Training and Professional Education Services


Professional Education

AIT’s Professional Education program aims at advancing the skills of professionals on cutting edge technological subjects, as well as leadership and managerial ones.

Our Professional Education Programs cover three broad subject areas including

  1. Technological courses: They are designed to advance professionals’ skills on cutting edge Information and Telecommunication technologies
    1. Internet of Things: Technologies and Applications
    2. Big Data and Data Analytics
    3. Android Programming
    4. Script Programming
    5. Java 8 Programming
    6. Game Programming
    7. SPSS Seminar
    8. Blockchain and applications
    9. Cryptocurrencies
    10. Introduction to Modern Telecoms
    11. Telecoms Foundation – Technology and Business
    12. Fiber to the X –FTTX: Next Generation Access Networks
  2. Managerial courses: The are designed to sharpen the skills of executives
    1. Tech MiniMBA: Leading Strategic Innovation
    2. Techno-economic Analysis of Broadband Networks
    3. Finance for Non Finance Managers
    4. Contract Negotiations
    5. Project Management
    6. Business restructuring
    7. Business Analysis Body of Knowledge (BABOK)
    8. Risk management
    9. Change management
    10. Time management
  3. Certification Courses
    1. ITIL v3 Foundation
    2. ITIL v2 Practitioner
    3. ITIL Professional
    4. Certified Product Manager
    5. Certified Product Marketing Manager
    6. PRINCE2
    7. Project Management Professional
    8. Certified Ethical Hacking
    9. ISO 20400
    10. ISO 27005
    11. ISO 28000
    12. ISO 28007
    13. ISO 55000

For more information download the brochure

Internet of Things: Technologies and Applications

The rapid proliferation of internet-connected devices (e.g., mobile phones, multi-purpose sensors, actuators, wearables, embedded devices) enables a wide range of pervasive applications and renders the Internet-of-Things paradigm as the next evolutionary step in internet computing, which is already shaping the world’s economy and society. The purpose of this course is to introduce the Internet-of-Things (IoT), along with the main technologies that it encompasses. The presentation of IoT technologies is driven by state-of-the-art IoT architectures and platforms and the components they comprise. These include sensing components, middleware components, data analytics components and business applications. Key technologies that are affiliated with IoT are presented, including Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID), IoT naming & addressing, along with the most prominent IoT standards. Special emphasis is put on the discussion of the convergence of IoT with cloud computing and the emerging BigData paradigm. The course also discusses representative application areas, including smart cities, healthcare, manufacturing and more. Furthermore, the main IoT ecosystems (which are propelled by vendors such as Apple, Microsoft, Amazon, Google, and more) will be discussed.

Big Data and Data Analytics

This course provides an introduction to the science and technologies behind large-scale data analytics, including statistical inference, machine learning, data mining, data visualization and distributed computing techniques, working smoothly together to generate actionable knowledge to the data analyst.

The course introduces the most successful techniques of the above fields, and exposes participants to the most successful commercial as well as open-source tools and solutions for data analytics, in addition to the theoretical underpinnings of each technology.

Android Programming

Android has seen wide acceptance lately. It is the operating system of choice for large smartphone manufacturers and the base upon which a huge number of applications have been developed. This course presents the fundamentals of the Android platform its architecture and capabilities and shows how to develop applications for Android using the Android Studio IDE.

Script Programming

Scripting languages are very popular nowadays. They provide the means for easily building powerful programs as they provide powerful structures and easy to use syntax. As such they are perfect candidates for rapid prototyping. This course provides an introduction to three widely used scripting languages, Python, Perl and Ruby.

Java 8 Programming

This course provides an intermediate to advanced exposure to the Java programming language and presents its latest features and capabilities. The course runs in a lab environment giving the participants a hands on experience of programming in Java. The features and capabilities of the language are exercised with a number of advanced examples.

Game Programming

This course aims to familiarise the attendants with the internals of computer games and provide a starting point for would be game developers. Through the use of open source or freely available tools they will be able to create 2D games at the end of the course and understand all the concepts involved in game making. Since the approach is completely hands–on they can reach an intermediate level and they will have the ability to continue their development either on their own or through more advanced classes on to 3D, VR/AR etc.

