CICS Command Level Programming provides an understanding of the CICS system, application environment and typical applications. The structure of CICS pseudo-conversational application programs are discussed and reviewed in detail. The course consists of a series of lectures, discussions and class exercises with hands-on programming sessions.
-
This course will teach you and your team to use Xamarin. Forms to build fully native Android, iOS and Universal Windows Platform apps with Xamarin and C#. Xamarin. Forms exposes a complete cross-platform UI toolkit for .NET developers
-
Vue.js is among the world’s most popular language frameworks for applications and interface development. Its relative lightweight platform, ease of understanding, simple integration, and flexibility have given it huge support from developers and organizations such as Alibaba, Xiaomi and others.
-
C# is one of the most popular programming languages and can be used for a variety of things, including mobile applications, game development, and enterprise software. In this course, you’ll be exposed to fundamental programming concepts using C# and start writing programs right away.
-
Intensive and hands-on, the course emphasizes becoming productive quickly as a Java application developer. This course quickly covers the Java language syntax and then moves into the object-oriented features of the language. As a participant you will be able to create basic applications using the Java 8 programming language.
The participants will also be able to describe object-oriented concepts, object-oriented programming (OOP) concepts, and Java platforms and technologies. This course will use Eclipse as an IDE.
-
This hands-on course provides training on standard UNIX commands and utilities used for day to day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. The course presents the concepts necessary to understand the way UNIX works as well as the system’s most commonly used commands. Data manipulation utilities and shell syntax for synthesizing command pipelines are emphasized. Bourne shell, Bash shell and Korn shell programming techniques are introduced so students will be able to read and modify existing shell scripts as well as create their own. Desktop environments are also introduced from a user’s perspective, including common window managers, Open Office utilities and an introduction to configuration tools. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency.
-
This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.
Throughout the whole course, participants will gain in-depth knowledge on the following topics:
- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models
- Smart Cards
- NDES, CEP/CES
- SSL
- OCSP
After completing the PKI course, every individual will be able to successfully design, setup, deploy, Troubleshoot and manage a public key infrastructure (PKI). This is a 5-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organization.
-
Over the 3 days in this hands-on APS-SD: Applying Professional Scrum for Software Development course, students gain a real-world view of what it is like to build software with Scrum. They collaborate over a series of Sprints applying modern engineering practices, and using the Scrum framework to manage complexity. The key focus of the class is on how to develop and deliver increments of releasable functionality. Students will experience real-world challenges and issues, and through a series of Sprints will learn how to continuously improve the way they perform their work.
This Professional Scrum Developer certification course teaches how Agile engineering practices and supportive DevOps tools complement Scrum and further advance a team’s capabilities and is available in .NET and Java specific technologies, along with a generic technology course. Professional Scrum Trainers can work with you to define a specific technology stack that meets your needs in private classes for your organization.
The course teaches how Agile engineering practices and supportive DevOps tools complement Scrum and further advance a team’s capabilities. This Agile developer course provides greatest value if the whole Scrum Team (Developers, Scrum Master and Product Owner) attend together and experience the power of real teamwork. Teams that attend together are not only able to apply learnings to their work immediately, but are also able to recall their classroom experiences to overcome particularly challenging times.
The course is available in Microsoft Visual Studio .NET and Java specific technologies, along with a generic technology course. Professional Scrum Trainers can work with you to define a specific technology stack that meets your needs in private classes for your organization.
-
-30%
Learn best practices in cloud security and how the Google Cloud security model can help protect your technology stack. Security Engineers actively assess existing Google Cloud implementations, identifying potential security issues, and prioritizing solutions.
This Google Cloud certification uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The Transition to Oracle Solaris 11 training and certification course will give you a detailed overview of the transition to Oracle Solaris 11 training builds on your system administration experience with Oracle Solaris 10.
-
This in-depth training explains working with BA (Business Architecture) projects. The course demonstrates designing the forms, data definitions and rules.
The course includes delivering the training of modeling, implementing, playing and deploying the business processes, creating BPM Studio or Business Process Composer, measuring process-specific and standard both types of business indicators using BAM, and throwing up warnings in conditions that are abnormal.
-
Oracle Data Integrator is an extensive data integration platform that handles all information integration requirements from high-intensity, high-performance batch loads, to event-driven integration processes and SOA-enabled data services.
Oracle Data Integrator’s Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data – the approach that optimizes performance, scalability and lowers overall solution costs.
Expert Oracle University instructors will teach you how to use Oracle Data Integrator (ODI) 12c to implement high-performance movement and transformation of data among various platforms. This course covers using ODI graphical user interfaces that enable users to access different ODI components and resources that form ODI infrastructure.
-
This Oracle BPM 12c: Advanced Implementation Ed 1 preparing shows you how to make increasingly complex procedure models to meet your business needs through utilizing various sorts of occasions, including message, sign and clock occasions. Master Oracle University educators will show you how to oversee synchronous and non concurrent correspondence among procedures and sub forms, peer forms and different administrations.
