afenoid brochure 2018provides a basis for assessing an organisation's process cybersecurity...

28
ENTERPRISE LIMITED Training Brochure ITIL®, IT Infrastructure Library®, PRINCE2®, are Registered Trademarks of the Axelos COBIT® is a registered Trademark of ISACA and the IT Governance Institute PMP® is a registered mark of the Project Management Institute, Inc The Kepner-Tregoe® brand and Intellectual Property are owned by Kepner-Tregoe. All rights reserved TOGAF® 9.1, is a Registered Trade Mark of The Open Group TOGAF® is a registered trademark of The Open Group in the United States and other countries.

Upload: others

Post on 20-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

ENTERPRISE LIMITED

Training

Brochure

ITIL®, IT Infrastructure Library®, PRINCE2®, are Registered Trademarks of the Axelos

COBIT® is a registered Trademark of ISACA and the IT Governance Institute

PMP® is a registered mark of the Project Management Institute, Inc

The Kepner-Tregoe® brand and Intellectual Property are owned by Kepner-Tregoe.

All rights reserved

TOGAF® 9.1, is a Registered Trade Mark of The Open Group

TOGAF® is a registered trademark of The Open Group in the United States and other countries.

Page 2: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

YOUR

DIGITAL

STRATEGY

PARTNER

About Us 3

Strategic Partners 4

Training Courses & Solutions 5

Business Governance of IT, Strategy and Enterprise Architecture 6

Business Analysis, Project, Programme and Portfolio Management 9

Risk Management, Information Security, Information Assurance and Cyber Resilience

14

Service Management and IT Operations 18

DevOps 24

Digital Marketing 25

Management Systems Consulting 26

Business Technology Suites 27

Contact Us 28

CONTENTS

Page 3: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

Afenoid Enterprise Limited’s purpose is to strengthen IT-related

organizational processes and empower professionals by equipping them

with best practice frameworks, tools and techniques to optimize

technology investments.

With the increasing dependence of enterprises on the use of information-related technologies, it is

imperative for organizations to prioritize the acquisition of skills that will deliver value to the enterprise

by realizing benefits, optimizing risks and optimizing resources.

ABOUT US

3

Page 4: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

Afenoid has developed international relationships and maintained global

alliances to bring to you the best-in-class, globally accredited, international best

practice learning solutions in IT Governance and Management to enhance the

competence, capability and capacity of IT professionals to deliver value to

internal and external stakeholders.

STRATEGIC PARTNERS

4

Page 5: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

TRAINING COURSES & SOLUTIONS

5

Page 6: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

6

COURSES OVERVIEWDURATION

(DAYS)

COBIT® 5 Foundation Certification Course

Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example driven approach

3

COBIT® 5 Implementation Certification Course

Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.

3

COBIT® 5 Assessor Certification Course

The COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives.

3

Business Governance of IT, Strategy and Enterprise Architecture

Page 7: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

COBIT® 5 Assessor for Security Certification Course

COBIT® 5 Assessor for Security provides a clear understanding of process cybersecurity capabilities of an IT system. COBIT 5 Assessor for Security provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM).

3

Implementing the NIST Standards using COBIT® 5

This module focuses on the Cybersecurity Framework (CSF), its goals, the implementation steps and the ability to apply this information. The course and exam are intended for individuals who have a basic understanding of both COBIT 5 and security concepts, and who are involved in improving the Cybersecurity programme for their enterprises.

3

Business Relationship Management Professional (Foundation)

BRMP® training and certification is aimed at Business Management, Provider Management, those with a Business Relationship Management role and Consultants looking to gain an insight into Business Relationship Management and looking for certification as a Business Relationship Manager

4

Certified Business Relationship Manager (Practitioner)

The CBRM® Practitioner qualification is intended for the intermediate to advanced Business Relationship Manager and focuses on advancing to the role of Strategic Business Relationship Manager. The primary focus is therefore on strategic business relationship management leveraged to optimize value to the enterprise.

