PT. HM. SAMPOERNA, Tbk. - Pasuruan Jawa Timur

Inhouse Training Microsoft Excel VBA Macro Programming

PT. PLN PERSERO MALUKU / MALUKU UTARA

Inhouse Training Android Apps. Development with phonegap

O-Shop, SCTV, Infotech (Jakarta)

Public Training Magento E-Commerce Advanced Level

PT. ASKRINDO - JAKARTA

Training IT Project Management based on PMBOK 5

Bank Fama International - Bandung

Inhouse Training Open Office Calc

Sunday, October 9, 2022

WHAT IS - CDMP DMBOK

What is the CDMP Certification?
DAMA International offers the CDMP Certification programme to enable international recognition of a data professional's knowledge and skills.   

What is the DMBOK? (Data Management Body of Knowledge)
The DMBOK is the comprehensive Data Management Body of Knowledge compiled by the thought leaders in all the Knowledge Areas of Data Management. The DMBOK ensures that data professionals worldwide have a shared understanding and speak a common "data language". The sheer breadth of the DMBOK can be overwhelming, but it doesn't take long to realise that the focus of the DMBOK is the WHATs and WHYs of Data Management and not the HOW.

UNDANGAN MENGAJAR HUBUNGI :
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506


HERY PURNAMA - CTFL ISTQB

ISTQB Certification - Foundation Level (CTFL)

The International Software Testing Qualifications Board known as ISTQB is an accredited certification organization. ISTQB is specialized and offers many types of internationally accepted Software Testing Certification. ISTQB exams are conducted online or through an Exam Provider location. Candidates who pass the exam are given the ISTQB Certified Tester certificate.

If you are a software tester or looking for your first software testing job, getting your ISTQB Certified Tester Foundation Level (CTFL) Certification is an advantage. Many employers expect their testers to have ISTQB Foundation Level Certification. It helps software testers to be more effective and efficient in the software testing profession.

UNDANGAN MENGAJAR HUBUNGI :
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506

SYLLABUS - CDPSE ISACA

What is CDPSE Certification?
Certified Data Privacy Solutions Engineer (CDPSE) is a certification that assesses a security professional's ability to implement privacy by design, which results in the creation of platforms and products that build and advance data privacy. CDPSE is the first experience-based data privacy certification of its kind.

CDPSE also validates a data analyst/ scientist's ability to manage the data lifecycle and advise the organisation experts on privacy compliance practices and best data protection practices. It enables data scientists and privacy solutions experts with a common language and data science methodologies to improve the end user's experience while maintaining privacy and trust.

Many people within an organisation and the data security team might claim to know about data security, but the demands for data security differ from organisation to organisation. CDPSE certified professionals have validated experience that ensures the privacy solutions you are going to implement match the organisation's risk appetite and mitigate or tackle risks of non-compliance.

UNDANGAN MENGAJAR HUBUNGI :
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506


TRAINER IN BANDUNG - CISA ISACA

What will I learn in the ISACA CISA Bootcamp?
The CISA certification enables you to be recognized, not only domestically, but at an international level, as a professional with knowledge, skills, and the credibility to offer opinions and solutions, and to audit all areas related to information systems. With organizations attempting to be faster to market and with more freely flowing information, the security and integrity of that information is key and CISA affirms you as an individual with the knowledge and abilities to identify risk, and articulate and apply proven practices for mitigating it.

UNDANGAN MENGAJAR HUBUNGI :
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506

Thursday, October 6, 2022

TRAINER - CISM ISACA

Is CISM Right for You?
ISACA's Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.
ISACA's Certified Information Security Manager (CISM) certification brings credibility to your team and ensures alignment between the organization's information security program and its broader goals and objectives. CISM can validate your team's commitment to compliance, security and integrity and increase customer retention.

UNDANGAN MENGAJAR HUBUNGI: 
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506

TRAINER IN JAKARTA - ITIL V.4

What's new in ITIL V.4
ITIL 4 is the latest version of the ITIL framework and was released back in February 2019. It is highly value-centric, primarily focusing on bringing different stakeholders in an organization together to co-create value for the end-users. With the arrival of new frameworks like VeriSM, SIAM, and FitSM in the IT service management landscape, there was a need for the previous version of ITIL (ITIL v3) to become more refined in the way it approaches service management as an enabler for businesses. ITIL 4, the current version of ITIL takes the best parts of ITIL v3, enhances them, and creates a framework that focuses more on delivering tailor-made solutions for organizations. The previous versions of ITIL directed practitioners to implement ITIL by the book which led them to a complex web of practical solutions. Whereas ITIL 4, is more pragmatic in this approach. Instead of idealizing processes and encouraging the practitioners to implement the same, ITIL 4 aims to deliver tailor-made solutions to organizations through "practices". It has two significant components that are enhancements to the previous version.

UNDANGAN MENGAJAR HUBUNGI: 
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506


EXAM PREPARATION - COBIT ISACA

What is COBIT?

