This Cloud Fundamentals Certificate course introduces you to Cloud Computing, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
This Blockchain Fundamentals Certificate course introduces you to Blockchain, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
-
This AI Fundamentals Certificate course introduces you to Artificial Intelligence (AI), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
AI focuses on building smart machines capable of performing tasks that typically require humans and is drastically increasing in demand as it continues to change the future of virtually every field of technology. With AI Fundamentals, you’ll learn how understanding AI’s risks and potential can fast-track your career.
-
This Data Science Fundamentals Certificate course introduces you to data science, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security. Data science demands skilled professionals who possess the knowledge, skills, and ability to address the evolving threat landscape.
-
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
-
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager.
-
This three-day training course provides the advanced knowledge, skills, and tools to achieve competency in troubleshooting problems in VMware Cloud Foundation™ infrastructure. In this course, you are exposed to tools and methodologies that help you support and troubleshoot your VMware Cloud Foundation environment.
In addition, various scenarios are presented to you in hands-on student labs and simulations in which you learn to identify, analyze, and solve problems systematically in the VMware Cloud Foundation infrastructure.
-
This three-day course is designed to provide VMware vSphere® administrators with the knowledge and hands-on experience in managing VMware Cloud Foundation™ in a hybrid cloud environment and utilizing VMware HCX® for workload migration.
-
This five-day course is a follow-on to the VMware Aria Automation: Install, Configure, Manage course. During this course, you will take a deeper dive into advanced topics using features of VMware Aria Automation such as deploying user systems and interfacing Aria Automation with other platforms. You will also learn how to deploy a cluster environment using VMware Aria Suite Lifecycle and interface with, and use, vSphere with Tanzu Kubernetes.
This course makes heavy use of hands-on labs.
-
During this five-day course, you focus on using VMware Aria Automation OrchestratorTM to extend the functionality of VMware Aria AutomationTM. You learn how to provide XaaS (Anything as a Service) and implement machine lifecycle extensibility using the VMware Aria Automation Event Broker. You also learn how to create VMware Aria Automation Orchestrator workflows and VMware Aria Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in VMware Aria Automation Orchestrator.
The course introduces the VMware Aria Automation Orchestrator HTML 5 interface, with API calls and REST functions, to give you the groundwork to implement a variety of plug-ins and scripts. This course is designed to give you the tools to craft custom solutions in the product
-
This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite LifecycleTM, which manages products such as VMware Aria OperationsTM and VMware Aria OperationsTM for Logs.
This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle.
-
-27%
This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure. This course introduces you to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your VMware NSX environment.
In addition, various types of technical problems are presented to you, which you will identify, analyze, and solve through a systematic process.
-
This five-day course provides comprehensive training on considerations and practices to design a VMware NSX® environment as part of a software-defined data center strategy.
This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer’s business needs.
-
This two-day, hands-on training course provides the knowledge to troubleshoot VMware vSAN™ clusters. In this course, you will learn the best practices to maintain a healthy vSAN environment and mitigate potential issues that might occur with operation of the software. The course provides a logical framework for a systematic troubleshooting approach.
You will learn about the GUI and CLI vSAN monitoring and troubleshooting tools, and you will learn how to troubleshoot common vSAN issues with examples. The labs provided in the course simulate real-world problems to evaluate and enhance your troubleshooting skills.
-
This two-day, hands-on course gives you the skills to deploy and use VMware Aria Operations™ for Networks to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of VMware Aria Operations for Networks and how to use it to simplify daily operation and troubleshooting tasks.
-
During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual machines, vSphere Pods, Supervisor Services, and VMware Tanzu® Kubernetes Grid™ clusters.
You will also gain experience with day 2 operations and life cycle management of a vSphere with Tanzu environmen
-
Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.
The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.
Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.
The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.
-
The Oracle Cloud Infrastructure (OCI) Data Science Professional course is designed to equip Data Scientists, Machine Learning/AI Engineers with the skills and knowledge to effectively utilize OCI’s comprehensive suite of data science tools. Spanning the entire machine learning lifecycle, from establishing a data science workspace to deploying and overseeing machine learning models in real-world environments, this course enables participants to harness OCI’s robust capabilities. They will learn to construct, train, and deploy machine learning models, apply MLOps best practices, and integrate other OCI services to optimize their data science workflows.
By the end of this course, you’ll gain the necessary preparation to achieve the Oracle Cloud Infrastructure Data Science Professional Certification and advance your career in data science.
-
This course helps you learn how to gather and examine evidence. You will learn to solve case problems, diagnose their cause and find methods of resolution. Each of these practices challenges you to diagnose and troubleshoot the issue using the GoldenGate software.
