You searched for: ""

  • SFWIPA: Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense training shows you how to deploy and configure Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support. You will learn how to configure identity-based policies, Secure Sockets Layer (SSL) decryption, remote-access VPN, and site-to-site VPN before moving on to advanced Intrusion Prevention System (IPS) configuration and event management, integrations with other systems, and advanced troubleshooting.

    You will also learn how to automate configuration and operations of Cisco Secure Firewall Threat Defense system using programmability and Application Programming Interfaces (APIs) and how to migrate configuration from Cisco Secure Firewall Adaptive Security Appliances (ASA).

    This training prepares you for the 300-710 Securing Networks with Cisco Firepower (SNCF) exam. If passed, you earn the Cisco Certified Specialist – Network Security Firepower certification and satisfy the concentration exam requirement for the Cisco Certified Networking Professional (CCNP) Security certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.

  • SFWIPF: Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing and advanced options, and conducting Secure Firewall administration troubleshooting.

    This training prepares you for the CCNP Security certification, which requires passing the 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) core exam and one concentration exam such as the 300-710 Securing Networks with Cisco Firepower (SNCF) concentration exam. This training also earns you 40 Continuing Education (CE) credits towards recertification.

  • 1 Day ILT, VILT

    Discover how to drive enablement of Copilot for Microsoft 365 in your organization

    Learn how to drive adoption of Microsoft Copilot for Microsoft 365 using the user enablement framework to create and implement a robust adoption plan.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    Create and manage canvas apps with Power Apps

    Create your own data model and canvas app to support a scenario for a fictional company. You’re provided high-level specifications on the custom tables, columns and canvas app needed to complete this project.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    Create and manage automated processes by using Power Automate

    Get started with Power Automate by create and manage automated processes with Power Automate. Including creating triggers for cloud flows, configuring actions, implementing conditional logic for a cloud flow, testing a cloud flow, creating and configuring approvals by using Power Automate, and sharing cloud flows.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    Create and manage model-driven apps with Power Apps and Dataverse

    In this learning path, you practice building model-driven apps by using Microsoft Power Apps. The skills validated include creating Dataverse tables, modifying forms and views, and configuring a model-driven app. The scenario in this experience represents real-world challenges faced by individuals with business-specific expertise who build model-driven apps.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 3 Days ILT, VILT

    Master the critical first line of cyber defense.

    EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

    This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

    The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.

    The E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH&R, from preparing/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

    With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.

    The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today`

  • 5 Days ILT, VILT

    Java SE 17 Developer

    This course is intended for students with some programming experience and is a comprehensive training for the Java programming language.

  • 4 Days ILT, VILT

    Developing Web Applications with JavaScript, HTML5, and CSS

    Develop front-end web application using JavaScript, HTML5 and CSS. Course starts with the coverage of web application fundamental concepts, JavaScript language syntax, construction user interfaces using HTML5 and CSS, building application logic using JavaScript, and eventually progresses to advanced topics such as using JavaScript to interact with server-side components, such as WebServices and WebSockets.

  • 1 Day ILT, VILT

    Oracle Cloud Infrastructure Foundations

    This course will help you in developing a strong foundation in cloud computing, core concepts and features of Oracle Cloud Infrastructure (OCI).

  • 4 Days ILT, VILT

    Deploy, manage, and troubleshoot containerized applications running as Kubernetes workloads in OpenShift clusters.

    The Red Hat OpenShift Administration I: Operating a Production Cluster (DO180) prepares OpenShift cluster administrators to manage Kubernetes workloads and to collaborate with developers, DevOps engineers, system administrators, and SREs to ensure the availability of application workloads. This Red Hat OpenShift course focuses on managing typical end-user applications that are often accessible from a web or mobile UI and that represent most cloud-native and containerized workloads. Managing applications also includes deploying and updating their dependencies, such as databases, messaging, and authentication systems.

    The skills that you learn in this course apply to all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift, and OpenShift Container Platform.

  • 4 Days ILT, VILT

    Configure and manage OpenShift clusters to maintain security and reliability across multiple applications and development teams.

    Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster with exam (DO281) prepares OpenShift Cluster Administrators to perform daily administration tasks on clusters that host applications provided by internal teams and external vendors, enable self-service for cluster users with different roles, and deploy applications that require special permissions such as such as CI/CD tooling, performance monitoring, and security scanners. This course focuses on configuring multi-tenancy and security features of OpenShift as well as managing OpenShift add-ons based on operators.

    The skills you learn in this course can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift, and OpenShift Container Platform.

    This course is based on Red Hat® OpenShift® 4.14. The Red Hat Certified OpenShift Administrator exam (EX280) is included in this offering.

Go to Top