dibuka Program Training Online / Webinar !

Tetap bisa training sekalipun #diRumahAja


Kami Bekerjasama dengan hotel bintang di 4 kota Bandung-Jakarta-Bali-Cikarang untuk memberikan kenyamanan peserta public training


Inhouse Training adalah pilihan paling tepat untuk jumlah peserta perusahaan yang banyak dengan mengutamakan efisiensi biaya training.


Inhouse Training Android Application Development di PT. PLN Wilayah Maluku selama 4 hari


Inhouse Training Magento E-Commerce berdurasi 7 hari dibagi 2 sesi Fundamental dan Advanced.

Monday, October 10, 2022


Learning Plan Description CDMP DMBOK
The DMBoK and CDMP Preparation Learning Plan addresses all of the Information Management disciplines as defined in the international industry standard, the DAMA International Data Management Body of Knowledge (DMBoK).  In each course, instructor Christopher Bradley (a CDMP fellow) provides a solid foundation of the different information disciplines across the complete DMBoK spectrum.

This plan provides a comprehensive exploration of the scope of Data Management as a whole, and therefore is an excellent resource for organizations and individuals wishing to gain more extensive knowledge of the disciplines covered in the DMBoK.

By utilizing this Learning Plan as preparation for the DAMA International Certified Data Management Professional (CDMP) exams, students will gain a firm understanding of a broad range of concepts and be able to explain the practical application of them throughout various industry examples.  

This Learning Plan introduces students to the different levels of the CDMP certification and helps students consolidate their existing knowledge by reinforcing Data Management topics contained in the CDMP syllabus at all levels.

CALL/WHATSAPP : 0838-0838-0001


Why choose the ISTQB Certified Tester Foundation Level (CTFL)?
This qualification is ideal for you if you'd like to learn all about the fundamental concepts of software testing. You'll be taught the common language for efficient and effective communication with other testers and project stakeholders, a key skill to have when you're looking for a job in this area of IT.

You'll be competent in establishing testing concepts, test processes, test approaches, and principles to support test objectives. The certification will make sure you can design and prioritise tests by using common techniques as well as nurture your ability to analyse both functional and non-functional specifications such as performance and usability.

CALL/WHATSAPP : 0838-0838-0001


Certified Data Privacy Solutions Engineer (CDPSE)
CDPSE certification can help you avail a technical understanding of the extensive privacy solutions. The one who holds Data Privacy Solutions Engineer Certification can help the company have an expert with technical privacy skills who can help them enhance efficiency and prevent all kinds of risk. So, if you are thinking about pursuing the respective course then reach out to experts at Securium Solutions. We help you get ISACA CDPSE Certification in the most proficient manner.

CALL/WHATSAPP : 0838-0838-0001

SCHEDULES - CISA ISACA (Certified Information Systems Auditor)

ISACA CISA (Certified Information Systems Auditor) Certification
The ISACA CISA Certified Information Systems Auditor certification is an expert-level, globally recognized credential designed for IS audit control, and for assurance and security professionals to audit, control, monitor, and assess information technology and business systems. The CISA (Certified Information Systems Auditor) certification is renowned across the globe as a standard for Business Systems and Information technology professionals who audit, monitor, access, and control data. Being CISA certified showcases audit experience that demonstrates a candidate's knowledge and skills, and reports on compliance and institute controls within the enterprise.

The ISACA CISA training program validates a candidate's proficiency and knowledge to meet the dynamic challenges of a modern enterprise, identify critical issues, and customize practices to support information systems.uCertify provides a study guide for the ISACA CISA certification exam. The ISACA CISA study guide covers the ISAC ACISA exam objectives and provides all the necessary skills related to Information Security principles.

CALL/WHATSAPP : 0838-0838-0001

Friday, October 7, 2022


Is CISM Right for You?
ISACA's Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.
ISACA's Certified Information Security Manager (CISM) certification brings credibility to your team and ensures alignment between the organization's information security program and its broader goals and objectives. CISM can validate your team's commitment to compliance, security and integrity and increase customer retention

CALL/WHATSAPP : 0838-0838-0001


What's new in ITIL V.4
ITIL 4 is the latest version of the ITIL framework and was released back in February 2019. It is highly value-centric, primarily focusing on bringing different stakeholders in an organization together to co-create value for the end-users. With the arrival of new frameworks like VeriSM, SIAM, and FitSM in the IT service management landscape, there was a need for the previous version of ITIL (ITIL v3) to become more refined in the way it approaches service management as an enabler for businesses. ITIL 4, the current version of ITIL takes the best parts of ITIL v3, enhances them, and creates a framework that focuses more on delivering tailor-made solutions for organizations. The previous versions of ITIL directed practitioners to implement ITIL by the book which led them to a complex web of practical solutions. Whereas ITIL 4, is more pragmatic in this approach. Instead of idealizing processes and encouraging the practitioners to implement the same, ITIL 4 aims to deliver tailor-made solutions to organizations through "practices". It has two significant components that are enhancements to the previous version:

CALL/WHATSAPP : 0838-0838-0001


What is COBIT?

COBIT stands for Control Objectives for Information and Related Technology. It is a framework 

created by the ISACA (Information Systems Audit and Control Association). It was designed to be a 

supportive tool for managers—and allows bridging the crucial gap between technical issues, 

business risks, and control requirements.

COBIT is a thoroughly recognized guideline that can be applied to any organization in any 

industry. Overall, COBIT ensures quality, control, and reliability of information systems in an 

organization, which is also the most important aspect of every modern business.

