IT Balanced ScoreCard

APA YANG DIMAKSUD DENGAN  IT BALANCED SCORECARD?

The balanced scorecard (BSC) awalnya dikembangkan oleh Kaplan dan Norton, adalah sistem manajemen kinerja yang memungkinkan perusahaan untuk mendorong strategi mereka pada pengukuran dan tindak lanjut. Dalam beberapa tahun terakhir BSC telah diterapkan untuk teknologi informasi (TI) dan saat ini sudah mulai banyak muncul penerapan IT Balanced Scorecard (IT BSC).

Ukuran keberhasilan implementasi teknologi informasi (information technology/IT) bagi sebuah perusahaan/organisasi dilihat dari seberapa besar IT perusahaan  tersebut  memberikan  value  dan  dukungan  bagi  pencapaian  tujuan  bisnisnya.  Setelah  investasi  IT dilakukan  oleh  sebuah perusahaan maka pertanyaan selanjutnya adalah seberapa besar investasi tersebut memberikan return bagi bisnis dan bagaimana mengukurnya.

MANFAAT BALANCED SCORECARD?

Dengan menggunakan  pendekatan balanced scorecard (BSC) untuk bisnis maka konsep yang sama dapat juga diterapkan untuk mengukur kinerja IT. IT Balanced Scorecard dapat mengukur kinerja IT sehingga mampu meningkatkan layanan IT bagi bisnis. Penerapan IT BSC memungkinkan perusahaan menerjemahkan visi, misi dan strategi bisnis perusahaan menjadi indikator kinerja IT yang jelas untuk semua pihak sehingga pencapaian tujuan perusahaan lebih dapat dipastikan dan pencapaiannya terukur. Perspektif dalam IT BSC juga memungkinkan keberhasilan perusahaan secara berkesinambungan.

Dalam training 2 hari ini para peserta akan diberikan wawasan dan pemahaman bagaimana menyusun IT Balanced Scorecard, bagaimana menerjemahkan visi, misi dan strategi ke dalam ukuran-ukuran kinerja operasional mulai dari level manajemen puncak sampai ke tingkat pelaksana dan bagaimana mengelola proyek IT BSC ini agar berhasil dengan baik. Juga akan dibahas bagaimana IT Balanced Scorecard (IT BSC) dapat dihubungkan dengan balanced scorecard bisnis (BSC) dan dengan cara ini inilah maka akan  mendukung IT /Business Governance dan Alignment Process. Training ini dilengkapi dengan penggunaan BSC Software dan difasilitasi oleh trainer yang ahli dan berpengalaman.

Siapa yang menjadi peserta?

Pelatihan dirancang khusus terutama untuk mereka yang ingin memahami bagaimana meningkatkan kinerja IT dengan menerapkan IT BSC, bagaimana mengelola proyek penerapan IT BSC agar berhasil dengan baik dan sesuai dengan best practices. Termasuk diantaranya:

  • Para manajer/pimpinan/profesional bisnis
  • Para manajer/pimpinan/professional IT

Training Objectives

Setelah mengikuti training Balanced SCorecard ini, para peserta diharapkan mampu:

  • Memahami konsep dasar Balanced Scorecard
  • Memahami manfaat Balanced Scorecard
  • Memahami  proses  penyusunan Balanced Scorecard
  • Memahami langkah-langkah implementasi Balanced Scorecard
  • Mampu merancang BSC suatu perusahaan dan menerjemahkan strategi, visi dan misi perusahaan tersebut
  • Mampu menyusun IT Balanced Scorecard
  • Mampu melakukan linked ke Balanced scorecard Bisnis (BSC)
  • Mampu melakukan proses IT /Business Governance dan Alignment
  • Menggunakan Balanced Scorecard Software untuk menggambarkan Strategi Map, KPI (Key Performance Indicator) dan KGI ( Key Goal Indicator)

Training Benefits

  • All participants will get BSC (Balanced Scorecard) TOOLKIT consisting of Learning Material, References, Process/Templates and Checklist, Samples of Strategy Map, BSC Software (trial/demo version)
  • Experienced and Internationally Certified Facilitator will guide participants in Case Study Session using Hands-on Approach
  • During the training our trainer will guide  all participants to use BSC Software in doing BSC case study

AGENDA AND MATERIAL

DAY 1

  • BSC DAN MANAJEMEN KINERJA LEVEL KORPORAT
    –Latar belakang dan definisi BSC
    –Tinjauan umum tentang perspektif yang ada di Business BSC .
    –Bagaimana mengonversi Business BSC tersebut menjadi sebuah IT BSC.
  • MEMAHAMI POKOK-POKOK PROYEK BSC
    –Tahapan memulai sebuah proyek BSC
    –Pembuatan metric-metrik indikator kinerja dan teknikk pemetaan proses.
  • IT BSC DAN KESELARASAN TI DENGAN STRATEGI PERUSAHAAN
    –IT BSC
    –Pemanfaatan business BSC dalam konteks TI.
  • TUTORIAL PENGGUNAAN BSC SOFTWARE
    LATIHAN DAN PRAKTEK MENGGUNAKAN BSC SOFTWARE
    STUDI KASUS

