You searched for: ""

  • 1 Day VILT

    This single subject course targeted to developers enables you to manually instrument your applications to send traces to Splunk APM. Through in-person discussions and hands-on activities, learn to manually instrument applications to create spans and add metadata to spans. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

    This lab-oriented class is designed to help you learn the fundamentals of instrumenting your code to send in traces and trace metadata. All hands-on labs are in Python and Java.

  • 1 Day VILT

    This course is targeted towards Splunk On-call admins responsible for setting up incident response with Splunk On-Call. This 4.5-hour virtual course describes the tasks required to set up on-call teams, including defining schedules, on-call rotations and shifts. Learn to set-up and configure alerts and integrations. Create post incident review reports, track response metrics and customize reports. Use advanced features such as the Rules engine for advanced customization and configure webhook integrations. All concepts are taught using lectures and scenario-based hands-on activities.

  • 1 Day VILT

    This single subject course targeted to DevOps enables you to learn configuration techniques to send traces to Splunk APM. Through inperson discussions and hands-on activities, learn to deploy the Splunk OpenTelemetry Collector on a Linux host. Use the OpenTelemetry Collector to configure processor components to modify trace metadata. Use auto-instrumentation to send in traces without altering your code. Enable AlwaysOn profiling to monitor code performance. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

  • 1 Day VILT

    This 4.5-hour virtual course, targeted towards developers and DevOps, focuses on creating custom metrics to monitor your applications/services with Splunk IM. Learn to instrument applications/services to send in custom metrics that characterize the application of service. Define relevant metadata for your metrics to let you find, filter and aggregate the metrics that you want to chart or alert on. Create charts and custom dashboards to visualize these custom metrics. Create detectors to monitor the metrics to alert when there are any issues with the application or service. This course assumes that you have completed the Splunk Infrastructure Monitoring Fundamentals course. Learn the concepts and apply the knowledge through discussions and hands-on activities.

  • 2 Days VILT

    This 9-hour virtual course targeted towards DevOps, Observability and SRE teams is a follow-up to the course “Automation Using the REST and SignalFlow APIs”. Learn to use the Splunk IM Terraform provider to manage Splunk IM resources for visualization, alerting and teams. Create and manage detectors and muting rules. Learn to create and modify teams including team notification policies. All concepts are taught through discussions and hands-on lab exercises.

  • 2 Days VILT

    Splunk IM exposes a comprehensive API that allows you to automate any action that can be done using the User Interface. This 2-day virtual course provides the foundation for you to use the API to automate bulk actions such as the creation of charts, dashboards, and alerts. See how to programmatically perform computations that can be used in charts and detectors or streamed in real-time. Use the API to manage Splunk IMteams.

  • 1 Day VILT

    This course is designed for developers responsible for debugging their own applications, and for SREs responsible for troubleshooting performance issues. Splunk Log Observer is built primarily for DevOps teams working on applications built on modern tech stacks (containerized microservices). However, the course can be taken by anyone who wants to view recent log data in a no-code environment.

    This 4.5-hour course describes how to use the tool to work with log data using the no-code user interface. Learn to create, save, and share search filters, and to investigate the shape of your log data. Learn to add log messages to dashboards. Analyze logs with aggregation functions and group by rules. Create rules to manipulate incoming data and generate synthetic metrics from log data.

    All concepts are taught using lectures and scenario-based hands-on activities.

  • 1 Day VILT

    This course serves as the foundation for all other Splunk Observability courses. It is targeted towards DevOps/SRE/Observability teams, Senior On-call Engineers, Onboarding and Monitoring Strategists and Developers. This 6-hr course provides a fundamental understanding of Metrics Monitoring in Splunk Observability such as the metrics data model and different types of metadata. See how you can interact with data using built-in content, search for metrics, find more information about a metric, visualize and alert on metrics. Learn to use appropriate rollups, interpret chart data based on chart resolution, rollups, and analytic functions. All concepts are taught using lectures and scenario-based hands-on activities.

  • MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

    Price range: RM3,500.00 through RM3,874.00
    5 Days ILT, VILT

    Modernize supply chain operations with Dynamics 365 Supply Chain Management.

    This Microsoft Dynamics 365 Supply Chain Management, Expert course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes.

    This course includes lectures and several hands-on exercises. The exercises will be introduced to you in the form of a case study presented to a Dynamics 365 Supply Chain Management Functional Consultant, Expert. Each exercise will be based on a business scenario followed by a question or discussion then a step-by-step guidance to perform the system related steps.

  • -20%

    EDU-NSXICM: VMware NSX: Install, Configure, Manage [V4.0]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    VMware NSX: Shaping the Future of Network Provisioning and Security.

    This VMware NSX: Install, Configure, Manage, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This VMware course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.

    Product Alignment

    • NSX 4.0.0.1
    • NSX 4.0.1
  • 3 Days ILT, VILT

    The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

  • 2 Days ILT, VILT

    Microsoft Cloud for Sustainability

    As a result of attending this course, the learner should be able to understand the sustainability concepts and how the business thinks of tracking and reporting emissions, describe Microsoft Cloud for Sustainability customer scenarios, and configure the features of Microsoft Sustainability Manage.

  • CT-DataSys+: CompTIA DataSys+

    Price range: RM3,500.00 through RM5,111.00
    5 Days ILT, VILT

    Gain skills and knowledge needed to deploy, maintain and protect data.

