Through hands-on labs, the student will learn the architecture and features of Red Hat JBoss BPM Suite, basic and advanced business process modeling (BPMN 2.0), and integration of workflow into Java™ SE and Java EE applications. In addition to creating workflow applications, the student will learn how to unit test and debug those applications using Red Hat JBoss Developer Studio. Students will learn how to deploy a business process and monitor its runtime state.
-
Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.
This course is based on Red Hat Enterprise Linux 7.1.
Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.
-
The RCCS curriculum has been created by subject matter experts (SMEs) of Rocheston, who have gone through extensive research to create content that is practical and connects perfectly with current industry standards.
The program acts as a stepping stone for becoming an accomplished cybersecurity specialist, who can turn tables at a dynamic organization with the acquired insights. The program teaches you about the best practices associated with security risks, both at home and otherwise.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.
As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.
-
The Modern Certification for the Modern Times.
The RCCE1: Rocheston Certified Cybersecurity Engineer – Level 1 course will delve into the basics of cybersecurity along with hands-on labs. You will gain an insight into hacking technologies and tools. Level 1 covers the foundation of hacking technologies. For instance, it looks at Web application attacks, Trojans and Malware, Denial of Service attacks, metasploit, firewalls, cryptography, cracking passwords, hacking the cloud etc. The RCCE Level 1 is a mandatory requirement, to move to the Level 2 program. The course is 100% Linux based.
The RCCE certification covers advanced futuristic technologies like Blockchain, Artificial Intelligence, Cyberthreat Intelligence, Incident Handling, Cloud technologies, Quantum Computing, Biometrics, Deep Learning etc.
Most sought after Ethical Hacking Training & Certification to get your started with Cybersecurity and serves as a mandatory requirements before attending RCCE2: Rocheston Certified Cybersecurity Engineer – Level 2 certification course.
NEW: The RCCE now includes RCAI Engineer certification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The RCCE Cybersecurity Certification Program.
Cybersecurity engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime. They’ll often serve as a go-to team member for security policies and procedures.
The RCCE2: Rocheston Certified Cybersecurity Engineer – Level 2 program will give you a detailed, in-depth knowledge and hands-on labs. You will have mastery over hacking technologies and tools. The Level 2 program covers advanced futuristic hacking stuff. For instance, it looks at advanced blockchain exploits, quantum computing and cryptography, advanced ransomware and cryptojacking, etc. The RCCE Level 1 is a mandatory requirement, to move to the Level 2 program.
PRO Tip: Learn more about our range of role-based cybersecurity training courses in our new blog post.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Over the 3 days in this hands-on APS-SD: Applying Professional Scrum for Software Development course, students gain a real-world view of what it is like to build software with Scrum. They collaborate over a series of Sprints applying modern engineering practices, and using the Scrum framework to manage complexity. The key focus of the class is on how to develop and deliver increments of releasable functionality. Students will experience real-world challenges and issues, and through a series of Sprints will learn how to continuously improve the way they perform their work.
This Professional Scrum Developer certification course teaches how Agile engineering practices and supportive DevOps tools complement Scrum and further advance a team’s capabilities and is available in .NET and Java specific technologies, along with a generic technology course. Professional Scrum Trainers can work with you to define a specific technology stack that meets your needs in private classes for your organization.
The course teaches how Agile engineering practices and supportive DevOps tools complement Scrum and further advance a team’s capabilities. This Agile developer course provides greatest value if the whole Scrum Team (Developers, Scrum Master and Product Owner) attend together and experience the power of real teamwork. Teams that attend together are not only able to apply learnings to their work immediately, but are also able to recall their classroom experiences to overcome particularly challenging times.
The course is available in Microsoft Visual Studio .NET and Java specific technologies, along with a generic technology course. Professional Scrum Trainers can work with you to define a specific technology stack that meets your needs in private classes for your organization.
-
In this two-days APS: Applying Professional Scrum class, students learn to apply Professional Scrum. They experience new, agile ways of working that enable teams to deliver more value, satisfy stakeholders and work better together. Students work together as a team in a series of Sprints to solve complex problems, facing similar challenges that they face outside of class and learning how to use Scrum to address them.
These Sprints enable students to see the practical application of Scrum and to understand the value of an Agile mindset. Additionally, these Sprints expose common missteps and misunderstandings often seen while using Scrum, allowing students to develop an awareness of the associated symptoms and how to correct them. Students not only learn Scrum; they learn how to use Scrum well.