DAY 2

  • MENYELARASKAN TI UNTUK MEMENUHI FINANCIAL & CUSTOMER OBJECTIVES
    –Perspektif finansial dan pelanggan dalam BSC
    –Apa saja yang perlu diperhatikan dalam penerapannnya.
  • MENYELARASKAN IT UNTUK MEMENUHI BUSINESS PROCESS OBJECTIVES DAN MEMELIHARA LEARNING & GROWTH
    –Perspektif proses internal dan pembelajaran dan pertumbuhan dalam BSC
    –Apa saja yang perlu diperhatikan dalam penerapannnya.
    –Pendekatan  mengintegrasikan CMM kedalam obyektif proses bisnis
    –Bagaimana memberdayakan SDM secara efektif.
  • OVERVIEW IT BSC TOOLS
    –Beberapa tools yang sering digunakan dalam mengukur kinerja
  • LATIHAN DAN PRAKTEK MENGGUNAKAN BSC SOFTWARE
  • STUDI KASUS DAN LATIHAN PENYUSUNAN IT BALANCED SCORECARD
    –Latihan, analisa dan presentasi
    –Langkah-langkah  Implementasi IT Balanced Scorecard
    –Penggunaan Balanced Scorecard Software

Informasi & Registrasi

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Balance Scorecard>
  • Untuk pendaftaran silahkan  download Registration Information dan kirim kembali setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

Practical Planning and Controlling Projects/IT Project

Pelatihan Practical Planning and Controlling Projects/IT Project  ini akan memperkenalkan kepada para peserta bagaimana mengelola proyek secara praktis dan komprehensif mulai dari  perencanaan, pengorganisasian, pengendalian.

Dalam pelatihan 3 hari ini peserta akan dibimbing secara hands-on oleh trainer yang berpengalaman dan pemegang sertifikasi internasional Project Management menggunakan metoda step-by-step  dalam penyampaian pengetahuan mengelola proyek.

Selama pelatihan, peserta juga akan dibekali dengan PM Toolkit yang berisi diantaranya Proses dan template PM serta contoh studi kasus PM yang lengkap dan komprehensif sehingga akan membantu para peserta memahami perencanaan dan pengontrolan proyek secara praktis dan siap pakai. Dalam toolkit tersebut juga akan diberikan bahan referensi terkait dengan Manajemen Proyek.

Agar bisa membuat Jadwal Proyek, Alokasi budget, serta melakukan Tracking Proyek, maka dalam pelatihan ini juga para peserta akan dibimbing bagaimana menggunakan Microsoft Project 2007/2010 dalam perencanaan, dan pengontrolan proyek. Training ini  berdasarkan pada standar *PMBOK terbaru yaitu PMBOK edisi 5 th. 2013.

Jadi secara umum, Pelatihan ini  menggunakan pendekatan praktis dalam  perencanaan dan pengontrolan proyek/proyek IT.

Target Peserta

  • Secara umum pelatihan ini dirancang untuk Project Managers, Architects & Groups Leaders, Functional & Line Managers, IT.
  • Selain itu juga dapat dihadiri oleh Developers and Staff, Advanced Project Managers, Senior Managers, Business Analysts, PMO/Project Specialist, Technical, Non-Technical, Pharma/Biomed, dan lain-lain.

Tujuan Pelatihan

Setelah mengikuti pelatihan ini, maka Para Peserta diharapkan mendapatkan pengetahuan dan skill bagaimana melakukan perencanaan, pengontrolan proyek/proyek IT secara praktis,dan  khususnya mampu:

  • Menguasai do’s & don’ts yang  telah dipraktekkan oleh manajer proyek/manajer proyek IT yang sukses
  • Menjaga kontrol proyek Anda dengan teknik penjadwalan terbukti efektif
  • Memberikan sistem mutu tepat pada waktunya
  • Rencanakan langkah dalam  menghadapi hal-hal yang  tak terduga
  • Menyusun Anggaran yang  lebih  efektif
  • Mendapatkan dukungan organisasi
  • Mampu  menggunakan perangkat lunak manajemen proyek (Microsoft Project 2007/2010) untuk perencanaan dan pengontrolan proyek secara  praktis.

Benefit Pelatihan

  • Para peserta akan mendapatkan softtcopy PM TOOLKIT terdiri dari Bahan Belajar, Referensi, Proses dan Template, Contoh Studi Kasus  IT PROJECT  dan PROJECT LAINNYA
  • Trainer berpengalaman dan pemegang sertifikasi International bidang Project Management akan membimbing peserta dalam Sesi Studi Kasus menggunakan Pendekatan Hands-on
  • Para Peserta akan mendapatkan keterampilan menggunakan Microsoft Project 2007/2010 dalam waktu singkat di bawah bimbingan trainer yang berpengalaman  dan trampil.