Cybersecurity Expert Master's Program
Master the Skills of a Cybersecurity ProfessionalVIEW COURSECybersecurity Expert Master's Program
What is ISACA?
ISACA stands for Information Systems Audit and Control Association. It develops controls and 

guidance for information governance, security, control, and audit professionals.

This international association focuses on IT governance, providing benchmarks and governance 

tools for organizations that employ information systems. ISACA is behind the creation, 

sponsorship, and driving of the COBIT framework.

What is the History of COBIT?
Originally published in 1996, COBIT helped financial auditors better navigate their IT 

environment growth. 

ISACA released a more comprehensive version in 1998. It enveloped areas beyond audit controls. 

The third and fourth versions, released in the 2000s, added further management guidelines around 

cyber security.

The fifth COBIT version came in 2013 and brought along tools, objectives, and best practices 

universally applicable to all IT operations in enterprises. It expanded on the fourth version by 

incorporating related standards from the ISO (International Organization for Standardization), 

including ITIL (IT Infrastructure Library.

ISACA then updated COBIT 5 to COBIT 2019. It is the latest version. This COBIT version is more 

comprehensive, flexible, and suitable for all enterprises, irrespective of their immediate goals 

or size. COBIT 2019 includes six governing principles, unlike COBIT 5, which had five. Also, in 

this version, the number of processes supporting management objectives and governance has 

increased from 37 to 40. 

CALL/WHATSAPP : 0838-0838-0001

Wednesday, September 28, 2022


Information Technology Infrastructure Library (ITIL) adalah satu set konsep dan teknik untuk mengelola teknologi informasi (TI) infrastruktur, pengembangan, dan operasi. ITIL adalah pendekatan yang paling luas diterima untuk layanan manajemen TI di dunia. ITIL menyediakan seperangkat praktek terbaik kohesif, yang diambil dari sektor publik dan swasta internasional. Sebuah filosofi keseluruhan ITIL telah berkembang dari bimbingan yang terkandung dalam buku-buku ITIL dan skema ITIL kualifikasi profesional.

ITIL terdiri dari serangkaian buku memberikan bimbingan pada penyediaan kualitas layanan TI, dan pada akomodasi dan fasilitas yang diperlukan untuk mendukung lingkungan TI. ITIL telah dikembangkan sebagai pengakuan ketergantungan organisasi 'tumbuh di TI dan mewujudkan praktik terbaik untuk IT Service Management.

Informasi, Silabus & Pendaftaran
Purnama Academy
Whatsapp : 081-223344-506


TOGAF is a framework for enterprise architecture that provides an approach for designing, planning, implementing and governing an enterprise architecture. TOGAF 9.2 certification is a trusted and vendor-neutral certification which ensures enterprise architecture professionals share the same standards across the world.

Informasi, Silabus & Pendaftaran
Purnama Academy
Whatsapp : 081-223344-506

Tuesday, September 27, 2022

What is COBIT (Control Objectives for Information and Related Technologies)?

COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices. COBIT is the acronym for Control Objectives for Information and Related Technologies.

The COBIT framework was created by ISACA to bridge the crucial gap between technical issues, business risks and control requirements.

COBIT can be implemented in any organization from any industry to ensure quality, control and reliability of information systems.

In the United States, COBIT is the most commonly used framework for achieving compliance with the Sarbanes-Oxley Act (SOX).

source :https://www.techtarget.com/searchsecurity/definition/COBIT

Informasi Silabus & Pendaftaran
Hery Purnama
Whatsapp : 0838-08380001


Certified Information Systems Auditor (CISA) refers to a designation issued by the Information Systems Audit and Control Association (ISACA). The designation is the global standard for professionals who have a career in information systems, in particular, auditing, control, and security

Informasi Silabus & Pendaftaran
Hery Purnama
Whatsapp : 0838-08380001

Monday, September 26, 2022

risk management definition

Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology issues, strategic management errors, accidents and natural disasters.

A successful risk management program helps an organization consider the full range of risks it faces. Risk management also examines the relationship between risks and the cascading impact they could have on an organization's strategic goals.


Informasi Silabus & Pendaftaran


Purnama Academy

whatsapp : 0838-0838-0001


Halo semuanya. Saya berharap teman-teman semua sehat dan bahagia selalu ya. Dengan rendah hati saya sampaikan bahwa mulai bulan ini saya mendapatkan gelar CGEIT (Certified in the Governance of Enterprise IT). Saya berkomitmen untuk selalu menuliskan tips lulus setiap ujian sertifikasi yang saya ikuti sebagai ungkapan kesyukuran dan juga untuk membantu setiap kandidat ujian sertifikasi di luar sana. Jadi, inilah tips lulus ujian CGEIT versi saya :


(P.S.: beberapa di antaranya mirip dengan tips untuk lulus ujian CISA yang diposting sebelumnya karena saya yakin keduanya memerlukan persiapan yang serupa)


1. Kalibrasi Ulang Pola Pikir


Satu hal yang paling saya sadari dari materi CGEIT adalah sudut pandang dan cara berpikirnya sedikit berbeda dari yang saya miliki. Sementara sebagai praktisi terkadang saya harus berpikir praktis, ujian CGEIT mengharuskan kita untuk berpikir secara strategis dan ideal. Jadi sebelum memulai perjalanan belajar, saya mengkalibrasi ulang pola pikir. Saya juga mempersiapkan diri untuk berpikir berdasarkan peran yang diberikan misalnya komite audit, CIO, CEO, dll, serta memahami jargon/istilah yang digunakan oleh mereka.