COBIT stands for Control Objectives for Information and Related Technology. It is a framework 

created by the ISACA (Information Systems Audit and Control Association). It was designed to be a 

supportive tool for managers—and allows bridging the crucial gap between technical issues, 

business risks, and control requirements.

COBIT is a thoroughly recognized guideline that can be applied to any organization in any 

industry. Overall, COBIT ensures quality, control, and reliability of information systems in an 

organization, which is also the most important aspect of every modern business.

Cybersecurity Expert Master's Program
Master the Skills of a Cybersecurity ProfessionalVIEW COURSECybersecurity Expert Master's Program
What is ISACA?
ISACA stands for Information Systems Audit and Control Association. It develops controls and 

guidance for information governance, security, control, and audit professionals.

This international association focuses on IT governance, providing benchmarks and governance 

tools for organizations that employ information systems. ISACA is behind the creation, 

sponsorship, and driving of the COBIT framework.

What is the History of COBIT?
Originally published in 1996, COBIT helped financial auditors better navigate their IT 

environment growth. 

ISACA released a more comprehensive version in 1998. It enveloped areas beyond audit controls. 

The third and fourth versions, released in the 2000s, added further management guidelines around 

cyber security.

The fifth COBIT version came in 2013 and brought along tools, objectives, and best practices 

universally applicable to all IT operations in enterprises. It expanded on the fourth version by 

incorporating related standards from the ISO (International Organization for Standardization), 

including ITIL (IT Infrastructure Library.

ISACA then updated COBIT 5 to COBIT 2019. It is the latest version. This COBIT version is more 

comprehensive, flexible, and suitable for all enterprises, irrespective of their immediate goals 

or size. COBIT 2019 includes six governing principles, unlike COBIT 5, which had five. Also, in 

this version, the number of processes supporting management objectives and governance has 

increased from 37 to 40. 

UNDANGAN MENGAJAR HUBUNGI: 
HERY PURNAMA - BANDUNG
CALL/WHATSAPP : 081-223344-506


Thursday, September 29, 2022

Risk management definition


RISK MANAGEMENT DEFINITION

Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology issues, strategic management errors, accidents and natural disasters.


A successful risk management program helps an organization consider the full range of risks it faces. Risk management also examines the relationship between risks and the cascading impact they could have on an organization's strategic goals.


INHOUSETRANER :

Undangan Mengajar silahkan Hubungi

Hery Purnama

Whatsapp : 081-223344-506

TIPS UJIAN CGEIT

TIPS UJIAN CGEIT

Halo semuanya. Saya berharap teman-teman semua sehat dan bahagia selalu ya. Dengan rendah hati saya sampaikan bahwa mulai bulan ini saya mendapatkan gelar CGEIT (Certified in the Governance of Enterprise IT). Saya berkomitmen untuk selalu menuliskan tips lulus setiap ujian sertifikasi yang saya ikuti sebagai ungkapan kesyukuran dan juga untuk membantu setiap kandidat ujian sertifikasi di luar sana. Jadi, inilah tips lulus ujian CGEIT versi saya :

 

(P.S.: beberapa di antaranya mirip dengan tips untuk lulus ujian CISA yang diposting sebelumnya karena saya yakin keduanya memerlukan persiapan yang serupa)

 

1. Kalibrasi Ulang Pola Pikir

 

Satu hal yang paling saya sadari dari materi CGEIT adalah sudut pandang dan cara berpikirnya sedikit berbeda dari yang saya miliki. Sementara sebagai praktisi terkadang saya harus berpikir praktis, ujian CGEIT mengharuskan kita untuk berpikir secara strategis dan ideal. Jadi sebelum memulai perjalanan belajar, saya mengkalibrasi ulang pola pikir. Saya juga mempersiapkan diri untuk berpikir berdasarkan peran yang diberikan misalnya komite audit, CIO, CEO, dll, serta memahami jargon/istilah yang digunakan oleh mereka.

 

2. Pelajari CGEIT Review Manual dan CGEIT Review Questions, Answers & Explanations Manual (QAE)

 

Seperti yang saya sebutkan dalam post tentang tips ujian CISA, review manual dan QAE adalah dua referensi sakral untuk semua orang yang ingin meraih sertifikasi ISACA. Luangkan waktu untuk membaca kedua buku ini dari sampul ke sampul terutama QAE karena memperkenalkan kita pada jenis pertanyaan yang akan kita hadapi. Pahami penjelasan dari jawaban-jawaban yang disarankan buku tersebut untuk mendapatkan logika, perspektif, dan kearifan yang ditetapkan ISACA. Saya juga mengidentifikasi kesenjangan pengetahuan saya dan membuatnya menjadi catatan. Saya membacanya lagi saat waktu luang.