Agenda dan Materi

  • Hari ke-1
    –Overview of Essential Project Management Tools
    –Essential Project Management Tools
    –Practical Project Planning
    –Using Microsoft Project 2007/2010 (Part 1)
    –Latihan dan studi kasus
  • Hari ke-2
    –Using Microsoft Project 2007/2010 (Part 2)
    –Develop  Project Schedule
    –Allocate Project Budget
    –Essentials for  Leading  Project Teams
    –Latihan dan studi kasus
  • Hari ke-3
    –Practical Project Controlling
    –Project Closure
    –Latihan dan Studi kasus
    –Presentasi studi kasus dan tanya jawab

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <Practical Planning and Controlling Projects/IT Project>.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

IT Audit Comprehensive

The IT Audit course is designed to provide practical view in conducting IT audit and assurance in one organization.

The course is designed to support professional staffs to expand their understanding of information technology (IT) audit. The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, and management of IT audit.

The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, students will gain a working understanding of the process of developing audit work programs.

Participants will be expected to gain a working understanding of how to identify reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process..

Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Objectives

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization
  • Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits
  • Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards

Target Audience

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs

Course Contents & Description

  1. Introduction to Information Technology Audit
    •The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit.
    •The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report.
  2. Conducting Information Technology Audit
    •The class session shall describe on practical methodology in conducting the effective and efficient IT audit, expand upon the need for appropriate controls and assurance processes for business and IT environment. The participants will be geared toward gaining a working understanding of the content and value of the management guidelines and assurance methodology.
    •Discussion will focus on the importance of measurement in achieving organizational and IT objectives. The session will also focus on the business and IT environments subject to operational and control assessments (audit).
  3. Management Controls
    •The session will provide an overview of the control model such as: internal control, control analysis methodology from the Closing the Loop Framework, identification of business processes, considerations regarding materiality, and the assessment of IT value by which all these tools will be used assessing the appropriateness of IT processes.
    •The class session will also expand upon the audit process by providing methodology for developing audit strategies and developing audit work programs with reference to best practices (CobiT, BS 17799,etc).
    •In this regard, the participant will cover organizational structure, accountability, role of the IT steering committee and oversight functions, and method for ensuring that appropriate policies and procedures are in place.
  4. Application Controls
    •The class session will expand upon the requirements for application system audits, use of audit software, and IT service delivery.
    •From an audit perspective, the objective is to provide assurance that application systems have integrity, and that IT service management practices will ensure the delivery of the level of services required to meet the business organization’s objectives.
    •Topic areas will include such as: types of application systems, application control assessment, evaluating IT service agreements, problem management, help desk functions, and network standards.
  5. Evidence Collection and Evaluation
    •The class session will expand the methods in conducting the evidence collection, evaluation and reporting which cover the observed processes, documentary audit and analysis of evidence using appropriate tools such as: sampling, CAAT, and etc.
    •The participants will be driven towards having the capability in conducting effective evidence collection and evaluation which are essential
  6. Managing the IT Audit Function
    •The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
    •Discussion will be on best approaches for involvement in professional organizations, obtaining certifications, and professional development. The class will also focus on the key issues surrounding audit and assurance engagements, such as establishing auditee /auditor protocols, oral and written communication requirements, engagement administration, and follow-up requirements.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Audit Comprehensive> atau klik di sini!
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

IT Financial Management

Information Technology (IT) has become the central nervous system of virtually every operation in an organization.

The rapidly changing business and technology environment confronts decision makers with the important challenge to justify the required investments, maintain the cost level at an acceptable level whilst not putting long-term IT capacity and agility at stake. IT Financial Management is the discipline of ensuring that the IT infrastructure is obtained at the most effective price (which does not necessarily mean cheapest) and calculating the cost of providing IT services so that an organization can understand the costs of its IT services. These costs may then be recovered from the customer of the service. Costs are divided into costing units: Equipment; Software; Organization (staff, overtime; accommodation; transfer costs (costs of 3rd party service providers) These costs are divided into Direct and Indirect costs and may be Capital or Ongoing. The practice of IT financial management enables the Service Manager to identify the amount being spent on security countermeasures in the provision of the IT services. The amount being spent on these countermeasures needs to be balanced with the risks and the potential losses that the service could incur as identified during a business impact assessment and risk assessment. Management of these costs will ultimately reflect on the cost of providing the IT services and potentially what is charged in the recovery of these costs.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Course Objectives & Benefits

Overall, the basic goal behind IT Financial Management is to offer a truly transparent analysis of what an organization is spending on IT resources. In many cases, this analysis of efficiency is used to create intelligent, metric-based cost-cutting strategies. For an internal IT organization, the goal is described as:

  • To provide cost-effective stewardship of the IT assets and resources used in providing IT services
  • For an outsourced IT organization or an IT organization which is run as if it were a separate entity (ie, with full charging) the goal may be described as:
  • To be able to account fully for the spend on IT services and to be able to attribute these costs to the services delivered to the organization’s customers and to assist management by providing detailed and costed business cases for proposed changes to IT services
  • The course enables delegates to understand how an IT Financial Management framework, based on best practice guidelines, can be adopted and adapted within their own organizations.
  • To provide proven practical guidance on how to successfully introduce an integrated IT Financial Management framework based on the best practice service life-cycle approach.
  • To prepare delegates for the ITIL Foundation Certificate in IT Financial Management examination

Who Should Attend?