-
Professional Scrum Master II (PSM II) course is a 2-day advanced Scrum Master class designed to support Scrum Masters in their professional development. The PSM II course is intended for Scrum Masters with at least one year of experience who are looking to grow their knowledge and abilities as a Scrum Master. This course is one step in that journey. The course also includes a free attempt at the globally recognized Professional Scrum Master II (PSM II) certification exam.
Unlike the Professional Scrum Master (PSM) course which focuses on how to use Scrum, the Scrum framework and the role of the Scrum Master, PSM II is an advanced Scrum Master certification course helping students to understand the stances that characterize an effective Scrum Master and servant-leader while diving deep into how they serve the Development Team, Product Owner and organization. The course then teaches students about related practices and skills to enable them to have the right types of conversations and how to apply them to become better Scrum Masters.
MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).
-
Mastering the Product Owner Stances.
This 2-day Professional Product Owner – Advanced (PSPO-A) course focuses on helping experienced practitioners expand their ability to establish a solid vision, validate their hypotheses, and ultimately deliver more value to their stakeholders. The PSPO-A course is intended for Product Owners who are looking to grow their knowledge and abilities. The course goes beyond the topics explored in the Professional Scrum Product Owner (PSPO) class by deepening the attendee’s understanding of the role through the exploration of the many stances of a professional Product Owner.
This Advanced Scrum Product Owner certification course is an interactive, experiential workshop where attendees explore topics through a series of exercises and discussions. Students should have at least one year of Product Owner experience and a practical knowledge of Scrum in order to participate in and benefit from these exercises. Having previously taken the PSPO class is recommended, but not required. The course also includes a free attempt at the globally recognized Professional Scrum Product Owner II certification exam (PSPO II).
-
The Professional Agile Leadership Essentials (PAL-E) is a 2-day hands-on workshop that uses a combination of instruction and hands-on exercises to help managers and other leaders who work directly with agile teams understand how to best support, guide, and coach their teams to improve their agile capabilities. The workshop provides a foundation for the role that leaders play in creating the conditions for a successful agile transformation.
Leaders and managers are critical enablers in helping their organizations be successful, yet the role of leaders and managers in an agile organization can be quite different from what they are used to. This workshop uses a combination of instruction and team-based exercises to help participants learn how to form and support agile teams to achieve better results, and how to lead the cultural and behavioral changes that organizations must make to reap the benefits of an agile product delivery approach.
-
Being a professional Agile Scrum Product Owner encompasses more than writing requirements or managing a Product Backlog. Product Owners need to have a concrete understanding of all product management aspects, including but not limited to product ownership, that drives value from their products.
Professional Scrum Product Owner (PSPO) is a 2-day course that focuses on all of these areas to teach students how to maximize the value of products and systems. PSPO is the cutting-edge course for Product Owners, Agile product managers and anyone responsible for a product’s success in the market. In this course, students will develop and solidify their knowledge of being a Product Owner through instruction and team-based exercises.
In this Scrum Product Owner training course, students will develop and solidify their knowledge of being a Product Owner through instruction and team-based exercises. The breadth of the role’s responsibilities in delivering a successful product will become more clear from an Agile perspective. Metrics are identified to track the creation of value and the successful delivery of the product to the marketplace.
This Scrum Product owner certification course is much more than just a set of slides and an instructor. In this course, students work on real-life cases with other classmates together as a team. This course is made up of discussions and hands-on exercises based upon real-life cases and courses are delivered by Professional Scrum Trainers (PST).
-
Professional Scrum with Kanban (PSK) is a 2-day course that teaches Scrum practitioners how to apply Kanban practices to their work. Through theory, case studies, and hands-on exercises, participants will understand the importance of transparency and flow as it pertains to the Scrum framework. Scrum is the defacto standard for how Agile teams work. Scrum exists only in its entirety and functions well as a container for other techniques and practices. Scrum Teams keep improving how they work, based on what they learn by inspecting and adapting on an ongoing basis.
In this class, students will learn how additional practices from Kanban can be introduced into their Scrum Teams without changing Scrum. They will learn how to add the right practices and the benefits that their Scrum Teams can achieve from using Scrum with Kanban.
-
Trend Micro™ TippingPoint™ Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands – on activities, students will learn to implement the inspection device and the Security Management System (SMS).
