You searched for: ""

  • 2 Days ILT, VILT

    Stay Ahead in a Digital World: Understand and Implement IT Governance & Risk Management.

    This hugely popular ITGRM: IT Governance and Risk Management provides a comprehensive review of the knowledge required for understanding IT Governance & Risk Management strategies. Students can use this crash course to review what they already know about IT Governance & Risk Management, pinpoint any gaps in their understanding and provide high level mitigation to address IT Governance & Risk Management gaps.

    The establishment of efficient IT governance is of the utmost importance with regard to the problem-free operation of IT businesses. The organization’s business goals can more easily be accomplished with the assistance of this concept when applied to its information systems. If you do not put into practice IT governance, it will become ineffective and may even be detrimental to the company.

    It is no longer necessary to argue that effective governance of information technology is essential because society and various markets are continuously undergoing change. It is a requirement for every business. In today’s world, where information occupies such an important role in our society, having strong governance in place for our information technology systems is absolutely necessary to ensure their smooth operation. By producing value, it ensures that the money your company invests in information technology will be put to good use.

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

  • 1 Day ILT, VILT

    Cloud Security: Essential Knowledge for the Modern Tech Professionals.

    The CSF1: Cloud Security Fundamental Level 1 course provides a brief introduction to information security risks associated with cloud computing. Students can use this course to review what they already know about cloud security and to pinpoint any gaps in their understanding. Students who are interested in working with cloud technology or who will be part of an organisation transitioning to the cloud will benefit from this course.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    For those of you who want to use Google Cloud, Microsoft Azure, or Amazon Web Services, cloud security is less about setting up a secure cloud and more about using it securely. After all, these companies have already spent a lot of money to make sure their systems are safe. Still, anyone who wants to set up their own cloud needs to think about more things. These include security architecture, protecting physical infrastructure, disaster recovery, maintenance, and a stable connection.

    Cloud security also helps businesses stay in line with international rules like the General Data Protection Regulation (GDPR). It can also prepare businesses for future rules, which are always being thought about. For example, to follow the GDPR, companies must make sure that their cloud was built with the right architecture and that security and privacy were taken into account throughout the design process. If they don’t, regulators may fine them a lot if a security breach happens.

  • -20%

    EDU-VAAICM: VMware Aria Automation: Install, Configure, Manage [V8.17]

    Price range: RM8,800.00 through RM12,125.00
    5 Days ILT, VILT

    VMware Aria Automation: Install, Configure, Manage [V8.17]

    During this five-day official VMware course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments.

    The course covers how VMware Aria Automation Consumption™ can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config™ as a configuration management tool.

  • 5 Days ILT, VILT

    Certified Cybersecurity Technician

    This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

    EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

    To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

  • PCPP1: Certified Professional in Python Programming 1

    Price range: RM4,500.00 through RM5,378.00
    4 Days ILT, VILT

    Program your future with Python Institute.

    PCPP1™ – Certified Professional in Python Programming 1 certification (Exam PCPP-32-101) is a professional credential that measures the candidate’s ability to accomplish coding tasks related to advanced programming in the Python language and related technologies, advanced notions and techniques used in object-oriented programming, the use of selected Python Standard Library modules and packages, designing, building and improving programs and applications utilizing the concepts of GUI and network programming, as well as adopting the coding conventions and best practices for code writing.

    The PCPP1™ certification shows that the individual is familiar with the following concepts: advanced use of classes and modelling real-life problems in the OOP categories (classes, instances, attributes, methods; class and instance data; shallow and deep operations; inheritance and polymorphism; extended function argument syntax and decorators; static and class methods; attribute encapsulation; composition and inheritance; advanced exceptions; copying object data; serialization; metaclasses), best practices and standardization (PEP8, PEP 257, code layout, comments and docstrings, naming conventions, string quotes and whitespaces, programming recommendations), GUI programming (events, widgets, geometry, tools and toolkits, conventions), the elements of network programming (network sockets, client-server communication, JSON and XML files in network communication, HTTP methods, CRUD, building a simple REST client), and file processing and communicating with a program’s environment (processing files: sqlite3, xml, csv, logging, and configparser; communication: os, datetime, io, and time).

  • 1 Day SPVC

    AWS Lambda is an event-driven, serverless compute service that lets you run code without provisioning or managing servers. This course focuses on what you need to start building Lambda functions and serverless applications.

    You learn how AWS Lambda works and how to write and configure Lambda functions. You explore deployment and testing considerations and finally end with a discussion on monitoring and troubleshooting Lambda functions.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • SISE: Implementing and Configuring Cisco Identity Services Engine

    Price range: RM10,500.00 through RM11,850.00
    5 Days ILT, VILT

    The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist – Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification

  • AZ-801T00: Configure Windows Server Hybrid Advanced Services

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Embrace the cloud future: Enhance your career with Azure certifications.

