You searched for: ""

  • DCCOR: Implementing and Operating Cisco Data Center Core Technologies

    Price range: RM10,500.00 through RM12,300.00
    5 Days ILT, VILT

    Master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure.

    This course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure.

    You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System™ (Cisco UCS®) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers.

    This course earns you 64 Continuing Education (CE) credits towards Cisco recertification.

  • SISE: Implementing and Configuring Cisco Identity Service Engine v3.0

    Price range: RM10,500.00 through RM11,850.00
    5 Days ILT, VILT

    This hands-on SISE: Implementing and Configuring Cisco Identity Service Engine v3.0 course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP Security and the Cisco Certified Specialist – Security Identity Management Implementation certifications.

    This course also earns you 40 Continuing Education (CE) credits towards Cisco recertification.

  • 5 Days ILT, VILT

    The Implementing Cisco NX-OS Switches and Fabrics in the Data Center training gives you a detailed understanding of the Cisco® Nexus switch platform and teaches you how to install, configure, and manage Cisco Nexus® switch platforms in a scalable, highly available environment.

    Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) mode.

    This training also earns you 40 Continuing Education (CE) credits towards recertification

  • SISE: Implementing and Configuring Cisco Identity Services Engine

    Price range: RM10,500.00 through RM11,850.00
    5 Days ILT, VILT

    The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist – Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification

  • 3 Days VILT

    This 18-hour course is designed for administrators who are responsible for getting data into Splunk Indexers. The course provides the fundamental knowledge of Splunk forwarders and methods to get remote data into Splunk indexers. It covers installation, configuration, management, monitoring, and troubleshooting of Splunk forwarders and Splunk Deployment Server components.

  • 5 Days ILT, VILT

    Boost developer productivity and flexibility with VMware Integrated OpenStack.

    This five-day course provides you with the skills to build a private cloud using VMware® Integrated OpenStack on a proven VMware SDDC. Through a combination of lecture and hands-on labs, this course builds your skills in installing, configuring, and managing VMware Integrated OpenStack. You learn how to offer IaaS and PaaS with advanced networking and security features to end users using VMware Integrated OpenStack.

    Product Alignment

    • VMware Integrated OpenStack 7.0
  • 3 Days ILT, VILT

    Organizations are compelled to find effective and cost-efficient data security solutions.

    Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.

    IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.

    z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:

    • Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
    • New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
    • Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
    • In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
    • In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
    • These exercises reinforce the concepts and technologies being covered in the lectures.
  • 3 Days ILT, VILT

    To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.

  • 3 Days ILT, VILT

    This is the follow on course to AS24G. This course teaches advanced operator skills. OL19G may also interest this student.

    This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC. We will discuss the IBM i Access Family of products in general and Access Client Solutions, specifically. We will discuss the different types of security that you can implement in order to control who has access to your data and what they can do with that data if they are allowed to access. We will discuss security control via system values, user and group profiles, authorization lists, and adopted authority. This course will help you develop additional skills in the areas of work management and how to create a basic CL program. In the area of CL programming, we discuss concepts of programming, then how to create a basic CL program using the traditional application development tools PDM and SEU. Then, you will learn how to use the GUI tools in RDP (RSE and LPEX). You will also learn the steps to create a menu using SDA. You will learn some tips that you can use to help improve your IBM i operations. We will also discuss how you can use Management Central as a tool to manage a single system or a network of TCP/IP connected Power Systems with IBM i.

  • 3 Days ILT, VILT

    This course is designed to provide you with the skills required to install and customize, and use the functions and features provided by z/OSMF.

    IBM z/OS Management Facility (z/OSMF) is a product for z/OS that will simplify, optimize, and modernize the z/OS system programmer experience.

    z/OSMF delivers solutions in a task-oriented, web browser-based user interface with integrated user assistance.

    In this course, we introduce z/OS Management Facility and its architecture; and describe the components that are necessary to run z/OSMF on z/OS.

    In this course, you will also learn the installation and customization of z/OS Management Facility, and will customize several system components to exploit the following z/OSMF functions:

    • z/OSMF Software Management Manager
    • Capacity Provisioning
    • Classic (ISPF) Interface
    • Incident Log
    • Configuration Assistant for the z/OS Communications Server
    • Workload Management
    • System Status, Resource Monitoring
    • Workflow
  • FT-FAC: FortiAuthenticator Administrator Training

    Price range: RM14,500.00 through RM15,400.00
    3 Days ILT, VILT

    In this three-day FT-FAC: FortiAuthenticator Training class, you will learn how to use FortiAuthenticator for secure authentication and identity management. You will learn how to configure and deploy FortiAutheticator, use FortiAuthenticator for certificate management and two-factor authentication, authenticate users using LDAP and RADIUS servers, and explore SAML SSO and how FortiAuthenticator can act as both a SAML identity provider and service provider.

    Finally, you will examine some helpful troubleshooting techniques.

    In interactive labs, you will explore how to authenticate users, with FortiAuthenticator acting as a RADIUS and LDAP server, a certificate authority (CA), and logon event collector that uses—and extends—the Fortinet Single Sign-On (FSSO) framework to transparently authenticate users. You will explore portal services, FortiTokens, and digital certificates.

  • 3 Days ILT, VILT

    In this three-day FT-FML: FortiMail Training class, you will analyze email security challenges that administrators face, and learn where and how to deploy, manage, and troubleshoot FortiMail to protect your network from email-borne threats.

    You will also explore the role of FortiMail as a specialized device, and how its features provide both high-performance and in-depth security for business-critical communications.

Go to Top