2. Pelajari CGEIT Review Manual dan CGEIT Review Questions, Answers & Explanations Manual (QAE)


Seperti yang saya sebutkan dalam post tentang tips ujian CISA, review manual dan QAE adalah dua referensi sakral untuk semua orang yang ingin meraih sertifikasi ISACA. Luangkan waktu untuk membaca kedua buku ini dari sampul ke sampul terutama QAE karena memperkenalkan kita pada jenis pertanyaan yang akan kita hadapi. Pahami penjelasan dari jawaban-jawaban yang disarankan buku tersebut untuk mendapatkan logika, perspektif, dan kearifan yang ditetapkan ISACA. Saya juga mengidentifikasi kesenjangan pengetahuan saya dan membuatnya menjadi catatan. Saya membacanya lagi saat waktu luang.


Informasi Silabus & Pendaftaran


Purnama Academy

Whatsapp : 0838-0838-0001

Wednesday, September 14, 2022





PRINCE2 is a structured project management method and practitioner certification programme. PRINCE2 emphasises dividing projects into manageable and controllable stages. It is adopted in many countries worldwide, including the UK, Western European countries, and Australia

WHAT IS AGILE KANBAN Developed by Toyota in the late 1940s, the Kanban system originally aimed to improve manufacturing efficiency. Taking its name from the card system that tracks production in a factory, it has since been refined and customised by many different manufacturers. Now, this system is used in project management, featuring in the PRINCE2 Agile guidance

• Understand how to manage project with PRINCE 2
• Understand how sofftware development Project works with PRINCE 2 Agile
• Understand how to use Kanban
• Understand how to Javanet Kanban SQA Tool to manage project

• Project Manager
• SQA Project Management Team
• IT Staff
• Public

- Basic Knowledge in Project Management

An Overview of PRINCE2 Agile
Continued Business Justification
Learn from Experience
Defined Roles and Responsibilities
Manage by Stages
Manage by Exception
Focus on Products
Tailor to Suit the Project Environment

Business Case

Starting up a Project
Initiating a Project
Directing a Project
Controlling a Stage
Managing Product Delivery
Managing a Stage Boundary
Closing a Project

Management Products
Benefits Management Approach
Business Case
Communication Management Approach
Configuration Management Approach
Product Description
Project Brief
Project Initiation Documentation
Project Product Description
Quality Management Approach
Risk Management Approach
Work Package
Configuration Item Record
Daily Log
Issue Register
Lessons Log
Quality Register
Risk Register
Checkpoint Report
End Project Report
End Stage Report
Exception Report
Highlight Report
Issue Report
Lessons Report
Product Status Account

Roles and Responsibilities
Project Board
Senior Supplier
Senior User
Project Manager
Team Manager
Project Assurance
Change Authority
Project Support
Additional Roles
Customer Subject Matter Expert
Customer Representative
Supplier Subject Matter Expert
Supplier Representative
Delivery Team Quality Assurance

Extra Concepts
Health Check
Guidance Points
Definition of Done
User Stories
The Focus Areas
The Agilometer
Frequent Releases
Rich Communication
Information Radiators
Daily Standups
Review Meetings
Retrospective Meetings

Prince2 Agile Kanban
What is Kanban
Kanban Purpose
How Does Kanban Works
Using Kanban in Prince2 Agile

Practice Prince 2 Agile Kanban with Kanban SQA Tool
Users and Groups
Automatic Actions
Project Analytics
Time Tracking
RSS/Atom Subscriptions
iCalendar Subscriptions
Advanced Search Syntax
Markdown Syntax
Keyboard Shortcuts

*For further more details please contact our sales team at info @ purnamaacademy.com or whatsapp 0838-0838-0001


The CISM (Certified Information Systems Manager) is a professional certification sponsored by ISACA for those who oversee, or seek to oversee, an information security program.

The CISM is meant for existing or aspiring managers, and is growing in relevance as cybersecurity at the enterprise level increasingly is becoming a c-level and board initiative. The thinking behind this certification is that as programs and needs grow, professionals will require management credentials alongside the various technical certifications that exposure to a large enterprise cybersecurity operation would require.

The Information Systems Audit and Control Association, which is known only by its acronym ISACA, is an international professional association that sponsors the CISM. The certification requirements include five years experience in the field, a single exam consisting of 200 questions taken over four hours, and a fee.

Informasi Silabus & Pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Tuesday, September 13, 2022


Power Query is a tool used to manipulate data and is commonly used for data analysis and business intelligence.

High-quality analysis relies on well-organized data that is free from errors and that draws data from a single source of truth. Whilst many analysts spend hours of time manipulating data, combining data, and performing look ups, Power Query allows all of these steps to be automated with simple, repeatable steps.

Power Query is one of the most transformative tools available to any analyst working with data in Excel. Not only will it save analysts hours of time, but it will result in reduced manual errors and a better ability to source data from a single source of truth.

Informasi Silabus & Pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Monday, September 12, 2022


Python is an interpreted, object-oriented, high-level programming language with dynamic semantics. Its high-level built in data structures, combined with dynamic typing and dynamic binding, make it very attractive for Rapid Application Development, as well as for use as a scripting or glue language to connect existing components together. Python's simple, easy to learn syntax emphasizes readability and therefore reduces the cost of program maintenance. Python supports modules and packages, which encourages program modularity and code reuse. The Python interpreter and the extensive standard library are available in source or binary form without charge for all major platforms, and can be freely distributed.

