You searched for: ""

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure.

    Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage.

    The Cloud Storage with Red Hat Ceph Storage with exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0.

    If you do not intend to bundle with certification exam, consider opting for CL260: Cloud Storage with Red Hat Ceph Storage instead.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0

  • 4 Days ILT, VILT

    Learn how to tune for optimum performance the IBM DB2 10 for Linux, UNIX, and Windows relational database management system and associated applications written for this environment. Learn about DB2 10 for Linux, UNIX, and Windows in a single partition database environment. Explore performance issues affecting the design of the database and applications using the database, the major database performance parameters, and the different tools that assist in performance monitoring and tuning.

    Use tools in class that are common across the Linux, UNIX, and Windows environments. During labs running on DB2 10.1, develop your ability to use monitoring tools. Explain tools and DB2 utilities like RUNSTATS, REORG and db2batch to tune a database running on your local LINUX workstation.

  • Out of stock
    2 Days ILT, VILT

    The course is intended for Data Administrators that need to prepare for using the DB2 BLU Acceleration facilities of DB2 11.1 for Linux, UNIX and Windows systems.

    The concepts and facilities of the BLU Acceleration feature of DB2 11 are presented including loading data into column-organized tables and monitoring the processing of SQL statements that access the tables.

    The DB2 10.5 Fix Pack 4, referred to as Cancun, added support for Shadow tables, a new type of Materialized Query Table, and also Column-organized User Maintained MQT tables. One lecture unit describes these features. A demonstration allows students to implement and experiment with these functions.

    With DB2 11.1, BLU Acceleration can be used in a clustered multiple database partition DB2 environment. This course includes a lecture and demonstration that allows students to create a set of column-organized tables from an existing set of row-organized tables and execute and analyze the performance of BLU Acceleration in a MPP database.

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux.

  • Out of stock
    5 Days ILT, VILT

    This course is designed to teach you how to:

    • Fully use the advanced technical functions and features of DB2 LUW 10.1 and 10.5.
    • Implement DB2 BLU Acceleration, column-organized table support, for a new or existing DB2 database.
    • Describe how the column dictionaries used for DB2 BLU Acceleration are built and utilized to provide extreme compression for column-organized tables.
    • Explain the default workload management used for DB2 BLU Acceleration processing and how you can tailor the WLM objects to efficiently use system resources.
    • Monitor a DB2 database or application that uses column-organized tables using SQL monitor functions.
    • Implement Shadow tables for selected row-organized tables to improve analytics query performance
    • Configure a DB2 database that supports a mixture of application processing, including OLTP and Analytics query processing with Shadow tables
    • Create the Infosphere CDC Datastore, Subscription and Table mappings required to support Shadow tables
    • Implement a User Maintained MQT for a column-organized table
    • Create optimization profiles that allow applications to control specific operations included in the access plans selected by the DB2 Optimizer, like which index is used to access a table or which join method to utilize for joining tables.
    • Perform advanced monitoring using the DB2 administrative views and routines in SQL queries.
    • Configure and manage the implementation of DB2 instance or database level auditing, including using the db2audit command and creation of audit policies which can be assigned to specific tables, users or database roles to perform selective collection of audit records.
    • Explore DB2 management of disk space usage in Database Managed Storage (DMS) table spaces, including the activities of the rebalancer. Use SQL queries and utilities to check the high water mark on table spaces and to monitor the rebalance operation.
    • Move data from one table to another or from one database to another using utilities like db2move.
    • Utilize the ADMIN_MOVE_TABLE procedure to implement table changes with a minimal impact to data availability for applications.
    • Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.
    • Exploit and monitor the REORG utility processing for offline and online table, and index reorganization This includes planning for the disk space and database log space necessary for reorganization.
    • Utilize the REORG Utility to implement row compression for large tables, to reduce disk utilization and improve I/O performance for a DB2 database and understand the automatic creation of compression dictionaries.
    • For Multidimensional Clustering (MDC) tables, determine how to select the dimension columns and table space extent size for efficient implementation of MDC tables. Compare the block indexes used with MDC tables with rows based indexes. Select the MDC rollout option that best matches application needs and achieves the best performance results.
    • Plan and implement range based table partitioning for large DB2 tables. Utilize the ALTER TABLE ATTACH and DETACH options to support roll-in and roll-out operations for range-partitioned tables. Compare the advantages of selecting or combining range partitioning with the hash-based partitioning used in DB2 partitioned databases or the multiple dimensions provided by MDC tables.
  • Out of stock
    2 Days ILT, VILT

    This course is designed to teach you how to: 

    • Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.
    • Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.
    • Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.
    • Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.
    • Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.
    • Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.
    • Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.
    • Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.
    • Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.
    • Implement Db2 Self Tuning Memory management for specific database memory areas.
  • 4 Days ILT, VILT

    This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.

