security

·         Service Oriented Architecture (SOA)

·         Architecture Maturity Models

·         Architecture Skills Framework


Exam Practice

Informasi dan pendaftaran training TOGAF Part 2 silahkan hubungi Call/whatsapp tim sales Purnama Academy di 0838-0838-0001


TOGAF atau The Open Group Architecture Framework adalah suatu kerangka kerja arsitektur perusahaan yang memberian pendekatan komprehensif untuk desain, perencanaan, implementasi, dan tata kelola arsitektur informasi perusahaan. Purnama Academy IT & Management Training menyediakan training TOGAF 9.2 Part 1 di jakarta, bandung, surabaya, dan berbagai kota lainnya di Indonesia dengan metode online, offline atau inhouse training



Duration              : 3 Days (09.00 – 16.00)


Description :

This course helps you become certified in the TOGAF 9.2 specification. Through learning the Architecture Development Method (ADM), you will become better at designing systems. If you already architect software for a living, learning an official enterprise architecture framework such as this takes you to the next level of your career.

You owe it to yourself:

If you are a software developer, this is your chance to learn the proper techniques for assessing the requirements of an enterprise, and designing the right solutions for today and tomorrow! While software development is skill any teenager can acquire, and the salaries paid to software developers fall or are frozen, it's those who know the complex skills of designing large software projects that will still be in high demand.

Specifically, this course will teach you:

The details of the TOGAF 9.2 Foundation exam (OG0-091), including how to book it, and my experiences taking the exam

The basic and core skills of the TOGAF framework

The Architecture Development Method (ADM), all of the phases, and the key information to know to pass the exam

Other topics covered on the exam, including Architecture Governance, Architecture Capacity, Enterprise Continuum, Capability Assessment, and reference frameworks such as TRM and III-RM

What you'll learn :

·         Learn the TOGAF 9.2 ADM method for Enterprise Architecture

·         Understand the basic and core concepts of the TOGAF standard

·         Pass the TOGAF 9 Foundations certification exam, Level 1

Who this course is for:

·         Enterprise architects, of all levels

·         People wishing to get into enterprise architecture

·         Anyone who wants to pass the TOGAF 9 certification exam


Prerequisites :

·         Some experience solving problems at the enterprise level, although familiarity with TOGAF is not required

·         A willingness to do the work to get the results


·         What is Enterprise Architecture?

·         The TOGAF Certification for People

·         The TOGAF . Standard

·         Overview of Core Concepts

·         Definition of Enterprise

·         The Four Architecture Domains - BDAT

·         BDAT Quiz

·         Architecture Development Method - ADM

·         Architecture Work Products - Deliverables, Artifacts and Building Blocks

·         Enterprise Continuum

·         Architecture Repository

·         Architecture Capability

·         Core Concepts Quiz


The ADM • 

·         Introduction to the ADM

·         ADM Cycle

·         Preliminary Phase

·         Phase A - Architecture Vision

·         ADM Quiz Preliminary and Phase A

·         Phase B - Business Architecture

·         Phase C - Information Systems Architecture

·         Phase C - Data Architecture

·         Phase C - Application Architecture

·         Phase D - Technology Architecture

·         Phase E - Opportunities and Solutions

·         Phase F - Migration Planning

·         Phase G - Implementation Governance


Continuing with the ADM lectures • 

·         Phase H - Architecture Change Management

·         Requirements Management Phase

·         Final ADM Quiz

ADM Guidelines and Tools lectures • 

·         Introduction to ADM Guidelines and Tools

·         ADM with Architecture Styles

·         Architecture Principles

·         Stakeholder Management

·         Architecture Patterns

·         Business Scenarios

·         Gap Analysis

·         Migration Planning

·         Interoperability

·         Business Readiness Transformation Assessment BRTA

·         Risk Management

·         Capability Planning


Other Important TOGAF Concepts lecture • 

·         Architecture Capability Framework and Architecture Governance


Exam Practice

Pendaftaran atau Informasi detail terkait training TOGAF Part 1 silahkan hubungi tim sales Purnama Academy melalui whatsapp 0838-0838-0001 atau email info@purnamaacademy.com

