Duration: 1 day
Course Description:
In this course, you will learn how to Govern and Protect Sensitive Information in the Age of AI
Accelerate AI Adoption with Next-Gen Security and Governance
Establishing policies and frameworks to ensure AI systems are used responsibly and align with ethical standards, Identifying, assessing, and mitigating risks associated with AI, such as biases and data privacy concerns and ensuring AI systems adhere to relevant laws and regulations, like GDPR and the EU AI Act.”
Course Objectives:
- Understand Microsoft’s Responsible AI framework
- Learn how to implement governance using Microsoft tools (Purview, Azure ML, AI Foundry)
- Align AI systems with regulatory standards (EU AI Act, NIST RMF, ISO 42001)
- Apply risk management and oversight through Microsoft services
Module 1: Introduction to AI Governance & Compliance (9:00 AM – 10:00 AM)
- What is AI Governance?
- Microsoft’s Responsible AI Principles
- AI-related risks (bias, misuse, transparency, safety)
- Key regulations overview:
- EU AI Act
- NIST AI Risk Management Framework
- ISO 42001 / 23894
- Activity: Risk identification scenario (use case walkthrough)
Module 2: Microsoft’s Responsible AI Ecosystem
- Microsoft’s AI governance structure – Responsible AI Council
- Overview of Responsible AI Standard
- AI Red Teaming examples
- Tooling across Azure and Microsoft 365
Module 3: Microsoft Purview & Compliance Manager
- Data classification, lineage, and lifecycle tracking
- Prebuilt regulatory compliance templates (EU AI Act, ISO, NIST, GDPR)
- Using Compliance Manager to evaluate controls
Demo: Create a compliance assessment in Microsoft Purview
Activity: Hands-on compliance checklist for a sample AI use case
Module 4: Azure AI Foundry & Responsible AI Dashboard
- What is Azure AI Foundry?
- Risk assessment
- Bias & fairness testing
- Hallucination detection
- Safety metric rankings
- Integrating governance into the MLOps pipeline
- Demo: Responsible AI Dashboard for model explainability, fairness, and error analysis
Module 5: Regulatory Compliance & Use Case Mapping
- EU AI Act: High-risk system categories, required documentation
- Mapping controls to NIST RMF and ISO 42001
- Use case examples:
- HR automation
- Customer service bots
- Computer vision for security
- Activity: Map a use case to compliance controls using Microsoft templates
Module 6: Governance Playbook
- Drafting an AI Governance & Risk Playbook using Microsoft tools
- Implementing continuous monitoring
- Vendor and partner compliance using Azure Lighthouse
Microsoft Data and AI Essentials — Overview & Course Structure
Duration: 1 Day
Description:
Microsoft Data and AI Essentials is an introductory course or learning path designed to build foundational understanding of data, analytics, and artificial intelligence (AI) services within the Microsoft Azure ecosystem.
This course is ideal for:
• Beginners to Azure Data & AI
• Business users, junior data professionals, or technical decision makers
• Individuals preparing for more advanced Azure certifications
Microsoft Data & AI Essentials
Module 1: Introduction to Azure Data & AI
- Microsoft’s vision for Data & AI
- Data to AI lifecycle: ingest, store, process, analyze, model, act
- Overview of key Azure services:
- Azure Synapse Analytics
- Azure Data Lake Storage
- Azure Machine Learning
- Power BI
- Azure OpenAI
- Demo: Navigating Azure Portal
Module 2: Data Fundamentals on Azure
- Structured vs. unstructured data
- Databases: Azure SQL, Cosmos DB, Azure Data Explorer
- Data pipelines and integration: Azure Data Factory
- Governance & compliance: Microsoft Purview
Activity: Choose the right Azure storage/database solution
Module 3: AI & Machine Learning Essentials
- What is AI? Common AI use cases
- Azure AI services overview:
- Azure Cognitive Services (vision, speech, language, decision)
- Azure Machine Learning
- Azure OpenAI Service
- Demo: Build a no-code text analysis app using Azure Cognitive Services
Module 4: Analytics & Business Intelligence
- Introduction to Power BI
- Integrating Power BI with Azure data sources
- Azure Synapse and real-time analytics
Activity: Create a basic Power BI dashboard with sample data
Module 5: Responsible AI & Governance
- Microsoft’s Responsible AI principles
- Data privacy, ethics, and transparency
- Overview of AI governance tools (Purview, Compliance Manager, Responsible AI dashboard)
Creating Business Value from AI
This course is designed to help organizations strategically adopt AI and drive meaningful outcomes. It’s ideal for business users and decision-makers looking to align AI initiatives with business goals.
