The Oracle NoSQL Database for Administrators Ed 2 training course will give you a detailed overview of deploying a KVStore and troubleshooting the installation and hardware failures, During the training, you will also learn to monitor and manage it.
-
Using Oracle Machine Learning with Autonomous Database course is designed for Data Scientists, Developers, Architects, Business Analysts and anyone who wants to know about Oracle Machine Learning and Oracle Autonomous Cloud Platform. In this course, you will learn how to use Oracle Autonomous Database and Analytics Cloud service instances with Oracle Machine Learning
-
You will figure out how to investigate and set up the source framework for movement and to pick the best relocation methodology that meets your prerequisites. As a feature of the hands-on labs you will make a Virtual Machine DB System and evaluate different relocation techniques.
This course is perfect for experienced DBAs who are hoping to improve their cloud relocation abilities. Taking this hands-on preparing will get ready DBAs for Cloud DBA accreditation tests.
-
This course teaches you how to design and implement a database maximum availability architecture on Oracle Cloud. You’ll learn the techniques involving design and implement a database HA & DR solution on Oracle Cloud Infrastructure (OCI).
-
This course teaches you how to migrate your data from On-Premises Oracle Database to Oracle Autonomous Database. It’s ideal for DBAs who want to learn migration techniques to move data to cloud and to quickly create test or development database instances using Oracle Autonomous Database.
-
Product owners have a unique and demanding role on agile teams. A product owner decides what the team will create next in order to deliver more value to the customer. In a Certified Scrum Product Owner (CSPO) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.
You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.
Participants in a CSPO offering should expect that each Learning Objective identified in this document will be covered. Students should also expect that the Scrum Foundations Learning Objectives are covered either before or during the offering.
-
The EASPO: EXIN Agile Scrum Product Owner certification focuses on bringing value to the customer and value for the business, through Agile project management techniques. This certification is especially suitable for professionals working in the areas of project management, software development, IT service management and business management.
EXIN Agile Scrum Product Owner tests a candidate’s skills and knowledge of Agile principles and Scrum practices specifically with the role of Product Owner in mind. This certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Product Owner.
-
Professional Scrum™ with User Experience (PSU) is a 2-day hands-on course where students who already have a fundamental understanding of Scrum and some experience using it will learn how to integrate modern UX practices, (UX is more than UI) into the way they are working in Scrum and how to work most effectively within Scrum Teams. Design work can sometimes feel slow, and not well suited to quick agile cadences and Scrum events, but that isn’t the case. Learn UX techniques that fit beautifully into Scrum, and practice these techniques with cross-functional teams in the class.
In this two day class* students will leverage an ongoing case study as a way of applying techniques learned throughout the class and preparing to take what they learn back to their workplace. This course is designed for Product Owners and Scrum Masters to enable them to better incorporate design, research and learning into their Scrum process.
Lean UX techniques focus the team toward customer-centric design and discovery. Scrum focuses the team toward rapid delivery and customer feedback. By bringing together Lean UX and Scrum, teams learn how to drive the design together with delivery in short, iterative cycles to assess what works best for the business and the user.
Leveraging Lean UX techniques, the course takes core design and research activities, illustrating how they come together with development and delivery. Attendees explore how these activities fit into a dual-track agile process (Design and Development) where cross-functional teams can work together to explore, experiment and deliver value-based outcomes.
-
Program your future with Python Institute.
PCPP1™ – Certified Professional in Python Programming 1 certification (Exam PCPP-32-101) is a professional credential that measures the candidate’s ability to accomplish coding tasks related to advanced programming in the Python language and related technologies, advanced notions and techniques used in object-oriented programming, the use of selected Python Standard Library modules and packages, designing, building and improving programs and applications utilizing the concepts of GUI and network programming, as well as adopting the coding conventions and best practices for code writing.
The PCPP1™ certification shows that the individual is familiar with the following concepts: advanced use of classes and modelling real-life problems in the OOP categories (classes, instances, attributes, methods; class and instance data; shallow and deep operations; inheritance and polymorphism; extended function argument syntax and decorators; static and class methods; attribute encapsulation; composition and inheritance; advanced exceptions; copying object data; serialization; metaclasses), best practices and standardization (PEP8, PEP 257, code layout, comments and docstrings, naming conventions, string quotes and whitespaces, programming recommendations), GUI programming (events, widgets, geometry, tools and toolkits, conventions), the elements of network programming (network sockets, client-server communication, JSON and XML files in network communication, HTTP methods, CRUD, building a simple REST client), and file processing and communicating with a program’s environment (processing files: sqlite3, xml, csv, logging, and configparser; communication: os, datetime, io, and time).
-
Learn, train and grow with Cybersecurity Fundamentals.
As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.
This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.
Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:
- Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
- Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
- Stay ahead of the curve on your current career path or start your new cybersecurity career strong.