The course is split in two parts. In the first part the relevant terms technologies and tools are covered along with computer game internals and theory. In the second part a game is built from scratch and explained in detail along with the strategies followed and the design decisions made.

SPSS Seminar

SPSS (Statistical Package for the Social Sciences) is a widely used program for statistical analysis in social science. It is also used by market researchers, health researchers, survey companies, government, education researchers, marketing organizations, data miners, and others. The original SPSS manual (Nie, Bent & Hull, 1970) has been described as one of “sociology’s most influential books” for allowing ordinary researchers to do their own statistical analysis. In addition to statistical analysis, data management (case selection, file reshaping, creating derived data) and data documentation (metadata dictionary is maintained by the tool) are features of the base software. This course provides an introduction to the capabilities of SPSS through a series of examples and case studies.

Blockchain and applications

Blockchain is a breakthrough technology that has emerged recently and originally put in use in the context of bitcoin. Nevertheless the concept of a distributed ledger that facilitates peer-to-peer transactions has found numerous applications from smart assets, to smart contracts, distributed payments, and so on. This course provides the technical details of blockchain and shows how transactions are recorded and consensus is achieved. It then goes on to discuss a number of applications from different business sectors that make use of this technology.


Cryptocurrencies are new forms of money that have been introduced with bitcoin. They are based on cryptographic technologies and can be used as a means of payment in a peer-to-peer fashion, while they guarantee full anonymity of the transacting parties. This course gives a detailed view of the technologies that underlie cryptocurrencies and the way transactions are secured, along with advanced concepts like smart contracts, currency exchanges, and introductions of new cryptocurrencies.

Introduction to Modern Telecoms

This course benefits those looking to enhance their knowledge of Modern Telecommunications in general; or to spot specific areas of expertise for further broadening their experience and knowledge base, whilst looking at chosen specialist areas overview. The program gives an overview analysis of the market and technical issues surrounding convergence, bringing together a comprehensive array of topics in an integrated training package.

This course provides an excellent grounding in Modern Telecommunications. Current and evolving services, applications, technologies and networks, within the fixed, mobile and data/internet environments giving a comprehensive overview of the Telecommunications Industry today. Participants gain:

  • A cleared view of where the telecom organizations stand
  • An updated picture of the telecommunications market and its future direction, with forecasts, and expert analysis
  • Become fully versed in fixed, mobile and convergent network technology and the reasons behind its adoption, its strengths, weaknesses and limitations.
  • Learn how best practice leadership techniques can be applied within the telecoms industry
  • Are fully equipped to take on new challenges and progress within the organization

Telecoms Foundation – Technology and Business

The rapidly changing landscape of modern communications presents major challenges for the future positioning and sustainability of traditional and new entrant players. This program has been designed to enable mid-senior managers, future managers, and specialists in telecommunications and related industries to develop effective telecom business strategies – equipping them to guide their organizations more effectively through a high risk environment.

The course covers the current state of the industry (including trends, forecasts and adoption of new technologies), existing and emerging technologies, and the overall business environment.

Pragmatic advice to the leading global operators and builders of communications infrastructure. These analysts are informed, objective and ready to apply practical ‘real world’ experience to your business challenges and opportunities.

This course provides an excellent grounding in Modern Telecommunications Business Perspective. Current and evolving services, applications, technologies and networks, within the fixed, mobile and data/internet environments giving a comprehensive overview of the Telecommunications Industry today. Participants gain

  • A clearer view of understanding of your people, your products, and telecom business
  • A solid platform on which to make strategic, technical, financial and management decisions that are reliable, well grounded and commercially viable
  • An updated picture of the telecommunications market and trends to spot threats and opportunities
  • Are fully equipped to take on new challenges and progress within the organization

Fiber to the X –FTTX: Next Generation Access Networks

As copper has already begun showing its limitations – notwithstanding the various DSL technology enhancements – optical access networks have recently attracted a lot of attention. The main competing technologies for supporting the so-called Fiber-to-the-x (FTTx) are currently Active Ethernet and Passive Optical Networks (PONs). Active Ethernet is a direct application of the well-known Ethernet paradigm to the access network and employs an active switch to distribute traffic from a Central Office (CO) to a number of customers using the standard Ethernet framing. PONs are a cost-effective solution based on a tree-like topology where user terminals or even whole buildings (Optical Network Terminations – ONTs) are located at the branches, while at the other end resides the Optical Line Termination (OLT) (located at the CO) which provides connectivity to the rest of the network. Downstream traffic is broadcast from the OLT to all ONTs as the optical signal is split using a passive coupler, while upstream traffic is sent in a time division multiple access (TDMA) fashion regulated by the OLT.