-
Trend Micro Deep Discovery Advanced Threat Detection 4.0 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks. Participants explore key concepts and methodologies using the following blend of Deep Discovery products for a more complete approach to network security:
- Trend Micro™ Deep Discovery™ Analyzer
- Trend Micro™ Deep Discovery™ Inspector
- Trend Micro™ Deep Discovery™ Email Inspector
- Trend Micro™ Deep Discovery™ Director
This cybersecurity course provides a variety of hands-on lab exercises allowing each student to put the lesson content into action. There will be an opportunity to set up and configure various Deep Discovery management and administration features and explore their functionality using a virtual lab environment. A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat Protection solutions. This includes recommendations on best practices and general troubleshooting steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions in your environment.
The course also explores various deployment considerations and requirements needed to tie Deep Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat hunting and intelligence sharing, for better threat detection functionality.
-
The Robotic Process Automation (RPA) Design & Development course offers comprehensive knowledge and professional-level skills focused on developing and deploying software robots. The course assumes no prior knowledge of RPA. It starts with the basic concepts of Robotic Process Automation. It further builds on these concepts and introduces key RPA Design and Development strategies and methodologies, specifically in the context of UiPath products. A student undergoing the course shall develop the competence to design and develop a robot for a defined process.
The course also prepares the student for UiPath-ADA – UiPath Automation Developer Associate exam. The course consists of 40 hours of a theory component and an associated 20 hours of practice/lab exercises component.
-
The Robotic Process Automation (RPA) Advanced Design and Development course aims at providing a deep understanding and extensive hands-on experience on UiPath technologies such as Studio, Robots, and Orchestrator. It prepares the student to independently build or lead production level automation and complex RPA solutions in the Robotic Enterprise Framework.
The course should be delivered in an instructor-led training environment. It has a 20-hour theory component and an associated lab component followed by 20-hours of Project work. The course is based on UiPath Studio version 2020.10.
-
This two-day, hands-on EDU-VSANPD7: VMware vSAN: Plan and Deploy [V7] training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster.
In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster.
-
This three-day EDU-VSD7: VMware vSphere: Design [V7] training course equips you with the knowledge, skills, and abilities to design a VMware vSphere® 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices.
This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.
Given a case study, you practice your design skills by working with peers on a design project.
Product Alignment
• VMware ESXi™ 7
• VMware vCenter Server® 7 -
Through a mix of lecture and hands-on labs, you will install, configure and manage vSphere . You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere, which includes VMware ESXi™ 7 and VMware vCenter Server.
-
This four-day, hands-on VMware Cloud on AWS: Deploy, Configure, Manage 2021 training course provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud on AWS infrastructure. You explore the common use cases of the VMware Cloud on AWS infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere® that leverage AWS.
In this course, you are introduced to various rapid and easy migration options for workloads based on vSphere to VMware Cloud on AWS. In addition, you are presented with VMware Cloud Disaster Recovery™, which is a Disaster Recovery as-a-service (DRaaS) solution, with fast recovery capabilities, that can be used to cost-effectively protect a broad set of your virtualized applications.
Product Alignment
- VMware Cloud on AWS
- VMware ESXi™ 7.0
- VMware vCenter Server® 7.0
- VMware vSAN™ 7.0
- VMware NSX-T™ Data Center 2.5
-
Simplify your cloud experience with vRealize Automation – the modern automation platform.
This is a five-day course that is a follow-on to the VMware vRealize® Automation Install, Configure, Manage course. In this course, you go deeper into using the advanced features of vRealize Automation to deploy user systems and interface vRealize Automation with other platforms. The course covers deploying and enterprise level cluster environment using VMware vRealize® Suite Lifecycle Manager.
This VMware course makes heavy use of hands-on labs. Students can run 41 labs during the 5-day course.
Product Alignment
- VMware vSphere® 7.0
- VMware vRealize Automation 8.1
- VMware vRealize Orchestrator 8.1
- VMware vRealize® Suite Lifecycle Manager™ 8.1
- VMware NSX-T Data Center 3.0
-
This five-day hands-on EDU-NSXTTO3: VMware NSX-T Data Center: Troubleshooting and Operations [V3.2] training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX-T™ Data Center environment. In this course, you are introduced to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your NSX-T Data Center.
In addition, you are presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process.
Product Alignment
- NSX-T Data Center 3.2
-
In this three-day EDU-VSANMO7: VMware vSAN: Management and Operations [V7] course, you learn about managing and operating VMware vSAN™ 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as, vSAN node management, cluster maintenance, security operations and advanced vSAN cluster operations. You also gain practical experience through the completion of instructor-led activities and hands-on lab exercises.
