You searched for: ""

  • 4 Days ILT, VILT

    The main objective of this React training course is to help you become familiar with the process and gain the skills you’ll need to become a professional React developer. You will learn the fundamentals of React through self-paced and instructor-led training to understand and build React components and structure applications with Redux.

  • SWSA: Securing the Web with Cisco Web Security Appliance v3.0

    Price range: RM5,000.00 through RM6,350.00
    2 Days ILT, VILT

    Protect your organization from online threats with the Cisco Web Security Appliance.

    Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.

    This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA), which leads to CCNP® Security and the Cisco Certified Specialist – Web Content Security.

    This course also earns you 16 Continuing Education (CE) credits towards recertification.

  • 2 Days ILT, VILT

    This course provides guidance into the Process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Participants learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ‘just enough’ process and how to continually align process performance with overall business goals.

    A process owner is an individual accountable for the performance of a process and for ensuring the process delivers value to its stakeholders. Process owners manage the requirements of process stakeholders, translate those requirements into process performance objectives, and oversee the entire process design and improvement life cycle.

  • 3 Days ILT, VILT

    This course provides an overview of the Oracle Database 18c new features and enhancements related to Multitenant architecture, security, RMAN, general database areas, performance, data warehousing and Sharding.

    Learn To: 

    • Use new features like Application PDB Fleet and PDB snapshots carousel of the Multitenant architecture.
    • Understand new features like PDB keystores and encryption of sensitive data in Database Replay files of the Security.
    • Benefit from new features like reuse of preplugin backups and duplication of active PDBs into an existing CDB of RMAN.
    • Use new features like private temporary tables and online modification of partitioning and subpartitioning strategy of General Database.
    • Configure and use new features like Automatic In-Memory Management in Performance.
    • Manipulate new features like inline external tables and polymorphic table functions of the Data Warehousing.
    • Understand enhancements like user-defined sharding method and support for PDBs as shards in Sharding.
  • 3 Days ILT, VILT

    The Oracle Database: SQL Workshop I Ed 3 course offers students an introduction to Oracle Database 12c database technology. The students are also introduced to Oracle Database Exadata Express Cloud Service. In this class students learn the concepts of relational databases and the powerful SQL programming language. This course provides the essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.

    Learn To: 

    • Identify what a SQL statement is.
    • Understand the Oracle Relational Database.
    • Use SQL Developer.
    • Write reports using SQL Statements.
    • Manipulate data in relational tables and save the data.
  • 3 Days ILT, VILT

    In the Oracle Database: SQL Tuning for Developers course, you learn about Oracle SQL tuning and how to apply tuning techniques to your SQL code. Learn the different ways in which data can be accessed efficiently. In this course, you will be introduced to Oracle Database Exadata Express Cloud Service.

    Learn To:

    • Use Oracle tools to identify inefficient SQL statements.
    • Use Automatic SQL Tuning.
    • Use Real Time SQL monitoring.
    • Write more efficient SQL statements.
    • Monitor and trace high load SQL statements.
    • Manage optimizer statistics on database objects.
    • Understand the optimizer process steps and operators.
    • Interpret execution plans.
    • Perform application tracing.
    • Gain an understanding of the Oracle Database Exadata Express Cloud Service
  • 3 Days ILT, VILT

    In the Oracle Database 12c R2: Advanced PL/SQL course, students learn how to use the advanced features of PL/SQL in order to design and tune PL/SQL to interface with the database and integrate with the other applications in the most efficient manner. They learn to write powerful PL/SQL programs using external C/Java routines, fine-grained access packages, cursors, extended interfaces and collections.

    Learn To:

    • Apply PL/SQL designing best practices.
    • Create PL/SQL applications that use collections.
    • Work with JSON data in the database.
    • Implement a virtual private database with fine-grained access control.
    • Write code to interface with external C and Java applications.
    • Write code to interface with large objects and use SecureFile LOBs.
    • Write and tune PL/SQL code effectively to maximize performance.
  • 3 Days ILT, VILT

    Oracle SOL Tuning for Developers Workshop course helps you learn how plans are tuned execution of Oracle SOL statements. You will learn how to write well-tuned SOL statements out of the box that are perfectly suited to Oracle DBMS.

     

  • 2 Days ILT, VILT

    The ICP-CAT: Enterprise Agile Coaching is the second of two knowledge-based certifications on the Enterprise Agile Coaching Track. This certification focuses on the field of Enterprise Agile Coaching, explores the core elements of an agile transformation, and links the core enterprise coaching competencies in a way that empowers coaches to act as agents of change in organizations.

    The Learning Outcomes also delve into the pursuit of professional mastery and Enterprise Agile Coaching’s ethical considerations. They then look at elements central to agile transitions, such as organizational and human change processes, transformation strategies, addressing organizational impediments, and communicating, educating, and facilitating enterprises. As an advanced path, most Enterprise Agile Coaching courses involve combining classroom learning and ongoing group discussions around practical experience in the field.

  • 2 Days ILT, VILT

    The nature of leadership has changed over the period. The longstanding top-down, command & control leadership style is not successful in the current and adaptive work environment. These environments require a paradigm shift in leaders and their understanding of what constitutes effective leadership.

