AIT’s Professional Education program aims at advancing the skills of professionals on cutting edge technological subjects, as well as leadership and managerial ones.
Our Professional Education Programs cover three broad subject areas including
For more information download the brochure
The rapid proliferation of internet-connected devices (e.g., mobile phones, multi-purpose sensors, actuators, wearables, embedded devices) enables a wide range of pervasive applications and renders the Internet-of-Things paradigm as the next evolutionary step in internet computing, which is already shaping the world’s economy and society. The purpose of this course is to introduce the Internet-of-Things (IoT), along with the main technologies that it encompasses. The presentation of IoT technologies is driven by state-of-the-art IoT architectures and platforms and the components they comprise. These include sensing components, middleware components, data analytics components and business applications. Key technologies that are affiliated with IoT are presented, including Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID), IoT naming & addressing, along with the most prominent IoT standards. Special emphasis is put on the discussion of the convergence of IoT with cloud computing and the emerging BigData paradigm. The course also discusses representative application areas, including smart cities, healthcare, manufacturing and more. Furthermore, the main IoT ecosystems (which are propelled by vendors such as Apple, Microsoft, Amazon, Google, and more) will be discussed.
This course provides an introduction to the science and technologies behind large-scale data analytics, including statistical inference, machine learning, data mining, data visualization and distributed computing techniques, working smoothly together to generate actionable knowledge to the data analyst.
The course introduces the most successful techniques of the above fields, and exposes participants to the most successful commercial as well as open-source tools and solutions for data analytics, in addition to the theoretical underpinnings of each technology.
Android has seen wide acceptance lately. It is the operating system of choice for large smartphone manufacturers and the base upon which a huge number of applications have been developed. This course presents the fundamentals of the Android platform its architecture and capabilities and shows how to develop applications for Android using the Android Studio IDE.
Scripting languages are very popular nowadays. They provide the means for easily building powerful programs as they provide powerful structures and easy to use syntax. As such they are perfect candidates for rapid prototyping. This course provides an introduction to three widely used scripting languages, Python, Perl and Ruby.
This course provides an intermediate to advanced exposure to the Java programming language and presents its latest features and capabilities. The course runs in a lab environment giving the participants a hands on experience of programming in Java. The features and capabilities of the language are exercised with a number of advanced examples.
This course aims to familiarise the attendants with the internals of computer games and provide a starting point for would be game developers. Through the use of open source or freely available tools they will be able to create 2D games at the end of the course and understand all the concepts involved in game making. Since the approach is completely hands–on they can reach an intermediate level and they will have the ability to continue their development either on their own or through more advanced classes on to 3D, VR/AR etc.
The course is split in two parts. In the first part the relevant terms technologies and tools are covered along with computer game internals and theory. In the second part a game is built from scratch and explained in detail along with the strategies followed and the design decisions made.
SPSS (Statistical Package for the Social Sciences) is a widely used program for statistical analysis in social science. It is also used by market researchers, health researchers, survey companies, government, education researchers, marketing organizations, data miners, and others. The original SPSS manual (Nie, Bent & Hull, 1970) has been described as one of “sociology’s most influential books” for allowing ordinary researchers to do their own statistical analysis. In addition to statistical analysis, data management (case selection, file reshaping, creating derived data) and data documentation (metadata dictionary is maintained by the tool) are features of the base software. This course provides an introduction to the capabilities of SPSS through a series of examples and case studies.
Blockchain is a breakthrough technology that has emerged recently and originally put in use in the context of bitcoin. Nevertheless the concept of a distributed ledger that facilitates peer-to-peer transactions has found numerous applications from smart assets, to smart contracts, distributed payments, and so on. This course provides the technical details of blockchain and shows how transactions are recorded and consensus is achieved. It then goes on to discuss a number of applications from different business sectors that make use of this technology.
Cryptocurrencies are new forms of money that have been introduced with bitcoin. They are based on cryptographic technologies and can be used as a means of payment in a peer-to-peer fashion, while they guarantee full anonymity of the transacting parties. This course gives a detailed view of the technologies that underlie cryptocurrencies and the way transactions are secured, along with advanced concepts like smart contracts, currency exchanges, and introductions of new cryptocurrencies.
This course benefits those looking to enhance their knowledge of Modern Telecommunications in general; or to spot specific areas of expertise for further broadening their experience and knowledge base, whilst looking at chosen specialist areas overview. The program gives an overview analysis of the market and technical issues surrounding convergence, bringing together a comprehensive array of topics in an integrated training package.