Often, programmers fall in love with Python because of the increased productivity it provides. Since there is no compilation step, the edit-test-debug cycle is incredibly fast. Debugging Python programs is easy: a bug or bad input will never cause a segmentation fault. Instead, when the interpreter discovers an error, it raises an exception. When the program doesn't catch the exception, the interpreter prints a stack trace. A source level debugger allows inspection of local and global variables, evaluation of arbitrary expressions, setting breakpoints, stepping through the code a line at a time, and so on. The debugger is written in Python itself, testifying to Python's introspective power. On the other hand, often the quickest way to debug a program is to add a few print statements to the source: the fast edit-test-debug cycle makes this simple approach very effective.

Informasi silabus & pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Friday, September 9, 2022


CISA is recognized the world over as proof of competency and experience in providing assurance that critical business assets are secured and available.
CISA affirms your credibility to offer conclusions on the state of an organization's IS/IT security, risk and control solutions.
CISA confirms to stakeholders your abilities to identify critical issues and recommend enterprise specific practices to support and safeguard the governance of information and related technologies.
CISA offers proof of your competency in IT controls and your understanding of how IT relates to business.
CISA assures your understanding of policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.

Informasi silabus & pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Wednesday, September 7, 2022


CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. The official Certified Risk Information Systems Control (CRISC) certification is a powerful manifestation of proficiency and expertise regarding various areas of risk. As well as this, CRISC demonstrates a commitment to IT security operations and enterprises, and a willingness to deliver quality within their profession. CRISC has been established as one of the most desirable and preferable IT security certifications worldwide. 

Informasi Silabus & Pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Tuesday, September 6, 2022


The Certified in Governance of Enterprise IT (CGEIT) certification is a vendor-neutral certification offered through the ISACA. It's designed for IT professionals in large organizations who are responsible for directing, managing and supporting the governance of IT.

The exam consists of 150 multiple-choice questions and you'll have four hours to complete the in-person exam. Testing locations can be found through PSI Online and, depending on your location, you'll likely be able to choose between a testing center or a kiosk. At a testing center, you'll take a live proctored exam with other exam-takers, but at a kiosk location, you'll take the exam alone at a small work station in a "managed, yet self-service way." The ISACA offers more information on each testing experience to help you choose the best option for you.

[ Get ahead with the top certs for big data, project management, agile, data science, IT management and the cloud, as well as the top-paying certs and emerging certifications for today's hottest skills. | Get weekly career tips by signing up for our CIO Leader newsletter. ]

Exams are offered during three specific testing windows during the year — the first testing window in 2019 will run from February 1 to May 24. The two other testing windows for 2019 haven't been announced yet, but they typically run for three-month periods.

What's on the CGEIT exam?
The ISACA organizes the exam by five main CGEIT domains, which includes:

Domain 1: Framework for the governance of enterprise IT (25% of the exam)
Domain 2: Strategic management (20% of the exam)
Domain 3: Benefits realization (16% of the exam)
Domain 4: Risk optimization (24% of the exam)
Domain 5: Resource optimization (15% of the exam)
Domain 1 includes establishing a framework for governance of enterprise IT that helps the organization realize its goals and objectives, while considering risk and optimization. It also covers all the basic requirements, policies, principles, processes, organizational structures, infrastructure, skills and competencies necessary to build, oversee, and manage a framework IT governance.

Domain 2 focuses on aligning IT with enterprise objectives creating a strategic plan that helps the organization understand how changes to business strategy will impact IT strategy. This domain covers knowledge of IT roles and responsibilities, prioritization processes, documentation and communication methods, potential barriers for strategic alignment and current and future technologies.

Domain 3 covers benefits realization, which is the process of managing, tracking and reporting on the performance of IT investments to ensure they deliver optimized business benefits. This domain includes knowledge of KPIs, benefit calculation techniques, how to measure and monitor outcome and performance, and knowledge of continuous improvement concepts and principles.

Domain 4 encompasses risk optimization, which is the process of ensuring IT risk management frameworks help identify, analyze, mitigate, manage, monitor and communicate IT-related business risk and that they're aligned with the enterprise risk management (ERM) framework. Risk optimization also includes an understanding of appropriate legal and compliance regulations and the ability to communicate risk to senior-level executives. You'll need knowledge of disaster recovery planning (DRP), business continuity planning (BCP), standard risk management frameworks, key risk indicators (KRIs) and the skills to report on analytical data.

Domain 5 covers the optimization of IT resources, including information, services, infrastructure and applications, and people. This domain includes everything you need to know to ensure the correct processes are in place to reach enterprise goals. You'll need knowledge of IT resource management, service level agreements (SLAs), operation level agreements (OLAs) and data management and data governance.  

For a more in-depth look at the tasks and knowledge areas for each domain, you can visit the ISACA website.

CGEIT qualifications
To qualify for the exam, you'll need at least five years of relevant work experience with one year working in Domain 1 (managing frameworks) and the other four years spent working in at least two out of the five other domains. You won't have to take a course to pass the CGEIT; instead your work experience and background serve as your CGEIT education. This certification is designed for professionals who have "significant management, advisory, or assurance role relating to the governance of IT and the knowledge required to perform these tasks," according to the ISACA

Informasi Silabus & Pendaftaran Hubungi
Purnama Academy
Whatsapp : 0838-0838-0001

Monday, August 29, 2022

Apakah itu COBIT 2019

Control Objective for Information Technologies, disingkat COBIT, adalah suatu panduan standar praktik manajemen teknologi informasi. Standar COBIT dikeluarkan oleh IT Governance Institute yang merupakan bagian dari ISACA. COBIT 2019 merupakan versi terbaru.