  • Managers involved and related in the IT operations
  • IT staff and executives involved in risk management and business process improvement
  • Information technology professionals involved in projects that are concerned, in part, with the automation of business processes
  • IT Managers and Practitioners involved in the strategy, design, and implementation and ongoing delivery of business-used IT services and who require an insight into IT Financial best practice

What You will Learn?

  1. IT Financial Management Overview
  2. Mission Statement Provide budgeting, accounting and charging services to control, manage and recover IT cost and spend.
  3. Process Goal Achieve the process mission by implementing:
    • ITIL-aligned IT Financial Management policies, processes and procedures
    • Dedicated Financial Management Process Owner
    • Effective IT budget and planning practices
    • Accurate and efficient IT charging and cost recovery for IT services
    • Accurate accounting of IT expenditures and revenues
    • Reporting on the state and health of IT costs and revenues on a regular basis
    • Periodic audits of IT financial information to ensure accuracy
  4. The Critical Success Factors (CSFs) are:
    • Effective stewardship over IT finances
  5. Key Activities The key activities for this process are:
    • Perform budgeting for IT services and activities.
    • Perform IT accounting activities.
    • Perform IT charging and billing activities.
    • Provide management information about Financial Management quality and operations.
  6. Key Performance Indicators (KPIs) Examples of Key Process Performance Indicators (KPIs) are shown in the list below. Each one is mapped to a Critical Success Factor (CSF).
  7. Effective Stewardship Over IT Finances
    • Overall cost of delivery per customer
    • Percentage of IT costs not accounted for
    • Dollar value of budget variances/adjustments
    • Percentage of IT financial objectives met
    • IT Service Headcount

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Financial Management> atau klik di sini!.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

The Comprehensive IT Security Audit

Training IT Project

The IT Security Audit course is designed to provide practical view  in conducting IT audit and assurance in one organization. The course is designed to support professional staffs   to expand their understanding of information technology (IT) audit.
The course presents a more in-depth view on the fundamentals of IT auditing by highlighting  on topics such as:  IT  audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit.
The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures.
Participants  will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process.
IT Security  Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Each class session will include discussion on an IT audit  management, security, control or audit issues that participants   should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Course Objectives & Benefits

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding on  the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
  • The participants shall obtain the capability on  how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants  get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobIT standard.
  • Participants shall obtain the capability in conducting IT audit and implement  techniques in performing assurance, attestation, and audit engagements
  • Capability to build  and maintain an IT audit function within the organization with maximum effectiveness and value
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
  • Participants shall obtain  an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
  • Capability to use  best prractices  and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC

Who Should Attend

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs.

What You Will Learn

  1. Audit Overview
    The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit. The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the  IT audit or assurance report.
  2. Building an Effective Internal IT Audit Function
    The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
  3. The Audit Process
    Perform IT audit in accordance with IT audit standards, guidelines and best practices to assist the organizations in ensuring that its information technology and business system are protected and controlled.
  4. Auditing Techniques
    Describing all techniques which are available to implemented for IT infrastructure auditing
  5. Auditing Entity-Level Controls
    Describing all entities control level which encompassing embedded controls in the areas such as:

    • Operating system control in UNIX-, Linux-, and Windows-based operating systems
    • Controls in  network routers, switches, firewalls, WLANs, and mobile devices
    • Entity-level controls, data centers, and disaster recovery plans
    • Controls in  Web servers, platforms, and applications
    • Database  critical controls
  6. Auditing Data Centers and Disaster Recovery
    Describe how to conduct data center as disaster recovery site with all supporting infrastructures
  7. Auditing Switches, Routers, and Firewalls
    Describe how to perform auditing on network infrastructure and network appliances
  8. Auditing Windows Operating Systems
    Describe how to conduct auditing on operating system using effective and control-piercing methodology within the Windows operating system environment
  9. Auditing Unix and Linux Operating Systems
    Describe how to conduct auditing on operating system using reliant and control-focus  methodology within the Unix  operating system environment
  10. Auditing Web Servers
    Describe how to perform auditing on Web Servers  infrastructure and net     DMZ devices
  11. Auditing Databases
    Describe how to perform auditing on organization’s Database  and all operating support elements
  12. Auditing Applications
    Describe how to perform auditing on organization’s Enterprise Applications and the supporting modules
  13. Auditing WLAN and Mobile Devices
    Describe how to perform auditing on Wide Area Network infrastructure and interface able mobile devices.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <The Comprehensive IT Security Audit>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

Accounting Information System (AIS)

Memahami Accounting Information System (AIS) beserta Keuntungan dan Implikasi Penerapannya bagi Perusahaan.