4

Business Governance of IT, Strategy and Enterprise Architecture

7

Page 8: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

TOGAF 9 Certified (Foundation & Practitioner)

TOGAF is an architecture framework – The Open Group Architecture Framework. Put simply, TOGAF is a tool for assisting in the acceptance, production, use, and maintenance of architectures. It is based on an iterative process model supported by best practices and a re- usable set of existing architectural assets. TOGAF 9 can be used for developing a broad range of different enterprise architectures.

5

Managing Benefits TM

Foundation and Practitioner

The purpose of the Managing Benefits guidance and certification scheme is to provide managers and practitioners from multiple disciplines, working in a variety of organisations with generally applicable guidance encompassing benefits management principles, practices and techniques.

5

Better Business Cases (Foundation and Practitioner)

he Better Business Cases certification course and examination are based on The Five Case Model which is the UK government’s best practice approach to planning spending proposals and enabling effective business decisions. This provides a step by step guide to developing a business case.

5

CGEIT Mentoring Class(without Exam)

Certified in the Governance of Enterprise IT (CGEIT) CGEIT recognizes a wide range of professionals for their knowledge and application of enterprise IT governance principles and practices. As a CGEIT certified professional, you demonstrate that you are capable of bringing IT governance into an organization—that you grasp the complex subject holistically, and therefore, enhance value to the enterprise

5

Business Governance of IT, Strategy and Enterprise Architecture

8

Page 9: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

BABOK Level 1 – Entry Certificate in Business Analysis (ECBA)

The ECBA™ certificate recognizes the foundational knowledge of individuals entering the field of business analysis. The online competency-based exam is aligned with A Guide to the Business Analysis Body of Knowledge (BABOK® Guide).

5

BABOK Level 2 -Certification of Capability in Business Analysis™ (CCBA®)

This Certification of Capability in Business Analysis™ (CCBA®) is a professional certification for business analysis practitioners who want to be recognized for their expertise and skills by earning formal recognition.

5

BABOK Level 3 -Certified Business Analysis Professional (CBAP)

This professional certification is for individuals with extensive business analysis experience.

5

Business Analysis, Project, Programme and Portfolio Management

9

Page 10: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

PRINCE2 Foundation Training and Exams

The PRINCE2 Foundation Level introduces the PRINCE2 method. The Foundation certification aims to confirm that you know and understand the PRINCE2 method well enough to be able to work effectively with, or as a member of, a project management team working within an environment supporting PRINCE2.

5

PRINCE2 Practitioner Training and Exams

PRINCE2 Practitioner certification is suitable for anyone managing projects either as part of a formal project management function or a role which involves project management as part of day-to-day work. It aims to confirm that you have sufficient knowledge and understanding to apply and tailor the method in a range of different project environments and scenarios.

5

PRINCE2 Agile® Foundation

PRINCE2 Agile Foundation is a newly developed certification level to support PRINCE2 Agile. In 2015, PRINCE2 Agile initially launched with a Practitioner level certification and this new Foundation level will build upon that success by opening PRINCE2 Agile out to project managers outside of the existing PRINCE2 community.

5

PRINCE2 Agile® Practitioner

PRINCE2 Agile Practitioner is all about using PRINCE2 and Agile in the right place, combining them together until you have the perfect mixture and blend. Corporate friendly and combining flexibility with pragmatism, PRINCE2 Agile Practitioner gives you the best of both worlds, allowing you to scale for complete control and good governance.

5

Business Analysis, Project, Programme and Portfolio Management

10

Page 11: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

Managing Successful Programme (MSP®) Foundation Training and Exams

The MSP Foundation Certification demonstrates you have sufficient knowledge and understanding of the MSP guidance to work effectively with a Programme Management team or act as an informed member of a Programme office, business change or project delivery team within a MSP supporting environment.