Wednesday, May 12, 2021

TRAINING ISO 45005 : 2020 K3 COVID - Pedoman umum untuk bekerja dengan aman selama pandemi COVID-19

SILABUS ISO 45005 , Training ISO 45005 di Purnama Academy Bandung, Jakarta, (Online, Offline, Inhouse Training) hubungi tim sales call/Whatsapp 0838-0838-0001

ISO/PAS 45005:2020
Manajemen kesehatan dan keselamatan kerja
Pedoman umum untuk bekerja dengan aman selama pandemi COVID-19

Durasi : 09.00 – 16.00 WIB ( 3  Hari )

Deskripsi : ISO (the International Organization for Standardization) adalah sebuah organisasi yang tersusun atas federasi dari berbagai komite yang memiliki kepentingan untuk mencipatakan  berbagai standarisasi internasional di setiap bidang yang di wakili teknisnya oleh komite, setiap komite bisa terdiri atas organsasi , pemerintahan ataupun non organisasi yang berkompetensi

Dokumen ISO 45005 dipublikasikan sebagai respon  terhadap pandemi COVID-19 dan peningkatan risiko penyakit ini terhadap kesehatan, keselamatan, dan kesejahteraan orang .
Didalam dokumen mencakup  semua pengaturan terhadap orang, termasuk mereka yang bekerja di rumah atau di lingkungan bergerak (mobile) , dan pekerja serta pihak berkepentingan lainnya termasuk membahas aspek tempat kerja fisik. Pemerintah, regulator, dan badan profesional lainnya di seluruh dunia agar tetap bekerja dengan aman selama pandemi COVID-19.

Dokumen ini memberikan satu set pedoman umum dan juga prinsip-prinsip yang terkait :
• Langkah-langkah yang wajar untuk mengelola risiko yang timbul dari COVID-19 sedang terjadi, atau akan terjadi, dan diterapkan untuk melindungi kesehatan dan keselamatan pekerja dan pihak terkait lainnya
• Pekerja tidak boleh diminta untuk bekerja kecuali langkah-langkah ini telah diterapkan.

Tujuan Training : Training ISO 45005 ini memberikan panduan kepada Organisasi bagaimana mengelola resiko yang timbul akibat COVID-19 untuk melindugi kesehatan dan keselaman pekerja

ISO 45005 dibuat cocok untuk berbagai ukuran skala industri baik kecil ataupun besar, termasuk juga untuk organisasi yang :

• Telah beroperasi selama pandemi;
• Melanjutkan atau berencana untuk melanjutkan operasi setelah penutupan penuh atau sebagian;
• Menempati kembali tempat kerja yang telah ditutup sepenuhnya atau sebagian;
• Baru dan berencana beroperasi untuk pertama kalinya.

Target Peserta : - Management Level
- HSE Staff
- Public

Prasyarat : - Tidak ada persyaratan khusus

Materi Training :
1 Scope
2 Normative references
3 Terms and definitions
4 Planning and assessment of risks
4.1 Understanding the context of the organization
4.2 Leadership and worker participation
4.3 General planning
4.4 Workplaces
4.5 Roles
4.6 Activities
4.7 Emergency preparedness and response
4.8 Planning for changes to restrictions
5 Suspected or confirmed cases of COVID-19
5.1 General
5.2 Managing illness in a physical workplace
5.3 Managing illness of workers at home or in mobile settings
5.4 Testing, contact tracing and quarantine
6 Psychological health and well-being
7 Inclusivity
8 Resources
9 Communication
9.1 General
9.2 For first entry into a workplace
9.3 Ongoing communication
10 Hygiene
11 Use of personal protective equipment, masks and face coverings
12 Operations
12.1 General
12.2 First return to a workplace
12.3 Entering and leaving the workplace
12 Operations
12.1 General
12.2 First return to a workplace
12.3 Entering and leaving the workplace
12.4 Moving around and between workplaces
12.5 Work zones and workstations
12.6 Use of common areas
12.7 Meetings and visits to the workplace
12.8 Working with the public
12.9 Work-related travel
12.10 Deliveries
13 Performance evaluation
13.1 Monitoring and evaluation
13.2 Management review, incidents and reporting
14 Improvement
Annex A Protective security considerations
A.1 General
A.2 Operations and practices
A.3 Measures
Annex B Accessibility and inclusion considerations