COBIT memiliki 4 cakupan domain, yaitu:

Perencanaan dan organisasi (plan and organise)
Pengadaan dan implementasi (acquire and implement)
Pengantaran dan dukungan (deliver and support)
Pengawasan dan evaluasi (monitor and evaluate)
Maksud utama COBIT ialah menyediakan kebijakan yang jelas dan good practice untuk IT governance, membantu manajemen senior dalam memahami dan mengelola risiko-risiko yang berhubungan dengan IT.

COBIT menyediakan kerangka IT governance dan petunjuk control objective yang detail untuk manajemen, pemilik proses bisnis, user dan auditor.

Hubungi Purnama Academy 0838-0838-0001 untuk pendaftaran dan informasi detail silabus training tersebut di atas

Apakah CISM

Certified Information Security Manager (CISM) adalah sertifikasi profesional untuk manajer keamanan informasi yang diberikan oleh ISACA. CISM bertujuan memberikan pengetahuan umum pada bidang keamanan informasi dan mencakup pengetahuan mengenai manajemen risiko informasi, tata kelola keamanan informasi, serta isu-isu praktis seperti pengembangan dan pengelolaan program keamanan informasi serta manajemen insiden.

Untuk mendapatkan sertifikasi CISM, kandidat harus melalui ujian tulis sertifikasi serta memiliki pengalaman paling tidak lima tahun di bidang keamanan informasi. Biasanya, profesional yang telah memiliki sertifikasi CISA atau CISSP juga berupaya mendapatkan sertifikasi CISM.

** Hubungi Purnama Academy 0838-0838-0001 untuk pendaftaran dan informasi detail silabus training tersebut diatas

Friday, June 17, 2022








Technical Writing for Software / Application

DURATIONS :   4 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )

DESCRIPTION : Is the ability to provide relevant information about using your software essential for your customers? Do you find yourself spending hours and hours trying to explain how to use the software? Or are you getting feedback from your clients that your documentation is hard to be followed, inconsistent or maybe even.... confusing? 

If you answered with "Yes!" to any of these questions and you are willing to invest the time and energy needed to go through this practical course then this course is for you!

A software technical writer creates documents to describe how to set up and use software products. Software technical writers make user guides, setup instructions, instruction manuals, online training material, release notes, new feature documents, how-to guides, and quick reference articles

TRAINING OBJECTIVES : This course is designed for beginner technical writers, usually students in IT, and covers the following subjects:

What is technical writing / writer all about?

What are the basics of Software technical writing?

Which are the main principles that you should follow to construct build your documentation?

Which are the common terms you will hear and use in the IT technical writing world?

How to write technical documentation using GitHub wiki? You will, later on, use this material for creating your portfolio that you will want to add to your CV when you apply for a technical writer job or promotion to a senior developer.

What is information architecture from a technical writing point of view?

REQUIREMENTS : You will need a PC or a laptop where you can develop content assignments or install particular software we will be using on trial basis in the course of the training 

PARTICIPANTS : - Software developers who want to gain practical knowledge on how to offer help for the users of software products

- Students who work on their software development projects and now struggle to create the documentation delivery for their app

- If you pursue career as a technical writer, developer, architect, manager or product owner

- Business analysts who want to know the basics of technical writing

- Technical Writers and Information Developers

TRAINING TOPICS : Application Technical Writer Overview

What is Technical Writing

Who is Doing Technical Writing

What is the Result from Technical Writing

The Job of Technical Writer

Types of Documentation

Functional Documentation

Functional Documentation in Application Documentation

Strategy for writing functional Documentation

Task- Oriented Documentation

Srategy for writing task-Oriented Documentation

What is Application Documentation

Technical Writers in the Application Development World

Technical Writing Deliverables for Application

Documentation in the Application Development World

Technical Writer in the Application Development Team

The Technical Writing Process

The Ultimate Purpose of the Technical Writer

Test Your Knowledge Documentation in the Application Development World

Writing Documentation Using GitHub Wiki

Overview - Sample Setup in GitHub

What is GitHub?

Why Writing in GitHub?

Documentation in GitHub

Markup Language in Wiki Pages

Set up Account in GitHub and Create a New Wiki Page

How to Create a Table in GitHub Wiki Using Markdown

How to Create an Image in GitHub Wiki using Markdown

How to Create a Link to a Mail Address in GitHub Wiki Using Markdown

How to Create a Table of Content (TOC) in GitHub Wiki Using Markdown

Style Guide In Technical Writing

How to Use a Style Guide in Technical Writing

What is Style Guide?

Why do we Needs Standards for Writing?

Sample Style Guides

Who Else Needs Rules for Writing?

Results from Using a Style Guide

Structure in Writing




Verb Choice Can or May?

Verb Choice Must/Must not/Should/Shouldn't/May

Active Voice and Present Tense


Consider in Addition

Use Tools!

UI Messages and Text on Screen

Introduction of Strurtured Writing

Structured Writing

Why Do We Need Structure in Writing?

Organizing Large Amounts of Content

Consistency in User Experience

Intuitive and Obvious User Experience

Ensuring Completeness of the Documentation

Targeting Content to Various Audiences

Coordinating Documentation Projects

Increase Understandability of the Documentation

Structured Writing Definition

Common Information Types

DITA XML - a Standard for Structured Writing

How to Structure in an Unstructured Writing Environment?

