Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.
-
In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.
-
Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.
This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.
-
Learn about Large Language Models (LLM) and how RAGs combine generative and retrieval-based AI models to extend the already powerful capabilities of LLMs. Get the knowledge you need about how a RAG works and how it’s assembled from component parts.
With our hands-on labs, you will develop a RAG using existing LLM and AI tools and apply RAG techniques to designs to solve problems.
-
The Software Architect has mastered the value, use, development and delivery of intensive systems.
They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.
The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.
-
We offer Leading SAFe Agilist 5.1 Certification Training in Malaysia, a 2-day training program that would get you the theoretical and practical basics of the Scaled Agile Framework (SAFe). The training helps you lead agile transformation within your enterprise using the Scaled Agile Framework and its underlying principles of lean thinking and product development flow.
The Scaled Agile Framework (SAFe) is a knowledge base of proven, integrated principles, practices, and competencies for achieving business agility using Lean, Agile, and DevOps. Created by Dean Leffingwell, this framework effortlessly aligns and synchronizes for large-scale, multi-team Agile projects to develop and deliver enterprise-class technology-based solutions with high quality and faster time-to-market.
-
In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.
-
In this NetApp training course, you will learn the installation process for ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, NVMe, and iSCSI, on Microsoft Windows Server, Linux and VMware ESXi host operating systems. The learning will be reinforced through hands-on guided labs. The course materials include a lab workbook that will serve as an on-the-job reference guide.
-
The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful Application Program Interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco® Identity Services Engine (ISE) to strengthen cybersecurity for your web services, network, and devices. You will learn to work within the following platforms: Cisco Firepower® Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch® Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella®, Cisco Advanced Malware Protection (AMP), Cisco Threat grid, and Cisco Security Management Appliances. This course will teach you when to use the API for each Cisco security solution to drive network efficiency and reduce complexity.
This course prepares you for 300-735 Automating and Programming Cisco Security Solutions (SAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Security Solutions (SAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification.
-
Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.
-
Defending Digital Frontiers: An Intensive Security Awareness workshop.
This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.
Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.
This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.
Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.
An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.
In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.
Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.
Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.
Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.