2

Managing Successful Programme (MSP®) Practitioner Training and Exams

The MSP Practitioner Certification demonstrates you have achieved sufficient knowledge and understanding of the MSP guide and can act as informed member of a programme management group.

3

Managing Successful Programme (MSP®) Advanced Practitioner Training and Exams

The MSP Advanced Practitioner Certification is aimed at MSP Practitioners who want to take the next step and demonstrate they can lead a programme of transformational change by applying the MSP guidance in a complex programme within an environment that uses MSP..

5

Business Analysis, Project, Programme and Portfolio Management

11

Page 12: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

Project, Programme & Portfolio Management (P3O) Foundation

The P3O Foundation Certification is suitable for individuals who want to demonstrate that they have sufficient knowledge and understanding of the P3O guidance and can work effectively in an environment within a P3O model. It is also a pre-requisite for individuals wishing to achieve the P3O Practitioner Qualification.

5

Project, Programme & Portfolio Management (P3O) Practitioner

The P3O Practitioner Certification is suitable for individuals who want to demonstrate they have achieved sufficient knowledge and understanding of the P3O guidance and are able to design implement, manage or work in any component office within a P3O model.

5

Management of Portfolios (MoP) -Foundation

The MoP Foundation Certification is suitable for individuals who want to demonstrate that they have sufficient knowledge and understanding of the MoP guidance and can work effectively as a member of a portfolio office or in various portfolio management positions.

5

Management of Portfolios (MoP) -Practitioner

The MoP Practitioner Certification is suitable for individuals who want to demonstrate that they have sufficient knowledge and understanding to apply and tailor the MoP guidance and to analyse portfolio data, documentation and roles in relation to a scenario situation.

5

Business Analysis, Project, Programme and Portfolio Management

12

Page 13: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

PMBOK- Project Management Professional (PMP) Exam Prep Class

The PMP course prepares you to write the globally recognized PMP examination. As a PMP you speak and understand the global language of project management and you become a member of a community of professionals, organizations and experts worldwide.

5

PMI Programme Management Professional, PgMP

This course is designed for programme managers at the senior-level who are recognized vanguards that advance the strategic goals of their organisations. They will be equipped to manage multiple, related projects in a coordinated fashion whilst achieving benefits that would not have been possible should the projects have been managed independently.

5

PMI Risk Management Professional Exam Prep Class

This course is designed to enhance the Manager’s ability to identify and assess project risks, mitigate threats and exploit opportunities in the protection of the organization’s needs and best interests.

5

Management of Value (MoV) - Foundation

The MoV Foundation Certification is suitable for individuals who want to demonstrate that they have sufficient knowledge and understanding of the MoV guidance to contribute effectively to MoV activities led by others and be able to explain MoV to others.

5

Management of Value (MoV) - Practitioner

The MoV Practitioner Certification is suitable for individuals who want to demonstrate they have achieved sufficient knowledge and understanding of the MoV guidance and are able to tailor and apply it in a scenario situation.

5

Business Analysis, Project, Programme and Portfolio Management

13

Page 14: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ISO 31000 Certified Risk Manager

In this course, participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 and ISO 31000:2009 standards as a reference framework.

3

ISO 31000 Certified Lead Risk Manager

This training enables students to acquire the expertise to support and lead an organization and its team to successfully identify, understand and manage a risk process based on ISO 31000

5

ISO 27001 (Information Security Management Systems) Lead Auditor

The ISO 27001 LA course is based around ISO/IEC 27001:2013 and provides participants with the opportunity to develop the expertise needed to audit an ISMS and to manage a team of auditors by applying widely recognized audit principles, procedures, and techniques.

5

ISO 27001 (Information Security Management Systems) Lead Implementer

The ISO27001 LI course is based around ISO/IEC 27001:2013 and provides participants with the opportunity to develop the expertise needed to support an organization in implementing and managing an ISMS.The course includes a 3-hour exam that, upon passing, allows the participant to become a certified Lead Implementer

5

Risk Management, Information Security, Information Assurance and Cyber Resilience

14

Page 15: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ISO 22301 (Business Continuity Management System) Lead Implementer

This ISO 22301 Business Continuity Management Lead Implementer course enables participants to develop the necessary expertise to support an organization in implementing and managing a Business Continuity Management System (BCMS) based on ISO 22301:2010..