Structured Writing in Microsoft Word Environment

Details of the Topic Types in the MS Word Template

Structured Writing in GitHub Wiki

Details of the Topic Types in the GitHub Wiki Template

12 Principles of Technical Writing

Principles of Technical Writing

Principle #1 Decide Who are You Writing For

Principle #2 Identify the Information Needs

Principle #3 Decide on the Style

Principle #4 Decide Which Deliverables to Create

Principle #5 Decide Which Tools to Use

Principle #6 Define the Content Structure

Principle #7 Decide Which Information Channels to Use

Principle #8 Write the Documentation

Principle #9 Use Images and Video When Appropriate

Principle #10 Publish the First Version

Principle #11 Collect Feedback and Improve

Principle #12 Repeat!

Exercise on Applying the Principles in Documentation

Application Documentation Development using DITA XML (Oxygen Author)

What is DITA?

Who Defines DITA?

The DITA Specification

Overview of the Specification

Do You Need to Know the Specification by Heart?

Basics of Structured Writing

Understanding DITA Authoring Point of View

Understanding DITA Information Architect Point of View

How to Install the Application for This Section

Oxygen XML Author

Installing a Tool for Writing with DITA

End-to-end Demo

Exercise  Write a Sample Instruction

Exercise  Writing Documentation using Oxygen Author DITA CMS

Using Graphics & Images in Software Documentation

Why Graphics are Important?

When to Use Graphics in Application Documentation?

Types of Graphics in Application Documentation

Process Graphics

Architecture Graphics


Rules for Graphics in Technical Writing

Tools for Creating Graphics

Exercise Instructions

Infographic Exercise - Expected Result

Demo - Create Infographic Using Canva

Creating Graphics Using Microsoft PowerPoint

Demo Using Microsoft PowerPoint

Exercise - Creating Graphics Using Google Drive

Strategies and Technical Writing Information Archictecture

What is Information Architecture?

Who is an Information Architect and What Does an IA Do?

Why Should I Care About Information Architecture?

Information Architecture in Technical Writing

How to Apply Information Architecture Principles for the Content?

Structuring Data. Metadata and Taxonomies.

What is Metadata?

What is Taxonomy?

Starting the Classification and Engaging Stakeholders

Define Scenarios

Visualize It!

Next Recommendation  Training : 1. ISTQB CTFL Exam Preparation Training

2. Application Testing Automations with Katalon Studio & Jenkins










DURATIONS :   3 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )

DESCRIPTION : Your IT Help desk is the center of your customer service team. It helps your business provide customer-centric service through automating and organizing their daily workflow. By doing correct IT Heldesk Management Practices and supplying employees with proper tools they need to quickly response and take actions for any issues and user questions, your company will creates a more powerful service cycle

TRAINING OBJECTIVES : This Course provide an overview of the typical knowledge and skills required,  without focusing on any one technology vendor or platform.

This course does assume the participants already has some technical knowledge that will be utilized in a Help Desk role. The focus of the course is on the high-level Management practices that are important when providing Help Desk support services, including customer service, IT Service Management and the technical activities that will be performed.

The course material also is based on the ITSM best practices

You learn Incident and Request classification, specific features of performing major Incident resolving. You learn and practice on creating Incident and Request models for certain types of user calls.

While Monitoring/Event management studies You learn the best practices of building-in monitoring tools in an IT service, types of events, and management of them.

Problem management is mostly an expert area. At the course students learn and practice best practices of expert analysis such as mind maps, Kepner Tregoe analysis, Five Whys, and others.

REQUIREMENTS : Junior experience at a Help desk/Service desk or other IT junior positions

Basic knowledge in IT management

PARTICIPANTS : - Service Desk/Help desk specialists

- Service/Help desk managers

- IT managers

- Business unit managers which closely collaborate with IT departmen

TRAINING TOPICS : IT Helpdesk Management Overview

What is IT Helpdesk Management

IT Helpdesk Vs IT Service Desk

IT Helpdek Hiring Management Practice

Hiring New Staff & Smart Hiring 

To DO List, Expectations, Technical Skills and Attributs

Have Others Check your List, Legally Complaint, Chart Review and Essentials

Create Job Description and Get the Word Out

Narrow your Application Pool, Prepare for the Interview and Resources

Know Who you are Talking To, Asking the Right Questions, About Discrimination

Open-ended, Relevant to the Position and the Individual & The Interview

Evaluation, In Review, Background Check, Extend the Offer & Steps in Hiring


Introduction and Definition of Topgrading

Definition of A-players, Best of the Rest and Appropriate Compensation

The Big Question, Implementation, Best Practices, Talent Review and Scorecards

Interview Process and Types of Interview

It Helpdesk Team Building

Working in a Team, Types of Team and Teamwork Success

Employee Involvement, Team Conflict and Team Leaders Role in Managing Conflict

Leadership, Learning to be a Leader, LEAD Model & What Sort of a Leader are You

Lead by Example and Management Process

How to Motivate, Coaching Staff and Coaching Skills

Working Together, Why is Training Needed and Contributing to the Team

Learning Organizations, Development Cycle and Performance Appraisals

Cross Training and Poor Management

Managing Your IT Helpdesk Team

Introduction, All About Money, and Reward and Recognition

The Cost, Factors, Challenging Goals and Clear Instruction

Meaningful Tasks, Feedback, Rewards and Incentives

No Single Rewards, Who Benefits and The Bottom Line

Performance Reviews and Avoidance

Tips for a Better Performance Review and Signs of Success

Retention of Quality, What can We Do, Research and Best Workplaces

Motivational Strategies, Rates, Most Important Attributes & Collecting Feedback

Ask, Cluster Surveys, Started Feedback, Stay and Exit Interview Survey

IT Service Management Principles

Introduction, Definition and Good Practice for ITSM?

