You searched for: ""

  • 1 Day SPVC

    AWS Lambda is an event-driven, serverless compute service that lets you run code without provisioning or managing servers. This course focuses on what you need to start building Lambda functions and serverless applications.

    You learn how AWS Lambda works and how to write and configure Lambda functions. You explore deployment and testing considerations and finally end with a discussion on monitoring and troubleshooting Lambda functions.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    Revolutionize your organization with machine learning on Amazon Web Services (AWS).

    This DTPE-AWS-MLC: Machine Learning in the Cloud with AWS Batch course describes how to run and accelerate your machine learning applications in the cloud using AWS Batch. AWS Batch is a fully managed service that enables you to easily and efficiently run batch computing jobs on AWS.

    This course provides an introduction to AWS Batch, explains the main components of the service, and reviews a few examples of batch processing architectures.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    Whether you are thinking of migrating to the AWS Cloud or already have a workload running on AWS, securing your data and resources should be at the top of the list. This course introduces several AWS services that you can use to improve your current security posture.

    The course covers the different security design principles that will help you to plan your security approach in the AWS Cloud and provides information on resources you can use to further your knowledge around security on AWS.

    • Course level: Fundamental
    • Delivery method: Presentation
    • Duration: 50 minutes

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    This DTPE-AWS-WA: AWS Well-Architected digital course teaches our customers about the AWS Well-Architected Framework to understand how they can make informed decisions about their architecture in a cloud-native way and understand the impact of design decisions.

    By using the Well-Architected Framework, customers can understand the risks in their architecture, and learn ways to mitigate them.

    Activities: This course includes digital training, videos, and assessments.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 2 Days ILT, VILT

    IBM Open Platform (IOP) with Apache Hadoop is the first premiere collaborative platform to enable Big Data solutions to be developed on the common set of Apache Hadoop technologies. The Open Data Platform initiative (ODP) is a shared industry effort focused on promoting and advancing the state of Apache Hadoop and Big Data technologies for the enterprise. The current ecosystem is challenged and slowed by fragmented and duplicated efforts between different groups. The ODP Core will take the guesswork out of the process and accelerate many use cases by running on a common platform. It allows enterprises to focus on building business driven applications.

    This module provides an in-depth introduction to the main components of the ODP core –namely Apache Hadoop (inclusive of HDFS, YARN, and MapReduce) and Apache Ambari — as well as providing a treatment of the main open-source components that are generally made available with the ODP core in a production Hadoop cluster.

  • 3 Days SPVC

    This DW613G: IBM BigInsights Foundation training course is for those who want a foundation of IBM BigInsights. This course consists of two separate modules.

    The first module is IBM BigInsights Overview and it will give you an overview of IBM’s big data strategy as well as a why it is important to understand and use big data. It will cover IBM BigInsights as a platform for managing and gaining insights from your big data. As such, you will see how the BigInsights have aligned their offerings to better suit your needs with the IBM Open Platform (IOP) along with the three specialized modules with value-add that sits on top of the IOP. Along with that, you will get an introduction to the BigInsights value-add including Big SQL, BigSheets, and Big R.

    The second module is IBM Open Platform with Apache Hadoop. IBM Open Platform (IOP) with Apache Hadoop is the first premiere collaborative platform to enable Big Data solutions to be developed on the common set of Apache Hadoop technologies. The Open Data Platform initiative (ODP) is a shared industry effort focused on promoting and advancing the state of Apache Hadoop and Big Data technologies for the enterprise. The current ecosystem is challenged and slowed by fragmented and duplicated efforts between different groups. The ODP Core will take the guesswork out of the process and accelerate many use cases by running on a common platform. It allows enterprises to focus on building business driven applications.

    This module provides an in-depth introduction to the main components of the ODP core –namely Apache Hadoop (inclusive of HDFS, YARN, and MapReduce) and Apache Ambari — as well as providing a treatment of the main open-source components that are generally made available with the ODP core in a production Hadoop cluster.

    IBM BigInsights v4 itself is built upon the ODP core and these other main open-source components.The relationships between the IBM Open Platform with Apache Hadoop and the BigInsights add-ons is covered briefly in Unit 1 – pro.

  • 1 Day ILT, VILT

    This course is designed to introduce you to the capabilities of BigSheets. BigSheets is a component of IBM BigInsights through the Analyst and the Data Scientist module. It provides the analyst the ability to be able to visualize and analyze data stored on the HDFS using a spreadsheet type interface without any programming.