5

ISO 22301 (Business Continuity Management System) Lead Auditor

ISO 22301 Lead Auditor training enables you to develop the necessary expertise to plan and perform a Business Continuity Management System (BCMS) internal and external audits by applying widely recognized audit principles, procedures and techniques.

5

Cyber Defense Capability Assessment Tool- CDCAT Senior Practitioner

CDCAT® is a comprehensive way for organisations to assess their existing cyber defences, identify vulnerabilities and see what improvements should be made. 5

Ethical Hacking and Countermeasures

The course is designed to prepare you to write the globally recognized Certified Ethical Hacker (CEH) Exam and train you in mastering the hacking technologies as a professional yet ethical hacker. It provides techniques used by Information Security experts and hackers to penetrate organization systems

5

Risk Management, Information Security, Information Assurance and Cyber Resilience

15

Page 16: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

COURSES OVERVIEWDURATION

(DAYS)

Management of Risk (M_o_R) -Foundation

This Foundation Certification is suitable for individuals who want to demonstrate they have sufficient knowledge and understanding of issues concerning the identification, assessment and control of risks across all organisationalperspectives and comprehend the main elements of the M_o_R framework (Principles, Approach, Processes, Embedding and Reviewing) and how they support corporate governance.

5

Management of Risk (M_o_R) -Practitioner

The M_o_R Practitioner Certification is suitable for individuals who want to demonstrate they have achieved sufficient knowledge and understanding on how to apply M_o_R in a scenario situation.

5

CISA Mentoring Class (without exams)

Certified Information Systems Auditor (CISA) is the top audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA). In a world dependent on IT the value of IT security expertise is obvious.

5

CISM Mentoring Class (without exams)

Certified Information Security Manager (CISM) is a certification offered by ISACA, a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance

5

CRISC Mentoring Class (without exams)

CRISC is the most current and rigorous assessment available to evaluate the risk management proficiency of IT professionals and other employees within an enterprise or financial institute.

5

Risk Management, Information Security, Information Assurance and Cyber Resilience

16

Page 17: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

COURSES OVERVIEWDURATION

(DAYS)

Resilia -Foundation

RESILIA Foundation demonstrates an understanding of Cyber Resilience Best Practices and of how decisions impact good/bad cyber resilience. This module teaches individuals how to make good cyber resilience an efficient part of business and operational management and shows how nurturing cyber resilience can support operational effectiveness and organisational resilience.

5

Resilia -Practitioner

RESILIA Practitioner helps professionals to understand what effective cyber resilience looks like and what are the risks and issues that can easily affect cyber resilience. Successful candidates gain practical skills to achieve the best balance of risk, cost, flexibility and operational management benefits within an organisation.

5

CISSP Mentoring Class (without exams)

Certified Information Systems Security Professional is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².

5

ISO 27032 Lead Cybersecurity Manager

Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework. During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders’ role in Cybersecurity.

5

Risk Management, Information Security, Information Assurance and Cyber Resilience

17

Page 18: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ITIL Foundation

This exciting and dynamic 3-day course, fully updated for ITIL 2011, introduces learners to the lifecycle of managing IT services to deliver to business expectations. As well as an engaging, case study based approach to learning the core disciplines of the ITIL best practice, this course also positions the student to successfully complete the associated exam, required for entry into the future ITIL intermediate level training courses.

3

ITIL Practitioner

The ITIL® Practitioner certification offers practical guidance on how to adopt and adapt the ITIL framework to support your business' objectives. It enables practitioners to not only speak the language of ITIL, but be able to translate it and use it in practice.