Accounting Information System (AIS) adalah sistem pengumpulan, penyimpanan dan pemrosesan data keuangan dan akuntansi yang digunakan oleh para pembuat keputusan. Sistem informasi akuntansi umumnya adalah metode berbasis komputer untuk melacak aktivitas akuntansi dalam hubungannya dengan sumber daya teknologi informasi. Laporan Statistik yang dihasilkan dapat digunakan secara internal oleh manajemen atau eksternal pihak berkepentingan lainnya termasuk investor, kreditor dan aparat pajak. Perangkat fisik yang sebenarnya dan sistem yang memungkinkan AIS untuk mengoperasikan dan melakukan fungsi-fungsi.

Siapa yang harus hadir

  • Lokakarya ini baik diikuti oleh akuntan, auditor keuangan, auditor system informasi, konsultan keuangan, dan staf professional perusahaan yang berminat.

Tujuan & Manfaat Pelatihan

  • Mengenalkan kepada peserta mengenai pengertian dan manfaat penerapan Accounting Information System (AIS) bagi perusahaan.
  • Memberikan pemahaman secara mendasar mengenai teknik penerapan Accounting Information System (AIS) ini melalui sessi workshop yang akan melibatkan setiap pesertanya.

Materi Pelatihan

  • Pendahuluan
    • Apa itu AIS
    • Akuntansi di zaman informasi
  • Keuntungan dan implikasi dari AIS
  • Karakteristik AIS
  • Bagaimana untuk secara efektif menerapkan AIS
    • Penganggaran
    • Sistem studi
    • Pelaksanaan dan menindaklanjuti Audit
  • Dokumentasi AIS
    • Mengapa dokumentasi ini penting
    • Dokumen dan sistem Flowchart
    • Proses peta dan Data Flow Diagram
  • End User Computing
    • Pentingnya End User Computing
    • Kebijakan untuk End User Computing dan dokumentasi

Related Topics:

Informasi & Registrasi:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <Accounting Information System (AIS)> atau klik di sini!.
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889, SMS/Mobile:08815608163 ; Fax: 021-5748888 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

IT Problem Analysis and Management

The purpose of IT Problem Analysis and Management course is to deliver competency and assures that participants have gained knowledge of the terminology, structure and basic concepts of IT Problem Analysis and Management and Incident Management which encompasses processes and has comprehended the processes of Situation Appraisal, Problem Analysis, Decision Analysis and Potential Problem Analysis that support Problem Management and Incident Management.

The course is also intended to enable the participants to start and apply the basic concepts of the processes listed above in Problem Management and Analysis as related to the application and operation of Information Technology system.

The syllabus will guide the design, development and use of training materials as well as training aimed at raising individual’s understanding of, and competence in, Situation Appraisal, Problem Analysis, Decision Analysis and Potential Problem Analysis within the framework of Problem analysis and Incident Management.

The syllabus has been designed with ease of reference, extensibility and ease of maintenance in mind.

*This course will deliver in Indonesian and/or English by Our Master Trainer/Instructor: Dr. Ir. Fauzi Hasan, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS.

Objectives & Benefits

Participants  can expect to gain knowledge and understanding the following issues in IT upon successful and completion of the training such as:

  • Handling complex issues (Situation Appraisal).
  • Analyzing problems (Problem Analysis).
  • Making decisions (Decision Analysis).
  • Avoiding future problems (Potential Problem Analysis
  • Understand how these skills assist in the delivery of Incident and Problem Management.
  • Improve ability to manage customer problems and escalations.
  • Provide managers and engineers with tools to handle issues rationally
  • Maximize questioning effectiveness.
  • Give techniques for handling complex customer issues.
  • Understand how IT Problem Management process fits within participants’ jobs.
  • Make progress toward resolution of several current customer issues

Target Audience

  • Individuals who require a basic understanding of the rational processes and how they may be used to enhance the quality of Problem Analysis and Management within an organization.
  • IT professionals that are working within an organization that has adopted and adapted Problem Management framework and who need to be informed about and thereafter contribute to an ongoing service improvement program. This may include but is not limited to, IT professionals, business managers and business process owners
  • Managers involved and related in the IT operations
  • IT staff and executives involved in risk management and  business process improvement
  • Information technology professionals involved in projects that are concerned, in part, with the automation of business processes.