INHOUSETRANER :

Undangan Mengajar silahkan Hubungi

Hery Purnama

Whatsapp : 081-223344-506



Wednesday, September 28, 2022

CISSP ISC2

Diterjemahkan dari bahasa Inggris-
CISSP adalah sertifikasi keamanan informasi independen yang diberikan oleh Konsorsium Sertifikasi Keamanan Sistem Informasi Internasional, juga dikenal sebagai (ISC)². Per Januari 2022, terdapat 152.632 (ISC)² anggota yang memegang sertifikasi CISSP di seluruh dunia. Wikipedia (Inggris)
Lihat deskripsi asli
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of January, 2022 there are 152,632 (ISC)² members holding the CISSP certification worldwide.



INHOUSETRAINER :
Undangan Mengajar Silahkan
Hubungi
Hery Purnama
Whatsapp : 081-223344-506

IBM COGNOS ANALYTICS

IBM Cognos Business Intelligence is a web-based integrated business intelligence suite by IBM. It provides a toolset for reporting, analytics, scorecarding, and monitoring of events and metrics. The software consists of several components designed to meet the different information requirements in a company. IBM Cognos has components such as IBM Cognos Framework Manager, IBM Cognos Cube Designer, IBM Cognos Transformer.



INHOUSETRAINER :
Undangan Mengajar Silahkan
Hubungi
Hery Purnama
Whatsapp : 081-223344-506

Tuesday, September 27, 2022

POWER QUERY

Apa itu Power Query? Power Query menyediakan kemampuan pengumpulan dan pembentukan data yang cepat dan mudah. Power Query memungkinkan Anda menyambungkan, menggabungkan, dan memperbaiki sumber data untuk memenuhi kebutuhan analisis Anda.


Undangan Mengajar Silahkan
Hubungi
Hery Purnama
Whatsapp : 081-223344-506

tips and trick power BI

1. Use measures to carry out calculations. Avoid adding unnecessary calculated columns to a table as they just add to your model. ...
2. Hide Unnecessary Columns. ...
3. Format Measures. ...
4. Write DAX like code. ...
5. Avoid data transformations steps using DAX. ...
6. Keep the structure of the model simple.



Undangan Mengajar Silahkan
Hubungi
Hery Purnama
Whatsapp : 081-223344-506

Monday, September 26, 2022

ABOUT PRIMAVERA

Primavera Risk Analysis is a full lifecycle risk analytics solution integrating cost and schedule risk management. It provides a comprehensive means of determining confidence levels for project success with quick and easy techniques for determining contingency and risk response plans.

INHOUSETRAINER :
Undangan Mengajar Silahkan
Hubungi
Hery Purnama
Whatsapp : 081-223344-506


what is PYTHON PROGRAMMING

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general-purpose language, meaning it can be used to create a variety of different programs and isn't specialized for any specific problems

INHOUSETRAUNER :
Undangan Mengajar silahkan Hubungi
Hery Purnama
Whatsapp : 081-223344-506


Friday, September 23, 2022

How to Pass ISACA CGEIT Certification Exam Dumps Practice Test

ISACA CGEIT certification is mainly targeted to those candidates who want to build their future in IT Governance domain. CGEIT exam can provide those within an information technology related governance field with great benefits, both with potential employers, and unlock a network of like-minded individuals. ISACA's Certified in the Governance of Enterprise IT (CGEIT) exam certification is framework agnostic and the only IT governance certification for the individual. CGEIT can put you in the role of a trusted advisor to your enterprise. CGEITs maintain an adequate level of current knowledge and proficiency in the field of information systems audit, control and security.

The technical skill requirement of CGEIT is that the candidate has relevant professional work experience supporting organizational enterprise information technology. CGEIT is a vendor-neutral enterprise IT governance certification which can help take your career to new heights.

Free Exam Practice Question and Answer

ISACA CGEIT Certification Practice Test
ISACA CGEIT Certification Practice Test
ISACA CGEIT Certification Practice Test
Get Ready To Prepare Like You've Never Prepared Before
As we often say at Exam Topics, work smarter not harder. You are about to see a study guide that took hours of hard collection work, expert preparation, and constant feedback. That's why we know this exam prep will help you get that high-score on your journey to certification. Our study guides are the real thing. Our study guides are so accurate, we have to fight the droves of clone test prep sites that actually steal our material. Don't worry though, we believe by offering our material free and upholding good values, ExamTopics will always have a strong community and a coveted place in the certification world.

Are you ready to crush the Certified in the Governance of Enterprise IT and get certified?
Today is a competitive world and the smartest, best, and most qualified get paid a lot of money to work in amazing fields. But you don't need a college degree, certification is an amazing path that opens up new opportunities and shows employers that you are the cream of the crop. We know that Isaca certification will add some flair to that resume and help you get amazing new roles. Certification from Isaca shows that you have the ability to be successful but it's still not a simple process. You need to study, make your qualifications, and actually learn the skills to be successful at work if you want any chance of being successful.