This VMware training course is also available in an On Demand format. For more information, select this link: VMware vSAN: Management and Operations [V7] – On Demand.
- Product Alignment
- VMware ESXi™ 7.0 U1
- VMware vCenter Server® 7.0 U1
- VMware vSAN 7.0 U1
-
In this three-day EDU-VSANDM67: VMware vSAN: Deploy and Manage v6.7 course, you focus on deploying and managing a software-defined storage solution with VMware vSAN™ 6.7. You learn how vSAN functions as an important component in the VMware software-defined data center. You gain practical experience with vSAN concepts through the completion of hands-on lab exercises.
Product Alignment
- ESXi 6.7
- vCenter Server 6.7
- vSAN 6.7
-
In this three-day FT-FSM: FortiSIEM Basic Training course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network.
You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.
Product version: FortiSIEM 6.3
-
In this two-day FT-FMG: FortiManager Training class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices.
In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
-
In this course, you will learn how to use the FortiClient EMS feature, provision FortiClient endpoints, FortiClient EMS Security Fabric integration, explore different editions of FortiClient, and deploy and configure ZTNA agent and endpoint security features. These fundamentals of the product will provide you with a solid understanding of how to deploy, manage and maintain endpoint security using FortiClient EMS products
In interactive labs, you will explore the FortiClient installation and features. You will also explore EMS components, database management, operation modes, how to deploy FortiClient, and more. These administration fundamentals will provide you with a solid understanding of how to implement and manage endpoint security and the Security Fabric.
-
In this three-day FT-FAC: FortiAuthenticator Training class, you will learn how to use FortiAuthenticator for secure authentication and identity management. You will learn how to configure and deploy FortiAutheticator, use FortiAuthenticator for certificate management and two-factor authentication, authenticate users using LDAP and RADIUS servers, and explore SAML SSO and how FortiAuthenticator can act as both a SAML identity provider and service provider.
Finally, you will examine some helpful troubleshooting techniques.
In interactive labs, you will explore how to authenticate users, with FortiAuthenticator acting as a RADIUS and LDAP server, a certificate authority (CA), and logon event collector that uses—and extends—the Fortinet Single Sign-On (FSSO) framework to transparently authenticate users. You will explore portal services, FortiTokens, and digital certificates.
-
In this 1-day FT-FDD: FortiDDoS Training class, candidates will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.
In interactive labs, candidates will deploy FortiDDoS to learn about normal network traffic patterns. Then you will simulate attacks, observe the defense, and adjust the automatically estimated behavior.
With a focus on core feature skills, topics also include network behavior analysis and ASIC chips.
-
In this three-day FT-FML: FortiMail Training class, you will analyze email security challenges that administrators face, and learn where and how to deploy, manage, and troubleshoot FortiMail to protect your network from email-borne threats.
You will also explore the role of FortiMail as a specialized device, and how its features provide both high-performance and in-depth security for business-critical communications.
-
In this three-day FT-FWC: FortiWLC Training class, you will learn how to design, implement, and maintain a basic FortiWLC-based wireless network.
The practical labs will give you hands on experience in configuration, management, and monitoring of the wireless network
-
In this three-day FT-NAC: FortiNAC course, you will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response.
In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.
-
In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.
These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.
-
Program your future with Python Institute.
The PCAP™ – Certified Associate in Python Programming certification (Exam PCAP-31-0x) is a professional, high-stakes credential that measures the candidate’s ability to perform intermediate-level coding tasks in the Python language, including the ability to design, develop, debug, execute, and refactor multi-module Python programs, as well as measures their skills and knowledge related to analyzing and modeling real-life problems in OOP categories with the use of the fundamental notions and techniques available in the object-oriented approach.
Becoming PCAP™ certified ensures that the individual is fully acquainted with all the primary means provided by Python 3 to enable them to start their own studies at an advanced level, and to open a path to the developer’s career.
PCAP™ certification is an interim step to the PCPP1: Certified Professional in Python Programming 1 certification, a great motivator for self-improvement and self-development, and most importantly – the means to keep one’s programming skills up to date and demonstrate them to others. Becoming PCAP™ certified reflects the candidate’s interest in developing a higher level of proficiency and a more in-depth understanding of Python, as well as their ability to use it for commercial and non-commercial general-purpose programming projects, and create, develop, and improve their own programming portfolio to increase their value in the job market.
-
In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.
In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.