The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
-
ISO/IEC 27002 Foundation
ISO/IEC 27002 Foundation training course enables participants to learn the basic concepts related to the implementation and management of information security controls based on the guidelines of ISO/IEC 27002. Through this training course, participants will be able to identify the information security controls of ISO/IEC 27002 that are categorized into four themes:
organizational, people, physical, and technological.The training course also provides information on how ISO/IEC 27002 is related with other standards, such as ISO/IEC 27001 and ISO/IEC 27003. The training course is followed by an exam. If you pass, you can apply for the “PECB Certificate Holder in ISO/IEC 27002 Foundation” certificate. This certificate demonstrates that you have a general knowledge of ISO/IEC 27002 information security controls.
The ISO/IEC 27002 Foundation training course provides information on the fundamental concepts of information security, cybersecurity and privacy based on ISO/IEC 27002.
-
This Data Science Fundamentals Certificate course introduces you to data science, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security. Data science demands skilled professionals who possess the knowledge, skills, and ability to address the evolving threat landscape.
-
This AI Fundamentals Certificate course introduces you to Artificial Intelligence (AI), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
AI focuses on building smart machines capable of performing tasks that typically require humans and is drastically increasing in demand as it continues to change the future of virtually every field of technology. With AI Fundamentals, you’ll learn how understanding AI’s risks and potential can fast-track your career.
-
This Blockchain Fundamentals Certificate course introduces you to Blockchain, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
-
This Cloud Fundamentals Certificate course introduces you to Cloud Computing, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.
As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.
The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.
-
CompTIA DataAI is an expert-level certification designed for experienced data professionals ready to work at the intersection of data science, AI, and enterprise operations.
The certification targets senior data analysts, data scientists, data engineers, and IT professionals who are already working with analytics, cloud platforms, and AI-enabled tools—and who want to move into more advanced, AI-infused roles.
Aligned with CompTIA’s Xpert Series, DataAI reflects how advanced data roles have evolved. Statistical rigor, machine learning, MLOps, and business outcomes are no longer separate concerns. The certification confirms that a professional can move beyond analysis into building trustworthy, scalable AI systems that deliver measurable results.
-
CompTIA SecurityX serves as the capstone certification in the CompTIA Cybersecurity Career Pathway, intended to be the final certification for those seeking to prove their mastery of advanced cybersecurity skills.
Targeted at professionals with 5 to 10 years of experience, SecurityX represents the pinnacle of cybersecurity certifications. It is specifically designed for senior security engineers and security architects tasked with leading and improving an enterprise’s cybersecurity readiness.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
CompTIA CloudNetX validates your ability to design and implement secure, scalable networking solutions in hybrid environments. You’ll cover key areas like security design, network monitoring, performance optimization, and advanced troubleshooting, with hands-on skills such as Zero Trust implementation. This certification equips you with the expertise to advance your career as a network architect, security architect, or enterprise architect.
CloudNetX equips tech professionals with advanced skills to design, engineer, and integrate secure, scalable networking solutions in hybrid environments. Building on Network+ and Cloud+, this certification addresses the intricate challenges of modern enterprises. With CloudNetX learning and certification, candidates will master navigating both on-premises and cloud-based systems, making them sought-after experts.
-
Discover the key benefits of ITIL 4 and see how it can have a transformative impact on your career journey.
This essential ITIL 4 module introduces you to key concepts at the start of your ITIL 4 journey, providing a solid foundation for understanding IT service management and its core elements.
- Industry-recognized certification: Showcase your ability to excel in essential IT service management, and to handle critical tasks in the field.
- Employers’ first choice: Certify your expertise in managing IT services, making you the preferred choice for roles in IT service management and support.
- New career opportunities: Advance your career in IT with an ITIL certification, opening doors to new roles and cutting-edge opportunities in the evolving tech landscape.
What skills will you acquire?
- Service Operation: Develop operational support and analysis skills for ITSM activities, including monitoring and maintaining IT systems and infrastructure.
- Digital Transformation: Learn the processes involved in transforming IT systems to support a digital model. Learn how to collaborate with stakeholders, manage and lead plans.
- Problem Management: Learn how to reduce the likelihood and impact of incidents by identifying actual and potential causes of incidents and managing workarounds and known errors.
-
This course provides a comprehensive introduction to Databricks SQL. Learners will ingest data, write queries, produce visualizations and dashboards, and configure alerts. This course will prepare you to take the Databricks Certified Data Analyst Associate exam.
This course consists of two four-hour modules.
SQL Analytics on Databricks
In this course, you’ll learn how to effectively use Databricks for data analytics, with a specific focus on Databricks SQL. As a Databricks Data Analyst, your responsibilities will include finding relevant data, analyzing it for potential applications, and transforming it into formats that provide valuable business insights.
You will also understand your role in managing data objects and how to manipulate them within the Databricks Data Intelligence Platform, using tools such as Notebooks, the SQL Editor, and Databricks SQL.