INHOUSETRAINER :
Undangan Mengajar silahkan hubungi
Hery Purnama
Whatsapp : 081-223344-506

Tuesday, September 13, 2022

WHAT IS CISM ISACA-HERY PURNAMA CERTIFIED TRAINER

The CISM (Certified Information Systems Manager) is a professional certification sponsored by ISACA for those who oversee, or seek to oversee, an information security program.

The CISM is meant for existing or aspiring managers, and is growing in relevance as cybersecurity at the enterprise level increasingly is becoming a c-level and board initiative. The thinking behind this certification is that as programs and needs grow, professionals will require management credentials alongside the various technical certifications that exposure to a large enterprise cybersecurity operation would require.

The Information Systems Audit and Control Association, which is known only by its acronym ISACA, is an international professional association that sponsors the CISM. The certification requirements include five years experience in the field, a single exam consisting of 200 questions taken over four hours, and a fee.

INHOUSETRAINER
Undangan Mengajar silahkan hubungi :
Hery Purnama
Whatsapp : 081-223344-506

Monday, September 12, 2022

WHAT IS POWER QUERY-HERY PURNAMA TRAINER JAKARTA, BANDUNG

Power Query is a tool used to manipulate data and is commonly used for data analysis and business intelligence.

High-quality analysis relies on well-organized data that is free from errors and that draws data from a single source of truth. Whilst many analysts spend hours of time manipulating data, combining data, and performing look ups, Power Query allows all of these steps to be automated with simple, repeatable steps.

Power Query is one of the most transformative tools available to any analyst working with data in Excel. Not only will it save analysts hours of time, but it will result in reduced manual errors and a better ability to source data from a single source of truth.

INHOUSETRAINER :
Undangan Mengajar silahkan hubungi
Hery Purnama
Whatsapp : 081-223344-506

Sunday, September 11, 2022

WHAT IS PYHTON PROGRAMMING-HERY PURNAMA CERTIFIED TRAINER

Python is an interpreted, object-oriented, high-level programming language with dynamic semantics. Its high-level built in data structures, combined with dynamic typing and dynamic binding, make it very attractive for Rapid Application Development, as well as for use as a scripting or glue language to connect existing components together. Python's simple, easy to learn syntax emphasizes readability and therefore reduces the cost of program maintenance. Python supports modules and packages, which encourages program modularity and code reuse. The Python interpreter and the extensive standard library are available in source or binary form without charge for all major platforms, and can be freely distributed.

Often, programmers fall in love with Python because of the increased productivity it provides. Since there is no compilation step, the edit-test-debug cycle is incredibly fast. Debugging Python programs is easy: a bug or bad input will never cause a segmentation fault. Instead, when the interpreter discovers an error, it raises an exception. When the program doesn't catch the exception, the interpreter prints a stack trace. A source level debugger allows inspection of local and global variables, evaluation of arbitrary expressions, setting breakpoints, stepping through the code a line at a time, and so on. The debugger is written in Python itself, testifying to Python's introspective power. On the other hand, often the quickest way to debug a program is to add a few print statements to the source: the fast edit-test-debug cycle makes this simple approach very effective.

Undangan Mengajar silahkan hubungi
Hery Purnama
Whatsapp : 081-223344-506

Friday, September 9, 2022

WHAT IS CISA ISACA-HERY PURNAMA CERTIFIED TRAINER

CISA is recognized the world over as proof of competency and

experience in providing assurance that critical business assets

are secured and available.
CISA affirms your credibility to offer conclusions on the state

of an organization's IS/IT security, risk and control solutions.
CISA confirms to stakeholders your abilities to identify critical

issues and recommend enterprise specific practices to support and

safeguard the governance of information and related technologies.
CISA offers proof of your competency in IT controls and your

understanding of how IT relates to business.
CISA assures your understanding of policies, standards,

procedures, and controls to ensure the confidentiality,

integrity, and availability of information assets.

Undangan mengajar silahkan hubungi:
Hery Purnama
Whatssapp: 0812-23344-506

Wednesday, September 7, 2022

WHAT IS CRISC ISACA- HERY PURNAMA CERTIFIED TRAINER

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. The official Certified Risk Information Systems Control (CRISC) certification is a powerful manifestation of proficiency and expertise regarding various areas of risk. As well as this, CRISC demonstrates a commitment to IT security operations and enterprises, and a willingness to deliver quality within their profession. CRISC has been established as one of the most desirable and preferable IT security certifications worldwide.

INHOUSETRAINER
Undangan Mengajar silahkan hubungi
Hery Purnama
Whatsapp : 081-223344-506

Tuesday, September 6, 2022

WHAT IS CGEIT ISACA - HERY PURNAMA CERTIFIED TRAINER

The Certified in Governance of Enterprise IT (CGEIT) certification is a vendor-neutral certification offered through the ISACA. It's designed for IT professionals in large organizations who are responsible for directing, managing and supporting the governance of IT.