Hubungi tim sales  Purnama Academy 0838-0838-0001 untuk detail atau pendaftaran training ISO 45005 di perusahaan Anda


Monday, April 26, 2021

Training Katalon Studio - Software Testing Tool

Training Katalon Studio di Jakarta , Bandung, Surabaya secara online, offline, inhouse training oleh Purnama Academy.

Apakah Katalon Studio ? , Katalon adalah salah satu software testing tool yang cukup populer , tool ini merupakan bagian dari aktifitas CI/CD, katalon mensupport aktifitas continues testing di platform aplikasi web, mobile apps dan desktop , tool lain yang serupa dengan katalon adalah selenium

Untuk mengetahui detail training terkait silabus katalon, jadwal dan biaya training katalon di Purnama Academy silahkan hubungi Call/ whatsapp 083808380001 atau email info@purnamaAcademy.com

Terima kasih

Tuesday, April 20, 2021






Durasi    :    5 Hari (09.00 – 16.00)

:    DAMA (the Data Management Association) adalah asosiasi profesional teknis dan bisnis yang nirlaba, vendor-independen internasional yang mendedikasikan kegiatannya untuk memajukan konsep dan praktik Information Resource Management (IRM) dan Data Resource Management (DRM).
Visi DAMA adalah mendukung komunitas professional global informasi .
Misi DAMA ini adalah untuk menyediakan sebuah asosiasi nirlaba dan vendor-independen dimana profesional data dapat meminta bantuan dan bantuan; menyediakan sumber daya praktik terbaik seperti DMBoK dan DM Dictionary of Terms dalam mekanisme yang menghasilkan profesional DM sebanyak mungkin; ciptakan lingkungan yang terpercaya bagi para profesional DM untuk berkolaborasi dan berkomunikasi dan memungkinkan Bab-bab di seluruh dunia memanfaatkan DAMAI dan berinteraksi dengan DAMA untuk mendapatkan manfaat dari semua Profesional DM.
"Body of Knowledge" tentang pengelolaan data cukup besar dan terus berkembang. Untuk menanggapi tantangan ini, DAMA International menyediakan Panduan DAMA untuk Pengelolaan Data Badan Pengetahuan, atau DAMA DMBOK, sebagai "Definitive introduction" terhadap pengelolaan data.
DAMA DMBOK mendefinisikan tampilan industri standar mengenai fungsi pengelolaan data, terminologi dan praktik terbaik, tanpa merinci metode dan teknik spesifik.

Target Training        
Peserta memahami Konsep Data Lifecycle , Data Management, knowledge Area dan Proses yang ada di dalam buku DMBOK, serta mempersiapkan peserta untuk mengikuti Ujian CDMP Associate – Data Management Fundamental
Target Peserta        -    System Analyst
-    Business Analyst
-    IT Manager
-    Data Analyst
-    Database Administrator
-    Data custodian
Materi Training        
Data Management
Essential Concepts, Data, Data and Information, Data as an Organizational Asset, Data Management Principles, Data Management Challenges, Data Management Strategy, Data Management Frameworks, Strategic Alignment Model, The Amsterdam Information Model, The DAMA-DMBOK Framework, DMBOK Pyramid (Aiken), DAMA Data Management Framework Evolved, DAMA and the DMBOK, EXAM PRACTICE 1
Data Handling Ethics
Business Drivers, Essential Concepts, Ethical Principles for Data, Principles Behind Data Privacy Law, Online Data in an Ethical Context, Risks of Unethical Data Handling Practices, Establishing an Ethical Data Culture, Data Ethics and Governance, EXAM PRACTICE 2