    This Configure Windows Server Hybrid Advanced Services course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server.

    The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor.

    Get Azure certified in 2024 with Microsoft Malaysia’s Learning Partner of the Year 2024 today.

  • 0.5 Days VILT

    This course goes beyond the basic concepts and benefits of containerization and teaches you more about the Amazon Elastic Container Service (ECS). You will learn about the implementation of containers on AWS using ECS and complementary services, such as the Amazon Elastic Container Registry (ECR). You will also learn about common microservices scenarios.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    This course is designed to help solution architects and developers who are looking to modernize their existing message-oriented middleware (MOM) or message broker architectures. You will learn the differences between traditional legacy architectures and modern messaging architectures.

    You will review several paths that customers may follow to modernize their messaging environments, including the benefits and costs of each approach. You will also be introduced to Amazon MQ and participate in several hands-on labs to better understand it. This fully managed message broker service uses industry-standard APIs and protocols (including JMS, NMS, AMQP, STOMP, MQTT, and WebSocket).

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    In this course, you will learn the basics of deploying, managing, and securing .NET applications with Amazon Web Services (AWS). You will learn about AWS services and tools specifically designed for .NET applications. Finally, the course will walk you through a hands-on example of deploying a .NET application to the AWS Cloud.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • IHCF: Integrating Hybrid Clouds Foundation

    Price range: RM3,636.00 through RM4,311.00
    1 Day ILT, VILT

    This Integrating Hybrid Clouds Foundation course describes the features and benefits of the NetApp® Cloud Volumes ONTAP® system. The course helps enable you to explain the architecture and functionality of cloud based ONTAP storage.

    Also, the course introduces basic administration, configuration, and management of the Cloud Volumes ONTAP system that uses NetApp BlueXP™ (formerly NetApp Cloud Manager).

  • 2 Days ILT, VILT

    Learn how to administer NetApp ONTAP9 data-management software integrated security and compliance features. Learn how to create a secure IT environment according to Zero Trust principals such as ‘least privilege access’ and ‘encrypt everything’.

    This ONTAP Security and Compliance Solutions Administration course comprehensively describes the administration, configuration, and management of the integrated data security and compliance features in ONTAP 9, including data retention using SnapLock software and data integrity with autonomous ransomware protection.

  • MS-721T00: Collaboration Communications Systems Engineer

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    The Ultimate Training for Microsoft 365 Collaboration Engineers.

    This MS-721T00: Collaboration Communications Systems Engineer training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer. Participants should understand the fundamentals of networking, telecommunications, audio/visual and meeting room technologies, identity and access management, and Microsoft Teams.

    They will gain hands-on experience configuring and deploying Microsoft Teams Phone, meetings and certified devices including Microsoft Teams Rooms and Surface Hub. The course will also cover how to manage and monitor Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard.

    In addition, the course will cover configuring and deploying Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing.

    This course replaces MS-720T00: Microsoft Teams Voice Engineer which retired on 30 June 2023.

  • -25%

    MS-102T00: Microsoft 365 Administrator

    Price range: RM2,899.00 through RM3,874.00
    5 Days ILT, VILT

    Microsoft 365: Revolutionizing Workflows for the Modern Enterprise.

    This Microsoft 365 Administrator course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.

    In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments.

    The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management.

    In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365’s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization’s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint.

    Once you have this understanding of Microsoft 365’s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels.

  • 2 Days ILT, VILT

    Essential Security Skills for Knowledge Workers.

    The purpose of the Certified Secure Computer User (CSCU)  training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

    This cybersecurity class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    This CSCU goes beyond security awareness and includes:

    • Coverage on the latest Operating Systems
    • Latest Tools and Techniques to maximize security
    • Coverage on securing Gaming Consoles and IoT/Smart Home Devices
    • Techniques to secure Home Offices and Remote Work locations

     

  • 5 Days ILT, VILT

    The gateway to acquire in-demand technical skills in cybersecurity.

    EC-Council Certified Security Specialist (ECSS) is an entry level cybersecurity certification covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

    This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Certify your expertise in managing IT services, making you the preferred choice for roles in IT service management and support.

    This 3-day course compiles for the candidates the understanding of the key concepts, principles, value and challenges of ITIL 4’s five management practices, namely, the ITIL 4 Incident Management Practice, the ITIL 4 Service Desk Practice, the ITIL 4 Service Request Management Practice, the ITIL 4 Monitoring and Event Management Practice, and the ITIL 4 Problem Management Practice. It is intended to provide candidates with best practice guidance at both strategic and operational levels of maximizing value from the Practices.

    The ITIL 4 Monitor, Support, and Fulfil Practices module is structured and aligned around the ITIL framework. The examination is intended to assess whether the candidate can demonstrate sufficient understanding and application of the concepts covered in the ITIL 4 Incident Management Practice, ITIL 4 Service Desk Practice, ITIL 4 Service Request Management Practice, ITIL 4 Monitoring and Event Management Practice, ITIL 4 Problem Management Practice publications.