This course is designed to be delivered in a half-day.
Important: There are five versions of this course for different industry sectors. The first four modules are identical for each sector, but you should choose the appropriate module 5 file for the specific industry sector of the course delivery:
- AI-3017-ENU-Powerpoint_05a-finance
- AI-3017-ENU-Powerpoint_05b-healthcare
- AI-3017-ENU-Powerpoint_05c-manufacturing
- AI-3017-ENU-Powerpoint_05d-retail
- AI-3017-ENU-Powerpoint_05e-sustainability
In this course, business leaders will find the knowledge and resources to adopt AI in their organizations. It discusses available resources, strategy, responsible practices, and use cases.
Learning objectives
After completing this course, students will be able to:
- Leverage AI tools and resources for their business.
- Create business value from AI.
- Embrace responsible AI principles and practices.
- Scale AI in their organization.
- Define a Microsoft AI strategy to create business value in their industry.
Course Modules
Course Introduction Slides only
Module 1 – Leverage AI tools and resources for your business
Module 2 – Create business value from AI
Module 3 – Embrace responsible AI principles and practices
Module 4 – Scale AI in your organization
Module 5a-finance – Define a Microsoft AI strategy to create business value in finance
Module 5b-healthcare – Define a Microsoft AI strategy to create business value in healthcare
Module 5c – Define a Microsoft AI strategy to create business value in manufacturing
Module 5d-retail – Define a Microsoft AI strategy to create business value in retail
Module 5e-sustainability – Define a Microsoft AI strategy to create
Training Format:
- Combined Training Format (Theory alongside Practice)
- Assessment in the form of Testing
Training Objective:
The objective of the training course is for participants to acquire:
- Information on the specific functionalities of Teams, Planner, OneDrive, SharePoint, Outlook, Loop, and Copilot for Microsoft 365 that will simplify their daily work.
Core Topics (Modules):
- Introduction to Microsoft Teams
- Overview of Teams and Its Applications: Understanding the functionalities and benefits of Microsoft Teams.
- Installation and Configuration: Step-by-step guidance on downloading, installing, and setting up Teams for optimal performance.
- Chat Features and Document Sharing: Exploring chat capabilities and methods for securely sharing documents.
- Creating Groups and Channels: Procedures for establishing groups and associated channels within Teams.
- Functionalities Within Groups: Overview of available features within groups and their associated channels.
- User and Permission Management: Techniques for overseeing user roles and permissions within the group.
- Scheduling and Managing Meetings: Instructions for organizing meetings both within and external to the group.
- File Sharing and Collaborative Work: Best practices for sharing files and collaborating in real time.
- Integration of Third-Party Applications: Utilizing third-party applications for enhanced productivity in both group and individual contexts.
- Introduction to Microsoft Planner
- Overview of Planner and Its Applications: Understanding the utility of Microsoft Planner.
- Project Creation: Steps for initiating a new project effectively.
- Task Assignment and Management: Creating subtasks and assigning them to specific team members.
- Project Status Overview: Insights into the project’s status, including task creation, completion rates, and overdue items.
- Utilizing Planner Within Teams and Individually: Strategies for leveraging Planner in both collaborative and personal project management settings.
- Introduction to OneDrive
- Overview of OneDrive : Understanding the functionalities of OneDrive.
- Document Creation: Procedures for creating various document types (Word, Excel, PowerPoint).
- Secure File and Folder Sharing: Methods for sharing files and folders in accordance with security policies.
- Collaborative Editing: Techniques for simultaneous collaboration on documents by multiple team members.
