You searched for: ""

  • 2 Days ILT, VILT

    Product owners have a unique and demanding role on agile teams. A product owner decides what the team will create next in order to deliver more value to the customer. In a Certified Scrum Product Owner (CSPO) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.

    You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.

    Participants in a CSPO offering should expect that each Learning Objective identified in this document will be covered. Students should also expect that the Scrum Foundations Learning Objectives are covered either before or during the offering.

  • 1 Day ILT, VILT

    Learn to retire manual processes through AWS security and governance services and concepts.

    Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.

    In this AWS-SGS: AWS Security Governance at Scale course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices.

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

  • 1 Day ILT, VILT

    Learn how to integrate Amazon Redshift with a data lake to support analytics and machine learning workloads to reduce your time to data insight by building a data analytics solution using Amazon Redshift.

    In this AWS-BDAS: Building Data Analytics Solutions Using Amazon Redshift course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service. This course prepares learners for the  AWS Certified Data Analytics – Specialty certification and focuses on the data collection, ingestion, cataloging, storage, and processing components of the analytics pipeline. You will learn to integrate Amazon Redshift with a data lake to support both analytics and machine learning workloads.

    You will also learn to apply security, performance, and cost management best practices to the operation of Amazon Redshift.

    AWS Discovery Day 2025: Develop Generative AI & Prompt Engineering Capabilities 
     
    This FREE Virtual Event on Friday, August 29 2025, from 9:30 AM – 4:00 PM (MYT) — designed for business leaders, IT professionals, and technical teams across Malaysia. 
     
    Secure your spot now. 

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure.

    Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

  • 2 Days ILT, VILT

    The Lean IT Foundation training is two days. During the training, you will learn the fundamentals of Lean and how to apply Lean in an IT domain. In the training you will practice with exercises to build hands-on skills. The training will introduce you to the softer aspects of Lean IT like change approaches and how to change people’s behavior and attitude. All the exercises are related to ICT, but no technical IT knowledge is required.

    This course is delivered using an exciting case study designed to further enhance the candidates understanding of Lean IT. Students who have attended this course are prepared to successfully take the associated Lean IT Foundation certification exam which is a requirement for attending any of the further Lean courses available in this track.

  • 2 Days ILT, VILT

    The EASPO: EXIN Agile Scrum Product Owner certification focuses on bringing value to the customer and value for the business, through Agile project management techniques. This certification is especially suitable for professionals working in the areas of project management, software development, IT service management and business management.

    EXIN Agile Scrum Product Owner tests a candidate’s skills and knowledge of Agile principles and Scrum practices specifically with the role of Product Owner in mind. This certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Product Owner.

  • AZ-800T00: Administering Windows Server Hybrid Core Infrastructure

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Level up with Microsoft Certified: Windows Server Hybrid Administrator Associate certification.

    This AZ-800T00: Administering Windows Server Hybrid Core Infrastructure course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.

  • CKA: Certified Kubernetes Administrator

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage.

    The Cloud Storage with Red Hat Ceph Storage with exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0.

    If you do not intend to bundle with certification exam, consider opting for CL260: Cloud Storage with Red Hat Ceph Storage instead.

  • 0A039G: Advanced Machine Learning Models Using IBM SPSS Modeler (V18.2)

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    This 0A039G: Advanced Machine Learning Models Using IBM SPSS Modeler (V18.2) course presents advanced models available in IBM SPSS Modeler. The participant is first introduced to a technique named PCA/Factor, to reduce the number of fields to a number of core factors, referred to as components or factors. The next topics focus on supervised models, including Support Vector Machines, Random Trees, and XGBoost. Methods are reviewed on how to analyze text data, combine individual models into a single model, and how to enhance the power of IBM SPSS Modeler by adding external models, developed in Python or R, to the Modeling palette.

  • 4 Days VILT

    AC helps you understand Business Technology Strategy (BTS) and Iasa IT Architecture Body of Knowledge (ITABoK).

    Find out how to apply skills from the five foundational pillars of ITABoK as well as distinguish key architecture concepts, scopes, principles, contexts and roles. Adopt industry frameworks and components alongside basic IT Architect skills and define values, as well as create IT’s business capabilities. Find out what it takes to set up an IT Architecture Office (ITAO) and how to run its day-to-day tasks as an IT Architect. Finally, learn how to select and priorities IT projects, assign resources for them, work hand in hand with the Project Management office and present technology values to stakeholders.