Course Contents and Descriptions

  1. Introduction
    The purpose of this segment is to highlight and emphasize on:

    • Familiarize candidates to the objectives of the course.
    • Explain the concept of the ‘thinking process’.
    • Provide an opportunity for ‘candidates’ to discover their own issue resolution styles.
    • Overview the steps of KT’s rational process of Situation Appraisal, Problem Analysis, Decision Analysis and Potential Problem Analysis.
    • Explain the role that these four processes play in Problem Management and Incident Management.
  2. Situation Appraisal
    The purpose of this segment  is to:

    • Explain the definition of an incident and a concern.
    • Explain how to “List Threats and Opportunities”.
    • Explain how to “Separate and Clarify”.
    • Explain how to “Set Priority”.
    • Explain how to “Plan Next Steps”.
    • Explain the role of questioning in Situation Appraisal
  3. Problem Analysis
    This  segment shall describe on the  IT Problem Analysis and focusing on the followings:

    • Explain the definition of a problem.
    • Explain how to “Describe Problem”.
    • Explain how to “Identify Possible Causes”.
    • Explain how to “Evaluate Possible Causes”.
    • Explain how to “Confirm True Cause”.
    • Explain the role of questioning in Problem Analysis.
  4. Decision Analysis
    The segment shall describe to the participants on the decision analysis process which encompasses:

    • Explain the definition of a decision.
    • Explain how to “Clarify Purpose”.
    • Explain how to “Identify Alternatives”.
    • Explain how to “Evaluate Alternatives”.
    • Explain how to “Make Decision”.
    • Explain the role of questioning in Decision Analysis.
    • Explain how to effectively “Present Recommendations”.
    • Explain how to effectively “Assess Recommendations”.
  5. Potential Problem Analysis
    This segment shall describe to the participants how to analyze potential problems as they are inherent in IT processes, which encompassing:

    • Explain the definition of an action and a plan.
    • Explain how to “Identify Potential Problems”.
    • Explain how to “Identify Likely Causes”.
    • Explain how to “Take Preventive Action”.
    • Explain how to “Plan Contingent Action and Set Triggers”.
    • Explain the role of questioning in Potential Problem Analysis.
  6. Questioning and Listening Skills
    The purpose of this segment  is to describe on soft skill as required and covering  :

    • Explain the role of questioning in  rational processes.
    • Explain the characteristics of effective questions.
    • Explain the techniques of “Open” and “Closed” questioning and their purposes.
    • Explain the two techniques of “Questioning to the Void” and their purposes.
    • Explain the difference between “Process” and “Content” questions.
    • Explain the concept of “Handling Answers
  7. Problem Analysis Techniques
    This segment emphasizes on the techniques to be implemented in problem analysis with the purpose as the followings:

    • Build on basic Problem Analysis concepts to understand advanced Problem Analysis concepts.
    • Explain how to use Problem Analysis concepts for “Start-Up Problems”.
    • Explain the “Stable”, the “Multiple” and the “Fluctuating” types of Start-Up Problems.
    • Explain how to use Problem Analysis concepts for “Intermittent Problems”.
    • Explain how to “Think Beyond the Fix”.
    • Explain the purpose and use of Dead Time Studied
  8. Implementation Techniques
    The purpose of this segment is to describe on significant issues such as:

    • Explain the Performance System model and how it is used to help install change initiatives
    • Demonstrate two methods of analyzing an existing Incident and Problem Management implementation to assess future usage potential of Situation Appraisal and Problem Analysis
    • Link model to the implementation of framework processes
    • Identify the value of an implementation as related to framework
  9. Risk Management Maturity and Performance Management
    This segment shall describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept. This segment shall also describe performance management as related process maturity.
  10. IT Risk Management
    This segment shall describe on the Information Technology risk management which is part of the organization IT governance encompassing such as: the identification, assessment, and prioritization of IT operation risks, control and control objectives, and  followed by coordinated and economical application of IT resources to minimize, monitor, and control the probability and/or impact of unfortunate events.
  11. Cases Study

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Problem Analysis & Management>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

 

IT Cost Management




The  Information Technology Cost Management course is suited to IT people  placed in the role as IT cost manager who have been performing the role for some time but have never received any formal training.

The course is also suitable as an introduction for anyone thinking about IT cost  analysis role or for other cost management management professionals with focus on IT investment and operation, and wanting to gain a more in-depth understanding of the role and responsibilities in the area of cost management.

This ‘Fundamentals’ course is aimed at learning real-world IT cost  analysis and IT budget development and implementation skills that can be used in the workplace especially in an organization with high IT investment.

Course delegates or course participants ;should be able to return to their working environments and work as effective Cost Management  team members immediately adding value and building effective relationships with business and IT stakeholders.
The course uses case studies to analyze approaches to managerial cost investment and operation (capex and opex) The course also covers the application of decision and control models, planning and control in IT cost management, while also concern on  decision control models, and cost planning.

*This course will deliver in Indonesian and/or English by Our Master Trainer/Instructor: Dr. Ir. Fauzi Hasan, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG).