Data Governance
Business Drivers, Goals and Principles, Essential Concepts, Activities, Define Data Governance for the Organization, Perform Readiness Assessment, Perform Discovery and Business Alignment, Develop Organizational Touch Points, Develop Data Governance Strategy, Define the DG Operating Framework, Develop Goals, Principles, and Policies, Underwrite Data Management Projects, Engage Change Management  , Engage in Issue Management, Assess Regulatory Compliance Requirements, Implement Data Governance, Sponsor Data Standards and Procedures, Develop a Business Glossary, Coordinate with Architecture Groups, Sponsor Data Asset Valuation, Embed Data Governance, Tools and Techniques ,Online Presence / Websites, Business Glossary, Workflow Tools, Document Management Tools, Data Governance Scorecards, Implementation Guidelines, Organization and Culture, Adjustment and Communication, Metrics , EXAM PRACTICE 3

Data Architecture

Business Drivers, Data Architecture Outcomes and Practices, Essential Concepts, Activities, Establish Data Architecture Practice, Integrate with Enterprise Architecture, Tools, Data Modeling Tools ,Asset Management Software, Graphical Design Applications, Techniques, Lifecycle Projections, Diagramming Clarity, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Data Architecture Governance, Metrics,   EXAM PRACTICE 4


Data Modeling and Design  
Business Drivers, Goals and Principles, Essential Concepts, Activities, Plan for Data Modeling  , Build the Data Model,  Review the Data Models, Maintain the Data Models, Tools, Data Modeling Tools, Lineage Tools, Data Profiling Tools, Metadata Repositories, Data Model Patterns, Industry Data Models, Best Practices, Best Practices in Naming Conventions, Best Practices in Database Design, Data Model Governance, Data Model and Design Quality Management, Data Modeling Metrics, EXAM PRACTICE 5  

Data Storage and Operations
Business Drivers, Goals and Principles,  Essential Concepts, Activities, Manage Database Technology, Manage Databases, Tools, Data Modeling Tools, Database Monitoring Tools, Database Management Tools, Developer Support Tools, Techniques, Test in Lower Environments, Physical Naming Standards, Script Usage for All Changes, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Data Storage and Operations Governance, Metrics, Information Asset Tracking, Data Audits and Data Validation , EXAM PRACTICE 6

Data Security
Business Drivers, Goals and Principles, Essential Concepts, Activities, Identify Data Security Requirements, Define Data Security Policy, Define Data Security Standards, Tools, Anti-Virus Software / Security Software, HTTPS, Identity Management Technology, Intrusion Detection and Prevention Software, Firewalls (Prevention), Metadata Tracking, Data Masking/Encryption, Techniques, CRUD Matrix Usage, Immediate Security Patch Deployment, Data Security Attributes in Metadata, Metrics, Security Needs in Project Requirements, Efficient Search of Encrypted Data, Document Sanitization, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Visibility into User Data Entitlement, Data Security in an Outsourced World, Data Security in Cloud Environments, Data Security Governance, Data Security and Enterprise Architecture , EXAM PRACTICE 7


Data Integration and Interoperability
Business Drivers, Goals and Principles, Essential Concepts, Data Integration Activities, Plan and Analyze, Design Data Integration Solutions, Develop Data Integration Solutions, Implement and Monitor, Tools, Data Transformation Engine/ETL Tool, Data Virtualization Server, Enterprise Service Bus, Business Rules Engine, Data and Process Modeling Tools, Data Profiling Tool, Metadata Repository, Techniques, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, DII Governance, Data Sharing Agreements, DII and Data Lineage, Data Integration Metrics,   EXAM PRACTICE 8

