You searched for: ""

  • -20%

    EDU-NSXICM: VMware NSX: Install, Configure, Manage [V4.0]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    VMware NSX: Shaping the Future of Network Provisioning and Security.

    This VMware NSX: Install, Configure, Manage, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This VMware course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.

    Product Alignment

    • NSX 4.0.0.1
    • NSX 4.0.1
  • -20%

    EDU-VCDDCM: VMware Cloud Foundation: Deploy, Configure, Manage [V5.2]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, and operating VMware® Cloud Foundation™. You will learn about the architecture of VMware Cloud Foundation, storage and network management, licensing, and certificates.

    In addition to workload domains, availability, life cycle management, and troubleshooting, the course also covers VMware® Aria Suite™ integration and VMware® Private AI Foundation with NVIDIA architecture and components

  • FT-FAD: FortiADC Training

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.

    These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.

  • FT-FVC: FortiVoice

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.

    In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.

  • 2 Days ILT, VILT

    This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.

  • 5 Days ILT, VILT

    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 4 Days ILT, VILT

    The Implementing Cisco Nexus 9000 Switches in NX-OS Mode–Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features.

Go to Top