Business, IT Alignment, Definition of Services and Process & the Generic Process

Function and Process Owner vs Service Owner

Service Lifecycle

IT Financial Management

Demand Management

Request Fulfillment

Access Management

Service Operations Process

INCIDENT Management & tasks

Problem management

Problem management assignment

Event management - Service monitoring and control

Serving user requests (RFS)

Develop a Request model

Selecting A Help Desk Tools

Importance of Supporting Technology, Common Features and Additional Features

Selection Process and Knowledge Management Integration

Workflow Management and Major Tool Vendors

IT Helpdesk Support Services

How to Properly Trouble Shoot PC Issues

How to Properly Trouble Shoot Printer Issues

Screen Sharing with Team Viewer

Active Directory Users and Computers Demostrated and explained

Introduction to Microsoft Outlook

Common Password Locations : Credential Manager

Common Password Locations : Google Chrome

Commong Password Locations : Wifi

What is the Internet

Basic Networking : IPconfig, Ping, Pathping

Next Recommendation  Training : 1. ITIL V.4

2. ISO 20000 IT Service Management (ITSM)

3. ICT Governance








DURATIONS :   4 DAYS (OFF/ONLINE TRAINING  09.00   –   16.00  )

DESCRIPTION : This program is designed for Software Quality Control and Assurance Manager, Project Manager and Software Development Team Member who is interested in increasing the likelihood of project success. The course looks at software quality control and assurance processes and practices, as well as support disciplines such as software project management, software configuration management and release management. Successful software quality assurance is the result of the combination and integration of these practices, and complements SE practices.

TRAINING OBJECTIVES : Write a software quality plan

Define software quality metrics

Prepare software quality checklists

Develop an overall process improvement plan

Understand how to best help your colleagues with the quality of their outputs

Ensure the highest possible quality products

Deliver value-added products

Help your company win more business by delivering higher quality

REQUIREMENTS : Have a general knowledge of software development life cycles.

Does not require knowledge of any programming languages 

PARTICIPANTS : - Learners and practionares of quality control, quality assurance and quality management.

- software developers

- software project managers and team leaders

- Example: Beginner level course ideally suited for someone who knows very little about software quality assurance

TRAINING TOPICS : Chapter 1  Quality Assurance Basics   

Connotations of the Word Quality   

What Is Quality? 


Definition of Quality from the Standpoint of the Provider 

Quality and Reliability 

Evolution of the Concepts of Quality 

Quality Gurus 

Total Quality Management 

Are We Giving Adequate Importance to Quality in Organizations? 

Organizational Goals and Quality Goals

Is a Quality Department in Software Development Organizations Really Needed? 

The Present Scenario in Software Development Organizations 

Chapter 2  Four Dimensions of Quality 


Specification Quality 

Design Quality 

Development (Software Construction) Quality 

Conformance Quality 

Ensuring Quality in Specifications 

Ensuring Quality in Design 

Ensuring Quality in Development (Software Construction) 

Ensuring Conformance Quality 

Chapter 3  Software Product Quality 

Functionality Standpoint 

White Box (Glass Box) Standpoint 

Presence of Defects in the Product 

Program Quality 

Measurement of Product Quality 

Chapter 4  Organizational Environment that Fosters a Quality


Quality and Organizational Environment    

Need for an Independent Quality Assurance Department    

The Role of the Quality Assurance Department    

The Position of the Quality Assurance Department in an Organization    

Organization of the Quality Assurance Department    

Organization and Staffing of the Quality Assurance Department    

A Well-Defined and Institutionalized Software Development Process    

Explicit System of Rewards and Recognition for Achieving Excellence in Quality    

Commitment and Involvement of Senior Management in Fostering a Culture of Quality in the Organization    


Chapter 5  Software Verification    


Walkthroughs (Peer Reviews)    



Verification Process     

Implementation of Verification Activities in Projects 


Chapter 6  Validation     

Definition of Validation     

Validation of Software Designs     

Validating the Product Specifications     

Validating the Software Product     

Testing Different Types of Software Products     

Testing Basics     

Approaches to Testing     

Test Case Design     

Test Environment     

Testing Scenarios     

Project Testing or Embedded Testing     

Product Testing     

Best Practices in Testing     

Automation of Testing and Use of Testing Tools     

Final Words about Software Testing     

Chapter 7   Software Product Quality: Reliability     

Software Disasters     

Software Reliability     

Cause of Software Failures     

Prediction of Software Reliability     

Software Reliability Improvement     

Chapter 8   Process Quality     

Process Quality Evolution     

Aligning the Process with a Process Model     

Process Improvement     

Process Stabilization     

Software Development Process     

Components of a Process     

Process Certification   


Chapter 9  New Paradigm for Software Quality     

Current Certification Paradigms     

The Fallacy of Certifications     

Criticisms of Maturity Models     

A New Paradigm for Software Quality Assurance     

Next Recommendation  Training : 1. ISTQB CTFL Exam Preparation Training

2. Software Testing Automations with Katalon Studio & Jenkins






DURATIONS :  4 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )

DESCRIPTION : Business process modeling in business process management and systems engineering is the activity of representing processes of an enterprise, so that the current business processes may be analyzed, improved, and automated

TRAINING OBJECTIVES : Create clear, correct and expressive BPMN 2.0 Models with clear process logic

The full vocabulary of BPMN 2.0 Level 1: the descriptive modelling pallet

The context of BPMN, BPM and Business Analysis in general

Best practices approach with tips and tricks to model any real-world process

How to improve real-world processes using BPMN 2.0

How to adhere a common modelling method to create consist diagrams for both Business and IT

REQUIREMENTS : This training is tool independent, just like BPMN itself. You can use your own tool or use the free web-based one

PARTICIPANTS : - Business Analysts

- Aspiring Business Analyst

- Managers

- Technical Developers

- Consultants

- External teams and third parties

- Process Improvers

TRAINING TOPICS : Introduction to BPMN

What is BPMN

Practice the core elements 

The Advantages of BPMN .

