You searched for: ""

  • SVPN: Implementing Secure Solutions with Virtual Private Networks

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.

    This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.

  • 2 Days ILT, VILT

    In this two-days Scaled Agile Framework course, attendees gain an understanding of the role of a Scrum Master in a SAFe enterprise. Unlike traditional Scrum Master training that focuses on the fundamentals of team-level Scrum, the SAFe Scrum Master course in Singapore, explores the role of the Scrum Master in the context of the entire enterprise and prepares attendees to successfully plan and execute the Program Increment (PI), the primary enabler of alignment throughout all levels of a SAFe organization. This includes learning the key components of Agile at scale development, how Scrum is facilitated throughout the enterprise, and how to execute Iteration Planning.

    Attendees discover how to build high performing Agile teams by becoming a servant leader and coach, and how to coach those teams to deliver the maximum business value at scale. The SAFe 5 Scrum Master (SSM) certification signifies that people are prepared to perform the role of Scrum Master in a SAFe environment, increasing their value to teams and organizations that are implementing SAFe.

  • 4 Days ILT

    The Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 course shows you how to deploy Snort® in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You’ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more.

  • 1 Day ILT, VILT

    IBM FlashSystem 9100 system is an all-flash, powerful end-to-end Non-Volatile Memory Express (NVMe) enterprise storage solution that combines the performance of IBM FlashCore technology.
    FlashSystem 9100 is built on the efficiency of IBM Spectrum Virtualize, and delivered on a proven IBM software solution with extremely low latencies for your multi cloud deployments.

    This course introduces the FlashSystem 9100 NVMe Control Enclosure models: IBM 9846/9848 FlashSystem 9110, Model AF7 and IBM 9846/9848 FlashSystem 9150, Model AF8.
    It also focuses on the integration of FlashSystem 9100 SAS-Attached expansion enclosures; scalability performance with NVMe; and the intuitive sight of IBM Storage Insights which helps optimize the storage infrastructure using predictive analytics.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 3 Days ILT, VILT

    The Securing Cisco Networks with Snort Rule Writing Best Practices (SSF Rules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more.

    The hands-on labs give you practice in creating and testing Snort rules.

  • 3 Days ILT, VILT

    The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.

    Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.

  • 4 Days ILT, VILT

    This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:

    Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.

    Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression

    Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.

    Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.

    Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.

    This course lecture offering is at the Storwize V7000 V7.6. level.

  • 5 Days ILT, VILT

    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installations storage management requirements.

    Hands-on lab exercises enable you to perform a step-by-step implementation.

  • 4 Days ILT, VILT

    This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.

  • 4 Days ILT, VILT

    This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.

    To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.

    Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.

    Hands-On Labs

    Eight labs are included to address:

    • IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
    • tuning VSAM and the VSAM buffers
    • alternate indexes
  • 3 Days ILT, VILT

    SRE Practitioners deliver business value to customers through collaboration with DevOps teams and engineering of reliable, secure application environments and software systems.

    The Site Reliability Engineering Practitioner course introduces ways to economically and reliably scale services in an organization. It explores strategies to improve agility, cross-functional collaboration, and transparency of health of services towards building resiliency by design, automation and closed loop remediation.

    The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and effective incident responses using SRE practices.

    The course is developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption. This course positions learners to successfully complete the SRE Practitioner certification exam.

    This course may be eligible for PMI’s PDUs.

Go to Top