Document and Content Management
Business Drivers, Goals and Principles, Essential Concepts, Activities, Plan for Lifecycle Management, Manage the Lifecycle, Publish and Deliver Content, Tools, Enterprise Content Management Systems, Collaboration Tools, Controlled Vocabulary and Metadata Tools, Standard Markup and Exchange Formats, E-discovery Technology, Techniques, Litigation Response Playbook, Litigation Response Data Map, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Documents and Content Governance, Information Governance Frameworks, Proliferation of Information, Govern for Quality Content, Metrics,   EXAM PRACTICE 9

Reference and Master Data
Business Drivers, Goals and Principles, Essential Concepts, Activities, MDM Activities, Reference Data Activities, Tools and Techniques, Implementation Guidelines, Adhere to Master Data Architecture, Monitor Data Movement, Manage Reference Data Change, Data Sharing Agreements, Organization and Cultural Change, Reference and Master Data Governance, Metrics,   EXAM PRACTICE 10

Data Warehousing and Business Intelligence
Business Drivers, Goals and Principles, Essential Concepts, Activities, Understand Requirements, Define and Maintain the DW/BI Architecture, Develop the Data Warehouse and Data Marts, Populate the Data Warehouse, Implement the Business Intelligence Portfolio, Maintain Data Products, Tools, Metadata Repository, Data Integration Tools, Business Intelligence Tools Types, Techniques, Prototypes to Drive Requirements, Self-Service BI, Audit Data that can be Queried, Implementation Guidelines, Readiness Assessment / Risk Assessment, Release Roadmap, Configuration Management, Organization and Cultural Change, DW/BI Governance, Enabling Business Acceptance, Customer / User Satisfaction, Service Level Agreements, Reporting Strategy, Metrics  , EXAM PRACTICE 11
Metadata Management
Business Drivers, Goals and Principles, Essential Concepts, Activities, Define Metadata Strategy ,Understand Metadata Requirements, Define Metadata Architecture  , Create and Maintain Metadata ,Query, Report, and Analyze Metadata, Tools, Metadata Repository Management Tools, Techniques, Data Lineage and Impact Analysis ,Metadata for Big Data Ingest, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organizational and Cultural Change, Metadata Governance, Process Controls, Documentation of Metadata Solutions, Metadata Standards and Guidelines, Metrics , EXAM PRACTICE 12

Data Quality
Business Drivers, Goals and Principles, Essential Concepts, Activities, Define High Quality Data, Define a Data Quality Strategy, Identify Critical Data and Business Rules, Perform an Initial Data Quality Assessment, Identify and Prioritize Potential Improvements, Define Goals for Data Quality Improvement, Develop and Deploy Data Quality Operations, Tools, Data Profiling Tools, Data Querying Tools, Modeling and ETL Tools, Data Quality Rule Templates, Metadata Repositories, Techniques, Preventive Actions, Corrective Actions, Quality Check and Audit Code Modules, Effective Data Quality Metrics, Statistical Process Control, Root Cause Analysis, Implementation Guidelines, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Data Quality and Data Governance, Data Quality Policy, Metrics , EXAM PRACTICE 13

Big Data and Data Science
Business Drivers, Principles, Essential Concepts, Activities, Define Big Data Strategy and Business Needs, Choose Data Sources, Acquire and Ingest Data Sources ,Develop Data Hypotheses and Methods, Integrate / Align Data for Analysis, Explore Data Using Models, Deploy and Monitor, Tools, MPP Shared-nothing Technologies and Architecture, Distributed File-based Databases, In-database Algorithms, Big Data Cloud Solutions, Statistical Computing and Graphical Languages, Data Visualization Tools, Techniques, Analytic Modeling, Big Data Modeling, Implementation Guidelines, Strategy Alignment, Readiness Assessment / Risk Assessment, Organization and Cultural Change, Big Data and Data Science Governance, Visualization Channels Management, Data Science and Visualization Standards, Data Security, Metadata, Data Quality, Metrics , EXAM PRACTICE 14