This course provides an excellent grounding in Modern Telecommunications. Current and evolving services, applications, technologies and networks, within the fixed, mobile and data/internet environments giving a comprehensive overview of the Telecommunications Industry today. Participants gain:
The rapidly changing landscape of modern communications presents major challenges for the future positioning and sustainability of traditional and new entrant players. This program has been designed to enable mid-senior managers, future managers, and specialists in telecommunications and related industries to develop effective telecom business strategies – equipping them to guide their organizations more effectively through a high risk environment.
The course covers the current state of the industry (including trends, forecasts and adoption of new technologies), existing and emerging technologies, and the overall business environment.
Pragmatic advice to the leading global operators and builders of communications infrastructure. These analysts are informed, objective and ready to apply practical ‘real world’ experience to your business challenges and opportunities.
This course provides an excellent grounding in Modern Telecommunications Business Perspective. Current and evolving services, applications, technologies and networks, within the fixed, mobile and data/internet environments giving a comprehensive overview of the Telecommunications Industry today. Participants gain
As copper has already begun showing its limitations – notwithstanding the various DSL technology enhancements – optical access networks have recently attracted a lot of attention. The main competing technologies for supporting the so-called Fiber-to-the-x (FTTx) are currently Active Ethernet and Passive Optical Networks (PONs). Active Ethernet is a direct application of the well-known Ethernet paradigm to the access network and employs an active switch to distribute traffic from a Central Office (CO) to a number of customers using the standard Ethernet framing. PONs are a cost-effective solution based on a tree-like topology where user terminals or even whole buildings (Optical Network Terminations – ONTs) are located at the branches, while at the other end resides the Optical Line Termination (OLT) (located at the CO) which provides connectivity to the rest of the network. Downstream traffic is broadcast from the OLT to all ONTs as the optical signal is split using a passive coupler, while upstream traffic is sent in a time division multiple access (TDMA) fashion regulated by the OLT.
Implementations of Active Ethernet, Gigabit-PON (GPON) and Ethernet-PON (EPON) systems have already taken place in various countries, offering an increase of over one order of magnitude in the bandwidth offered to the end user. For the exact choice of an optical access technology, several criteria must be taken into account, including desired geographical coverage, scalability, deployment / operation and maintenance costs, offered bandwidth and quality of service per user.
This course gives an overview of the optical access network enabling technologies and provides an in depth understanding of their concept of operation, their individual characteristics (pros and cons) and their potential for deployment.
The technology-oriented mini MBA program is designed to give executives a critical understanding of key technology competency areas that are essential for any successful endeavor within the converged information and communication era as well as the latest management trends enabling them thus to make informed and commercially viable strategic decisions.
In this program senior managers and prospective entrepreneurs will master processes to
Value analysis studies are an integral part of every strategic marketing and business plan related with new products and services in the ICT industry. They are commonly used to compare important parameters such as capital and operational expenditures (CapEx, OpEx), life-cycle costs, revenue streams, discounted cash flows, and techno-economic evaluation measures such as the net present value (NPV) and the internal rate of return (IRR).
Such studies offer a measurable output and can be used to support the decision making process related with the business or the market that a company should be in, the potential of certain technology solutions, or, the future of internal R&D projects, etc. In this course the methodologies and tools for technology/product planning and value analysis based on techno-economic evaluation measures will be described and analyzed.
The purpose of this professional seminar is the understanding of the basic concepts and methodologies of financial management that are required to be mastered by non-financial business executives to achieve the objectives and results in their area of expertise. This integrated professional training seminar gives participants the opportunity to:
This training program provides an introduction to the technical and professional skills of the modern financial and commercial management executive as well as an introduction to professional negotiator techniques. It uses the role playing methodology to offer the ability to familiarize executives with methodologies in business negotiations in credit and risk management areas.
The course gives an introduction to the basic concepts and techniques for designing, planning, managing, monitoring and testing large scale projects. A number of case studies are presented and analyzed in the course. Moreover, the course presents the MS Project as a tool to support the tasks of project management and provides the participants with hands on practical experience in a lab setting.
This course presents the fundamental concepts, motivation and techniques for restructuring, the act of reorganizing the legal, ownership, operational, or other structures of a company for the purpose of making it more profitable, or better organized for its present needs. It also discusses and delves into alterative reasons for restructuring for example a change of ownership or ownership structure, demerger, or a response to a crisis or major change in the business such as bankruptcy, repositioning, or buyout. It gives a number of real world examples of restructuring businesses and analyzes them.
BABOK® Guide v3 is the essential standard to help practitioners and their stakeholders deliver business value and create better business outcomes. BABOK® Guide is the most credible and authoritative source of knowledge and practices for business analysis. The new version expands the scope of business analysis, providing essential direction and support for practitioners in areas such as agile, business intelligence, information technology, business architecture and business process management.
The course introduces basic concepts and techniques for risk management, i.e., risk identification, assessment and prioritization. The course places a focus on the banking sector and gives a number of examples of how risks can be managed.
