You searched for: ""

  • 1 Day VILT

    This blended course is for Devops/SREs and Developers.

    The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
    find insights using analytics in charts and detectors and to create detectors for common use cases.

  • 1 Day ILT, VILT

    Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

    • Level: Intermediate
    • Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
    • Role: Security Operations Analyst
    • Subject: Threat protection
  • 1 Day ILT, VILT

    In this learning path, you learn about the capabilities of generative AI using Microsoft Copilot. Bring your personal creativity and passion to dream up a novel destination and create the content to help tell its story.

  • 1 Day ILT, VILT

    Get more done and unleash your creativity with Microsoft Copilot. In this learning path, you’ll explore how to use Microsoft Copilot to help you research, find information, and generate effective content.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!

  • 1 Day ILT, VILT

    While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.

    We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.

    Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.

    We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

    Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM)

    Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • CKS: Certified Kubernetes Security Specialist

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.

    Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14. The Red Hat Certified OpenShift Application Developer Exam (EX288) is included in this offering

Go to Top