    This set of Learning Outcomes focuses on developing leaders who are adaptive and agile in their leadership style.

    Leaders learn to lead themselves first and create an environment that will allow agility to thrive. In this two-day Agile leadership training, participants learn why we need enterprise agility, the vital personal competencies to lead the transformation, and the organizational elements required to survive and thrive in today’s turbulent environment.

  • 3 Days ILT, VILT

    Oracle Autonomous Database Workshop training course is designed for developers, administrators, architects and anyone who wants to learn about the first Autonomous Database in the market. In this course, you will be taught how to provision an Oracle Autonomous Database Cloud Service instance on Oracle Cloud that is suitable for your workload and requirements.

  • 3 Days ILT, VILT

    This course will help you to gain a first-hand experience of performing RAC Database migration in this workshop using some of the popular methods with the help of hands-on labs.

  • 3 Days ILT, VILT

    This three-day FDTBF: Fintech and Digital Transformation in Banking and Finance course aims to provide finance professionals with a solid foundation in the rapidly changing world of fintech and digital banking. FinTech, short for financial technology, refers to an emerging financial services sector that is fast becoming indispensable to financial institutions and is constantly impacting the way we view and execute financial transactions.

    This course will be pivotal in helping participants grasp the basics of fintech, navigate the mechanisms that facilitate it and comprehend the inevitably complex issues and intricacies that it brings.

    Benefits of the workshop are:

    • Understand the technologies that are impacting the economy, especially banking
    • Theoretical understanding of artificial intelligence (AI), the blockchain and Internet of Things (IoT) within FinTech
    • Broad applications grasp of technical/process solution to existing pain points
    • Develop business use case to develop/improve a new/existing product
    • Develop a competitive corporate strategy through innovative thinking
    • Significantly reduce business costs and improve efficiencies
  • 3 Days ILT, VILT

    EXIN Privacy & Data Protection Professional is a certification that validates a professional’s knowledge and understanding of the European privacy and data protection legislation and its international relevance, as well as the professional’s ability to apply this knowledge and understanding to everyday professional practice.

    With the ever increasing explosion of information flooding the internet, every company needs to plan how to manage and protect privacy of persons and their data. Not without a reason, many new laws within the EU, as well as in the USA and many other regions, are formed in order to regulate both privacy and data protection.

    The European Commission has published the EU General Data Protection Regulation (GDPR), meaning that from the 25th of May 2018 on, all organizations concerned must comply with specific rules. This Practitioner certification builds on the subjects covered by the Foundation exam by focusing on the development and implementation of policies and procedures in order to comply with existing and new legislation, application of privacy and data protection guidelines and best practices, and by establishing a data protection management system (DPMS).

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context

  • 3 Days ILT, VILT

    Service Integration and Management (SIAM) is a methodology used to manage and seamlessy integrate multiple service providers to ensure a single business-facing IT organization.

    The EXIN SIAM™ Professional certification tests a candidate’s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.

  • 2 Days ILT, VILT

    This CASM: Certified Agile Service Manager course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT’s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements.

    As Dev and Ops have been working in parallel with Dev focused on Agile/Scrum and Ops focused on ITSM/ITIL, this course strives to bring together individual achievements to deliver full business value. The course cross-pollinates Agile and ITSM practices to support end-to-end Agile Service Management so Dev starts to manage services instead of products and Ops and ITSM become more agile by scaling to “just enough” process leading to improved flow of work and time to value.

    Agile Service Management helps IT to meet customer requirements faster, improve the collaboration between Dev and Ops, overcome constraints in process workflows by taking an iterative approach to process design that will improve the velocity of process improvement teams to get more done. This course may be eligible for PMI’s PDUs.

  • 5 Days ILT, VILT

    The gateway to acquire in-demand technical skills in cybersecurity.

    EC-Council Certified Security Specialist (ECSS) is an entry level cybersecurity certification covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

    This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    Certified Cybersecurity Technician

    This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

    EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

    To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

  • 5 Days ILT, VILT

    The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

    The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization.

    It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an  understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 3 Days ILT, VILT

    The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

  • 2 Days ILT, VILT

    The RSSD: Secure Software Developer course is an intensive,highly interactive two-day program designed to equip software developers with the essential knowledge and skills needed to build secure applications in today’s increasingly hostile digital
    landscape.

    This course is an invaluable resource for developers seeking to enhance their understanding of web application security, understand common threats and vulnerabilities, and implement security best practices from the ground up.

  • 2 Days ILT, VILT

    While advances in technology have had a profound impact on the modern workplace, the expectations of the role and responsibilities of a project manager have correspondingly increased. Project teams in today’s environment are expected to:

    • Manage greater amounts of quickly evolving data and information.
    • Work at a higher level of productivity and show increased Returns on Investment.
    • Derive more information and value from the vast amounts of data being created.

    Artificial intelligence (AI), the science of systems imbued with the same cognitive abilities as people, is one solution to the issues listed above.