The exam consists of 150 multiple-choice questions and you'll have four hours to complete the in-person exam. Testing locations can be found through PSI Online and, depending on your location, you'll likely be able to choose between a testing center or a kiosk. At a testing center, you'll take a live proctored exam with other exam-takers, but at a kiosk location, you'll take the exam alone at a small work station in a "managed, yet self-service way." The ISACA offers more information on each testing experience to help you choose the best option for you.

[ Get ahead with the top certs for big data, project management, agile, data science, IT management and the cloud, as well as the top-paying certs and emerging certifications for today's hottest skills. | Get weekly career tips by signing up for our CIO Leader newsletter. ]

Exams are offered during three specific testing windows during the year — the first testing window in 2019 will run from February 1 to May 24. The two other testing windows for 2019 haven't been announced yet, but they typically run for three-month periods.

What's on the CGEIT exam?
The ISACA organizes the exam by five main CGEIT domains, which includes:

Domain 1: Framework for the governance of enterprise IT (25% of the exam)
Domain 2: Strategic management (20% of the exam)
Domain 3: Benefits realization (16% of the exam)
Domain 4: Risk optimization (24% of the exam)
Domain 5: Resource optimization (15% of the exam)
Domain 1 includes establishing a framework for governance of enterprise IT that helps the organization realize its goals and objectives, while considering risk and optimization. It also covers all the basic requirements, policies, principles, processes, organizational structures, infrastructure, skills and competencies necessary to build, oversee, and manage a framework IT governance.

Domain 2 focuses on aligning IT with enterprise objectives creating a strategic plan that helps the organization understand how changes to business strategy will impact IT strategy. This domain covers knowledge of IT roles and responsibilities, prioritization processes, documentation and communication methods, potential barriers for strategic alignment and current and future technologies.

Domain 3 covers benefits realization, which is the process of managing, tracking and reporting on the performance of IT investments to ensure they deliver optimized business benefits. This domain includes knowledge of KPIs, benefit calculation techniques, how to measure and monitor outcome and performance, and knowledge of continuous improvement concepts and principles.

Domain 4 encompasses risk optimization, which is the process of ensuring IT risk management frameworks help identify, analyze, mitigate, manage, monitor and communicate IT-related business risk and that they're aligned with the enterprise risk management (ERM) framework. Risk optimization also includes an understanding of appropriate legal and compliance regulations and the ability to communicate risk to senior-level executives. You'll need knowledge of disaster recovery planning (DRP), business continuity planning (BCP), standard risk management frameworks, key risk indicators (KRIs) and the skills to report on analytical data.

Domain 5 covers the optimization of IT resources, including information, services, infrastructure and applications, and people. This domain includes everything you need to know to ensure the correct processes are in place to reach enterprise goals. You'll need knowledge of IT resource management, service level agreements (SLAs), operation level agreements (OLAs) and data management and data governance.  

For a more in-depth look at the tasks and knowledge areas for each domain, you can visit the ISACA website.

CGEIT qualifications
To qualify for the exam, you'll need at least five years of relevant work experience with one year working in Domain 1 (managing frameworks) and the other four years spent working in at least two out of the five other domains. You won't have to take a course to pass the CGEIT; instead your work experience and background serve as your CGEIT education. This certification is designed for professionals who have "significant management, advisory, or assurance role relating to the governance of IT and the knowledge required to perform these tasks," according to the ISACA

Undangan Mengajar silahkan hubungi
Hery Purnama
Whatsapp : 081-223344-506

Sunday, August 28, 2022

Apakah itu COBIT 2019

Control Objective for Information Technologies, disingkat COBIT, adalah suatu panduan standar praktik manajemen teknologi informasi. Standar COBIT dikeluarkan oleh IT Governance Institute yang merupakan bagian dari ISACA. COBIT 2019 merupakan versi terbaru.

COBIT memiliki 4 cakupan domain, yaitu:

Perencanaan dan organisasi (plan and organise)
Pengadaan dan implementasi (acquire and implement)
Pengantaran dan dukungan (deliver and support)
Pengawasan dan evaluasi (monitor and evaluate)
Maksud utama COBIT ialah menyediakan kebijakan yang jelas dan good practice untuk IT governance, membantu manajemen senior dalam memahami dan mengelola risiko-risiko yang berhubungan dengan IT.

COBIT menyediakan kerangka IT governance dan petunjuk control objective yang detail untuk manajemen, pemilik proses bisnis, user dan auditor.


Hubungi Hery Purnama 081-223344-506 IT Certified Trainer untuk undangan mengajar topik terserbut di perusahaan anda

Monday, January 24, 2022

HERY PURNAMA TRAINER CTFL ISTQB SOFTWARE TESTING JAKARTA BANDUNG

 Hery Purnama 081-223344-506 is a Certified IT trainer for training CTRFL ISTQB - Certified Tester Foundation Level in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.