  • 1 Day SPVC

    Learn how to use IBM BigInsights Text Analytics, an information extraction system, to extract information from unstructured and semi-structured documents.

    Using IBM BigInsights Text Analytics you can create extractors using a visual web interface. The visual extractors are then automatically translated into Annotation Query Language (AQL) rules to extract structured information from unstructured and semi-structured documents. You can apply Text Analytics to big data at rest in IBM BigInsights and big data in motion in IBM Streams.

  • 2 Days ILT, VILT

    After successfully completing the EXIN Lean IT Foundation exam, a candidate will be familiar with the principles of the Lean philosophy and in particular with the application of this philosophy within an IT environment. Specifically, the candidate should understand:

    • The principles underlying the Lean philosophy
    • The importance of understanding and delivering customer value
    • The way Lean looks at processes and the waste within them
    • How to measure performance and the key determinants of performance
    • What the organizational requirements are when implementing Lean, including the use of visual management tools
    • Which behavior and attitude is necessary for Lean to be successful within an IT organization
    • The DMAIC problem-solving model
    • How these Lean principles can be applied within an IT organization

    EXIN Lean IT Foundation helps IT organizations to ensure that they provide their customers with the best possible services. Through understanding customer value, the processes that deliver this value, the way to manage performance, the way to organize and the required attitude and behavior, IT organizations are helped to develop a continuous improvement mindset. Lean IT is complementary to all other best practice methods. The purpose of EXIN Lean IT Foundation is to confirm that a candidate has sufficient knowledge and understanding of Lean IT to support a Lean initiative within an IT organization.

  • 1 Day ILT, VILT

    EXIN Privacy & Data Protection Essentials (PDPE) is a certification that validates a professional’s knowledge about organizing the protection of personal data, the EU rules and regulations regarding data protection.

    Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns arise. With the EU General Data Protection Regulation (GDPR) the Council of the European Union aims to strengthen and unify data protection for all individuals within the European Union (EU). This regulation affects every organization that processes personal data of EU citizens. The EXIN Privacy & Data Protection Essentials certification covers the main subjects related to the GDPR, which should be known by everyone working with personal data.

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context.

  • 2 Days ILT, VILT

    EXIN Privacy & Data Protection Foundation (PDPF) is a certification that validates a professional’s knowledge and understanding of the protection of personal data, the EU rules and regulations regarding data protection.

    Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns arise. With the EU General Data Protection Regulation (GDPR) the Council of the European Union aims to strengthen and unify data protection for all individuals within the European Union (EU). This regulation affects every organization that processes personal data of EU citizens. The EXIN Privacy & Data Protection Foundation certification covers the main subjects related to the GDPR.

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context.

  • 3 Days ILT, VILT

    EXIN Privacy & Data Protection Professional is a certification that validates a professional’s knowledge and understanding of the European privacy and data protection legislation and its international relevance, as well as the professional’s ability to apply this knowledge and understanding to everyday professional practice.

    With the ever increasing explosion of information flooding the internet, every company needs to plan how to manage and protect privacy of persons and their data. Not without a reason, many new laws within the EU, as well as in the USA and many other regions, are formed in order to regulate both privacy and data protection.

    The European Commission has published the EU General Data Protection Regulation (GDPR), meaning that from the 25th of May 2018 on, all organizations concerned must comply with specific rules. This Practitioner certification builds on the subjects covered by the Foundation exam by focusing on the development and implementation of policies and procedures in order to comply with existing and new legislation, application of privacy and data protection guidelines and best practices, and by establishing a data protection management system (DPMS).

    The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.

    Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context

  • 2 Days ILT, VILT

    The EASF: EXIN Agile Scrum Foundation certification is designed to test a professional’s fundamental understanding of agile principles and scrum methodology. It is especially useful for those leading or participating in projects. This EXIN Agile Scrum certification is especially interesting for professionals who work in areas including project management, software development, IT service management and business management.

    EXIN Agile Scrum Foundation offers professionals a unique certification that combines agile principles and scrum practices. The exam tests candidates on their understanding of key concepts and their application.

    MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).

  • 2 Days ILT, VILT

    Agile Scrum is about working together to successfully reach a goal. Agile methodologies are popular approaches in software development and are increasingly being used in other areas. Scrum practices include establishing cross-functional and self-managed teams, producing a working deliverable at the end of each iteration or Sprint. This EXIN Agile Scrum certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Scrum Master.