    This course provides a basic understanding of how Artificial Intelligence is already contributing to project effectiveness, and ultimately to project success in today’s project environments.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 3 Days ILT, VILT

    Lead the way with EXIN DevOps Master™. EXIN DevOps Master™ is an advanced-level certification that tests candidates on their ability to develop and maintain sustainable work practices. It enables them to introduce and promote DevOps in their organization in order to better manage application and service life cycles whilst facilitating collaborative teamwork.

  • 3 Days ILT, VILT

    The VeriSM™ Professional certification tests a candidate’s knowledge of, and skills in, applying VeriSM™ in an organization. Those certified as VeriSM Professional understand the impact of digital transformation on the organization and on people, consumers as well as staff. They are able to translate strategic direction into a successful operating environment. The certified VeriSM™ Professional has proven his or her ability to create and use a Management Mesh that is based on the organization’s portfolio, principles, and governance needs. After creating or adapting the Management Mesh based on new requirements, a VeriSM Professional is able to manage the product or service through the Define, Produce, Provide and Respond stages.

  • GCPNET: Networking in Google Cloud v3.0

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    This training course builds on the networking concepts covered in the Networking Fundamentals in Google Cloud course. Through presentations, demonstrations, and labs, participants explore and deploy Google Cloud networking technologies.

    These technologies include: Virtual Private Cloud (VPC) networks, subnets, and firewalls; Interconnection among networks; Load balancing ;Cloud DNS; Cloud CDN; Cloud NAT.

    The course will also cover common network design patterns.

  • GCSEC: Security in Google Cloud

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    Learn best practices in cloud security and how the Google Cloud security model can help protect your technology stack. Security Engineers actively assess existing Google Cloud implementations, identifying potential security issues, and prioritizing solutions.

    This Google Cloud certification uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    The Logging, Monitoring and Observability in Google Cloud training course teaches participants techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud.

    Learn how to monitor, troubleshoot, and improve your infrastructure and application performance. Guided by the principles of Site Reliability Engineering (SRE), this official Google Cloud course features a combination of lectures, demos, hands-on labs, and real-world case studies. In this course, you’ll gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, and profiling CPU and memory usage.

  • -30%

    GCP-SDPD: Serverless Data Processing with Dataflow

    Original price was: RM7,200.00.Current price is: RM5,040.00.
    3 Days ILT, VILT

    The next generation of Dataflow: Dataflow Prime, Dataflow Go, and Dataflow ML.

    This training is intended for big data practitioners who want to further their understanding of Dataflow in order to advance their data processing applications.

    Beginning with foundations, this training explains how Apache Beam and Dataflow work together to meet your data processing needs without the risk of vendor lock-in. The section on developing pipelines covers how you convert your business logic into data processing applications that can run on Dataflow.

    This training culminates with a focus on operations, which reviews the most important lessons for operating a data application on Dataflow, including monitoring, troubleshooting, testing, and reliability

  • 3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • 3 Days ILT, VILT

    PRINCE2® (Projects IN Controlled Environments) is a process-based approach for project management providing an easily tailored and scalable method for the management of all types of projects. The method is the de-facto standard for project management and is practiced worldwide. PRINCE2 is a flexible method that guides you through the essentials for running a successful project regardless of project type or scale. PRINCE2 can be tailored to meet your organization or industry-specific requirements. Upon completion of the course, learners will be able to:

    • Define the key concepts of projects and PRINCE2
    • Explain how the PRINCE2 principles underpin the PRINCE2 method
    • Understand the importance of people in successful projects
    • Describe the PRINCE2 practices and how they are applied throughout the project
    • Explain the PRINCE2 processes and how they are carried out throughout the project
    • Identify the relationships between processes, deliverables, roles, and the management dimensions of a project

    In addition to these general learning objectives, the PRINCE2 7 Foundation course also aims to prepare learners for the PRINCE2 Foundation exam. The exam covers the following topics:

    • The seven PRINCE2 principles
    • The seven PRINCE2 themes
    • The seven PRINCE2 processes
    • The purpose and major content of all PRINCE2 roles
    • The purpose and major content of all PRINCE2 management products

    By completing the PRINCE2 7 Foundation course and passing the exam, learners will demonstrate that they have a sound understanding of the PRINCE2 methodology and are ready to apply it to their own projects.

  • 4 Days ILT, VILT

    This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).

    In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.

  • CKA: Certified Kubernetes Administrator

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • CKAD: Certified Kubernetes Application Developer

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    Open new career doors – prove your Kubernetes & cloud native developer skills with the CKAD certification that is recognized globally, vendor-neutral, and relevant across all industries.

    The course, along with real-world experience and study, will provide the skills and knowledge also tested by the Certified Kubernetes Application Developer (CKAD) exam.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 4 Days ILT, VILT

    Deep Learning and Natural Language Processing

    Deep Learning and Natural Language Processing (NLP) have revolutionized the way we interact with and analyze text data. This four-day course, tailored for beginners, provides a comprehensive introduction to the foundations of deep learning and its application in NLP. Participants will gain a strong understanding of neural networks, language processing, and hands-on experience in building NLP models.

Go to Top