You searched for: ""

  • 3 Days ILT, VILT

    A developer introduction to building and managing containers with Podman for deploying applications on Red Hat OpenShift Container Platform.

    Red Hat OpenShift Development I: Introduction to Containers with Podman (DO188) introduces students to building, running, and managing containers with Podman and Red Hat OpenShift. This course helps students build the core skills for developing containerized applications through hands-on experience. These skills can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift, and OpenShift Container Platform.

    This course is based on Red Hat® Enterprise Linux® 8, Podman 4.2 and Red Hat OpenShift® 4.12.

  • 3 Days ILT, VILT

    Prepare yourself for Red Hat Enterprise Linux 8 by learning about changes to the operating system

    Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release.

    This course is based on Red Hat Enterprise Linux 8.

  • 3 Days ILT, VILT

    Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.

    Camel development is organized around:

    • Routes that define a sequence or flow of processing.
    • Processors that transform, interpret, and modify messages within a Camel route.
    • Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.

    Cloud-native Integration with Red Hat Fuse (AD221) emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.

    This course is based on Red Hat Fuse 7.10 and OpenShift 4. The Red Hat Certified Specialist in Cloud-native Integration exam (EX221) is included in this offering.

  • 2 Days ILT, VILT

    Learn, train and grow with IT Risk Fundamentals.

    The IT Risk Fundamentals Certificate Program by ISACA offers a comprehensive understanding of IT risk management principles, methodologies, and best practices. Participants will develop the skills and knowledge needed to identify, assess, mitigate, and manage IT risks in alignment with ISACA’s standards and frameworks.

    The IT Risk Fundamentals Certificate covers the principles of IT risk management, the responsibilities and accountability for IT risk, how to build risk awareness and how to communicate risk.

  • 3 Days ILT, VILT

    Learn, train and grow with Cybersecurity Fundamentals.

    As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.

    This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.

    Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:

    • Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
    • Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
    • Stay ahead of the curve on your current career path or start your new cybersecurity career strong.

    The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 4 Days ILT, VILT

    Python programming for beginners

    Python is a popular programming language used by system administrators, data scientists, and developers to create web applications, custom Red Hat Ansible Automation modules, perform statistical analysis, and train AI/ML models.

    This Red Hat course introduces the Python language and teaches fundamental concepts like control flow, loops, data structures, functions, file I/O, regular expressions, parsing JSON, and debugging.

    This course is based on Python 3 and RHEL 9.0.

  • 3 Days ILT, VILT

    Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.

    Camel development is organized around:

    • Routes that define a sequence or flow of processing.
    • Processors that transform, interpret, and modify messages within a Camel route.
    • Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.

    The Cloud-native Integration with Red Hat Fuse (AD221) course emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.

    This Red Hat course is based on Red Hat Fuse 7.10 and OpenShift 4.

  • 1 Day ILT, VILT

    Develop and deploy event-driven auto-scaling serverless applications and functions

    Learn how to develop, deploy, and auto-scale event driven serverless applications on the Red Hat OpenShift Container Platform. Red Hat OpenShift Serverless enables developers and Site Reliability Engineers (SREs) to focus on the core business logic of their applications and functions by delegating operational concerns and infrastructure services to the Red Hat® OpenShift Serverless platform.

    This Red Hat course is based on Red Hat OpenShift Serverless 1.23 and OpenShift Container Platform 4.10.

  • 2 Days ILT, VILT

    Introduction to configuring and managing Red Hat Single Sign-On for authenticating and authorizing applications

    Red Hat Single Sign-On Administration (DO313) is designed for system administrators who want to install, configure and manage Red Hat Single Sign-On servers for securing applications. Learn about the different ways to authenticate and authorize applications using single sign-on standards like OAuth and OpenID Connect (OIDC). You will also learn how to install and configure Red Hat SIngle Sign-On on the OpenShift Container Platform. This course is based on Red Hat Single Sign-On version 7.6.

  • 4 Days ILT, VILT

    Create and manage virtual machines on OpenShift using the Red Hat OpenShift Virtualization operator.

    Managing Virtual Machines with OpenShift Virtualization teaches the essential skills required to create and manage virtual machines (VM) on OpenShift using the Red Hat OpenShift Virtualization operator. This Red Hat course does not require previous knowledge of containers and Kubernetes.

