You searched for: ""

  • -30%

    GCP-DWBQ: Data Warehousing with BigQuery: Storage Design, Query Optimization, and Administration

    Original price was: RM7,200.00.Current price is: RM5,040.00.
    3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • 5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

  • 2 Days ILT, VILT

    This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server.

    Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

  • 3 Days ILT, VILT

    Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of troubleshooting the full line of Palo Alto Networks next-generation firewalls.
    Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall.

    Completing this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.

  • 5 Days ILT, VILT

    The Prisma SD-WAN Design and Operation course introduces you to Palo Alto Networks next-generation Prisma SDWAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.

    This course is intended for people who must configure, maintain, and use wide-area networks that connect data centers, branch offices, and cloud-based assets and infrastructures.

  • 4 Days ILT, VILT

    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in public cloud security and cybersecurity or anyone wanting to learn how to secure remote networks and mobile users.

  • 2 Days ILT, VILT

    This instructor- led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the  Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution .

    Multiple modules focus on how to leverage the collected data. You will create simple search queries in on e module an d XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact- related data, such as IP and Hash Views. Addition ally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external- data collection capabilities, including the use of Cortex XDR API to receive external alerts.

  • 3 Days ILT, VILT

    This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.

    The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. It concludes by discussing basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 2 Days ILT, VILT

    Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in Computer Forensics Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach.

Go to Top