-
This course will provide you with the skills you need to successfully implement WebCenter Sites. You will learn how to perform the developer responsibilities for using the WebCenter Sites content management features and related rendering frameworks for building websites.By attending this course, you will have the opportunity to create effective user interfaces for content contributions, manage users, roles and access permissions for a content management site, and develop and implement a rendering model with the appropriate caching strategy. You will learn how to improve your company’s web presence with the new features of Oracle WebCenter 12c, such as A / B testing and visitor services.
-
This extensive course empowers the developers with declarative features of the ADF Business Components that allow developers to develop and crate the business services. These business services are reusable and can be later exposed in the UI by using the client components of ADF. The course explains every ADF Faces component that allows to apply skins and extends internationalization support along with accessibility. The Faces components also facilitate the complete customization and provides affluent components for visualization, having the capabilities of rendering gauges, graphs, charts and much more graphics for real time updates.
-
This Oracle Access Manager 11g R2: Administration Workshop preparing is intended for heads. When you’re OK with introducing, designing, overseeing, investigating, diagnosing and fundamental organization of Oracle Access Manager 11g R2, master Oracle University educators will show you further developed organization points in this course.
-
This 5-day course offers step-by-step instructions for creating Oracle BI analyses and dashboards in business intelligence applications. It takes you off from building basic analyses to include in dashboards towards more complex scenarios. The course helps you attain and acquire knowledge and skills to design mobile applications for BI content using Oracle BI Mobile App Designer. Through this you can transform your organization’s data into intelligence for improved decision making.
-
This 5- day course instills in you the ability to extend the initial repository and model more complex business requirements, including: logical dimension hierarchies, multiple logical table sources, aggregate tables, partitions, and time series data. Participants attain experience to use Administration Tool wizards and utilities to manage, maintain, and enhance repositories. Ultimately they are made familiar to advanced topics, like implicit fact columns, bridge tables, usage tracking, patch merge, and managing service instances.
-
This Oracle Unified Directory 12c: Administration preparing gives you a diagram of the highlights and design of Oracle Unified Directory 12c. You’ll figure out how this arrangement takes into account adaptability to billions of passages, simplicity of establishment, flexible organizations, venture sensibility and successful observing.
-
Oracle Identity Manager 11g course explains complex OIM System Administration topics. Helps in enhancing knowledge of OIM System Administration by setting up a production like availability of OIM environment on high level and performing configuration, troubleshooting, diagnostics and performance tuning for OIM.
-
The Oracle Identity Governance 12c: Essentials Ed 1 training and certification course will give you a detailed overview of the essential concepts about implementing identity management solutions with Oracle Identity Governance. During the training, you will also learn about the Identity Governance infrastructure and the suite of Oracle Identity Management products. relationship of Oracle Identity Governance with other Oracle Identity Management products including Oracle Identity Analytics and Oracle Privileged Account Manager
-
Oracle Identity Governance 12c: Develop Identity Provisioning training course enables you to perform advanced administration, development, and customization tasks in Oracle Identity Manager 12c 12.2.1.3.0. During the class, you will learn the architecture of Oracle Identity Governance 12c and know the various development tools used.
-
This OAE-W1: Oracle Application Express Workshop I training teaches you how to quickly and efficiently develop database-centric web applications using Oracle Application Express. Explore implementing security in your applications, managing application navigation, basic validation and debugging techniques used while developing an application in Oracle Application Express.
Learn To:
- Create database applications for both desktop and mobile interfaces.
- Add various components like new pages, reports regions, items and other components required to enhance an application.
- Create processes, validations, computations and dynamic actions within an application.
- Change the look and feel of your web applications using built-in themes and templates.
- Create and use shared components for an application.
- Understand managing and using session state variables.
- Implement security in an application.
- Manage application navigation using shared components.
- Improvise your application by creating calendars, charts and trees.
- Extend your application by adding advanced features like printing, BLOB object, data loading, site and more.
- Enable feedback mechanisms from the application and tracking the feedback from Oracle APEX.
-
Participants learn to load data by executing the mappings or the process flows, use Oracle Warehouse Builder 11g, Release 2 features to manage metadata changes, debug mappings, backup metadata, manage security, and tune the ETL mappings for better performance. Integration of Warehouse Builder with OBI EE, along with the Warehouse Builder architecture and configuration are discussed.
Participants learn to retrieve data from different types of sources such as flat files or relational schemas and also to use the different transformation operators to design an ETL task. The usage of Warehouse Builder to define both relational dimensional models and multidimensional models, to deploy a single logical model to multiple physical targets and how to handle slowly changing dimensions are also covered.
In addition, extraction of data from non-Oracle sources using code templates, usage of the Warehouse Builder ETL and data integration features of the Enterprise ETL Option of the Oracle database are discussed.
This functionality requires the Oracle Warehouse Builder Enterprise ETL/ODI EE option.
This course is a combination of Data Integration and ETL with Oracle Warehouse Builder: Part 1 and Data Integration and ETL with Oracle Warehouse Builder: Part 2 courses.
Learn To:- Retrieve data from different types of sources such as flat files or relational schemas
- Use the different transformation operators to design an ETL task
- Load data by executing the mappings or the process flows
- Use OWB features to manage metadata changes, debug mappings, backup metadata, manage security, and tune the ETL mappings for better performance
- Integrate Warehouse Builder with OBI EEWarehouse
- Explain the Warehouse Builder architecture and configuration
A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording, copying, or transmission of LVC content may not be made.