3

ITIL Service Strategy

The Service Strategy (SS) certification is one of five ITIL® Service Lifecycle modules and provides you with the guidance that enables you to design, develop, and implement service provider strategy that aligns to the organizational strategy. The SS module focuses on the importance of the strategic aspect of services within the IT service lifecycle. It provides the specific knowledge and techniques to help you demonstrate that you understand the risks and success factors and have the skills to develop and progress strategy within an organization or programme.

3

Service Management and IT Operations

18

Page 19: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ITIL Service Design

The Service Design (SD) module is one of the certifications within the ITIL® Service Lifecycle work stream. It focuses on the design of IT services and covers the architectures, processes, policies and documentation that will enable you to design services that meet the needs of the organization or programme.

3

ITIL Service Transition

The Service Transition (ST) module is one of the certifications within the ITIL® Service Lifecycle work stream. This module focuses on the process and practice elements and management techniques required to build, test and implement products and services. It also demonstrates how service transition can apply to other stages of the IT Service lifecycle and can underpin decisions during the Strategy and Operations phases.

3

ITIL Service Operation

The Service Operation (SO) module is one of the certifications within the ITIL® Service Lifecycle work stream. This module focuses on the principles, processes, operational activities and functions that enable organizations and individuals to successfully manage how their products and services perform. These activities can also help improve their IT service management.

3

Service Management and IT Operations

19

Page 20: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ITIL Continual Service Improvement

The Continual Service Improvement (CSI) module is one of the certifications within the ITIL® Service Lifecycle work stream. The CSI certification focuses on how organizations and individuals can strategically review the products and services they have produced following the strategy, design, transition and operation stages of the IT Service Lifecycle and offers guidance on how this process should be organized and executed.

3

ITIL Service Offerings & Agreement (SOA)

The Service Offerings and Agreements (SOA) module is one of the certifications in the ITIL® Service Capability work stream. The module focuses on the practical application of SOA practices in order to enable portfolio, service level, service catalogue, demand, supplier and financial management. The content of the course is based mainly on the best practice guidance contained in the ITIL Service Strategy and ITIL Service Design publications.

4

ITIL Planning, Protection & Optimization

The Planning, Protection and Optimization (PPO) module is one of the certifications in the ITIL® Service Capability work stream. The module focuses on the practical application of PPO practices in order enable capacity, availability, IT service continuity, information security and demand management. The content of the course is based mainly on the best practice guidance contained in the ITIL Service Design publication.

4

Service Management and IT Operations

20

Page 21: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ITIL Release, Control & Validation (RCV)

The Release, Control and Validation (RCV) module is one of the qualifications in the ITIL® Service Capability work stream. The module focuses on the practical application of RCV practices in order to enable the successful planning, testing and implementation of new services that meet the organization’s or users’ needs.

4

ITIL Operational Support & Analysis (OSA)

The Operational Support and Analysis (OSA) module is one of the certifications in the ITIL® Service Capability work stream. The module focuses on the practical application of OSA practices in order to enable event, incident, request, problem, access, technical, IT operations and application management.

4

ITIL Managing Across Lifecycle

The Managing Across the Lifecycle (MALC) is an essential step for attaining the ITIL Experts certification. The MALC course enables the participants to bridge the lifecycle stages of ITIL and help an organization integrate processes, responsibilities, and other subjects into a cohesive service management approach. To succeed, participants must strategize, plan, use, and measure ITIL principles in an integrated approach.

5

Service Management and IT Operations

21

Page 22: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

Lean IT Foundation

Lean IT Foundation helps IT organisations to ensure that they provide their customers with the best possible services. With Lean IT Foundation, IT organisations can develop a continuous improvement mindset through:Understanding customer value, Processes that deliver this value, The way to manage performance, The way to organise, The required attitude and behaviours

5

Lean IT Leadership

Lean IT Leadership builds on the basic knowledge acquired through the Lean IT Foundation, by focusing on ensuring that people in a leadership role within an IT organisation know what they need to do to help to develop it into a Lean IT organisation. The role may be carried out in a formal or informal capacity.