- Introduction to SharePoint
- Creating Work Site: Steps for establishing SharePoint site.
- Inviting Members to Participate: Procedures for inviting team members to collaborate on the site.
- Generating Lists for Tasks and Ideas: Methods for creating lists to facilitate task management and idea generation.
- Conducting Surveys and Inputting Information: Capabilities for gathering feedback and managing information on the site.
- Uploading Essential Documents: Procedures for uploading important work documents to the site.
- New Features in Outlook
- Overview of New Outlook Features: Updates and enhancements in the new Outlook interface.
- Email Organization and Visualization: Techniques for grouping emails and utilizing visual enhancements.
- Advanced Email Processing Capabilities: Tools for inserting tables, scheduling sends, and managing email lists.
- Importing Contacts from CSV: Efficient methods for importing contacts.
- Flagging Emails and To-Do List Integration: Strategies for flagging emails and automatically adding them to your To-Do list.
- Setting Email Reminders: How to configure reminders for important emails.
- Pinning Emails for Prioritization: Techniques for prioritizing critical emails.
- Color Categorization: Using color categories to easily identify and categorize related issues.
- Duplicating Calendar Events: How to replicate meetings with complete details on new dates.
- Sharing Meeting Times with “Book with Me”: Steps for sharing available meeting times.
- Scheduling Meeting Reminders: Techniques for setting reminders for upcoming meetings.
- Automated Follow-Up Emails: Configuring automated follow-up emails after meetings at designated intervals.
- Generating Free Time Automatically: Methods for automatically generating free time for meeting coordination.
- Time Zone Management: How to manage different time zone settings within the calendar.
- Generating Meetings from Emails: Steps for creating meetings directly from email correspondence.
- Scheduling Recurring Meetings: Techniques for establishing recurring meetings.
- Loop
- Creating Loop Work Files: How to develop Loop work files, including task-specific tables or other formats. Sharing full workspaces or individual Loop components with appropriate permissions.
- Copilot for Microsoft 365
- Overview of Copilot for Microsoft 365: Understanding the functionalities of Copilot.
- Utilizing Copilot in Outlook:
- Generating drafts for new emails.
- Creating summaries of email threads.
- Providing quick responses to emails.
- Offering coaching and assistance.
- Utilizing Copilot in Word:
- Generating text based on prompts or existing files.
- Highlighting key points and creating summaries from lengthy documents.
- Leveraging AI functions for information retrieval and integrating relevant text and visuals.
- Utilizing Copilot in PowerPoint:
- Generating presentations with relevant content, visuals, and speaker notes.
- Creating presentations from files stored in OneDrive.
- Utilizing Copilot in Excel:
- Adding columns that contain formulas.
- Performing sorting and filtering operations.
- Conducting data analysis.
- Utilizing Copilot in Microsoft Teams:
- Preparing transcripts of meetings.
- Retrieving questions raised and issues addressed during meetings.
- Introducing effective communication strategies with AI support.
Training Tools
Computer equipment (laptops), a reliable internet connection, and a projector or screen through which we will share the display with participants.
Training Outcomes and Competencies
Upon completion of the course, the training participant will know:
1. What Microsoft 365 services—specifically Teams, Planner, OneDrive, SharePoint, Outlook, Loop, and Copilot for Microsoft 365- represent user functionalities.
Literature and Other Resources
During the course, participants will be provided with:
1. Introduction to Microsoft Teams
- Overview of Teams and Its Applications: Understanding the functionalities and benefits of Microsoft Teams.
- Installation and Configuration: Step-by-step guidance on downloading, installing, and setting up Teams for optimal performance.
- Chat Features and Document Sharing: Exploring chat capabilities and methods for securely sharing documents.
- Creating Groups and Channels: Procedures for establishing groups and associated channels within Teams.
- Functionalities Within Groups: Overview of available features within groups and their associated channels.
- User and Permission Management: Techniques for overseeing user roles and permissions within the group.
- Scheduling and Managing Meetings: Instructions for organizing meetings both within and external to the group.