-
In the Oracle Big Data Fundamentals course, learn to use Oracle’s Integrated Big Data Solution to acquire, process, integrate and analyze big data. In this course, you will be introduced to Oracle Big Data Cloud Service.
Learn To:
- Define Big Data.
- Describe Oracle’s Integrated Big Data Solution and its components.
- Define the Hadoop Ecosystem and Cloudera’s Distribution Including Apache Hadoop (CDH).
- Use the Hadoop Distributed File System (HDFS)to store, distribute, and replicate data across the nodes in the Hadoop cluster.
- Acquire big data using the HDFS Command Line Interface, Flume, and Oracle NoSQL Database.
- Use MapReduce and YARN for distributed processing of the data stored in the Hadoop cluster.
- Process big data using MapReduce, YARN, Hive, Pig, Oracle XQuery for Hadoop, Solr, and Spark.
- Integrate big data and warehouse data using Scoop, Oracle Big Data Connectors, Copy to BDA, Oracle Big Data SQL, Oracle Data Integrator, and Oracle GoldenGate.
- Analyze big data using Oracle Big Data SQL, Oracle Advanced Analytics technologies, and Oracle Big Data Discovery.
- Use and manage Oracle Big Data Appliance. Secure your data.
- Understand Oracle Big Data Cloud Service: Key Features & Benefits.
-
Learn, train and grow with Cybersecurity Fundamentals.
As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.
This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.
Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:
- Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
- Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
- Stay ahead of the curve on your current career path or start your new cybersecurity career strong.
The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
-
Professionals in the data field looking to upskill and close existing knowledge gaps will benefit from CompTIA DataX. This new certification falls under CompTIA Xpert — a new series of certifications and trainings offered through CompTIA that are geared towards professionals who are looking to gain expert knowledge in business-critical technologies.
DataX equips highly experienced professionals with essential skills that meet the demands of the rapidly evolving field of data science. Learners will have access to a comprehensive curriculum that covers concepts ranging from the foundations of machine learning to more specialized data science applications.
While covering these emerging concepts, learners won’t spend time revisiting familiar concepts that they’ve already encountered in their careers. Instead, DataX helps learners focus their efforts on filling existing knowledge gaps due to a lack of available training.
-
-40%
Data Engineers design solutions that ensure maximum flexibility and scalability, while meeting all required security controls.
Get hands-on experience with designing and building data processing systems on Google Cloud. This course uses lectures, demos, and hand-on labs to show you how to design data processing systems, build end-to-end data pipelines, analyze data, and implement machine learning.
This Google Cloud course covers structured, unstructured, and streaming data.
Upskill in data engineering with 40% off – limited-time price: RM5760.
-
CompTIA A+ is the industry standard for launching IT careers into today’s digital world.
CompTIA A+ certified professionals are proven problem solvers. They support today’s core technologies from security to cloud to data management and more. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment.
It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace.
This course is designed for two exams which consists of performance based questions:
- CompTIA A+ Core 1 220-1201 Certification Exam
- CompTIA A+ Core 2 220-1202 Certification Exam
The exam price shown is inclusive for two exams.
-
Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.
*Please note: This is a self-paced virtual course, containing course manuals and an online lab environment, only. No audio or video is provided for this course.
-
-30%
This training course builds on the networking concepts covered in the Networking Fundamentals in Google Cloud course. Through presentations, demonstrations, and labs, participants explore and deploy Google Cloud networking technologies.
These technologies include: Virtual Private Cloud (VPC) networks, subnets, and firewalls; Interconnection among networks; Load balancing ;Cloud DNS; Cloud CDN; Cloud NAT.
The course will also cover common network design patterns.
-
Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.
Camel development is organized around:
- Routes that define a sequence or flow of processing.
- Processors that transform, interpret, and modify messages within a Camel route.
- Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.
Cloud-native Integration with Red Hat Fuse (AD221) emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.
This course is based on Red Hat Fuse 7.10 and OpenShift 4. The Red Hat Certified Specialist in Cloud-native Integration exam (EX221) is included in this offering.
-
In this FortiAnalyzer Administrator course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.
Product Versions: FortiAnalyzer 7.2
-
An integrated security architecture with analytics and automation capabilities to dramatically improve visibility and response.
In this FortiAnalyzer Analyst course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.
Product Versions: FortiAnalyzer 7.2
-
Around the world, there are many organizations in both the public and private sectors, who recognize that their portfolio, programme and project management is best supported through a delivery support office. PRINCE2®, Managing Successful Programmes (MSP®), Management of Portfolio’s (MOP® )and Management of Risk (MoR®) all touch on the need to provide adequate support structures. P3O® provides a single source of information for guidance or
advice on setting up or running an effective delivery support office.Portfolio, Programme and Project Offices (P3O®) is a Best Management Practice certification that brings together a set of principles, processes and techniques to facilitate effective portfolio, programme and project management through enablement, challenge and support structures.
-
As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.
That’s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what’s next.