BPMN . versus Traditional Flowcharts

BPMN . and BPM Suites

Why BPMN . is Important

Getting Started with BPMN 

Tooling BPMN . Setup & Tips and Tricks

BPMN for Practitioners

Model your First BPMN

Using XOR Gateways correctly

Practical Example Model a webshop order proces.

Practice with XOR gateways and conventions

Pools, Lanes, Subprocess, Hierarchical Model

Pools in BPMN

How To Creating Pools in Lucidchart

Lanes and Pools in BPMN

How To Create Lanes in Lucidchart & replicate the model

Different Task Types User and Service

Subprocesses, Nesting and Inline or Hierarchical Expansion

Parallel Gateways, Terminate End Events and Timer Trigger Events

Collaborations, Message Flows, data Objects & Events

Collaboration, Blackbox pools, message events & Flows

Collaborations in practice

Data Objects, Data Stores and Call Activities

Annotation Options in BPMN

Exercise Practice with Message End Events

Summary the All of Elements

Starts & Events

Activities and subprocesses

Gateways, Connectors. Pools, lanes and black boxes

Data objects


Quality, Best Practices and Methodology

About Good BPMN

Seven Best Practices to create good BPMN . Models

Agile methodology to go from a blank piece of paper to a full BPMN diagram

Practice & Case Study

Business Case Assignment Description

Business Case The Scenario

Step 1 Assignment Scope of the high level Business Process

Step 1 Solution Scope the high level business process

Step 2 Part I Assignment Model the happy path scenario

Step 2 Part I Solution of the happy path scenario

Step 2 Part I How to draw the happy path scenario Lucidchart

Step 2 Part II Assignment Add exception flows

Step 2, Part II Solution of adding the exception flows

Step 2 , Part II How to model the exception flows in Lucidchart

Step 2,  Part III Assignment Add all detail to the high level process

Step 2,  Part III Solution of Adding all detail to the Model

Step 2 , Part III How to add all detail to the model in Lucidchart

Step 3 Improve The Process

Step 3  Assignment Model the improvement

Step 3 Solution

Step 3 How to model 'to be' or 'target' business process models 

Step  4 Scope sublevel processes; scenario and assignment.

Step  4 Solution of scoping the sublevel processes

Step  5 Model subprocesses assignment

Step  5 Solution of the subprocess

Step  5 How to model the subprocess in Lucidchart.

Next Recommendation  Training : 1. S.A.D with UML

2. Enterprise Architect with TOGAF 9








DURATIONS :  3 DAYS (OFF/ONLINE TRAINING   09.00   –  16.00  )

DESCRIPTION : In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.

You will learn how to identify, assess and articulate risk as well as options available for treating cyber security risk and which may be most appropriate for your situation.

This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization

TRAINING OBJECTIVES : Develop an understanding of what risk is and how it can be managed.

How to create a risk management framework within your organisation.

How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.

How to perform detailed analysis of risk and develop risk treatment plans.

How to apply risk management concepts in practice including developing a risk register, Cyber Security Strategy Plan, governance models, risk bowties and reporting.

REQUIREMENTS : No special requirements

PARTICIPANTS : - Information Technology Managers

- Information/Cyber Security Managers

- Information Security Professionals

- Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security

TRAINING TOPICS : Introduction

What Is Risk?

IT & Cyber Security Risk

Components of a Risk

Articulating Risk

Risk Management

What is Risk Management

Objectives of Risk Management

Risk Management vs Risk Minimisation

Risk Management Principles

Risk Management Framework

Mandate & Commitment

Designing your framework

Designing your framework – Organisational Context

Designing your framework - Establish Policy

Designing your framework - Accountability

Designing your framework - Organisational Integration

Designing your framework - Communication & Reporting

Designing your framework - Implementation

Designing your framework - Monitoring & Review

Designing your framework - Continual Improvement

The risk management process

The risk management process - Communication & Consultation

The risk management process - Context Establishment

The risk management process - Risk Assessment

The risk management process - Risk Treatment

The risk management process - Monitoring & Review

The risk management process - Auditability and Traceability

Risk Management - Maturity Models

Risk Management - Risk Assessment & Measurement

Risk Assessment & Measurement - Terminology

The risk management process (recap)

Risk Identification

Risk Analysys

Risk Analysis - Likelihood

Risk Analysis - Consequence/Impact

Risk Analysis - Consequence Examples

Risk Analysis - Risk Matrix

Risk Analysis - Analysis Example 

Risk Evaluation

Risk Treatment

Risk Treatment Plan Example 

Risk Treatment Considerations

Cyber Security Risk management in Practice

Creating an IT risk register

Example Excel risk register

Risk governance -   lines of defence model

Developing Cyber Security Strategy Plan 

Risk bowties


Next Recommendation  Training : 1. CISM Exam Preparation Training

2. CISSP Exam Preparation Training

3. ISO 27001 Training

4. ISO 31000 Training

Top Topics