  • 4 Days ILT, VILT

    Explore the breadth and depth of Prism Central’s centralized management capabilities.

    If you already have experience with administering a Nutanix environment, this Nutanix Enterprise Cloud Administration course will extend, deepen, and broaden your knowledge as you grow in your career as a Nutanix administrator.

    Designed with Prism Central as the focal point, this Nutanix course illustrates the breadth and depth of Nutanix’s centralized management capabilities, and allows you to explore the wide variety of features that are available in this one, single web console.

    ECA is divided into four major sections:

    1. Understanding core Nutanix concepts, such as hyperconverged infrastructure (HCI) and the various Nutanix cloud solution packages. Also, the basic configuration of a cluster and the components that are needed to create and manage VMs – namely, networks and images.
    2. Creating and managing VMs, how to protect VMs and their data, how to apply storage optimization features at the VM level, and how to migrate your workloads to a Nutanix environment.
    3. Learn about alerts, events, log collection, reporting, and how to use various features in Prism Central to identify, analyze, and remediate performance issues.
    4. Learn how to set up a cluster for maintenance activities – such as starting and stopping nodes and clusters – and how to manage and upgrade licenses and installed software with just a few clicks.
  • 2 Days ILT, VILT

    The Nutanix Hybrid Cloud Fundamentals course is for those who are new to Nutanix and want a feature-focused
    introduction to AOS Storage, Nutanix’s scale-out storage technology, and Prism, Nutanix’s multicloud management interface.

    NHCF explores the breadth and depth of Nutanix’s centralized management capabilities. Focused on getting you to explore and work with the Nutanix platform as quickly as possible, this introductory course starts by discussing key Nutanix products and cluster-related concepts.

    Using the Prism Central and Prism Element unified control plane, you will learn how to monitor cluster health and performance, manage software versions, create and manage VMs, and perform basic management tasks on hardware, storage, and networks.

    In addition to the associate-level NHCF course, Nutanix University also offers a professional-level course — Enterprise Cloud Administration (ECA). ECA covers similar topics to NHCF, providing more in-depth content regarding key administrative tasks (deployment, configuration, migration, reporting, and so on).

  • AWS-COA: Cloud Operations on AWS

    Price range: RM5,400.00 through RM6,075.00
    3 Days ILT, VILT

    This AWS-COA: Cloud Operations on AWS course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems.

    The course also covers specific AWS features, tools, and best practices related to these functions.

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 2 Days ILT, VILT

    Elevate Your Career with vSphere 8 Training and Certification

    In this 2-day official VMware Learning course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0. Through use-case scenarios, demonstrations, labs, and simulations, you develop skills to implement and configure vSphere 8.0.

  • -20%

    EDU-VSTS8: VMware vSphere: Troubleshooting [V8]

    Original price was: RM12,000.00.Current price is: RM9,600.00.
    5 Days ILT, VILT

    Troubleshoot VMware vSphere 8 Like a Pro

    Are you looking to enhance your troubleshooting skills for VMware vSphere 8? Look no further than this five-day training course, designed to equip you with the knowledge, skills, and abilities to troubleshoot even the most complex issues.

    Through hands-on training, you’ll learn how to use the command-line interface, VMware vSphere® Client™, log files, and other essential tools to analyze and solve problems. This course will increase your skill level and competence in troubleshooting the VMware vSphere 8 environment.

    From basic troubleshooting techniques to advanced problem resolution strategies, this course covers it all. You’ll learn how to identify and resolve performance issues, networking problems, storage issues, and more.

  • -13%

    IMP-SAFE: Implementing SAFe with SPC

    Original price was: RM15,000.00.Current price is: RM13,000.00.
    4 Days ILT, VILT

    In this four-day course, you’ll practice how to coach programs, launch Agile Release Trains (ARTs), create a DevOps culture to build a Continuous Delivery Pipeline, and empower a Lean portfolio. Leading SAFe®, taught during the first two days, gives you the foundation to teach SAFe to leaders. The next two days focus exclusively on what it takes to successfully implement SAFe in your organization. By becoming a change agent and a Certified SAFe® 5 Program Consultant (SPC), you’ll gain the knowledge and skills to implement a Lean-Agile SAFe transformation—and guide the enterprise toward success in disruptive, fast-moving markets.

  • CKAD: Certified Kubernetes Application Developer

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    What are the most in-demand IT skills/jobs in the 2021 and beyond? Google any reputable sites (e.g. forbes.com, cio.com,  techrepublic.com, sdxcentral.com, etc) and you will notice that “Cloud” and “Container” technologies are always in the top 10 most in-demand list.

