Search

Certification
Role
Delivery Mode
Tags

This qualification is intended for individual who aspires to become a Citizen Data Scientist in the organization using open-source technology to perform moderate to sophisticated diagnostics analytics and simple predictive analytics. The Data Analytics Essentials qualification is also highly relevant to other key staff involved in the requirements input, design, development, delivery and ultimate use of the digital initiatives including Data consumer, digital initiatives decision maker, business analyst, and operational line managers/staff.

12 Hours
HK$7,800

This qualification is intended for an individual who aspires to become a Data Citizen in the organisation using open-source technology to perform descriptive analytics and data visualisation. It is also highly relevant to other key staff involved in the requirements input, design, development, delivery and ultimate use of the digital initiatives including Data consumer, digital initiatives decision maker, business analyst, and operational line managers/staff.

12 Hours
HK$7,800

This qualification is intended for individual who aspires to improve the data literacy through skill-up the digital competence. It is also highly relevant to other key staff involved in the requirements input, design, development, delivery and ultimate use of the digital initiatives including data consumer, digital initiatives decision maker, business analyst, and operational line managers/staff.

6 Hours
HK$5,000

As enterprises and consumers move greater amounts of sensitive information to the cloud, employers struggle to find information security leaders who have the necessary breadth and depth of knowledge to establish cloud security programs protecting sensitive information.

The CCSK lets the marketplace know you are ready for the challenge with the first credential dedicated to cloud security, offered by the world’s thought leader in cloud security.

KORNERSTONE is a CSA authorized training partner to run the CSA training courses.

Institute of Image Training and Testing International (IITTI) is a global, non-profit organization registered in Vancouver, Canada, an unique set of standardized global certifications on soft skills for business. It is like the ISO for soft skills and The “Standard” bible. An unified, worldwide standard documents! IITTI has developed standardized tests on international business standards of appearance, behaviour, business protocol and communications. IITTI recommends that these international business images and etiquette standards be adopted in the business arena worldwide. IITTI standards is recognized by Associate Image Consultants Association (AICI)

This 2-day certificate program will equip you with the knowledge to understand the business applications of blockchain technology, and the potential to discover chances for solving real-world problems innovatively.

The program is built on the experience of Hong Kong Blockchain Society (HKBCS). It helps you to inspect blockchain technology from a business perspective. You will be offered a foundational outline of how distributed ledger technology works in order to reveal the possibilities and limitations of blockchain.

Over the 2-day program, you will be directed to understand blockchain technology from concepts to applications. You will be able to understand the impact of blockchain technology on various industries.

Get in the spotlight by becoming an early adopter of ISACA®’s Certified Data Privacy Solutions Engineer™ (CDPSE™) certification! With increasing regulations on how data is collected and managed, organizations need to enhance the value of data while maintaining customer trust. CDPSE is the first experience-based, technical certification of its kind. It assesses a technology professional’s ability to implement privacy by design which results in privacy technology platforms and products that build trust and advance data privacy. CDPSE also assesses a data analyst/data scientist’s ability to manage the data lifecycle and advise technologists on privacy compliance and best data practices. CDPSE enables data scientists and privacy technologists with a common language and data science methodologies to improve the end user experience while preserving privacy and retaining trust.

Since its introduction in 2010, more than 24,000 professionals have obtained ISACA®’s Certified in Risk and Information Systems Control® (CRISC®) certification. The designation demonstrates to employers that the holder is able to identify, evaluate and manage information systems and technology risk, and help enterprises achieve their business objectives.

CISM® is a globally recognized standard of achievement of information security management. The CISM certification was developed specifically for experienced information security managers and those with information security management responsibilities who include Information Security Managers, Aspiring Information Security Managers, IS/IT Consultants and Chief Information Officers.

CISA® is a globally recognized standard of achievement among information systems (IS) audit, control and security professionals. The certification examination is designed to assess and certify individuals in the IS audit, control, assurance and security professionals.

Holder of a CISA® credential demonstrates proficiency and signifies commitment to serving an organization and the IS audit, control and security industry with distinction.

This programme is specifically designed according to the CISA® syllabus.

Information Technology Infrastructure Library, famously know is as ITIL, has ever been evolving to help the IT industry to do a better job and to cope with the increasingly business dependency on IT for business success. While previous ITIL frameworks enable the IT professional on processes, value to business, and continual improvement, ITIL 4 brings in the management piece. It is an enriching new piece for all IT professionals.

ITIL 4 new elements are the service management framework, namely the Seven Guiding Principles, Four Dimension of Service Management, Service Value System, Service Value Chain which includes all the practices. It also embraces others such as Agile, LEAN, DevOps.

This instructor-led course is specially designed for participants to attempt the ITIL Foundation Certificate level, a new way to look at IT Service Management through a Service Value System, with that, IT professionals may choose the best service management approach for maximum business value.

As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSP, a credential which denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security.

 

CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure

Search for a course