- File Sharing and Collaborative Work: Best practices for sharing files and collaborating in real time.
- Integration of Third-Party Applications: Utilizing third-party applications for enhanced productivity in both group and individual contexts.
2. Introduction to Microsoft Planner
- Overview of Planner and Its Applications: Understanding the utility of Microsoft Planner.
- Project Creation: Steps for initiating a new project effectively.
- Task Assignment and Management: Creating subtasks and assigning them to specific team members.
- Project Status Overview: Insights into the project’s status, including task creation, completion rates, and overdue items.
- Utilizing Planner Within Teams and Individually: Strategies for leveraging Planner in both collaborative and personal project management settings.
3. Introduction to OneDrive
- Overview of OneDrive : Understanding the functionalities of OneDrive.
- Document Creation: Procedures for creating various document types (Word, Excel, PowerPoint).
- Secure File and Folder Sharing: Methods for sharing files and folders in accordance with security policies.
- Collaborative Editing: Techniques for simultaneous collaboration on documents by multiple team members.
4. Introduction to SharePoint
- Creating Work Site: Steps for establishing SharePoint site.
- Inviting Members to Participate: Procedures for inviting team members to collaborate on the site.
- Generating Lists for Tasks and Ideas: Methods for creating lists to facilitate task management and idea generation.
- Conducting Surveys and Inputting Information: Capabilities for gathering feedback and managing information on the site.
- Uploading Essential Documents: Procedures for uploading important work documents to the site.
5. New Features in Outlook
- Overview of New Outlook Features: Updates and enhancements in the new Outlook interface.
- Email Organization and Visualization: Techniques for grouping emails and utilizing visual enhancements.
- Advanced Email Processing Capabilities: Tools for inserting tables, scheduling sends, and managing email lists.
- Importing Contacts from CSV: Efficient methods for importing contacts.
- Flagging Emails and To-Do List Integration: Strategies for flagging emails and automatically adding them to your To-Do list.
- Setting Email Reminders: How to configure reminders for important emails.
- Pinning Emails for Prioritization: Techniques for prioritizing critical emails.
- Color Categorization: Using color categories to easily identify and categorize related issues.
- Duplicating Calendar Events: How to replicate meetings with complete details on new dates.
- Sharing Meeting Times with “Book with Me”: Steps for sharing available meeting times.
- Scheduling Meeting Reminders: Techniques for setting reminders for upcoming meetings.
- Automated Follow-Up Emails: Configuring automated follow-up emails after meetings at designated intervals.
- Generating Free Time Automatically: Methods for automatically generating free time for meeting coordination.
- Time Zone Management: How to manage different time zone settings within the calendar.
- Generating Meetings from Emails: Steps for creating meetings directly from email correspondence.
- Scheduling Recurring Meetings: Techniques for establishing recurring meetings.
6. Loop
- Creating Loop Work Files: How to develop Loop work files, including task-specific tables or other formats. Sharing full workspaces or individual Loop components with appropriate permissions.
7. Copilot for Microsoft 365
- Overview of Copilot for Microsoft 365: Understanding the functionalities of Copilot.
- Utilizing Copilot in Outlook
- Utilizing Copilot in Word
- Utilizing Copilot in PowerPoint
- Utilizing Copilot in Excel
- Utilizing Copilot in Microsoft Teams
- Introducing effective communication strategies with AI support
Training Course Overview
ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).
Why Should You Attend?
Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.
After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Who can Attend?
- Managers or consultants involved in and/or concerned with the implementation of an information security management system in an organization
- Project managers, consultants, or expert advisers seeking to master the implementation of an information security management system; or individuals responsible to maintain conformity with the ISMS requirements within an organization
- Members of the ISMS team
Learning objectives
By the end of this training course, the participants will be able to:
- Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
- Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an implementer
- Initiate and plan the implementation of an ISMS based on ISO/IEC 27001, by utilizing PECB’s IMS2 Methodology and other best practices
- Support an organization in operating, maintaining, and continually improving an ISMS based on ISO/IEC 27001
- Prepare an organization to undergo a third-party certification audit
Educational approach
- This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Prerequisites
The main requirement for participating in this training course is having a general knowledge of the ISMS concepts and ISO/IEC 27001.