    Especially now during the Covid19 period, many companies are pivoting to the cloud to streamline their operations and become more agile. Having a CKAD certification will definitely make you more in demand, and enables you to command a higher pay with the potential employers.

    This CKAD Training course is NOT the official training course offered by the LinuxFoundation – but is structured according to the official CKAD Exam Curriculum.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 3 Days ILT, VILT

    The Implementing and Troubleshooting Networks Using Cisco Thousand Eyes (ENTEIT) v1.0 course is designed to introduce you to and familiarize you with Cisco® Thousand Eyes. Through a combination of lectures and hands-on experience, you will learn to implement and configure the Cisco Thousand Eyes solution. You will also learn to install and configure the Cisco Thousand Eyes agents with different test types. This solution will also enable you to perform root cause analysis when troubleshooting.

  • 1 Day VILT

    This virtual course targeted to SREs and DevOps enables you to monitor and troubleshoot your Kubernetes clusters with Splunk Observability Cloud. Through discussions and hands-on activities, learn to explore and use the Kubernetes Navigator, built-in dashboards, and AutoDetect to monitor the health of your cluster. Create custom dashboards and detectors to monitor and troubleshoot common Kubernetes trouble conditions. This course assumes basic knowledge of Kubernetes and familiarity with navigating Splunk IM.

    This lab-oriented class is designed to help you learn best practices and tips to use Splunk Observability Cloud to monitor and troubleshoot Kubernetes clusters. All hands-on labs are performed in the Observability Cloud UI.

  • 1 Day VILT

    This single subject course targeted to developers enables you to manually instrument your applications to send traces to Splunk APM. Through in-person discussions and hands-on activities, learn to manually instrument applications to create spans and add metadata to spans. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

    This lab-oriented class is designed to help you learn the fundamentals of instrumenting your code to send in traces and trace metadata. All hands-on labs are in Python and Java.

  • 1 Day VILT

    This course is targeted towards Splunk On-call admins responsible for setting up incident response with Splunk On-Call. This 4.5-hour virtual course describes the tasks required to set up on-call teams, including defining schedules, on-call rotations and shifts. Learn to set-up and configure alerts and integrations. Create post incident review reports, track response metrics and customize reports. Use advanced features such as the Rules engine for advanced customization and configure webhook integrations. All concepts are taught using lectures and scenario-based hands-on activities.

  • 1 Day VILT

    This single subject course targeted to DevOps enables you to learn configuration techniques to send traces to Splunk APM. Through inperson discussions and hands-on activities, learn to deploy the Splunk OpenTelemetry Collector on a Linux host. Use the OpenTelemetry Collector to configure processor components to modify trace metadata. Use auto-instrumentation to send in traces without altering your code. Enable AlwaysOn profiling to monitor code performance. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

  • 1 Day VILT

    This 4.5-hour virtual course, targeted towards developers and DevOps, focuses on creating custom metrics to monitor your applications/services with Splunk IM. Learn to instrument applications/services to send in custom metrics that characterize the application of service. Define relevant metadata for your metrics to let you find, filter and aggregate the metrics that you want to chart or alert on. Create charts and custom dashboards to visualize these custom metrics. Create detectors to monitor the metrics to alert when there are any issues with the application or service. This course assumes that you have completed the Splunk Infrastructure Monitoring Fundamentals course. Learn the concepts and apply the knowledge through discussions and hands-on activities.

  • 2 Days VILT

    This 9-hour virtual course targeted towards DevOps, Observability and SRE teams is a follow-up to the course “Automation Using the REST and SignalFlow APIs”. Learn to use the Splunk IM Terraform provider to manage Splunk IM resources for visualization, alerting and teams. Create and manage detectors and muting rules. Learn to create and modify teams including team notification policies. All concepts are taught through discussions and hands-on lab exercises.

  • 2 Days VILT

    Splunk IM exposes a comprehensive API that allows you to automate any action that can be done using the User Interface. This 2-day virtual course provides the foundation for you to use the API to automate bulk actions such as the creation of charts, dashboards, and alerts. See how to programmatically perform computations that can be used in charts and detectors or streamed in real-time. Use the API to manage Splunk IMteams.

  • 1 Day VILT

    This course is designed for developers responsible for debugging their own applications, and for SREs responsible for troubleshooting performance issues. Splunk Log Observer is built primarily for DevOps teams working on applications built on modern tech stacks (containerized microservices). However, the course can be taken by anyone who wants to view recent log data in a no-code environment.

    This 4.5-hour course describes how to use the tool to work with log data using the no-code user interface. Learn to create, save, and share search filters, and to investigate the shape of your log data. Learn to add log messages to dashboards. Analyze logs with aggregation functions and group by rules. Create rules to manipulate incoming data and generate synthetic metrics from log data.

    All concepts are taught using lectures and scenario-based hands-on activities.

Go to Top