Implementations of Active Ethernet, Gigabit-PON (GPON) and Ethernet-PON (EPON) systems have already taken place in various countries, offering an increase of over one order of magnitude in the bandwidth offered to the end user. For the exact choice of an optical access technology, several criteria must be taken into account, including desired geographical coverage, scalability, deployment / operation and maintenance costs, offered bandwidth and quality of service per user.

This course gives an overview of the optical access network enabling technologies and provides an in depth understanding of their concept of operation, their individual characteristics (pros and cons) and their potential for deployment.

Tech MiniMBA: Leading Strategic Innovation

The technology-oriented mini MBA program is designed to give executives a critical understanding of key technology competency areas that are essential for any successful endeavor within the converged information and communication era as well as the latest management trends enabling them thus to make informed and commercially viable strategic decisions.

In this program senior managers and prospective entrepreneurs will master processes to

  • Establish an ICT strategy and define an ICT governance process.
  • Get fully versed in the converged information and communication technologies and the reasons behind their adoption through best practices.
  • Identify opportunities to add business value through use of ICT.
  • Identify, quantify, and articulate the market opportunity.
  • Qualify, quantify, and effectively communicate the value of ICT to financial executives.
  • Manage performance and provide executive oversight of ICT projects.
  • Build and implement a compelling business plan.
  • Use financial data to make better management decisions.
  • Network with similarly-minded peers across industry.

Techno-economic Analysis of Broadband Networks

Value analysis studies are an integral part of every strategic marketing and business plan related with new products and services in the ICT industry. They are commonly used to compare important parameters such as capital and operational expenditures (CapEx, OpEx), life-cycle costs, revenue streams, discounted cash flows, and techno-economic evaluation measures such as the net present value (NPV) and the internal rate of return (IRR).

Such studies offer a measurable output and can be used to support the decision making process related with the business or the market that a company should be in, the potential of certain technology solutions, or, the future of internal R&D projects, etc. In this course the methodologies and tools for technology/product planning and value analysis based on techno-economic evaluation measures will be described and analyzed.

Finance for Non Finance Managers

The purpose of this professional seminar is the understanding of the basic concepts and methodologies of financial management that are required to be mastered  by non-financial business executives to achieve the objectives and results in their area of ​​expertise. This integrated professional training seminar gives participants the opportunity to:

  • Get in touch and understand in the most simple and practical way a basic framework of professional techniques and methodologies in the field of financial management.
  • Acquire the required professional skills needed to be able to use them directly in their area of ​​responsibility to make them more effective and competitive in an ever-changing and demanding business environment.
  • Make greater use of the practical knowledge they will acquire during the development of their professional career.

Contract Negotiations

This training program provides an introduction to the technical and professional skills of the modern financial and commercial management executive as well as an introduction to professional negotiator techniques. It uses the role playing methodology to offer the ability to familiarize executives with methodologies in business negotiations in credit and risk management areas.

Project Management

The course gives an introduction to the basic concepts and techniques for designing, planning, managing, monitoring and testing large scale projects.  A number of case studies are presented and analyzed in the course. Moreover, the course presents the MS Project as a tool to support the tasks of project management and provides the participants with hands on practical experience in a lab setting.

Business restructuring

This course presents the fundamental concepts, motivation and techniques for restructuring, the act of reorganizing the legal, ownership, operational, or other structures of a company for the purpose of making it more profitable, or better organized for its present needs. It also discusses and delves into alterative reasons for restructuring for example a change of ownership or ownership structure, demerger, or a response to a crisis or major change in the business such as bankruptcy, repositioning, or buyout. It gives a number of real world examples of restructuring businesses and analyzes them.