  • 0.5 Days VILT

    This eLearning course teaches students how to use scheduled reports and alerts to automate processes in their organization. Students will create, manage, and schedule reports and alerts, and use alert actions to further respond to incidents as they occur.

  • 0.5 Days VILT

    This eLearning course teaches students how to create visualizations in Splunk, using Splunk’s Search Processing Language as well as the Splunk Web interface. Students will learn commands that allow data to be displayed on charts and graphs, transform geographic data into maps, create single value visualizations, and use Splunk’s visual formatting options to change the look of statistical tables.

  • 0.5 Days VILT

    This eLearning course gives students additional insight into how Splunk processes searches. Students will learn about Splunk architecture, how components of a search are broken down and distributed across the pipeline, and how to troubleshoot searches when results are not returning as expected.

  • 0.5 Days ILT, VILT

    This three-hour course is designed for power users who want to create maps in Splunk. It focuses on the data and components required to create cluster and choropleth maps. It also shows how to format, customize and make maps interactive.

  • 0.5 Days ILT, VILT

    This three-hour SPLK-SO: Search Optimization course is for power users who want to improve search performance. Topics will cover how search modes affect performance, how to create an efficient basic search, how to accelerate reports and data models, and how to use the tstats command to quickly query data.

  • 4 Days ILT, VILT

    The just-discharged COBIT 2019 is the best COBIT yet, highlighting numerous positive changes including adjusted standards, new structure factors, refreshed objectives course, altered procedures (from 37 to 40), refreshed execution the board, new point by point administration and the executives goals.

    This COBIT2019DAI: COBIT 2019 Design and Implementation course is planned for progressively experienced clients to COBIT who are keen on further developed utilization of the system, for example structuring administration frameworks and running administration improvement programs. This course requires the COBIT 2019 Foundation Certificate to be effectively accomplished. This two-day course is organized around the COBIT 2019 Design Guide and the COBIT 2019 Implementation Guide

  • 1 Day ILT, VILT

    COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.

  • 2 Days ILT, VILT

    DevOps is a complex maze that has many leaders frustrated. Many enterprises struggle with their DevOps journey, or even knowing where to start. There are many layers of people, process and technologies across each organization that are instrumental to engineering a successful DevOps solution. DevOps is not something you go get a quote for and simply buy. It’s an evolving journey.

    This DOEF: DevOps Engineering Foundation course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution.

    This course positions learners to successfully complete the DevOps Engineering Foundation exam.

  • 2 Days ILT, VILT

    Elevate the digital workspace experience with the efficient and secure delivery of virtual desktops and apps from on-premises to the cloud.

    This EDU-HVDT8: VMware Horizon 8: Virtual Desktop Troubleshooting course, equivalent to 2 days of training, builds your skills in resolving common issues that occur in a VMware Horizon® environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators.

  • 2 Days ILT, VILT

    For the economy today, leaders need to be equipped to use different set of tools , values and principles to manage the workforce today to achieve greatness.

    VUCA is an acronym that stands for Volatility, Uncertainty, Complexity, and Ambiguity. It was originally used by the military to describe the conditions of the post-Cold War world. However, VUCA has since been adopted by business leaders and academics to describe the contemporary business environment. VUCA represents a shift from the traditional assumptions about organizations and their environments. In a VUCA world, organizations must be able to adapt and respond to change at a moment’s notice.

    This VUCA’s training will focus on:

    • Strategic leadership
    • Design Thinking
    • Competencies of flawless communication, resilience & team synergy
  • 2 Days ILT, VILT

    Learn to present with confidence.

    When presenting, it’s important to project confidence. This will help you engage with your audience and deliver your message effectively. But how can you present with confidence in the 21st century?

    There are a few key things to keep in mind. First, remember that your audience is composed of individuals with their own unique perspectives. So it’s important to be respectful and open-minded when presenting. Second, don’t be afraid to use technology to enhance your presentation. There are a number of great tools available that can help you deliver your message in an engaging way. Finally, keep in mind that it is all about the connection. Use your body language and voice to create an intimate connection with your audience, and you’ll be sure to deliver a confident and impactful presentation.

    This is a 1+1 day course. The participants are critiqued on their first presentation on Day 1. Then, they learn the concepts, revise the same presentation and rehearse before making a second presentation on Day 2. They get personal coaching to enhance their presentation skills on the second day.