ISTQB CTFL, also commonly called ISTQB Foundation Level, is the first step in ISTQB software testing certification. ... For software testers, ISTQB CTFL is valuable because it establishes a base knowledge of software testing vocabulary and principles.


Hery Purnama adalah seorang trainer IT bersertifikasi untuk training CTFL ISTQB di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 


Exam preparation training available


Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA TRAINER DMBOK CDMP DAMA JAKARTA BANDUNG

 Hery Purnama 081-223344-506 is a Certified IT trainer for training CDMP - Certified Data Management Professional  in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.



DAMA International has constructed the Certified Data Management Professional (CDMP) designation. The certification program gives data management .


Hery Purnama adalah seorang trainer IT bersertifikasi untuk training CDMP - DMBOK 2.0 di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 


Exam preparation training available


Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA CDPSE TRAINER JAKARTA BANDUNG

Hery Purnama 081-223344-506 is a Certified IT trainer for training CDPSE - CERTIFIED DATA PRIVACY SOLUTIONS ENGINEER  in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.

CERTIFIED DATA PRIVACY SOLUTIONS ENGINEER (CDPSE) - ISACA  is focused on validating the technical skills and knowledge it takes to assess, build and implement a comprehensive privacy solutions.

Hery Purnama adalah seorang trainer IT bersertifikasi untuk training CDPSE di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 



Exam preparation training available

Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA CISSP TRAINER JAKARTA BANDUNG

 Hery Purnama 081-223344-506 is a Certified IT trainer for training CISSP - Certified Information Systems Security Professional  in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.


Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems

Hery Purnama adalah seorang trainer IT bersertifikasi untuk training CISSP di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 

Exam preparation training available



Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA TRAINER CISM JAKARTA BANDUNG

Hery Purnama 081-223344-506 is a Certified IT trainer for training CISM - Certified Information Security Manager in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.

ISACA's Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.

Hery Purnama adalah seorang trainer IT bersertifikasi untuk training CISM di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 



Exam preparation training available

Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA TRAINER CISA JAKARTA BANDUNG

 Hery Purnama 081-223344-506 is a Certified IT trainer for training Certified Information Systems Auditor (CISA)   in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.



Hery Purnama adalah seorang trainer IT bersertifikasi untuk training Certified Information Systems Auditor (CISA) di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 

Certified Information Systems Auditor (CISA) refers to a designation issued by the Information Systems Audit and Control Association (ISACA). The designation is the global standard for professionals who have a career in information systems, in particular, auditing, control, and security.

Exam preparation training available


Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.

HERY PURNAMA TRAINER ITIL V.4

Hery Purnama 081-223344-506 is a Certified IT trainer for training .ITIL V.4 (IT INFRASTRUCTURE LIBRARY)   in Jakarta, Bandung, surabaya, for inquiry please contact whatsapp 081223344506.

Hery Purnama adalah seorang trainer IT bersertifikasi untuk training ITIL V.4 (IT INFRASTRUCTURE LIBRARY)  di Jakarta, Bandung, Surabaya, untuk undangan mengajar silahkan hubungi whatsapp 081-223344-506 (online, offline, inhouse). 



Other Training topics : ITIL V4 foundation, CISA, CISM, CISSP, CDPSE, CRISC, CCISO, CDMP, CTFL - ISTQB, DATA STORY TELLING, SYSTEM ANALYSIS DESIGN, CBAP - BABOK, PMBOK, CAPM, ISO 27001, ISO 38500, ISO 20000, ISO 27063, ISO 31000, ISO 28000, POWER BI, EXCEL VBA MACRO, MICROSOFT PROJECT, PRIMAVERA, APACHE NIFI, IBM TABLEAU, IBM COGNOS, DYNAMICS AX, ODOO ERP, ARCHIMATE, TOGAF, POWER QUERY, ORACLE DBA, DATA GOVERNANCE, IT GOVERNANCE, ARCGIS, QGIS, MAGENTO E-COMMERCE, PHONEGAP, KATALON STUDIO, SQA, COBIT 2019, etc.


Exam preparation training available

Sunday, January 16, 2022

HERY PURNAMA TRAINER CRISC JAKARTA, BANDUNG

Hery Purnama 081223344506 is  CRISC trainer for training certified in Risk and information System Control

Topik lainnya, PMP, CAPM, CISA, CISM, CISSP,CDMP, COBIT, TOGAF

HERY PURNAMA TRAINER COBIT 2019 JAKARTA, BANDUNG

Hery Purnama 081223344506, certified trainer for training COBIT 5/2019 foundation , governance framework, design.

Topik lainnya, PMP, CDMP, ITILF, TOGAF, CISM, CISA, CISSP, CCISO, CRISC, CDPSE


ICT Governance Syllabus

Hery Purnama 081223344506 is trainer for training ICT governance.