-
The Oracle Cloud Infrastructure DevOps Professional course is designed to equip DevOps Engineers and Developers with the skills and knowledge to effectively utilize (OCI) DevOps service: an end-to-end, continuous integration and continuous delivery (CI/CD) platform to build, test, and deploy their applications.
Through this course, you will gain a deep understanding of DevOps principles and learn how to leverage OCI for efficient automated workflows.
At the end of this training, you will be prepared to take on the Oracle Cloud Infrastructure DevOps Professional Certification.
-
The Oracle Cloud Infrastructure Operations Professional course caters to Administrators and Architects. It offers an in-depth technical introduction to essential OCI capabilities, covering various aspects such as using OCI CLI to create, discover, and terminate resources. Additionally, the course covers topics like creating shell scripts using OCI CLI, utilizing Oracle Resource Manager, provisioning a simple set of OCI resources with Ansible, managing custom images, and understanding Network Security Architecture, including Virtual Cloud Network (VCN), Load Balancer, and DNS.
Throughout the course, participants will engage in practical exercises, including provisioning and managing OCI resources, describing scaling options, handling billing and account management in the OCI Console, and troubleshooting OCI resources. They will learn to optimize performance, ensure security, and efficiently manage operational tasks within OCI
-
This class provides training applicable to Oracle E-Business Suite Releases 12.2. It does not provide training applicable to Oracle E-Business Suite Releases 12.0 and 12.1 (the architecture of Release 12.2 is different compared to Releases 12.0 and 12.1).
This E-Business Suite training teaches the essentials of installing and maintaining an Oracle E-Business Suite R12.2 system. Learn about the changes in Oracle E-Business Suite architecture and explore how to perform online patching using adop (the new patching utility).
-
The Implementing the Cisco NCS 540 Series Routers (NCS540HWE) training teaches you how to deploy Cisco Network Convergence System (NCS) 540 Series routers in a network environment. You will be introduced to the features and functions of the Cisco NCS 540 series platforms, system architecture, services implementation, quality of service (QoS), system security, model-driven telemetry, and programmability. This training also earns you 40 Continuing Education (CE) credits towards recertification.
-
The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.
The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, covering the authentication and authorization of the administrators’ access. This training also earns you 26 Continuing Education (CE) credits toward recertification.
-
The Gold Standard.
CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.
This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The OCI 2024 Architect Professional Course is meticulously designed for seasoned cloud architects and IT professionals aiming to elevate their proficiency in Oracle Cloud Infrastructure (OCI). This advanced course offers an in-depth curriculum encompassing sophisticated OCI architecture, strategic design principles, and best practices for deployment and management.
Learners will engage in hands-on labs, ensuring practical application of theoretical knowledge through real-world scenarios. These labs are pivotal in cementing the skills required to architect and manage robust, scalable, and secure OCI environments.
The course is invaluable to learners, providing comprehensive insights into OCI’s advanced functionalities. By the end of the program, learners will possess the expertise and confidence to design and implement complex OCI solutions, making them highly capable and competitive in the field of cloud infrastructure.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.
This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets.
This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.
-
The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.
-
This learning path will teach you the essentials of Microsoft Intune, advanced threat detection and response with Microsoft Copilot for Security, and how to optimize the integration between Intune and Copilot.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere 8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure.
This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.
-
Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.
The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).
Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.
-
Extend Microsoft Copilot for Microsoft 365 with Copilot Studio
As a developer, you can enhance, enrich, and customize Microsoft Copilot for Microsoft 365 in 2 ways: you can extend Microsoft Copilot or build your own copilot.
On its own, Copilot for Microsoft 365 is a powerful productivity tool for keeping users in the flow of their work across Microsoft 365 applications. It provides users with general skills that enhance personal productivity, such as understanding, summarizing, predicting, recalling, translating, and generating content. It draws from a baseline of your organizational knowledge by indexing content into Microsoft Graph, such as the emails, chats, and documents that users have permission to access.
However, business workflows don’t typically run exclusively on Microsoft 365 applications and experiences. With Copilot extensibility, you can augment Copilot for Microsoft 365 with custom actions and ground your responses with connectors that access data in real-time. You can even extend Copilot’s experiences with declarative and custom copilots that focus on specific user experiences.
IMPORTANT: This course retired 31 Mar 2025 and has been replaced with MS-4022
-
Build connectors and plugins for Microsoft Copilot for Microsoft 365
What will you get from this course:
- provides comprehensive knowledge and hands-on experience in building declarative agents using Visual Studio Code and Teams Toolkit
- introduction to declarative agents, followed by practical labs that guide them through building their first agent
- understanding API plugins, and implementing APIs.
- advanced topics include creating adaptive cards, managing authentication for API plugins, and integrating Microsoft Graph connectors.
By the end of the course, participants have a solid understanding of how to leverage declarative agents to enhance the functionality of Microsoft 365 Copilot.