    This course provides:

    • Skills required to create, access, and manage VMs on OpenShift clusters.
    • Skills required to control usage and access of cpu, memory, storage, and networking resources from VMs using the same Kubernetes features that would also control usage and access to these resources for containers.
    • Sample architectures to manage High Availability (HA) of VMs using standard Kubernetes features and extensions from OpenShift Virtualization.
    • Strategies to connect VMs on OpenShift to data center services outside of their OpenShift cluster, such as storage and databases.
  • FT-FAZ-ADM: FortiAnalyzer Administrator

    Price range: RM4,750.00 through RM5,650.00
    1 Day VILT

    In this FortiAnalyzer Administrator course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.

    Product Versions: FortiAnalyzer 7.2

  • FT-FAZ-ANS: FortiAnalyzer Analyst

    Price range: RM4,750.00 through RM5,650.00
    1 Day ILT, VILT

    An integrated security architecture with analytics and automation capabilities to dramatically improve visibility and response.

    In this FortiAnalyzer Analyst course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.

    Product Versions: FortiAnalyzer 7.2

  • CT-P+: CompTIA Project+

    Price range: RM3,500.00 through RM5,111.00
    5 Days ILT, VILT

    CompTIA Project+ Opens the Door to Your Project Management Career!

    With a median annual salary of $104360 for Project+ certified professionals in the United States and Canada, CompTIA Project+ is ideal for IT professionals who manage smaller, less-complex projects as part of their job duties but still require foundational project management skills. Project+ is versatile because it covers essential project management concepts beyond the scope of just one methodology or framework.

     

  • 2 Days ILT, VILT

    Essential Security Skills for Knowledge Workers.

    The purpose of the Certified Secure Computer User (CSCU)  training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

    This cybersecurity class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    This CSCU goes beyond security awareness and includes:

    • Coverage on the latest Operating Systems
    • Latest Tools and Techniques to maximize security
    • Coverage on securing Gaming Consoles and IoT/Smart Home Devices
    • Techniques to secure Home Offices and Remote Work locations

     

  • PECB-27001F: ISO/IEC 27001 Foundation

    Price range: RM1,440.00 through RM4,500.00
    2 Days ILT, VILT

    ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • PECB-27001LA: ISO/IEC 27001 Lead Auditor

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Auditor 

    ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.

    During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

    Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

    After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • PECB-27001LI: ISO/IEC 27001 Lead Implementer

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

    Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

    This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

    After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day VILT

    This 1-virtual day course is designed for the experienced Splunk system administrators. This hands-on class is designed to provide the essential knowledge for deploying and managing Splunk SmartStore.

    It covers SmartStore deployment options, cache manager configurations, monitoring, and troubleshooting of SmartStore implementation.

  • 2 Days VILT

    This 9-hour virtual course highlights key differences between Splunk Enterprise deployed on-premises and Splunk Enterprise Cloud to allow Splunk Administrators to transition to Splunk Cloud.

    This course provides the skills and knowledge for experienced on-prem administrators to migrate the collection and data ingest as well as manage their Splunk Cloud environment and maintain a productive Splunk SaaS deployment.

  • 2 Days VILT

    This 9-hour course is for developers who want to use the Splunk REST API to interact with Splunk servers. In this course, use curl and Python to send requests to Splunk REST endpoints and learn how to parse and use the results. Create a variety of objects in Splunk, learn how to change properties, work with and apply security to Splunk objects, run different types of searches and parse its results, ingest data using the HTTP Event Collector and manipulate collections and KV Stores.

  • 4 Days VILT

    This 4-day course is designed for the experienced Splunk administrators who are new to Splunk DSP. This hands-on class provides the fundamentals of deploying a Splunk DSP cluster and designing pipelines for core use cases. It covers installation, source and sink configurations, pipeline design and backup, and monitoring a DSP environment.

  • 3 Days VILT

    This 13.5-hour course is for users who want to attain operational intelligence level 4, (business insights) and covers implementing analytics and data science projects using Splunk’s statistics, machine learning, built-in and custom visualization capabilities.

  • 1 Day VILT

    This 3 hours course prepares IT professionals to configure and manage SOAR.

  • 1 Day VILT

    This virtual course targeted to SREs and DevOps enables you to monitor and troubleshoot your Kubernetes clusters with Splunk Observability Cloud. Through discussions and hands-on activities, learn to explore and use the Kubernetes Navigator, built-in dashboards, and AutoDetect to monitor the health of your cluster. Create custom dashboards and detectors to monitor and troubleshoot common Kubernetes trouble conditions. This course assumes basic knowledge of Kubernetes and familiarity with navigating Splunk IM.

    This lab-oriented class is designed to help you learn best practices and tips to use Splunk Observability Cloud to monitor and troubleshoot Kubernetes clusters. All hands-on labs are performed in the Observability Cloud UI.

Go to Top