You searched for: ""

  • 3 Days ILT, VILT

    SDWSECis a Cisco SASE (Secure Access Service Edge) training targeted to engineers and technical personnel involved in designing, deploying, operating, and securing Cisco Edge solutions both in enterprise and Service Provider environments.

    This training is specifically designed for partners and customers implementing secure Cisco SD-WAN integrated with the complete feature set of Cisco Umbrella including DNS Security, Cloud Based Firewall and Secure Internet Gateway. The course walks you through how each integration works and how to design and implement it step-by-step.

  • 3 Days ILT, VILT

    Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella works and what are the features is the key focus of this 3-day Cisco online IT class. Students who enter the course with a basic understanding of Cisco products and IT solutions will be able to describe the Cisco Umbrella, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, and use Cisco Roaming Client.

  • 5 Days ILT, VILT

    This deep-dive training covers Cisco UCS X-Series server family and how Intersight can be the enablement platform for all UCS servers.

    We will cover Intersight features such as IWOM, IST, ICO, and programmability either On-Prem or in the Cloud. Attendees will learn the breadth of the physical X-Series (pools, policies, firmware, so much more) platform as well as maintaining existing infrastructure with Intersight Infrastructures Services. Also covered is how to manage physical, virtual, cloud platforms and deploy to any or all

  • 3 Days ILT, VILT

    Cisco DNA Spaces helps resolve physical-space ‘blind spots’ inside an organization. Through Cisco wireless infrastructure, organizations can gain insights into how people and things move throughout their physical spaces. Based on these insights, organizations can drive operational efficiencies by monitoring and managing the location, movement, and utilization of assets.

    This course enables learners how to use DNA Spaces to drive operational efficiency across environment types. Learners will understand use-cases and obtain the ability to identify procedures and applications when implementing and operating DNA spaces that are getting ‘back to business’ or business as usual.

    This course covers both basic and advanced operational elements of DNA Spaces while considering Data Analytics in the context of DNA Spaces. You will perform a hands-on ‘deep-dive’ into the solution and perform on-boarding of wireless infrastructure. Subsequently, you will configure the DNA Spaces solution both tactically and strategically. This will include elements such as behavioral metrics, location analytics, captive portals, profiling, customer engagements, Internet of Things, asset identification and management, and API interfaces for streaming and notifications. You will also explore DNA Spaces App Center and IoT Device Marketplace.

  • 2 Days ILT, VILT

    The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.

    You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.

    The course will allow you to earn 12 Continuing Education (CE) credits toward recertification

  • 5 Days ILT, VILT

    Master the implementation and management of information security incident management processes based on ISO/IEC 27035.

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities.

    In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

  • 3 Days ILT, VILT

    Understand the implementation and management of information security controls based on ISO/IEC 27002.

    ISO/IEC 27002 Manager enables participants to acquire the necessary knowledge and skills to support an organization in selecting, implementing, and managing information security controls based on ISO/IEC 27002. The training course provides information that will help participants in gaining a thorough understanding of how information security risks can be treated by selecting relevant controls, especially in the context of an information security management system (ISMS).

    A PECB ISO/IEC 27002 Manager certification will enable you to demonstrate your comprehensive knowledge in the implementation and management of information security controls based on industry best practices.

     

  • 5 Days ILT, VILT

    Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.

    The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.

    These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.

    In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

  • 1 Day ILT, VILT

    Do you have information locked up in structured and unstructured data sources? Using Azure AI Search, you can extract key insights from this data, and enable applications to search and analyze them.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!

  • 1 Day ILT, VILT

    Microsoft AI Builder offers a wide array of AI capabilities. Through this learning path, you discover how to leverage AI for your business enhancement, include text recognition, document processing automation, and incorporate AI Builder’s features into applications or workflows.

  • -25%

    MS-4017: Manage and extend Microsoft 365 Copilot

    Price range: RM900.00 through RM1,200.00
    1 Day ILT, VILT

    This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course introduces you to Copilot, examines how to implement and administer it, and then explores the fundamentals of Copilot extensibility.

  • 1 Day ILT, VILT

    This learning path examines the key Microsoft 365 security and compliance features that administrators must prepare in order to successfully implement Microsoft 365 Copilot.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

Go to Top