  • 2 Days ILT, VILT

    Every sales leader have a subtle way of influence over the audience. Have you ever wondered how they do it? Have you ever wanted to have the same subtle influence over your prospect? What if I tell you that this skill can be learnt and you too can learn how to use influence the decision making part of the mind and get your prospects to buy?

    Participants will learn, practice and assimilate these skills into their daily activities until they become unconsciously competent in these skills.

    Training is delivered in a highly interactive and experiential way. Concepts and background information are presented through group exercises, discussion and activities creating an environment that facilitates accelerated learning and application.

    The trainer will facilitate discussion of real issues and challenges that the participants face in their work and private lives. Each activity will be thoroughly de-briefed to link the learning to real life situations.

  • 5 Days ILT, VILT

    The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

    CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v2 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 5 Days ILT, VILT

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, the CPENT: Certified Penetration Testing Professional teaches you how to perform an effective penetration test across filtered networks.

    The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies. In summary, there is no program of its kind in the world.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • GCP-CDL: Cloud Digital Leader training with Google Cloud

    Price range: RM2,400.00 through RM2,670.00
    2 Days ILT, VILT

    Validate your broad knowledge of cloud concepts and the products, services, tools, features, benefits, and use cases of Google Cloud.

    If you’re wondering how cloud can transform your business then this course is for you. Aimed at business leaders new to cloud, this GCP-CDL: Cloud Digital Leader training with Google Cloud course provides insight into Google’s approach to digital transformation, and how to embrace cloud in your business.

    This Google Cloud training is designed to give you foundational knowledge about cloud technology, data, and Google Cloud products that enable digital transformation. Empowering you and your team(s) to contribute to cloud-related business initiatives in your organization.

    Learn more about Multicloud Strategies in Malaysia: Adopting Multicloud Strategies in Malaysia: A 2024 Roadmap

  • 2 Days ILT, VILT

    EXIN Privacy & Data Protection Foundation (PDPF) is a certification that validates a professional’s knowledge and understanding of the protection of personal data, the EU rules and regulations regarding data protection.

    Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns arise. With the EU General Data Protection Regulation (GDPR) the Council of the European Union aims to strengthen and unify data protection for all individuals within the European Union (EU). This regulation affects every organization that processes personal data of EU citizens. The EXIN Privacy & Data Protection Foundation certification covers the main subjects related to the GDPR.

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context.

  • 1 Day ILT, VILT

    EXIN Privacy & Data Protection Essentials (PDPE) is a certification that validates a professional’s knowledge about organizing the protection of personal data, the EU rules and regulations regarding data protection.

    Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns arise. With the EU General Data Protection Regulation (GDPR) the Council of the European Union aims to strengthen and unify data protection for all individuals within the European Union (EU). This regulation affects every organization that processes personal data of EU citizens. The EXIN Privacy & Data Protection Essentials certification covers the main subjects related to the GDPR, which should be known by everyone working with personal data.

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context.

  • 3 Days ILT, VILT

    EXIN Privacy & Data Protection Professional is a certification that validates a professional’s knowledge and understanding of the European privacy and data protection legislation and its international relevance, as well as the professional’s ability to apply this knowledge and understanding to everyday professional practice.

    With the ever increasing explosion of information flooding the internet, every company needs to plan how to manage and protect privacy of persons and their data. Not without a reason, many new laws within the EU, as well as in the USA and many other regions, are formed in order to regulate both privacy and data protection.

    The European Commission has published the EU General Data Protection Regulation (GDPR), meaning that from the 25th of May 2018 on, all organizations concerned must comply with specific rules. This Practitioner certification builds on the subjects covered by the Foundation exam by focusing on the development and implementation of policies and procedures in order to comply with existing and new legislation, application of privacy and data protection guidelines and best practices, and by establishing a data protection management system (DPMS).

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context

  • 2 Days ILT, VILT

    The EXIN SIAM™ Foundation credential validates a professional’s knowledge about bringing together multiple service providers to strive for a common goal in order to support the client organization’s agreed objectives for service delivery.

    This certification includes the following topics:

    •  introduction to SIAM
    •  SIAM implementation roadmap
    • SIAM roles and responsibilities
    • SIAM practices
    • processes to support SIAM
    • SIAM challenges and risks
    • SIAM and other practices.

    SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization. A synonym for Service Integration and Management (SIAM™) is multi-sourcing integration (MSI). In this certification, the term SIAM is used. The EXIN SIAM™ Foundation certification tests a candidate’s knowledge and understanding of the terminology and the core principles. The certification covers themes such as: potential benefits as well as the challenges and risks of implementing SIAM. It also includes examples of implementation structures, governance, tooling and data considerations and the common processes used in a SIAM ecosystem. A candidate who successfully completes this certification knows how SIAM delivers business value and is able to contribute to the implementation and use of SIAM in an organization.

  • 3 Days ILT, VILT

    Service Integration and Management (SIAM) is a methodology used to manage and seamlessy integrate multiple service providers to ensure a single business-facing IT organization.

    The EXIN SIAM™ Professional certification tests a candidate’s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.

  • 2 Days ILT, VILT

    Security in IT is not only becoming more important but also more sophisticated. In light of this, organizations are dedicating roles to the safeguarding of their data and systems. The EXIN Cyber & IT Security program is geared towards providing candidates with the required knowledge to understand the technical side of information security.

    It covers the theoretical background, detailed information about security infrastructure and goes into the vulnerabilities, risks, and required measures.

     

  • 2 Days ILT, VILT

    The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner.

    Today’s technology is moving fast and changing the way we do business. Companies digitize all information by default, store their data in the cloud and use open source software. This raises information security issues related to network and system infrastructure.

    The EEHF: EXIN Ethical Hacking Foundation module covers the basic steps of ethical hacking: intelligence gathering, scanning computer network/systems, and penetrating systems. Candidates are expected to be very aware of the difference between legal and illegal hacking, and the consequences of misuse.

    In more detail the candidate will develop an understanding of the following topics:

    • Network sniffing (gathering information from network traffic)
    • Cracking a WEP and WPA(2) key from a wireless network
    • Network vulnerability scanning
    • Basic penetration of computer systems
    • Password cracking
    • Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)

    The EXIN Ethical Hacking Foundation exam tests the knowledge of the candidate on:

    • the basics of Ethical Hacking, and
    • the practice of Ethical Hacking.
  • 2 Days ILT, VILT

    After successfully completing the EXIN Lean IT Foundation exam, a candidate will be familiar with the principles of the Lean philosophy and in particular with the application of this philosophy within an IT environment. Specifically, the candidate should understand:

    • The principles underlying the Lean philosophy
    • The importance of understanding and delivering customer value
    • The way Lean looks at processes and the waste within them
    • How to measure performance and the key determinants of performance
    • What the organizational requirements are when implementing Lean, including the use of visual management tools
    • Which behavior and attitude is necessary for Lean to be successful within an IT organization
    • The DMAIC problem-solving model
    • How these Lean principles can be applied within an IT organization

    EXIN Lean IT Foundation helps IT organizations to ensure that they provide their customers with the best possible services. Through understanding customer value, the processes that deliver this value, the way to manage performance, the way to organize and the required attitude and behavior, IT organizations are helped to develop a continuous improvement mindset. Lean IT is complementary to all other best practice methods. The purpose of EXIN Lean IT Foundation is to confirm that a candidate has sufficient knowledge and understanding of Lean IT to support a Lean initiative within an IT organization.

  • 2 Days ILT, VILT

    Professional Scrum™ with User Experience (PSU) is a 2-day hands-on course where students who already have a fundamental understanding of Scrum and some experience using it will learn how to integrate modern UX practices, (UX is more than UI) into the way they are working in Scrum and how to work most effectively within Scrum Teams. Design work can sometimes feel slow, and not well suited to quick agile cadences and Scrum events, but that isn’t the case. Learn UX techniques that fit beautifully into Scrum, and practice these techniques with cross-functional teams in the class.

    In this two day class* students will leverage an ongoing case study as a way of applying techniques learned throughout the class and preparing to take what they learn back to their workplace. This course is designed for Product Owners and Scrum Masters to enable them to better incorporate design, research and learning into their Scrum process.

    Lean UX techniques focus the team toward customer-centric design and discovery. Scrum focuses the team toward rapid delivery and customer feedback. By bringing together Lean UX and Scrum, teams learn how to drive the design together with delivery in short, iterative cycles to assess what works best for the business and the user.

    Leveraging Lean UX techniques, the course takes core design and research activities, illustrating how they come together with development and delivery. Attendees explore how these activities fit into a dual-track agile process (Design and Development) where cross-functional teams can work together to explore, experiment and deliver value-based outcomes.

Go to Top