You searched for: ""

  • 3 Days ILT, VILT

    Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.

    This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    This instructor-led course equips you with the necessary skills to become a certified expert in Trend Vision One’s Attack Surface Risk Management (ASRM) platform. You will understand the ASRM principles and methodologies through a combination of lectures, discussions, and hands-on labs.

  • 5 Days ILT, VILT

    Experience the possibilities of DevOps through proven open culture and practices used by Red Hat to support customer innovation.

    The TL500: Red Hat Training: DevOps Culture and Practice Enablement is a five-day, immersive class offering students an opportunity to experience and implement cultural shifts that are utilized in many successful DevOps adoption journeys. Many agile training offerings focus on a particular framework, delivery mechanism, or technology. Instead, DevOps Culture & Practice combines the best tools from many leading frameworks to blend continuous discovery and continuous delivery with cultural and technical practices into a unique, highly-engaging experience simulating real-world scenarios and applications.

    To achieve the learning objectives, participants should include multiple roles from an organization. Business product owners, architects, developers, and site reliability engineers will gain the experience of working outside of their traditional silos. The daily routine simulates a real-world delivery team, where cross-functional teams learn how collaboration breeds innovation. Armed with shared experiences and best practices, the team can apply what it has learned to help the organization’s culture and mission succeed in the pursuit of new projects and improved processes.

    This course includes a copy of the Red Hat Training: Open Practices for your DevOps Journey course book, which can be used as a resource as students take the learnings from this course and apply them to other real world scenarios.

  • 3 Days ILT, VILT

    Discover open practices for incremental process changes to assist in your DevOps transformation journey.

    The TL250: Open Practices for your DevOps Journey course prepares a student to facilitate and participate in discovery, planning, and delivery of projects where DevOps transformation is desired.

    At the end of this course, you will establish a toolbox of select practices and rethink your approach to cross-functional team projects. Utilizing new skills will enable your organization to effectively discover team purpose, align on project options, and deliver value that achieves target outcomes

  • 2 Days ILT, VILT

    A pragmatic introduction to the Site Reliability Engineering implementation of DevOps

    Red Hat Transformational Learning: Introduction to Pragmatic Site Reliability Engineering (TL112) teaches the vocabulary, concepts and cultural considerations required to prepare to adopt an implementation of DevOps referred to as Site Reliability Engineering (SRE). In this course, the history, definitions, and Red Hat specific take on this practice will be explored as the student prepares to continue the learning path of joining or implementing an SRE team.

  • 5 Days ILT, VILT

    Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment is a 5-day course exploring telemetry data, the flows corpus, and how Cisco Tetration Analytics™ Firewall Agent provides enforcement.

    This course will provide the details and hands-on activities necessary to successfully deploy, manage, and troubleshoot firewall policies in Cisco Tetration.

  • TDT-I: Tableau Desktop Training (Intermediate)

    Price range: RM4,200.00 through RM5,325.00
    2 Days ILT, VILT

    Expand your Tableau proficiency and boost your analytics skills. In this 2-day instructor-led course, you’ll learn how to connect to data, work with calculations, build visualizations, apply analytics such as parameters, and customize dashboards. Enhance your analysis and design more comprehensive dashboards to guide users to efficient data discoveries.

  • TDT-B: Tableau Desktop Training (Basic)

    Price range: RM4,200.00 through RM4,650.00
    2 Days ILT, VILT

    Learn the fundamentals of Tableau Desktop in this introductory course. In this 2-day instructor-led course, you’ll gain a comprehensive introduction to data analysis and visual design to build a range of visualizations—from single worksheets to dashboards—and learn techniques to apply to your own data analysis with Tableau.

  • TDT-ADV: Tableau Desktop Training (Advanced)

    Price range: RM4,200.00 through RM5,325.00
    2 Days ILT, VILT

    Discover how to create innovative charts and dashboards that are compatible with complex data analysis using Tableau Desktop. In this 2-day instructor-led course, you’ll explore scenario-based data visualization challenges to acquire greater proficiency with calculations and to learn advanced chart techniques.

    Apply these advanced skills to your Tableau environment to maximize the capabilities of your organization’s data.

  • TDT-A: Tableau Desktop Training (Accelerated)

    Price range: RM6,300.00 through RM7,425.00
    3 Days ILT, VILT

    Familiarize yourself with Tableau Desktop quickly with curated content from Tableau Desktop I: Fundamentals and Tableau Desktop II: Intermediate. In this fast-paced, 3-day instructor-led course, you’ll learn both foundational and more advanced Tableau skills. Build a range of visualizations, customize your data to enhance your analysis, and implement interactive features to engage your audience.