Syllabus : ICT Governance

ICT GOVERNANCE

 

Trainer : HERY PURNAMA, SE,MM.
 MCP,  PMP, ITILF , CISA, CDMP, CTFL, CISM, CRISC, CISSP, CDPSE , CGEIT

 

DESCRIPTIONS :

Whether you are a manager in a leadership positions, an ICT professional or you are looking to get a foothold in the ICT sector, this course will adequately equip you to understand and navigate the diverse approaches of ICT Governance.

This course will cover key topics including: decision-rights and decision domains of ICT Governance, a widely-used ICT Governance matrix, how top performing firms govern their ICT, key ICT Governance capabilities, and an overview of ICT governance frameworks.

 

TRAINING OBJECTIVES

·        How to navigate the world of digital governance

·        Understand essential ICT governance approaches and how they are designed and implemented

·        What ICT governance is and how it relates to corporate governance, ICT management and organizational coordination

·        How top performing firms govern their ICT

·        The ICT Governance tools and methods to navigate a transforming business landscape

·        Analyse how organizations govern their ICT assets using an ICT Governance matrix

·        Learn about the three types of ICT Governance capabilities

·        Learn about ICT Governance Frameworks , their principles, components, and benefits

 

PREREQUISITES :

·        Basic familiarity with ICT

 

Duration : 5 Days

 

Module 1

·        Executive’s View of ICT

·        Definition and Purpose of ICT Governance

·        ICT Governance Assessment Maturity Model

·        Integrated ICT Governance Framework and Roadmap

·        Key Governance Roles, Responsibilities and Accountability

·        ICT Governance Decision Rights

·        Demand Management

·        Balanced Score Card for Business and ICT

·        Prerequisites for Creating a Successful ICT Governance Program

·        Future State of ICT Governance – A Blueprint Concept

 

Module 2

·        Foundations of ICT Governance

·        Why Do Organizations Need an ICT/Business Governance Policy and Process

·        Value propositions from Best-in-Class Companies on Governance

·        Key ICT Resources and Functions to be Managed

·        Three Critical Pillars of ICT Governance – Organization/People, Process and Technology

·        Results of Ineffective ICT Governance

·        Steps in Making ICT Governance Real

·        A Generic Governance Process Improvement Model

·        A First Step – Understand Current Maturity of ICT Governance

 

Module 3          

·        Integrated ICT Governance Framework and Roadmap

·        Benefits of Using an Integrated ICT Governance Framework

·        Integrated ICT Governance Framework and Roadmap

·        Select Examples of Current and Emerging Business/ICT Strategy and Governance Best Practice Reference Models, Frameworks and Standards

 

Module 4

·        Business/ICT Alignment Excellence

·        The Board’s Role in Driving Business/ ICT Alignment

·        Principles of Aligning ICT to the Business More Effectively

·        Business and ICT Plan Integration Flow

·        Business and ICT Strategy Development Framework and Outline

·        ICT/Business Alignment & Portfolio Management Triangle

·        The Five Stages of ICT Investment (Portfolio) Management Maturity

·        ICT Engagement (Relationship) Model

 

Module 5          

·        Program/Project Management (PM) Excellence

·        Value Propositions of PM from Leading Organizations

·        Principle for Achieving Excellence in Program/Project Management

·        PM Maturity Model

·        Linking ICT/Business Plans to PM and Beyond

·        PM Life Cycle Phases, Components and Key Templates

·        ICT Demand Management Gate Process Flow and Select Decision Criteria

·        Fast Track versus Complex PM Initiatives (Scalable and Flexible Process)

·        PM Governance and Escalation Framework

·        PM Key Metrics – Mandatory and Discretionary

·        The Roles of the Program Management Office (PMO)

 

Module 6          

·        ICT Service Management and Delivery (ITSMD) Excellence

·        Principles for Achieving ICT Service Management and Delivery Excellence

·        Benefits of ICT Service Management and Delivery

·        What is ITIL and Why is ITIL Different?

·        ITIL Framework and an Overview of the Twelve Process Areas of ITIL (e.g. configuration mgt., asset/financial mgt., incident mgt., problem mgt., change mgt., release mgt., service level mgt., capacity mgt., service continuity mgt., capacity, mgt, etc.)

·        Steps in Making ITIL Real

·        ICT Service management and Delivery Assessment Maturity Model

·        Conducting a ITSMD Health Check

·        Select ITSMD Metrics

 

Module 7          

·        Outsourcing and Vendor Management Excellence

·        The ICT Balancing Dilemma

·        The Outsourcing Decision-Making Scorecard

·        Major Outsourcing Trends, Issues and Challenges

·        Differences Between Domestic and Off Shore Deals

·        Empowering Executives to Outsourcing

·        Vendor Selection Process Flow

·        Key Vendor Evaluation Criteria

·        Key Governance Roles, Processes and KPIs

·        Summary Steps in Vendor/Outsourcing Selection, Contract Negotiations and Management

 

Module 8          

·        Performance Management, Management Controls and Risk Management

·        Principles for Achieving Performance Management Excellence

·        What Key Performance Indicators Should Be Tracked?