Business Analysis Body of Knowledge (BABOK)

BABOK® Guide v3 is the essential standard to help practitioners and their stakeholders deliver business value and create better business outcomes. BABOK® Guide is the most credible and authoritative source of knowledge and practices for business analysis. The new version expands the scope of business analysis, providing essential direction and support for practitioners in areas such as agile, business intelligence, information technology, business architecture and business process management.

Risk management

The course introduces basic concepts and techniques for risk management, i.e., risk identification, assessment and prioritization.  The course places a focus on the banking sector and gives a number of examples of how risks can be managed.

Change management

The course introduces basic concepts and techniques for managing organizational change. It shows how processes, people, financial structures, can be prepared to effect a change in the organization. The course gives a number of examples of successful organizational changes.

Time management

The course introduces basic time management concepts, i.e., the processes for organizing and planning how much time should be spent in different activities, which have a direct impact on work efficiency and quality. A number of examples are presented along with the theoretical presentation.

ITIL Foundation

The purpose of the course is to build a foundational understanding about IT Service Management and the Information Technology Infrastructure Library.

At the end of this course, participants will be able to:

  • Identify the principles and concepts of IT Service Management based on ITIL®
  • Identify the best practices of implementing ITIL® in an organization
  • Define the terminology used in ITIL®
  • Identify the concepts and definitions used in the Service Lifecycle.
  • Define Service Strategy concepts
  • Define Service Design concepts
  • Define Service Operations concepts
  • Define Service Transition concepts
  • Define Continual Service Improvement concepts
  • Define the roles, processes, and components within key areas of IT Service Management based on ITIL®
  • Prepare the student to take the ITIL® Foundation Certification exam

ITIL Practitioner

ITIL® v2 Practitioner is the next level up following the Foundation level and signifies a deep understanding of the ITIL process. Following the Foundation exam the ITIL® v2 Practitioner is obtained after pursuing at least one the three paths “Release and Control,” “Support and Restore,” and “Agree and Define” and passing at least one of the corresponding exams. The Release and Control (IPRC) path focuses on change management, release management, and configuration management. The Support and Restore (IPSR) path focuses on Incident management, service desk processes, and problem management. The Agree and Define (IPAD) path focuses on service level management, and financial management.

ITIL Expert

The ITIL® Expert level certification is aimed at those who are interested in demonstrating knowledge of the ITIL Scheme in its entirety. The certificate is awarded to candidates who have achieved a range of ITIL certifications and have achieved a well-rounded, superior knowledge and skills base in ITIL Best Practices.

Certified Product Manager

Through this AIPMM certification course participants have the opportunity to pursue continuing education and increase industry involvement and industry-wide recognition to successfully bridge the innovation-execution gap and transform products to profit to:

  • excel in product development
  • manage the front end of the product lifecycle
  • assess processes rounding out the Product Manager key roles
  • move goods & services to profitability assess licensing opportunities
  • recommend enhancements, mergers & acquisitions or portfolio withdrawals

Certified Product Marketing Manager

Through this AIPMM certification course participants have the opportunity to pursue continuing education and increase industry involvement and industry-wide recognition to successfully improve the Market Value of their Product Portfolio to:

  • optimize commercialization
  • develop strategic marketing functions throughout the product lifecycle
  • create & execute the marketing plan & budget
  • manage deliverables & campaigns
  • drive customer acquisition & revenue
  • assess the market, competition & trends
  • translate insights into compelling business opportunities


PRINCE2 (Projects IN Controlled Environments) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2 is also widely recognized and used in the private sector, both in the UK and internationally. The PRINCE2 method is in the public domain, and offers non-proprietorial best practice guidance on project management.

Key features of PRINCE2 include:

  • Focus on business justification
  • Defined organisation structure for the project management team
  • Product-based planning approach
  • Emphasis on dividing the project into manageable and controllable stages
  • Flexibility that can be applied at a level appropriate to the project.

This course prepares you to take the PRINCE2 Certification Exam.