Introduction to ISO/IEC 27001 and initiation of an ISMS implementation
Implementation plan of an ISMS
Implementation of an ISMS
ISMS monitoring, continual improvement, and preparation for the certification audit
ISO/IEC 27001 Lead Auditor
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Why should you attend?
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Who can attend?
- Auditors seeking to perform and lead information security management system (ISMS) audits
- Managers or consultants seeking to master the information security management system audit process
- Individuals responsible to maintain conformity with the ISMS requirements in an organization
- Technical experts seeking to prepare for the information security management system audit
- Expert advisors in information security management
Learning objectives
By the end of this training course, the participants will be able to:
- Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
- Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor
- Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles
- Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
- Manage an ISO/IEC 27001 audit program
Educational approach
- This training is based on both theory and best practices used in ISMS audits
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practice tests are similar to the Certification Exam
Prerequisites
A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of audit principles.
Introduction to the information security management system (ISMS) and ISO/IEC 27001
Audit principles, preparation, and initiation of an audit
In the modern world, one of the significant challenges in business is managing data and processing it effectively. On one hand, there is the challenge of receiving data, and on the other hand, the ability to accurately analyze the received data is crucial. In response to these challenges, the demand for the position of a data analyst is increasing, making it one of the growing and popular career directions of the 21st century.
Power BI is a modern data visualization tool that will allow you to process, visualize and analyze large amounts of data quickly and efficiently.
Who is the training intended for?
The training is intended for those who are interested in data analytics, who often have to produce various types of reports and want to learn modern data processing techniques.
Trainers
The training will be led by Giorgi Jokhadze, the co-founder of Kaizen Institute Georgia and AOTS Georgia, the official representative of TEMOS International in Georgia, who has many years of experience in the field of business analytics.
The course will be held in Georgian, and a Syntax Academy certificate will be issued.
Global trend – digital transformation
BI and the World market
Task #1 (Excel format)
Task Review (#1)
Preparing a test Power BI database
Principles of database operation
Task #2 (Excel format)
Task Review (#2)
DAX – Power BI programming language
Creating the first formulas in DAX
Integrating formulas into Power BI visuals
Task #3 (DAX & Power BI Format)
Task Review (#3)
Programming in DAX and Data Processing (continued)
Task #4 (DAX & Power BI Format)
Task Review (#4)
Programming in DAX and Data Processing (continued)
Task #5 (DAX & Power BI Format)
Task Review (#5)
Talking with Data (The Importance of Visualization)
Reviewing the results of the task (#2)
Summary of the course
Questions and Answers
Satisfaction survey
Certifications
ITIL® is the world’s leading best practice framework for implementing IT Service Management. ITIL 4 introduces IT Service Management through the lens of a Service Value System (SVS), which provides a holistic end-to-end view of how to successfully contribute to business value. This foundational course immerses you in the guiding principles, dimensions, and practices of ITIL® 4.
By completion of this course, you will have a deep understanding of the 7 Guiding Principles, 4 Dimensions of Service Management, 34 ITIL® Practices, and the new Value Service Chain that incorporate the core of ITIL® 4.
ITIL 4 OVERVIEW
- Introduction to ITIL
- Key Concepts of ITIL
THE ITIL FRAMEWORK
- The Four Dimensions of Service Management
- The ITIL Service Value System
THE ITIL GUIDING PRINCIPLES
- Focus on Value
- Start Where You Are
- Progress Iteratively with Feedback
- Collaborate and Promote Visibility
- Think and Work Holistically
- Keep It Simple and Practical
- Optimize and Automate
THE ITIL SERVICE VALUE SYSTEM
- Governance
- The Service Value Chain
- Continual Improvement
KEY ITIL PRACTICES
- Continual Improvement
- Service Level Management
- Change Control
- Incident Management
- Service Request Management
- Service Desk
- Problem Management
OTHER ITIL PRACTICES
- General Management Practices
- Service Management Practices
- Technical Management Practices