·        Linking Critical Success Factors to Key Performance Indicators

·        Governance Calendar and Balanced Scorecard

·        Select Examples of KPIs in Support of ICT Governance Components

·        Key ICT Management Controls

·        Risk Assessment, Management and Mitigation

Monday, September 20, 2021

TRAINER DATA STORYTELLING DI JAKARTA BANDUNG

 Hery Purnama 081223344506, Certified Trainer for Training Data Storytelling in Jakarta, Bandung, Surabaya , Indonesia. For inquiry please contact Mr. Hery Purnama

Syllabus Data Storytelling

Duration : 2 Days (09.00-16.00)

Description

The unprecedented evolution and progress of technology in the recent past decades has led to the ease of capture and surge of storage capacity for data for everyone. With the saying that ‘data is the new oil’, we have witnessed organizations undergo transformation in their business models, new companies built on data platforms and the rise of various data products that has become part and parcel of our everyday life.

In light of all these head spinning developments there is one truth that needs to be remembered: data captured and stored but not processed is wasteful and useless. All the developments mentioned above became possible because data was made sense of- that is it was turned to information upon which insights were generated which were in turn used to drive better business-decision making, improve business operations or to craft new business strategies.

This course focuses on fundamental concepts and best practices for effective communication with data- something that sits between the crosshairs of science and art. It seeks to enable you to tell the story of your data and not just merely to show data. It is primarily designed for beginners in the field of business analytics or data science who quickly wants to learn how to effectively and efficiently communicate the insights they have discovered from a data exploratory analysis and be able to significantly contribute to the improvement or transformation of their respective organization.

What you'll learn

·         Draft the main message behind your data story

·         Utilize and conceptually construct the appropriate type of visualization for your data

·         Identify needed improvements and refinements on a visualization to make it more effective for communication

·         Smoothly and effectively convey the story behind your data

Requirements

·         No Specific Requirement needed

Who this course is for:

·         Those with interest and beginners in business and data analytics

·         People in the field of business intelligence

·         Those who want to learn explanatory data analysis

·         People who want to learn data visualization

·         Those who want to brush up their skills in data storytelling

·         For executives and managers who wants to know what good visualization and storytelling is like but who are not mainly responsible or tasked to do it.

 

Course content

 

Contextualizing the Data Story  • 

·         What is Data Storytelling

 

·         Why Data Storytelling and Its Steps

 

·         Clarifying the Context

 

·         Clarifying the Context Exercise

 

·         Crafting Your Message

 

·         Storyboarding

 

·         Clarifying the Context and Crafting Your Message

 

·         Crafting Your Message and Storyboarding Exercise

 

 

Choosing the Visualization  • 

 

·         Introduction to Visualization and Its Key Components

 

·         Visualization Title, Cues, Coordinate Systems and Scales

 

·         Visualization Basics

 

·         Position as Visual Cue and the Scatterplot

 

·         Direction as Visual Cue and the Line Plot

 

·         Length as Visual Cue and the Bar Chart

 

·         Area as Visual Cue and the Pie Chart

 

·         A Guide for Choosing Your Data Visualization

 

·         Chart Types

 

·         Visualization Tips Things to Avoid and Remember

 

·         Choosing and Constructing a Visualization

 

·         From Your Message to Data Visualization

 

 

Decluttering a Visualization  • 

 

·         Tufte's Data-to-Ink Ratio

 

·         Undertsanding Clutter

 

·         Common Types of Visual Clutter

 

·         Gestalt's Principle of Visual Perception

 

·         Principles of Similarity, Proximity and Enclosure

 

·         Principles of Closure, Continuity and Connection

 

·         Clutter and Visual Perception

 

·         Visualization Improvement Exercise

 

Enhancing Your Visualization  • 

 

·         Design Concepts for Enhancement

 

·         Pre-attentive Processing

 

·         Pre-attentive Attributes Introduction

 

·         Position, Color and Size Attributes

 

·         Pre-attentive Attributes

 

·         Affordances Eliminating Distraction

 

·         Visualization Accessibility

 

·         Visualization Aesthetics

 

·         Other Design Concepts for Visualization Enhancement

 

·         Enhancing Visualization Exercise

 

·         Enhancing the Visualization for Your Data Story

 

 

Crafting the Data Story  • 

 

·         Story Structure and Storytelling Tips

 

·         Creating the Narrative Structure and Flow

 

·         Storytelling and Narrative

 

·         Crafting Your Data Story

 

 

 Other topics : ITIL V.4, COBIT 2019 Foundation, COBIT 2019 Design & Implementation, TOGAF 9, Data Story Telling, CISM, CISA, CISSP, CDPSE, QA Automation, Capacity Management, ITAM, ISO 27001, ISO 31000,for Inquiry please contact Hery Purnama 081223344506