You searched for: ""

  • 4 Days ILT, VILT

    This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).

    In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.

  • 4 Days ILT, VILT

    Helping Java SE developers write Java EE applications.

    Red Hat Application Development I: Programming in Java EE (AD183) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE).

    This course is based on Red Hat® Enterprise Application Platform 7.0.

    In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.

  • 4 Days ILT, VILT

    Python programming for beginners

    Python is a popular programming language used by system administrators, data scientists, and developers to create web applications, custom Red Hat Ansible Automation modules, perform statistical analysis, and train AI/ML models.

    This Red Hat course introduces the Python language and teaches fundamental concepts like control flow, loops, data structures, functions, file I/O, regular expressions, parsing JSON, and debugging.

    This course is based on Python 3 and RHEL 9.0.

  • 4 Days ILT, VILT

    Administering Cisco Unified Communications Manager (ACUCM) is a 4-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.

    The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involve routers, switches, or Cisco IOS software configuration.

    This information technology course includes various lab exercises to apply what was learned in each preceding lesson. Labs begin with a newly installed publisher and subscriber. The only element that is pre-configured is two MGCP gateways, for the headquarters (HQ) and branch (BR), and an intercluster trunk pointing to the neighbor’s pod. Therefore, the student will become familiar with all the various concepts through configuration of the elements in the lab environment.

  • 4 Days VILT

    AC helps you understand Business Technology Strategy (BTS) and Iasa IT Architecture Body of Knowledge (ITABoK).

    Find out how to apply skills from the five foundational pillars of ITABoK as well as distinguish key architecture concepts, scopes, principles, contexts and roles. Adopt industry frameworks and components alongside basic IT Architect skills and define values, as well as create IT’s business capabilities. Find out what it takes to set up an IT Architecture Office (ITAO) and how to run its day-to-day tasks as an IT Architect. Finally, learn how to select and priorities IT projects, assign resources for them, work hand in hand with the Project Management office and present technology values to stakeholders.

  • AB-900T00: Introduction to Microsoft 365 and AI Administration

    Price range: RM1,200.00 through RM1,425.00
    1 Day ILT, VILT

    This course provides a comprehensive introduction to Microsoft 365, Copilot, and AI-powered agents. It introduces learners to the foundational concepts, core services, and administrative controls of Microsoft 365. It then builds upon this foundation by exploring how Copilot and agents can utilize AI to automate tasks, enhance collaboration, and personalize user experiences across the Microsoft 365 suite.

  • AB-731T00: Drive AI transformation in your organization

    Price range: RM1,200.00 through RM1,425.00
    1 Day ILT, VILT

    In this course, learners will explore how to lead AI transformation across their organization. They’ll learn practical strategies to identify high-impact AI opportunities, align investments with business goals, and champion responsible AI practices.

    The course emphasizes real-world applications and strategic decision-making—no technical expertise required—making it ideal for senior leaders who want to confidently drive AI adoption and innovation.

  • AB-730T00: Transform Business Workflows with Generative AI

    Price range: RM1,200.00 through RM1,425.00
    1 Day ILT, VILT

    In this course, learners will discover how to apply generative AI to streamline daily tasks, enhance decision-making, and drive meaningful business outcomes. Learners will understand how to use Microsoft 365 Copilot and its functionalities to improve their productivity. The course focuses on real-world use cases—no coding required—making it ideal for those who want to confidently integrate AI into their work.

  • 4 Days ILT, VILT

    Invest in your future with Nutanix University training: The Industry standard for Hyperconverged Infrastructure.

    This AAPM: Advanced Administration & Performance Management course explains in detail how to use Acropolis services such as Volumes, Files and Objects. The course also explains how to define, manage, and secure workloads and applications using Calm and Flow, including automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.

    This course also covers Data Protection solutions such as Metro Availability with Witness. Advanced management using the new features of Prism Central and the command line are also covered in detail. This includes how to take advantage of machine learning with entity management and resource optimization as well as how to plan for future growth using Scenario Management using Prism Pro.

  • 2 Days ILT, VILT

    Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.

    ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

    As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.

    AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:

    • Evaluate and secure AI-enabled systems across the enterprise
    • Integrate AI into existing security operations and workflows
    • Identify and respond to risks tied to AI technologies
    • Reinforce governance, compliance and responsible innovation
  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

  • 3 Days ILT, VILT

    The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

Go to Top