5

Service Management and IT Operations

22

Page 23: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

ISO 20000 Lead Implementer

ISO/IEC 20000 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an IT Service Management System (ITSMS) based on ISO/IEC 20000. During this training course, you will also gain a thorough understanding of the best practices of IT Service Management Systems and consequently improve an organization’s IT processes and/or services, effectiveness and overall performance.

5

ISO 20000 Lead Auditor

ISO/IEC 20000 Lead Auditor training enables you to develop the necessary expertise to plan and perform both internal and external IT Service Management System (ITSMS) audits by applying widely recognized audit principles, procedures and techniques. ISO 19011 and ISO/IEC 17021-1 certification process.

5

Six Sigma Yellow Belt

Six Sigma Yellow Belt training enables you to learn about the fundamental principles of Six Sigma. During this training course, you will be able to understand the main problem solving tools and techniques, and the DMAIC process.

5

Six Sigma Green Belt

This training enables you to develop and certify the technical knowledge and skills of a Six Sigma Green Belt. The course is characterized by experiential learning, personalized labs, skill-based training, practical statistics, 1:1 attention, and immediately usable decision trees and job aides. Certification is based on a project simulation, in-class assignments, examination, and participation.process.

5

Service Management and IT Operations

23

Page 24: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

DevOps Foundation

The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success.

5

DevSecOpsEngineering

The DevSecOps Engineer is skilled at "security as code" and has the necessary knowledge to make security and compliance consumable as a service. A DevSecOps Engineer uses data and security science as their primary means of protecting the organization and customer. With DevSecOps Engineering you will learn the purpose, benefits, concepts and vocabulary of DevSecOps; particularly in how DevSecOps roles fit with a DevOps culture and organization.

5

DevOps Leader (DOL)

A DevOps Leader is a tactical or strategic individual who helps design, influence, implement or motivate the cultural transformation proven to be a critical success factor in DevOps adoption. This individual understands the human dynamics of cultural change and is equipped with practices, methods and tools to engage people across the DevOps spectrum.

5

DevOps Test Engineering (DTE)

DevOps Test Engineers are responsible for testing software in a DevOps environment. DTE provides information on culture and team aspects for test engineering, test strategies, test infrastructures, test tools, test automation, best practices, test management and analysis.

5

DevOps

24

Page 25: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

WE

ARE SEARCH

ENGINE AND

SOCIAL

MEDIA

EXPERT

COURSES OVERVIEWDURATION

(DAYS)

Certified Digital Marketing Professional

This digital marketing certification programme covers the structural foundations of digital marketing, including strategy & planning, search, social media, PPC, email marketing,

5

Certified Digital Marketing Specialist - Strategy & Planning

This program can help candidates gain a comprehensive understanding of all aspects of digital strategy and planning including budgeting, personnel selection, analytics, reputation management and social customer service.

5

Digital Marketing

25

Page 26: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

MANAGEMENT SYSTEMS CONSULTING

Information

Security

Management

Quality

Management

Business

Continuity

Management

Cyber Resilience

and Security

IT Governance

Systems

IT Service

Management

26

Page 27: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

School Management

SystemEnterprise Resource

Planning

Electronic Document

Management System

Security Events &

Incident Management

Customer Relationship

Management & Call

Centre Solution

Electronic Medical

Record System

BUSINESS TECHNOLOGY SUITES

27

Page 28: Afenoid Brochure 2018provides a basis for assessing an organisation's process cybersecurity capabilities against the COBIT 5 Process Assessment Model (PAM). 3 Implementing the NIST

Block B, Ground floor, AUJ Complex

Plot 564/565 Independence Avenue

Central Business District, Abuja FCT

08023572738

(09) 2911777

08098365259

[email protected]

[email protected]

www.afenoid.com

CONTACT US