  • SWSA: Securing the Web with Cisco Web Security Appliance v3.0

    Price range: RM5,000.00 through RM6,350.00
    2 Days ILT, VILT

    Protect your organization from online threats with the Cisco Web Security Appliance.

    Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.

    This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA), which leads to CCNP® Security and the Cisco Certified Specialist – Web Content Security.

    This course also earns you 16 Continuing Education (CE) credits towards recertification.

  • 1 Day ILT, VILT

    The Securing WAN and SD-WAN 1-day workshop provides what is available from Cisco’s portfolio of solution to secure the Branch office and Software Defined WAN. Attendees will have the opportunity to go through preliminary design and implementation guidance for organizations looking to deploy an enterprise network that delivers an uncompromised secured user experience over any WAN connection. There is a plethora of security solutions that Cisco offers to have a secure WAN connectivity like DMVPN, Zone-based Firewall, Stealth watch, Cisco Umbrella, Snort IPS, FirePOWER and Introduction to Software Defined WAN. The course is focused on real world use cases which attendees can easily understand and relate.

  • SVPN: Implementing Secure Solutions with Virtual Private Networks

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.

    This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.

  • 2 Days ILT, VILT

    In this two-days Scaled Agile Framework course, attendees gain an understanding of the role of a Scrum Master in a SAFe enterprise. Unlike traditional Scrum Master training that focuses on the fundamentals of team-level Scrum, the SAFe Scrum Master course in Singapore, explores the role of the Scrum Master in the context of the entire enterprise and prepares attendees to successfully plan and execute the Program Increment (PI), the primary enabler of alignment throughout all levels of a SAFe organization. This includes learning the key components of Agile at scale development, how Scrum is facilitated throughout the enterprise, and how to execute Iteration Planning.

    Attendees discover how to build high performing Agile teams by becoming a servant leader and coach, and how to coach those teams to deliver the maximum business value at scale. The SAFe 5 Scrum Master (SSM) certification signifies that people are prepared to perform the role of Scrum Master in a SAFe environment, increasing their value to teams and organizations that are implementing SAFe.

  • 4 Days ILT

    The Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 course shows you how to deploy Snort® in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You’ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more.

  • 1 Day ILT, VILT

    IBM FlashSystem 9100 system is an all-flash, powerful end-to-end Non-Volatile Memory Express (NVMe) enterprise storage solution that combines the performance of IBM FlashCore technology.
    FlashSystem 9100 is built on the efficiency of IBM Spectrum Virtualize, and delivered on a proven IBM software solution with extremely low latencies for your multi cloud deployments.

    This course introduces the FlashSystem 9100 NVMe Control Enclosure models: IBM 9846/9848 FlashSystem 9110, Model AF7 and IBM 9846/9848 FlashSystem 9150, Model AF8.
    It also focuses on the integration of FlashSystem 9100 SAS-Attached expansion enclosures; scalability performance with NVMe; and the intuitive sight of IBM Storage Insights which helps optimize the storage infrastructure using predictive analytics.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 3 Days ILT, VILT

    The Securing Cisco Networks with Snort Rule Writing Best Practices (SSF Rules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more.

    The hands-on labs give you practice in creating and testing Snort rules.

  • 3 Days ILT, VILT

    The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.

    Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.

  • 4 Days ILT, VILT

    This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:

    Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.

    Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression

    Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.

    Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.

    Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.

    This course lecture offering is at the Storwize V7000 V7.6. level.

  • 5 Days ILT, VILT

    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installations storage management requirements.

    Hands-on lab exercises enable you to perform a step-by-step implementation.

  • 4 Days ILT, VILT

    This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.

  • 4 Days ILT, VILT

    This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.

    To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.

    Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.

    Hands-On Labs

    Eight labs are included to address:

    • IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
    • tuning VSAM and the VSAM buffers
    • alternate indexes
  • 3 Days ILT, VILT

    SRE Practitioners deliver business value to customers through collaboration with DevOps teams and engineering of reliable, secure application environments and software systems.

    The Site Reliability Engineering Practitioner course introduces ways to economically and reliably scale services in an organization. It explores strategies to improve agility, cross-functional collaboration, and transparency of health of services towards building resiliency by design, automation and closed loop remediation.

    The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and effective incident responses using SRE practices.

    The course is developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption. This course positions learners to successfully complete the SRE Practitioner certification exam.

    This course may be eligible for PMI’s PDUs.

Go to Top