You searched for: ""

  • 180 Days ILT, VILT

    The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.

    This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.

    This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals v1.2

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Launch your career in cybersecurity operations.

    The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) training provides an understanding of:

    • network infrastructure devices, operations, and vulnerabilities of the TCP/IP protocol suite
    • basic information security concepts
    • common network application operations and attacks
    • Windows and Linux operating systems
    • types of data that are used to investigate security incidents

    After completing this training, you will have the basic knowledge that is required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center (SOC).

    This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

    In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

    This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • 2 Days ILT, VILT

    As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.

    That’s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what’s next.

    Why Earn the CC?
    If you’re looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team. This certification is ideal for:

    • IT professionals
    • Career changers looking to transition into cybersecurity
    • College students or recent graduates
  • CCNA: Implementing and Administering Cisco Solutions

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Unlock the Potential of Network Programmability and Automation: Discover the new Cisco CCNA v2.0 course.

    The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

    The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking, and sets the foundation for you to upgrade your skillset with Cisco CCNP certifications.

    This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    To gain a comprehensive understanding of CCNA, be sure to explore our blog on The CCNA: A Beginner’s Guide to Networking Certifications, take a read today!

  • 5 Days ILT, VILT

    Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.

    As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • 5 Days ILT, VILT

    Attackers never rest, and along with all the traditional threats targeting internal networks and systems, an entirely new variety specifically targeting the cloud has emerged.

    As more organizations adopt cloud-based systems, new complexities and challenges surface and the risks increase. Organizations need cloud security professionals with the requisite knowledge, skills and abilities to be able to audit, assess and secure cloud infrastructures.

    To address this need, ISC2 and the Cloud Security Alliance (CSA) have developed the Certified Cloud Security Professional (CCSP) certification. This top cybersecurity credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.

    In this 5-day course you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this ISC2 Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official ISC2 CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Certified Cybersecurity Technician

    This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

    EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

    To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 2 Days ILT, VILT

    This CDEF: Continuous Delivery Ecosystem Foundation course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing, and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APIs and cultural considerations with Continuous Delivery.

    Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.

    Built upon the principles and practices highlighted in bestselling books such as “Continuous Delivery,” “Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations,” and more written by thought leaders in the DevOps movement. The Continuous Delivery Architecture course equips IT professionals with the broad-based competencies necessary in architecting and orchestrating effective and efficient automated deployment pipelines.

     

  • 4 Days ILT, VILT

    The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam.

    The global average cost of a data breach in 2024 reached $4.88 million, with costs even higher in sectors handling sensitive personal data (e.g., healthcare, finance). – Source: IBM Cost of a Data Breach Report 2024

    The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

Go to Top