The course introduces basic concepts and techniques for managing organizational change. It shows how processes, people, financial structures, can be prepared to effect a change in the organization. The course gives a number of examples of successful organizational changes.
The course introduces basic time management concepts, i.e., the processes for organizing and planning how much time should be spent in different activities, which have a direct impact on work efficiency and quality. A number of examples are presented along with the theoretical presentation.
The purpose of the course is to build a foundational understanding about IT Service Management and the Information Technology Infrastructure Library.
At the end of this course, participants will be able to:
ITIL® v2 Practitioner is the next level up following the Foundation level and signifies a deep understanding of the ITIL process. Following the Foundation exam the ITIL® v2 Practitioner is obtained after pursuing at least one the three paths “Release and Control,” “Support and Restore,” and “Agree and Define” and passing at least one of the corresponding exams. The Release and Control (IPRC) path focuses on change management, release management, and configuration management. The Support and Restore (IPSR) path focuses on Incident management, service desk processes, and problem management. The Agree and Define (IPAD) path focuses on service level management, and financial management.
The ITIL® Expert level certification is aimed at those who are interested in demonstrating knowledge of the ITIL Scheme in its entirety. The certificate is awarded to candidates who have achieved a range of ITIL certifications and have achieved a well-rounded, superior knowledge and skills base in ITIL Best Practices.
Through this AIPMM certification course participants have the opportunity to pursue continuing education and increase industry involvement and industry-wide recognition to successfully bridge the innovation-execution gap and transform products to profit to:
Through this AIPMM certification course participants have the opportunity to pursue continuing education and increase industry involvement and industry-wide recognition to successfully improve the Market Value of their Product Portfolio to:
PRINCE2 (Projects IN Controlled Environments) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2 is also widely recognized and used in the private sector, both in the UK and internationally. The PRINCE2 method is in the public domain, and offers non-proprietorial best practice guidance on project management.
Key features of PRINCE2 include:
This course prepares you to take the PRINCE2 Certification Exam.
The Project Management Professional (PMP)® credential of the Project Management Institute (PMI)® is probably the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects.
This recognition is seen through increased marketability to employers and higher salary; according to the PMI Project Management Salary Survey–Seventh Edition, certification positively impacts project manager salaries.
This course prepares you to take the examination for either or both of the following certifications:
The CEH accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. Following the motto “To beat a hacker, you need to think like a hacker”, this course immerses participants into the Hacker Mindset so that they are able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
Sustainable procurement – Guidance
ISO 20400:2017 provides guidance to organizations, independent of their activity or size, on integrating sustainability within procurement, as described in ISO 26000. It is intended for stakeholders involved in, or impacted by, procurement decisions and processes.
Information technology — Security techniques — Information security risk management
ISO/IEC 27005:2011 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2011. ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization’s information security.
Specification for security management systems for the supply chain
ISO 28000:2007 specifies the requirements for a security management system, including those aspects critical to security assurance of the supply chain. Security management is linked to many other aspects of business management. Aspects include all activities controlled or influenced by organizations that impact on supply chain security. These other aspects should be considered directly, where and when they have an impact on security management, including transporting these goods along the supply chain.
ISO 28000:2007 is applicable to all sizes of organizations, from small to multinational, in manufacturing, service, storage or transportation at any stage of the production or supply chain.
There are legislative and regulatory codes that address some of the requirements in ISO 28000:2007.
Ships and marine technology – Guidelines for Private Maritime Security Companies (PMSC) providing privately contracted armed security personnel (PCASP) on board ships (and pro forma contract)
ISO 28007-1:2015 gives guidelines containing additional sector-specific recommendations, which companies (organizations) who comply with ISO 28000 can implement to demonstrate that they provide Privately Contracted Armed Security Personnel (PCASP) on board ships.
Asset management – Overview, principles and terminology
ISO 55000:2014 provides an overview of asset management, its principles and terminology, and the expected benefits from adopting asset management. ISO 55000:2014 can be applied to all types of assets and by all types and sizes of organizations.
For more Information and registration please contact Ms. Chrisanthy Efstathiou, email@example.com, T: 210 668 2702
AIT offers the internationally acclaimed Certified Product Manager certification course.
Dates of instruction: December 5 and 6, 2018
Date of certification exam: December 7, 2018
The course will be conducted in English by Hector del Castillo, AIPMM approved instructor.
Details of the course at https://aipmm.com/cpm/
The cost of the course is 1200 euros plus 24% VAT and includes
The course will be offered only if a minimum number of participations is secured.
For more information please contact Ms. Chrisanthi Efstathiou, firstname.lastname@example.org, 210 668 2702