You searched for: ""

  • 1 Day ILT, VILT

    While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.

    We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.

    Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.

    We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

    Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM)

    Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • CKS: Certified Kubernetes Security Specialist

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.

    Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14. The Red Hat Certified OpenShift Application Developer Exam (EX288) is included in this offering

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0

  • 2 Days ILT, VILT

    As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.

    That’s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what’s next.

    Why Earn the CC?
    If you’re looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team. This certification is ideal for:

    • IT professionals
    • Career changers looking to transition into cybersecurity
    • College students or recent graduates
  • 2 Days ILT, VILT

    Microservices and Cloud-Native architectures have been goals of many organizations to help increase speed and agility, but as complexity grows, systems become increasingly challenging to observe. When issues occur, these issues are often di cult to triage and identify the root causes. This course introduces a range of practices for advancing resilience and how to architect end-to-end Observability for Cloud-Native applications. The advantages of building full-stack metrics, events, logs, and distributed tracing are introduced, along with the impact of DevSecOps on Observability and how AIOPs enhance Observability capabilities.

    This course also covers how Network and Security Observability plays a key role in building reliability, the key aspects of security operations and automated responses are covered, The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in Observability by using real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage situations such as implementing MELT models effectively, that fit their organizational context, building distributed tracing and resiliency by design.

    The course is developed by leveraging key experts in the fields of telemetry, sources of knowledge and engaging with thought-leaders in the Observability space, and working with organizations who have crossed the chasm of modern Observability to extract real-life best practices. This course positions learners to successfully complete the Observability Foundation certification exam.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • TDT-ADV: Tableau Desktop Training (Advanced)

    Price range: RM4,200.00 through RM6,450.00
    2 Days ILT, VILT

    Discover how to create innovative charts and dashboards that are compatible with complex data analysis using Tableau Desktop. In this 2-day instructor-led course, you’ll explore scenario-based data visualization challenges to acquire greater proficiency with calculations and to learn advanced chart techniques.

    Apply these advanced skills to your Tableau environment to maximize the capabilities of your organization’s data.

  • TDT-A: Tableau Desktop Training (Accelerated)

    Price range: RM6,300.00 through RM7,425.00
    3 Days ILT, VILT

    Familiarize yourself with Tableau Desktop quickly with curated content from Tableau Desktop I: Fundamentals and Tableau Desktop II: Intermediate.

    In this fast-paced, 3-day instructor-led course, you’ll learn both foundational and more advanced Tableau skills. Build a range of visualizations, customize your data to enhance your analysis, and implement interactive features to engage your audience.

  • TDT-I: Tableau Desktop Training (Intermediate)

    Price range: RM4,200.00 through RM5,325.00
    2 Days ILT, VILT

    Expand your Tableau proficiency and boost your analytics skills. In this 2-day instructor-led course, you’ll learn how to connect to data, work with calculations, build visualizations, apply analytics such as parameters, and customize dashboards.

    Enhance your analysis and design more comprehensive dashboards to guide users to efficient data discoveries.

  • TDT-B: Tableau Desktop Training (Basic)

    Price range: RM4,200.00 through RM4,650.00
    2 Days ILT, VILT

    Learn the fundamentals of Tableau Desktop in this introductory course. In this 2-day instructor-led course, you’ll gain a comprehensive introduction to data analysis and visual design to build a range of visualizations—from single worksheets to dashboards—and learn techniques to apply to your own data analysis with Tableau.

  • DP-700T00: Implement Data Engineering Solutions using Microsoft Fabric

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    This course covers methods and practices to implement data engineering solutions by using Microsoft Fabric. Students will learn how to design and develop effective data loading patterns, data architectures, and orchestration processes.

    Objectives for this course include ingesting and transforming data and securing, managing, and monitoring data engineering solutions.

    This course is designed for experienced data professionals skilled at data integration and orchestration, and prepares learners for the Microsoft Certified: Fabric Data Engineer Associate certification.

  • ENSDWI: Implementing Cisco SD-WAN Solutions

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    You will learn best practices for configuring routing protocols in the data center and the branch, as well as how to implement advanced control, data, and application-aware policies.

    The course also covers SD-WAN deployment and migration options, placement of controllers, how to deploy WAN Edge devices, and how to configure Direct Internet Access (DIA) breakout. The course looks at the different Cisco SD-WAN security options available, such as application-aware enterprise firewall, Intrusion Prevention System (IPS), URL filtering, Cisco Advanced Malware Protection (AMP), Secure Sockets Layer/Transport Layer Security (SSL/TLS) proxy, and Cisco Umbrella® Secure Internet Gateway (SIG).

    This course helps you prepare to take the Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) exam which is part of the CCNP® Enterprise certification. You will also earn 32 Continuing Education (CE) credits toward recertification.

  • 3 Days ILT, VILT

    The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.

    Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.

  • 3 Days ILT, VILT

    The Securing Cisco Networks with Snort Rule Writing Best Practices (SSF Rules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more.

    The hands-on labs give you practice in creating and testing Snort rules.

  • 4 Days ILT

    The Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 course shows you how to deploy Snort® in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You’ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more.

  • ENAUI: Implementing Automation for Cisco Enterprise Solutions

    Price range: RM14,100.00 through RM20,850.00
    3 Days ILT, VILT

    Showcase your ability to implement enterprise automated solutions including programming concepts, Python programming, API, controllers and automation tools.

    The Implementing Automation for Cisco Enterprise Solutions (ENAUI) training teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools.

    This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.

  • CLICA: Implementing Cisco Collaboration Applications

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Applications (CLICA) training teaches you the knowledge and skills to configure and troubleshoot Single Sign-On (SSO), Cisco Unity Connection and Cisco Unity Express, and Application clients.

    Topics covered include streamlining communication procedures, strengthening compliance measures, and enhancing communication systems and devices.

    This course also earns you 40 Continuing Education (CE) credits towards recertification.

Go to Top