Project Management Professional

The Project Management Professional (PMP)® credential of the Project Management Institute (PMI)® is probably the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects.

This recognition is seen through increased marketability to employers and higher salary; according to the PMI Project Management Salary Survey–Seventh Edition, certification positively impacts project manager salaries.

This course prepares you to take the examination for either or both of the following certifications:

  • Certified Associate in Project Management (CAPM)®
  • Project Management Professional (PMP)®

Certified Ethical Hacking

The CEH accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. Following the motto “To beat a hacker, you need to think like a hacker”, this course immerses participants into the Hacker Mindset so that they are able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

ISO 20400

Sustainable procurement – Guidance

ISO 20400:2017 provides guidance to organizations, independent of their activity or size, on integrating sustainability within procurement, as described in ISO 26000. It is intended for stakeholders involved in, or impacted by, procurement decisions and processes.

ISO 27005

Information technology — Security techniques — Information security risk management

ISO/IEC 27005:2011 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.

Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2011. ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization’s information security.

ISO 28000

Specification for security management systems for the supply chain

ISO 28000:2007 specifies the requirements for a security management system, including those aspects critical to security assurance of the supply chain. Security management is linked to many other aspects of business management. Aspects include all activities controlled or influenced by organizations that impact on supply chain security. These other aspects should be considered directly, where and when they have an impact on security management, including transporting these goods along the supply chain.

ISO 28000:2007 is applicable to all sizes of organizations, from small to multinational, in manufacturing, service, storage or transportation at any stage of the production or supply chain.

There are legislative and regulatory codes that address some of the requirements in ISO 28000:2007.

ISO 28007

Ships and marine technology – Guidelines for Private Maritime Security Companies (PMSC) providing privately contracted armed security personnel (PCASP) on board ships (and pro forma contract)

ISO 28007-1:2015 gives guidelines containing additional sector-specific recommendations, which companies (organizations) who comply with ISO 28000 can implement to demonstrate that they provide Privately Contracted Armed Security Personnel (PCASP) on board ships.

ISO 55000

Asset management – Overview, principles and terminology

ISO 55000:2014 provides an overview of asset management, its principles and terminology, and the expected benefits from adopting asset management. ISO 55000:2014 can be applied to all types of assets and by all types and sizes of organizations.


Blockchains, Cryptocurrencies and Applications

Stay tuned for new dates!

Tech Mini MBA 2020

Stay tuned for new dates!

Brochure in English Brochure in Greek
MiniMBA 2018: Leading Strategic innovation. An advanced executive training program focusing on

  • Corporate and technology management strategy
  • Innovation management and entrepreneurship
  • Marketing
  • Finances and assessment of business efficiency
  • Leadership and Human Resource Management

For more Information and registration please contact Ms. Chrisanthy Efstathiou,, T: 210 668 2702


Big Unstructured Data

Stay tuned for new dates!


AIPMM Certified Product Manager

Successfully  Completed   

AIT offers the internationally acclaimed Certified Product Manager certification course.

Dates of instruction: December 5 and 6, 2018
Date of certification exam: December 7, 2018

The course will be conducted in English by Hector del Castillo, AIPMM approved instructor.

Details of the course at

The cost of the course is 1200 euros plus 24% VAT and includes

  • 16 hours (net) of instruction (December 5 and 6, 2018)
  • Online Certification exam (December 7, 2018)
  • One year membership to AIPMM

The course will be offered only if a minimum number of participations is secured.

For more information please contact Ms. Chrisanthi Efstathiou,, 210 668 2702



26 Sun 27 Mon 28 Tue 29 Wed 30 Thu 31 Fri 1 Sat
12:00 am
1:00 am
2:00 am
3:00 am
4:00 am
5:00 am
6:00 am
7:00 am
8:00 am
9:00 am
10:00 am
11:00 am
12:00 pm
1:00 pm
2:00 pm
3:00 pm
4:00 pm
5:00 pm
6:00 pm
7:00 pm
8:00 pm
9:00 pm
10:00 pm
11:00 pm
Now: Jan 28 02:04 am

If you are interested in organizing an in-house course feel free to contact us and we will get back to you

  • 3 + 50 =