    This 2-days EXIN Agile Scrum Master certification with the assignment workshop course is designed to illustrate this best practice project management approach and give candidates an understanding of Agile as it should be managed within projects. Within project environments there will always be times where there is uncertainty and high volumes of change, and these should managed effectively.

    EXIN Agile Scrum Master is a certification that looks to confirm both skills and knowledge of the Agile framework and Scrum methodology.

    MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).

     

  • 2 Days ILT, VILT

    The EASPO: EXIN Agile Scrum Product Owner certification focuses on bringing value to the customer and value for the business, through Agile project management techniques. This certification is especially suitable for professionals working in the areas of project management, software development, IT service management and business management.

    EXIN Agile Scrum Product Owner tests a candidate’s skills and knowledge of Agile principles and Scrum practices specifically with the role of Product Owner in mind. This certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Product Owner.

  • 4 Days ILT, VILT

    Explore the breadth and depth of Prism Central’s centralized management capabilities.

    If you already have experience with administering a Nutanix environment, this Nutanix Enterprise Cloud Administration course will extend, deepen, and broaden your knowledge as you grow in your career as a Nutanix administrator.

    Designed with Prism Central as the focal point, this Nutanix course illustrates the breadth and depth of Nutanix’s centralized management capabilities, and allows you to explore the wide variety of features that are available in this one, single web console.

    ECA is divided into four major sections:

    1. Understanding core Nutanix concepts, such as hyperconverged infrastructure (HCI) and the various Nutanix cloud solution packages. Also, the basic configuration of a cluster and the components that are needed to create and manage VMs – namely, networks and images.
    2. Creating and managing VMs, how to protect VMs and their data, how to apply storage optimization features at the VM level, and how to migrate your workloads to a Nutanix environment.
    3. Learn about alerts, events, log collection, reporting, and how to use various features in Prism Central to identify, analyze, and remediate performance issues.
    4. Learn how to set up a cluster for maintenance activities – such as starting and stopping nodes and clusters – and how to manage and upgrade licenses and installed software with just a few clicks.
  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 3 Days ILT, VILT

    Master the critical first line of cyber defense.

    EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

    This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

    The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.

    The E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH&R, from preparing/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

    With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.

    The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today`

  • ECMS: Engineering Cisco Meraki Solutions

    Price range: RM9,500.00 through RM10,850.00
    4 Days ILT, VILT

    The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.

    This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

    The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

    It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

    This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 3 Days ILT, VILT

    The Nutanix Enterprise Cloud Solution Design Boot Camp is designed to provide you with a technical deep dive into Nutanix-based solutions and the Nutanix solution design methodology, which is based on the Nutanix Platform Expert (NPX) Program. And has been used to consistently deliver business critical solutions to the most demanding customers – from SMB to the G2000.

    The goal of this three-day boot camp is to prepare you to engage with enterprise customers and design Nutanix Enterprise Cloud solutions that deliver real business value. The boot camp is led by an onsite team of dedicated NPX-certified instructors who will focus on designing multi-hypervisor solutions capable of supporting enterprise-class applications according to clearly defined service level agreements.

    During the boot camp you will be asked to choose a hypervisor, divide into teams, and engage in a multi-day, interactive role-play exercise to extract the business requirements, technical requirements, risks, and constraints that will shape their solutions. And requires daily design presentations from each team and participation in Q&A sessions with instructors and peers. You will be required to defend your team’s design decisions at each stage of the exercise.

    This is an intense and immersive learning experience that will change how you approach enterprise solution design and delivery. The cost of this bootcamp is completely covered, you will just be responsible for your own travel and expenses.

  • 5 Days ILT, VILT

    The gateway to acquire in-demand technical skills in cybersecurity.

    EC-Council Certified Security Specialist (ECSS) is an entry level cybersecurity certification covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

    This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

    From 9/11 to Hurricane Katrina to the recent WannaCry fiasco, the business community has been hit repeatedly by one disaster after another in the past decade and a half. The scary part is that the frequency is increasing exponentially in the past few years, thanks to the growing number of cyber-attacks.

    Even scarier is the study that shows that 2 out of 5 business still do not even have a disaster recovery and business continuity plan. And out of the ones that do, only about half of them even test it regularly to see if it is still relevant. Furthermore, industry experts have reiterated the fact in every forum possible, that the size of the business is irrelevant to having a recovery and business continuity plan. Everyone needs to have one to stay relevant in current times.

    This scenario can only be amended by trained BC/DR professionals who not only understand the gravity of the situation, but also are equipped to ensure that businesses are least impacted when a disaster strikes.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Go to Top