Objectives & Benefits

By the end of the   IT Cost Management the  participants will be able to:

  • To have thorough  understanding on the IT cost management including all the parameters and issues related
  • To have complete perspective on IT Investment Management Process
  • Work with business users  (stake holders) to define  different types of IT cost investment and operation
  • A framework to calculate Total Cost of Ownership (TCO) for  IT enterprise resource  systems
  • To have capability to break-down complex IT cost  scenarios or cost problems into process and data models (cost management related)
  • To Have capability in implementing modern cost management concept as related to IT infrastructure
  • To have capability to reduce and optimize IT cost as related to the investment, operation and maintenance of  IT installation and the infrastructure

Target Audience

This course was originally designed for IT  managers and those who involve in the activitie such as related to IT investment, operation and maintenance. However, the course is also suitable for experienced IT managers and Investment  Analysts as it:

  • Provides a reinforcement session for those IT staff  who have   been doing the job for many years but have never received formal training in IT cost management
  • Provides a ‘standard’ approach to be adopted by teams who might currently be using a mix of different techniques in IT cost management.

Course Contents and Descriptions

  1. Introduction to IT Cost Management
    Covers the role of Information Technology Cost Management and how the role has evolved within the cycle of IT investment, operation and maintenance. Examines the differing roles and responsibilities in cost management through all  phases of investment planning and IT infrastructures operation.
  2. Performance Evaluation
    Outcomes: Understand the relationship between IT Cost  Management control and IT performance evaluation such as:
    –Identify the objectives of  IT cost management control
    –Identify the types of IT Cost control systems
    –Explain the application of control to IT cost centers, IT revenue centers and IT profit centers
    –Understand how the balanced scorecard supports strategic cost management
  3. Strategic Investment For Information Technology
    Outcomes
    –Describe the function of a strategic investment unit
    –Discuss implementation of appropriate transfer prices
    –Calculate return on investment, residual income and economic value added, and use them to evaluate the performance of a business unit
  4. IT Cost Management Information Outcomes
    –Explain how IT cost information is used in different types of investment for infrastructure’
    –Identify the  functions of IT Cost management
    –Understand the use of IT cost information in support of different IT investment strategies
    –Describe the influence of modern management techniques on IT cost management
    –Allocate shared support costs to IT production
    –Allocate shared cost to products that result from a single process
  5. The Flexible Budget and Standard IT Costing
    Outcomes
    –Identify and explain control systems and uses of standard IT costing
    –Distinguish between effectiveness and efficiency in IT Cost Management
    –Construct a master IT investment  budget
    –Develop a flexible IT  investment budget
    –Calculate direct input variances in IT investment budget
  6. Flexible Budget: Analyzing Factory Overhead
    Outcomes
    –Distinguish between the control purposes and the costing purposes of standard costing for IT overhead
    –Calculate, explain and record the overhead variances in IT budget
  7. Operational IT Cost
    Outcomes
    –Explain, calculate and use the operational data on IT costs
  8. Total Cost of Ownership (TCO) for  IT enterprise resource  systems
    Outcomes
    –Distinguish among the components of Total Cost of Ownership (TCO)  as related to costing purposes of standard costing for IT overhead
    –Calculate, explain and record the overhead variances in IT budget
  9. Strategic Investment for IT Infrastructure
    Outcomes
    –Describe the function of a strategic investment in IT Infrastructure
    –Discuss implementation of appropriate investment
    –Calculate return on investment, residual income and economic value added, and use them to evaluate the performance of IT strategic investment
  10. Review: Revisit the key learning points from the course and looks at why IT investment and cost management  can go wrong and how good cost management can prevent it.

Related Topics:

Information & Registration:

  1. Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silakan dilihat di <IT Cost Management> atau klik di sini!
  2. Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  3. Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  4. Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

 

IT Risk Management

This course deals with how IT helps to achieve an appropriate balance between realizing opportunities for gains while minimizing losses. It is an integral part of good management practice and an essential element of good corporate governance. It is an iterative process consisting of steps that, when undertaken in sequence, enable continuous improvement in IT decision-making and facilitate continuous improvement in IT performance.

This course will deliver in Indonesian and/or English by Our Master Trainer: Fauzi Hasan, DR, Ir. MM, MBA, PMP, CISA, CISSP, SSCP, CISM,  CMPP, CGeIT, APICS

Objectives & Benefits

IT risk management course covers how to establish an appropriate infrastructure and culture and apply a logical and systematic method of establishing the context, identifying, analyzing, evaluating, treating, monitoring and communicating IT risks associated with any activity, function or process in a way that will enable organizations to minimize losses and maximize gains. At the completion of this course, the participants should be able to :

  • Conceptualize organizations risk management within IT processes
  • Identify and analyze risks within IT operations and understand the implications to the whole business operation
  • Improve IT operation risk level thru  the application and implementation of IT risk management methodology and best practices
  • Support the attainment of organizational business objectives by providing comprehensive perspective of IT risk management to the executive management of the organization
  • Plan to  implement tool  for identifying, analyzing, eradicating and communicating the risks within the cycle of risk management

Target Audience

  • Managers involved and related in the IT operations
  • IT staff and executives involved in risk management and  business process improvement
  • Information technology professionals involved in projects that are concerned, in part, with the automation of business processes
  • IT professionals especially from companies regulated to implement risk management and IT risk management such as banks and state-owned enterprises.

