SlideShare a Scribd company logo
This is to certify that
Youssef Chelly
Has achieved the
ITIL® Foundation Certificate
in IT Service Management
Effective from
28 October 2016
Certificate number Candidate Number
5832267.20592318 5832267
Abid Ismail, CEO, AXELOS drs. Bernd W.E. Taselaar, CEO, EXIN
This certificate remains the property of the issuing Examination Institute and shall be returned immediately upon request.
AXELOS, the AXELOS logo, the AXELOS swirl logo, ITIL, PRINCE2, PRINCE2 AGILE, MSP, M_o_R, P3M3, P3O, MoP and MoV are registered trade marks of AXELOS
Limited. RESILIA is a trade mark of AXELOS Limited.

More Related Content

What's hot (19)

AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS (1) (1)
AXELOS (1) (1)AXELOS (1) (1)
AXELOS (1) (1)
 
ITIL Certified
ITIL CertifiedITIL Certified
ITIL Certified
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS-Certificate
AXELOS-CertificateAXELOS-Certificate
AXELOS-Certificate
 
ITIL
ITILITIL
ITIL
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
ITI Certification
ITI CertificationITI Certification
ITI Certification
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS
AXELOSAXELOS
AXELOS
 
AXELOS (1)
AXELOS (1)AXELOS (1)
AXELOS (1)
 
ITIL Release, Control and Validation Certificate
ITIL Release, Control and Validation CertificateITIL Release, Control and Validation Certificate
ITIL Release, Control and Validation Certificate
 
VARUN ITIL Cert
VARUN  ITIL CertVARUN  ITIL Cert
VARUN ITIL Cert
 
Gudermuth-ITILF Certification
Gudermuth-ITILF CertificationGudermuth-ITILF Certification
Gudermuth-ITILF Certification
 

More from Youssef Chelly

ISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead AuditorISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead Auditor
Youssef Chelly
 
Attestation RGPD
Attestation RGPDAttestation RGPD
Attestation RGPD
Youssef Chelly
 
ISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead ImplementerISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead Implementer
Youssef Chelly
 
Attestation SecNumacademie
Attestation SecNumacademieAttestation SecNumacademie
Attestation SecNumacademie
Youssef Chelly
 
Expert Auditor in Computer Security
Expert Auditor in Computer SecurityExpert Auditor in Computer Security
Expert Auditor in Computer Security
Youssef Chelly
 
ISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead AuditorISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead Auditor
Youssef Chelly
 
ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)
Youssef Chelly
 

More from Youssef Chelly (7)

ISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead AuditorISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead Auditor
 
Attestation RGPD
Attestation RGPDAttestation RGPD
Attestation RGPD
 
ISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead ImplementerISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead Implementer
 
Attestation SecNumacademie
Attestation SecNumacademieAttestation SecNumacademie
Attestation SecNumacademie
 
Expert Auditor in Computer Security
Expert Auditor in Computer SecurityExpert Auditor in Computer Security
Expert Auditor in Computer Security
 
ISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead AuditorISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead Auditor
 
ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

ITIL® Foundation Certificate in IT Service Management

  • 1. This is to certify that Youssef Chelly Has achieved the ITIL® Foundation Certificate in IT Service Management Effective from 28 October 2016 Certificate number Candidate Number 5832267.20592318 5832267 Abid Ismail, CEO, AXELOS drs. Bernd W.E. Taselaar, CEO, EXIN This certificate remains the property of the issuing Examination Institute and shall be returned immediately upon request. AXELOS, the AXELOS logo, the AXELOS swirl logo, ITIL, PRINCE2, PRINCE2 AGILE, MSP, M_o_R, P3M3, P3O, MoP and MoV are registered trade marks of AXELOS Limited. RESILIA is a trade mark of AXELOS Limited.