    If you are a database professional wanting to land a database administrator role, a DBA who wants to validate their skill set or another type of IT pro seeking database management skills, you need CompTIA DataSys+. By earning this certification, you’ll prove to employers that you can identify database structure types; develop, modify and run code; and gather, store and drive data assets. You’ll also confirm your knowledge of:

    • The various aspects of database design and planning
    • The different phases of the implementation, testing and deployment of data
    • The purpose of monitoring and reporting database performance
    • Common database maintenance processes
    • The production of essential documentation
    • Best practices for backup and data restoration

    CompTIA DataSys+ certified professionals demonstrate their ability to secure databases, protect against cyberattacks and control authorization. Moreover, they prove they can ensure governance and regulatory compliance.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get certified today!

  • 3 Days ILT, VILT

    Learn how to extend DevOps practices to build, train and deploy machine learning models.

    This MLOps Engineering on AWS course builds upon and extends the DevOps practice prevalent in software development to build, train, and deploy machine learning (ML) models. The course stresses the importance of data, model, and code to successful ML deployments. It will demonstrate the use of tools, automation, processes, and teamwork in addressing the challenges associated with handoffs between data engineers, data scientists, software developers, and operations.

    The course will also discuss the use of tools and processes to monitor and take action when the model prediction in production starts to drift from agreed-upon key performance indicators.

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

  • 2 Days ILT, VILT

    This Oracle WebLogic Server 14c: Troubleshooting Workshop course teaches you how to monitor and tune Oracle WebLogic Server 14c. The lecture content is suitably reinforced with hands-on practices.

  • 5 Days ILT, VILT

    This Oracle WebLogic Server 14c: Administration II training is a continuation of Oracle WebLogic Server 14c: Administration I. It teaches you how to perform important administrative tasks, employing best practices that enable you to make the most of your WebLogic applications.

  • 4 Days ILT, VILT

    The Oracle WebLogic Server 14c: JMS Administration certification validates a professional’s skills to configure, manage, and tune JMS resources for Oracle WebLogic Server. JMS stands for Java Message Service, a messaging standard that allows Java EE applications to communicate with other messaging systems.

    With this certification, individuals can demonstrate their understanding of deploying JMS in a WebLogic domain, configuring message-driven beans, and tuning JMS for optimized performance. Industries use this certification to ensure their IT professionals have the required knowledge and skills to effectively implement and manage the JMS functionalities in Oracle WebLogic Server, improving productivity and communication across different systems.

  • 4 Days ILT, VILT

    Invest in Success: How CAPM Certification Elevates Your Project Management Skills.

    The PMI-CAPM: CAPM Exam Preparation Course offers recognition to practitioners who are interested in or are just starting a career in project management, as well as project team members who wish to demonstrate their project management knowledge.

    As the #1 ranked most in-demand professional certification, this fundamental project management certification denotes that the individual possesses the knowledge in the principles and terminology of A Guide to the Project Management Body of Knowledge (PMBOK® Guide), which outlines generally recognized good practices in project management.

    Whether you’re new to project management, changing careers, or already serving as a subject matter expert on project teams, the CAPM credential by PMI can get your career on the right path and take it to the next level.

    CAPM examination content is now based on PMBOK® Guide – Seventh Edition

  • -29%

    AWS-CLDPE: AWS Cloud Practitioner Essentials

    Price range: RM1,600.00 through RM2,250.00
    1 Day ILT, VILT

    Learn about 78+ AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge.

    Are you new to the AWS Cloud and looking to jump-start your cloud journey? Do you want to prepare for the AWS Certified Cloud Practitioner exam but don’t know where to start?

    Dedicate a day toward building your AWS cloud skills and confidence to advance your career with our one-day classroom course, AWS Cloud Practitioner Essentials.

    The fundamental-level AWS Cloud Practitioner Essentials course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support. This fundamental AWS course also helps you prepare for the AWS Certified Cloud Practitioner exam.

    AWS Discovery Day 2025: Develop Generative AI & Prompt Engineering Capabilities 
     
    This FREE Virtual Event on Friday, August 29 2025, from 9:30 AM – 4:00 PM (MYT) — designed for business leaders, IT professionals, and technical teams across Malaysia. 
     
    Secure your spot now. 

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    Stay Ahead in a Digital World: Understand and Implement IT Governance & Risk Management.

    This hugely popular ITGRM: IT Governance and Risk Management provides a comprehensive review of the knowledge required for understanding IT Governance & Risk Management strategies. Students can use this crash course to review what they already know about IT Governance & Risk Management, pinpoint any gaps in their understanding and provide high level mitigation to address IT Governance & Risk Management gaps.

    The establishment of efficient IT governance is of the utmost importance with regard to the problem-free operation of IT businesses. The organization’s business goals can more easily be accomplished with the assistance of this concept when applied to its information systems. If you do not put into practice IT governance, it will become ineffective and may even be detrimental to the company.

    It is no longer necessary to argue that effective governance of information technology is essential because society and various markets are continuously undergoing change. It is a requirement for every business. In today’s world, where information occupies such an important role in our society, having strong governance in place for our information technology systems is absolutely necessary to ensure their smooth operation. By producing value, it ensures that the money your company invests in information technology will be put to good use.

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

Go to Top