Course Content & Description

  1. Risk Management Introduction
    The segment defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures
  2. Risk Management Processes
    The participants learn to recognize the following issues in the risk management processes such as:

    • Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence
  3. Risk Indicators
    This  segment shall describe on the need of IT risk management  to operate at multiple levels with diversified risk indicators including:

    • Operation: risks that could compromise the effectiveness of IT systems and supporting infrastructure
    • Project:  risks management needs to focus on the ability to understand and manage project complexity
    • Strategic:  the risk focus shifts to considerations such as how well the IT capability is aligned with the business strategy
  4. Loss Event Database
    The segment shall describe to the participants on intentional and unintentional action that causes data loss, and highlight on organizational responsibility such as:

    • preventing data loss
    • recovery from data loss
    • Cost of data loss
  5. Effective Risk Management
    This segment shall describe to the participants how to establish effective risk management program that covers:

    • Establish purpose of the risk management program
    • Assign the responsibility for the risk management
  6. Risk Management Maturity
    This segment shall describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept.
  7. IT Risk Management
    This segment shall describe on the Information Technology risk management which is part of the organization IT governance encompassing such as: the identification, assessment, and prioritization of IT operation risks, and  followed by coordinated and economical application of IT resources to minimize, monitor, and control the probability and/or impact of unfortunate events.
  8. Cases Study: IT risk management cases

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Risk Management>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

 

IT Asset Management

The IT Asset Management course is  designed specifically for the executives in the organization and for  those who have asset  management responsibilities.
This course teaches the participants the methods in identifying all aspects as related to IT assets management, further and takes appropriate countermeasures to prevent and mitigate failure risks for an organization.

*This course will deliver in Indonesian and/or English, by Our Master Trainer: Dr. Ir. Fauzi Hasan, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG).

It also provides the networking professional with a foundation in IT asset  management, including preparation of management procedures, assessment of risks in the enterprise , development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan in asset management.
This course takes an enterprise-wide approach to developing an IT asset  management plan.
The course is designed to support the executives to expand their understanding of information technology (IT) asset management and provide practical view in conducting asset  management practice.

This course deals with how can the executives achieve an appropriate balance between realizing opportunities for maximizing the results of IT asset management. It is an integral part of good management practice and an essential element of good corporate governance.
Participants will be expected to gain a working understanding of how to identify reference and implement IT asset management and control policies, standards and related asset management.
Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in IT assets management
Each class session will include discussion on IT asset  management practice, control or audit issues that participants   should be familiar with.

Target Audience

  • Business Director
  • Business Manager
  • Operation Director
  • Operation Manager
  • Chief Information Security Officer (CISO)
  • Chief Information Officers (CIO)
  • Chief Technology Officers (CTO)
  • IS/IT Steering Committee
  • Audit Committee
  • IT Senior Manager
  • Information Security Manager
  • Senior Risk Manager
  • Senior Audit Manager
  • IT & Audit Staff
  • IT Security Staff
  • Risk Management Staff

Objectives & Benefits

  • The course has been designed to enhance the skill and insights in the area of IT  asset  management practice, especially in relation to the practice and implementation in their day-to-day operation.
  • The training shall provide the participant  with the following capabilities:
    • Have thorough understanding of  good  IT asset  management practice within the scope  and framework of  Best Practice of Asset management
    • Enhanced knowledge and skill in dealing with the operational issues as related to IT asset management  within day-to-day installation operation and risk management
    • Enhance capability to  implement tool  for identifying, analyzing, eradicating and communicating the risks within the cycle of risk management and IT asset management
    • Support the attainment of organizational business objectives by providing comprehensive perspective of IT asset   management to the executive management of the organization
    • Capability in assuring the level of alignment between IT asset management and  organization business in the drive to achieve organization’s objectives

Course Contents and Descriptions

  • Introduction
    • Terminology
    • IT asset management programmes
    • IT asset management and traditional asset management
  • Management context
    • The need for IT asset management
    • Supply chain management
    • IT asset life cycle
    • Service and support strategy
    • IT strategy
    • IT asset strategy
  • IT asset management services
    • IT asset management services model
    • Inventory management
    • Configuration management
    • Change management
    • Order processing
    • Contract management
  • Financial aspects
    • Property accounting
    • Budget and cost control
    • Potential cost savings
  • Reporting
    • Definition and outline
    • Data sources
    • Data analysis
    • Report production
    • Sample report
  • Organizational structure
    • Impact of ITAM
    • Roles and responsibilities
  • Technology
    • Management approaches
    • Layers of information
    • Asset tags
    • Tool requirements
    • Solutions
  • Implementation plan
    • Due diligence
    • Implementation plan

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Asset Management> atau klik di sini!
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com