Data Management Maturity Assessment
Business Drivers, Goals and Principles, Essential Concepts, Activities, Plan Assessment Activities, Perform Maturity Assessment, Interpret Results, Create a Targeted Program for Improvements, Re-assess Maturity , Tools, Techniques, Selecting a DMM Framework, DAMA-DMBOK Framework Use, Guidelines for a DMMA, Readiness Assessment / Risk Assessment, Organizational and Cultural Change, Maturity Management Governance, DMMA Process Oversight, Metrics  , EXAM PRACTICE 15

Data Management Organization and Role Expectations,
Understand Existing Organization and Cultural Norms, Data Management Organizational Constructs, Decentralized Operating Model, Network Operating Model, Centralized Operating Model, Hybrid Operating Model, Federated Operating Model, Identifying the Best Model for an Organization, DMO Alternatives and Design Considerations, Critical Success Factors, Executive Sponsorship, Clear Vision, Proactive Change Management, Leadership Alignment, Communication, Stakeholder Engagement, Orientation and Training, Adoption Measurement, Adherence to Guiding Principles, Evolution Not Revolution, Build the Data Management Organization, Identify Current Data Management Participants, Identify Committee Participants, Identify and Analyze Stakeholders, Involve the Stakeholders, Interactions Between the DMO and Other Data-oriented Bodies, The Chief Data Officer ,Data Governance, Data Quality, Enterprise Architecture, Managing a Global Organization, Data Management Roles, Organizational Roles, Individual Roles, EXAM PRACTICE 16

Data Management and Organizational Change Management
Laws of Change, Not Managing a Change: Managing a Transition, Kotter’s Eight Errors of Change Management, Error #: Allowing Too Much Complacency, Error #: Failing to Create a Sufficiently Powerful Guiding Coalition, Error #: Underestimating the Power of Vision, Error #: Under Communicating the Vision by a Factor of , , or , Error #: Permitting Obstacles to Block the Vision, Error #: Failing to Create Short-Term Wins, Error #: Declaring Victory Too Soon, Error # : Neglecting to Anchor Changes Firmly in the Corporate Culture ,Kotter’s Eight Stage Process for Major Change, Establishing a Sense of Urgency, The Guiding Coalition, Developing a Vision and Strategy, Communicating the Change Vision, The Formula for Change, Diffusion of Innovations and Sustaining Change, The Challenges to be Overcome as Innovations Spread, Key Elements in the Diffusion of Innovation, The Five Stages of Adoption, Factors Affecting Acceptance or Rejection of an Innovation or Change, Sustaining Change, Sense of Urgency / Dissatisfaction, Framing the Vision, The Guiding Coalition, Relative Advantage and Observability, Communicating Data Management Value, Communications Principles, Audience Evaluation and Preparation, The Human Element, Communication Plan, Keep Communicating  , EXAM PRACTICE 17



The Data Management Fundamentals exam covers 14 topics.  There are 11 Knowledge areas, plus Data Management Process, plus Ethics and Big Data.
The exam question coverage by each of the 14 topics is:
•    Data Management Process – 2%
•    Big Data – 2%
•    Data Architecture – 6%
•    Document and Content Management – 6%
•    Data Ethics – 2%
•    Data Governance – 11%
•    Data Integration and Interoperability – 6%
•    Master and Reference Data Management – 10%
•    Data Modelling and Design – 11%
•    Data Quality – 11%
•    Data Security – 6%
•    Data Storage and Operations – 6%
•    Data Warehousing and  Business Intelligence – 10%
•    Metadata Management – 11%
All exams have 100 multiple choice questions. All exams include a 40 question Data Management Fundamentals Practice exam. You will have 90 minutes to complete the exam once you start. If English is not your main language you can take the ESL version, where you will get an additional 20 minutes to complete the exam.
COST : $311 (EXAM ) + $11 (PROCTORES)

Top Topics