    The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.

    We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.

  • Out of stock
    3 Days ILT, VILT

    This course is designed to prepare DB2 Linux, UNIX and Windows database administrators for planning, installing, managing and monitoring a DB2 pureScale database system. This course covers the features and functions of the DB2 pureScale feature for DB2 10.5, including fixpack levels 4 and 5. This is a lecture-only course.

  • Out of stock
    1 Day ILT, VILT

    This course teaches database administrators how to plan, implement and manage Db2 11.1 databases using the High Availability Disaster Recovery HADR) feature. The lectures cover the processing performed for a Db2 Primary and Standby Db2 database. The Db2 database configuration options that define and control the HADR function are covered. The option to define and operate multiple HADR standby databases will be explained. The course also covers the special considerations for allowing read only access by applications to a HADR Standby database. Students will learn the Db2 commands like TAKEOVER, START HADR and STOP HADR that are used to control HADR primary and standby database activity. The monitoring for HADR status of the primary and standby databases using the db2pd commands will be presented. The course also presents usage of HADR with Db2 pureScale databases.

  • CLACCM: Implementing Cisco Advanced Call Control and Mobility Services

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services. You will learn how to use Cisco® Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution.

    Through a combination of lessons and hands-on experiences, you will also learn about a wealth of other features such as Globalized Call Routing, Global Dial Plan Replication, Cisco Unified Mobility, Cisco Extension Mobility, Device Mobility, Session Initiation Protocol Uniform Resource Identifier (SIP/ URI) call routing, Call Admission Control, Cisco Unified Communications Manager Express and Survivable Remote Site Telephony (SRST) gateway technologies, Cisco Unified Board Element Call deployments, signaling and media protocols, call coverage, and time of day routing.

  • CLCEI: Implementing Cisco Collaboration Cloud and Edge Solutions

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) training provides you with an understanding of Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Topics covered also include details about the Webex solutions, and the benefits of hybrid integrations between Cisco on-premises solutions and Webex Meetings in the cloud. This training also earns you 40 Continuing Education (CE) credits towards recertification.

    This training helps prepare you to take the exam:

    • 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)
  • CLCNF: Implementing Cisco Collaboration Conferencing v1.0

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.

  • CLCOR: Implementing and Operating Cisco Collaboration Core Technologies

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) v1.3 course helps you prepare for advanced-level roles focused on implementation and operation of Cisco collaboration solutions.

    You will gain the knowledge and skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications. This course earns you 64 Continuing Education (CE) credits towards recertification.

    This course will help you:

    • Integrate and troubleshoot Cisco Unified Communications Manager with Lightweight Directory Access Protocol (LDAP) for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Configure and troubleshoot collaboration endpoints
  • 5 Days ILT, VILT

    The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. This Cisco training course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools.

    In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course also earns you 30 Continuing Education (CE) credits towards recertification.

  • CLICA: Implementing Cisco Collaboration Applications

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Applications (CLICA) training teaches you the knowledge and skills to configure and troubleshoot Single Sign-On (SSO), Cisco Unity Connection and Cisco Unity Express, and Application clients. Topics covered include streamlining communication procedures, strengthening compliance measures, and enhancing communication systems and devices. This course also earns you 40 Continuing Education (CE) credits towards recertification.

  • Out of stock
    3 Days ILT, VILT

    Database Control (DBCTL) is an Information Management System (IMS) facility that provides CICS access to an IMS database subsystem. DBCTL provides access for CICS transactions to IMS managed databases. Get a detailed description of the activities required to install, tailor, maintain, and support an IMS DBCTL system. Additionally, learn about aspects of the IMS architecture that apply to database management and attaching to CICS systems and transactions.

  • Out of stock
    2 Days ILT, VILT

    Learn how to write application programs that use Data Language One (DL/I) to process terminal input and output messages in an Information Management System / Data Communications (IMS/DC) system.

  • CMESERIES: Configuring and Monitoring NetApp E-Series and EF-Series Storage Systems

    Price range: RM14,558.00 through RM15,233.00
    4 Days ILT, VILT

    In this course, you learn how to deploy, configure, and monitor NetApp ESeries or EF-Series storage systems. In the deployment phase, you use both the NetApp SANtricity® Storage Management and System Management software to create the configuration, perform administrative tasks, and employ data protection features.

    You also learn how to configure attached servers for I/O operations. During post-deployment, you use SANtricity Unified Manager and System Management software and to collect storage system information for trend analysis, troubleshooting, performance monitoring, and tuning.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v2 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 1 Day ILT, VILT

    COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.

