PMG Academy Soluções em Treinamento LTDA ME
Available qualification programs
The EXIN Information Security Management (based on ISO/IEC 27001) certification program is designed to instill a security-conscious mindset at for employees every level within IT organizations. Each of the exams includes practical skills for handling confidential information. Professionals benefit from learning the essentials of managing in-house security policies from set up to implementation and monitoring. EXIN Information Security qualifications are based on the international standard ISO/IEC 27001.
Please note that as of the 1st of October 2017, a number of changes were implemented in the Information Security program. For more details please click here.
The EXIN MOF program is based on the Microsoft Operations Framework which consists of best practices, principles and models. It is based on MOF 4.0 and ensures candidates know about the importance of availability, reliability and manageability of IT systems. The program is ideal for professionals who work in the field of operations.
EXIN Green IT is designed to teach candidates about green IT solutions in modern organizations. The program looks at the background of sustainable IT, the IT components and measures that can be applied at different levels. It aligns with the principles of Corporate Social Responsibility (CSR) and underpins efficiency initiatives for supply chain and business operations.
EXIN IT Service Management focuses less on the theory and more on the practical side of ITSM. It combines key IT service management elements with the quality principles of the ISO/IEC 20000 standard. The EXIN IT Service Management certification program offers several side-entry and bridge possibilities for those professionals with ITIL® qualifications.
The EXIN Cloud Computing program looks at the way IT-related services are provided via the internet. The creation of this modern, digital utility has led to a wide array of roles needing at least basic Cloud knowledge. Issues of scalability, agility and security are covered within the context of Cloud Computing. The exam materials have been created in collaboration with experts in the Cloud industry.
EXIN Business Information Management with reference to BiSL examines information management from an end-user and business perspective. The program confirms a candidate’s theoretical knowledge and ability to connect business needs with IT services and resources. The program is based on the internationally recognized BiSL standard and is suitable for both IT and non-IT professionals.
EXIN Agile Scrum is the world’s first certification program to combine Agile service management with the Scrum process framework. Scrum is being used by over 70% of Agile teams* which makes this an ideal combination. The advantages of using Agile include increased productivity, improved visibility and being better able to deal with changing priorities. These benefits have led to it being adopted across a wide range of disciplines and organizations and not just in software development.
*The 10th Annual State of Agile report
EXIN Secure Programming offers the knowledge required for programmers to make use of secure programming practices. This is essential in the prevention of cybercrime and data leaks. The certification program ensures that they are able to build secure software through the understanding of security threats and the necessary counter measures. The content of the Secure Programming certification is related to the Framework Secure Software.
Ethical Hacking is increasingly required as a preemptive measure to ensure malicious hackers are not successful in their efforts to access your systems. By simulating such attacks, organizations can analyze or identify weak spots and determine how they need to improve their security measures. EXIN’s Ethical Hacking certification program offers IT professionals the background knowledge around different approaches including web-based hacking, system penetration, and network sniffing. This program lays the groundwork for a thorough understanding of Ethical Hacking and its applications.