Additionally, you will learn about the importance of Unity Catalog in managing data assets and the overall platform. Finally, the course will provide an overview of how Databricks facilitates performance optimization and teach you how to access Query Insights to understand the processes occurring behind the scenes when executing SQL analytics on Databricks.
AI/BI for Data Analysts
In this course, you’ll learn how to use the features Databricks provides for business intelligence needs: AI/BI Dashboards and AI/BI Genie. As a Databricks Data Analyst, you will be tasked with creating AI/BI Dashboards and AI/BI Genie Spaces within the platform, managing the access to these assets by stakeholders and necessary parties, and maintaining these assets as they are edited, refreshed, or decommissioned over the course of their lifespan. This course intends to instruct participants on how to design dashboards for business insights, share those with collaborators and stakeholders, and maintain those assets within the platform. Participants will also learn how to utilize AI/BI Genie Spaces to support self-service analytics through the creation and maintenance of these environments powered by the Databricks Data Intelligence Engine.
-
The course provides the Oracle Database 19c new features and enhancements related to database overall, security, availability, performance, data warehousing, and diagnosability. In the lessons, you learn the new and enhanced features of Oracle Database 19c amongst different areas such as database overall, security, availability, performance, big data and warehousing, and diagnosability.
-
This one-day, role-specific course introduces business users to the Snowflake AI Data Cloud and its architecture. Participants learn how to connect to Snowflake, access the data they need, use that data, augment the data, and report data insights from Snowflake. The course consists of lectures, labs, demonstrations, and discussions.
-
CompTIA SecAI+ enables a safer digital future by empowering IT and cybersecurity talent worldwide to meet the emerging challenges and opportunities at the intersection of AI and security.
This cybersecurity credential from CompTIA is the global IT industry’s first comprehensive “expansion” certification focused on the security of artificial intelligence systems and the secure application of AI in cybersecurity operations.
This certification equips professionals with critical, vendor-neutral skills to understand, defend, and ethically deploy AI technologies within any organization.
-
The SDA qualification course is for front-line IT service and support analysts with some experience in a first-line or second-line service desk environment. This course is perfect for analysts looking to grow in their role and gain a recognized qualification in their profession. This course will help them to develop practical skills whilst earning a certificate that endorses their commitment and knowledge.
Covering three days of learning, plus the qualification exam at the end of the course, analysts will fully explore the modules covered in SDI’s professional standard for Service Desk Analysts and will equip all Service Desk Analysts the essential skills and knowledge needed for delivering customer service and support excellence.
-
This two-day, hands-on EDU-SDWANDM4: VMware SD-WAN: Deploy and Manage [V4.x] training course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud® environment.
In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud.
-
Elevate Your Career with vSphere 8 Training and Certification
In this 2-day official VMware Learning course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0. Through use-case scenarios, demonstrations, labs, and simulations, you develop skills to implement and configure vSphere 8.0.
-
Prepare yourself for Red Hat Enterprise Linux 8 by learning about changes to the operating system
Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release.
This course is based on Red Hat Enterprise Linux 8.
-
This course gives business leaders the skills and knowledge to better manage such analytical efforts. It describes how to get started and what is required to effectively run projects which leverage Big Data analytics. Specifically, it addresses: deriving business value from Big Data, leading Data Science projects using a data analytics lifecycle, developing Data Science teams, and driving innovation using analytics.
-
This 24-hour practical lab exercise is designed to take you through the tasks of a complete mock deployment. Each participant is given access to a specified number of Linux servers and a set of requirements. Participants then perform a mock deployment according to requirements which adhere to Splunk Deployment Methodology and best-practices.
-
This 2-virtual day course is designed for Splunk administrators. It covers topics and techniques for troubleshooting a standard Splunk distributed deployment using the tools available on Splunk Enterprise
This lab-oriented class is designed to help you gain troubleshooting experience before attending more advanced courses. You will debug a distributed Splunk Enterprise environment using the live system.
This course does not cover the issues surrounding Splunk Cloud, Splunk Clusters, or Splunk premium apps.
-
This 9 hour introductory course prepares IT and security practitioners to plan, design, create and debug basic playbooks for SOAR. Students will learn fundamentals of SOAR playbook capabilities, creation and testing. This course is a pre-requisite for the Advanced SOAR Implementation course.
-
The goal of this course is to enhance your basic teaching techniques. You will acquire a broad range of necessary knowledge and become able to put it into practice in order to provide high-quality training as a trainer.
-
Become a Cyber First Responder – Monitor, Detect, Prevent and Document Cyber Incidents.
CSA thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.
As the security landscape is expanding, a SOC team offers high-quality IT-security services to detect potential cyber threats and attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analyst who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.
- The lab-intensive SOC analyst certification program emphasizes the holistic approach to deliver elementary as well as advanced knowledge of how to identity and validate intrusion attempts.
- Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence.
- The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools.
- The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Master the critical first line of cyber defense.
EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.
This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.
The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.
The E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH&R, from preparing/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.
With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.
The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today`











