XDR is the industry’s most powerful extended detection and response platform. You will gain hands-on expertise in endpoint management, case management, forensic analysis and platform automation. Throughout this course, you will explore the key features of Cortex XDR.
-
XSIAM is the industry’s most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments.
-
In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.
In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.
-
In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.
These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.
-
This course is intended to give architects, engineers, and developers the skills required to help enterprise customers architect, plan, execute, and test database migration projects. Through a combination of presentations, demos, and hands-on labs participants move databases to GCP while taking advantage of various GCP services.
This course covers how to move on-premises, enterprise databases like SQL Server to Google Cloud (Compute Engine and Cloud SQL) and Oracle to Google Cloud bare metal.
-
Empower your business with Dialogflow CX’s Advanced AI capabilities.
In this Google Cloud course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow CX to create virtual agents and test them using the simulator. Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures.
Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.
-
Take your customer conversations to the next level.
In this GCP-CXCCES: Customer Experiences with Contact Center AIDialogflow ES course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow ES to create virtual agents and test them using the simulator.
Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures. Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.
-
Data Engineers design solutions that ensure maximum flexibility and scalability, while meeting all required security controls.
Get hands-on experience with designing and building data processing systems on Google Cloud. This course uses lectures, demos, and hand-on labs to show you how to design data processing systems, build end-to-end data pipelines, analyze data, and implement machine learning.
This Google Cloud course covers structured, unstructured, and streaming data.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
Gain technical ability to match your technical knowledge.
ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.
CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.
This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.
-
Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.
Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The Gold Standard.
CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.
This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Validate your expertise and get the leverage you need to move up in your career.
In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.
Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024 | Career Advancement
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.





