You searched for: ""

  • CKS: Certified Kubernetes Security Specialist

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.

    Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.

  • CKAD: Certified Kubernetes Application Developer

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    What are the most in-demand IT skills/jobs in the 2021 and beyond? Google any reputable sites (e.g. forbes.com, cio.com,  techrepublic.com, sdxcentral.com, etc) and you will notice that “Cloud” and “Container” technologies are always in the top 10 most in-demand list.

    Especially now during the Covid19 period, many companies are pivoting to the cloud to streamline their operations and become more agile. Having a CKAD certification will definitely make you more in demand, and enables you to command a higher pay with the potential employers.

    This CKAD Training course is NOT the official training course offered by the LinuxFoundation – but is structured according to the official CKAD Exam Curriculum.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • CKA: Certified Kubernetes Administrator

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 2 Days ILT, VILT

    Security in IT is not only becoming more important but also more sophisticated. In light of this, organizations are dedicating roles to the safeguarding of their data and systems. The EXIN Cyber & IT Security program is geared towards providing candidates with the required knowledge to understand the technical side of information security.

    It covers the theoretical background, detailed information about security infrastructure and goes into the vulnerabilities, risks, and required measures.

     

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    ONTAP SMB Administration is a one day course that extends the CIFS information found in the ONTAP Cluster Administration course. You will review and explore SMB 3.x and the features of ONTAP 9 software that support the SMB protocol. Hands-on labs are completed using ONTAP 9 software.

  • 5 Days ILT, VILT

    The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

    CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 3 Days ILT, VILT

    This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

Go to Top