  • 4 Days ILT, VILT

    The just-discharged COBIT 2019 is the best COBIT yet, highlighting numerous positive changes including adjusted standards, new structure factors, refreshed objectives course, altered procedures (from 37 to 40), refreshed execution the board, new point by point administration and the executives goals.

    This COBIT2019DAI: COBIT 2019 Design and Implementation course is planned for progressively experienced clients to COBIT who are keen on further developed utilization of the system, for example structuring administration frameworks and running administration improvement programs. This course requires the COBIT 2019 Foundation Certificate to be effectively accomplished. This two-day course is organized around the COBIT 2019 Design Guide and the COBIT 2019 Implementation Guide

  • 3 Days ILT, VILT

    COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance.  In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.

    COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.

    COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.

  • 5 Days ILT, VILT

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, the CPENT: Certified Penetration Testing Professional teaches you how to perform an effective penetration test across filtered networks.

    The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies. In summary, there is no program of its kind in the world.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • -10%

    CSA-C01: Alibaba Cloud Security Engineer

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Cloud Security Engineer is responsible for securing cloud workloads on Alibaba Cloud by implementing and managing robust security policies, practices, and technologies. This role emphasizes safeguarding applications and data from potential threats and vulnerabilities. The Cloud Security Engineer works closely with other roles to enhance the overall security posture

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 3 Days ILT, VILT

    Become a Cyber First Responder – Monitor, Detect, Prevent and Document Cyber Incidents.

    The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate level operations.

    CSA certification is a training and credentialing program that helps the candidate acquire trending and in demand cybersecurity skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

    As the security landscape is expanding, a SOC team offers high-quality IT-security services to detect potential cyber threats and attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analyst who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.

    The lab-intensive SOC analyst certification program emphasizes the holistic approach to deliver elementary as well as advanced knowledge of how to identity and validate intrusion attempts. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

     

  • 3 Days ILT, VILT

    The Introducing Automation for Cisco Solutions (CSAU) v1.2 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git.

    This course is a requirement prior to enrolling in professional-level automation courses and exams because it provides crucial foundational knowledge essential to success:

  • 2 Days ILT, VILT

    Essential Security Skills for Knowledge Workers.

    The purpose of the Certified Secure Computer User (CSCU)  training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

    This cybersecurity class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    This CSCU goes beyond security awareness and includes:

    • Coverage on the latest Operating Systems
    • Latest Tools and Techniques to maximize security
    • Coverage on securing Gaming Consoles and IoT/Smart Home Devices
    • Techniques to secure Home Offices and Remote Work locations

     

  • 1 Day ILT, VILT

    Cloud Security: Essential Knowledge for the Modern Tech Professionals.

    The CSF1: Cloud Security Fundamental Level 1 course provides a brief introduction to information security risks associated with cloud computing. Students can use this course to review what they already know about cloud security and to pinpoint any gaps in their understanding. Students who are interested in working with cloud technology or who will be part of an organisation transitioning to the cloud will benefit from this course.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    For those of you who want to use Google Cloud, Microsoft Azure, or Amazon Web Services, cloud security is less about setting up a secure cloud and more about using it securely. After all, these companies have already spent a lot of money to make sure their systems are safe. Still, anyone who wants to set up their own cloud needs to think about more things. These include security architecture, protecting physical infrastructure, disaster recovery, maintenance, and a stable connection.

    Cloud security also helps businesses stay in line with international rules like the General Data Protection Regulation (GDPR). It can also prepare businesses for future rules, which are always being thought about. For example, to follow the GDPR, companies must make sure that their cloud was built with the right architecture and that security and privacy were taken into account throughout the design process. If they don’t, regulators may fine them a lot if a security breach happens.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

  • 2 Days ILT, VILT

    Certified Scrum Master(CSM) certification training from Scrum Alliance is a widely recognized Scrum certificate in the world. Designed to help the team coaches learn how to maximize the potential of the product development teams. Our 2-day CSM Training and classroom workshop delivered by an expert and Certified Scrum Trainer (CST) provides tested and practical techniques for data-based iterative product management within Scrum using videos, activities and exercises, that are conducted by expert trainers.

    The Certified Scrum Master certification builds on your foundational scrum knowledge with enhanced implementation skills and helps distinguish yourself in the global marketplace and stand out as a member of the Scrum Alliance community.

  • 2 Days ILT, VILT

    Product owners have a unique and demanding role on agile teams. A product owner decides what the team will create next in order to deliver more value to the customer. In a Certified Scrum Product Owner (CSPO) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.

    You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.

    Participants in a CSPO offering should expect that each Learning Objective identified in this document will be covered. Students should also expect that the Scrum Foundations Learning Objectives are covered either before or during the offering.

Go to Top