You searched for: ""

  • 2 Days ILT, VILT

    Learn, train and grow with IT Risk Fundamentals.

    The IT Risk Fundamentals Certificate Program by ISACA offers a comprehensive understanding of IT risk management principles, methodologies, and best practices. Participants will develop the skills and knowledge needed to identify, assess, mitigate, and manage IT risks in alignment with ISACA’s standards and frameworks.

    The IT Risk Fundamentals Certificate covers the principles of IT risk management, the responsibilities and accountability for IT risk, how to build risk awareness and how to communicate risk.

  • 3 Days ILT, VILT

    Learn, train and grow with Cybersecurity Fundamentals.

    As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.

    This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.

    Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:

    • Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
    • Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
    • Stay ahead of the curve on your current career path or start your new cybersecurity career strong.

    The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 4 Days ILT, VILT

    Python programming for beginners

    Python is a popular programming language used by system administrators, data scientists, and developers to create web applications, custom Red Hat Ansible Automation modules, perform statistical analysis, and train AI/ML models.

    This Red Hat course introduces the Python language and teaches fundamental concepts like control flow, loops, data structures, functions, file I/O, regular expressions, parsing JSON, and debugging.

    This course is based on Python 3 and RHEL 9.0.

  • 3 Days ILT, VILT

    Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.

    Camel development is organized around:

    • Routes that define a sequence or flow of processing.
    • Processors that transform, interpret, and modify messages within a Camel route.
    • Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.

    The Cloud-native Integration with Red Hat Fuse (AD221) course emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.

    This Red Hat course is based on Red Hat Fuse 7.10 and OpenShift 4.

  • 1 Day ILT, VILT

    Develop and deploy event-driven auto-scaling serverless applications and functions

    Learn how to develop, deploy, and auto-scale event driven serverless applications on the Red Hat OpenShift Container Platform. Red Hat OpenShift Serverless enables developers and Site Reliability Engineers (SREs) to focus on the core business logic of their applications and functions by delegating operational concerns and infrastructure services to the Red Hat® OpenShift Serverless platform.

    This Red Hat course is based on Red Hat OpenShift Serverless 1.23 and OpenShift Container Platform 4.10.

  • 2 Days ILT, VILT

    Introduction to configuring and managing Red Hat Single Sign-On for authenticating and authorizing applications

    Red Hat Single Sign-On Administration (DO313) is designed for system administrators who want to install, configure and manage Red Hat Single Sign-On servers for securing applications. Learn about the different ways to authenticate and authorize applications using single sign-on standards like OAuth and OpenID Connect (OIDC). You will also learn how to install and configure Red Hat SIngle Sign-On on the OpenShift Container Platform. This course is based on Red Hat Single Sign-On version 7.6.

  • 4 Days ILT, VILT

    Create and manage virtual machines on OpenShift using the Red Hat OpenShift Virtualization operator.

    Managing Virtual Machines with OpenShift Virtualization teaches the essential skills required to create and manage virtual machines (VM) on OpenShift using the Red Hat OpenShift Virtualization operator. This Red Hat course does not require previous knowledge of containers and Kubernetes.

    This course provides:

    • Skills required to create, access, and manage VMs on OpenShift clusters.
    • Skills required to control usage and access of cpu, memory, storage, and networking resources from VMs using the same Kubernetes features that would also control usage and access to these resources for containers.
    • Sample architectures to manage High Availability (HA) of VMs using standard Kubernetes features and extensions from OpenShift Virtualization.
    • Strategies to connect VMs on OpenShift to data center services outside of their OpenShift cluster, such as storage and databases.
  • 1 Day VILT

    In this FortiAnalyzer Administrator course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.

    Product Versions: FortiAnalyzer 7.2

  • FT-FAZ-ANS: FortiAnalyzer Analyst

    Price range: RM8,550.00 through RM9,450.00
    2 Days ILT, VILT

    In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports.

    Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.

  • 2 Days ILT, VILT

    Essential Security Skills for Knowledge Workers.

    The purpose of the Certified Secure Computer User (CSCU)  training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

    This cybersecurity class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    This CSCU goes beyond security awareness and includes:

    • Coverage on the latest Operating Systems
    • Latest Tools and Techniques to maximize security
    • Coverage on securing Gaming Consoles and IoT/Smart Home Devices
    • Techniques to secure Home Offices and Remote Work locations

     

  • PECB-27001F: ISO/IEC 27001 Foundation

    Price range: RM1,440.00 through RM4,500.00
    2 Days ILT, VILT

    ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • PECB-27001LA: ISO/IEC 27001 Lead Auditor

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.

    During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

    Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

    After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • PECB-27001LI: ISO/IEC 27001 Lead Implementer

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

    Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

    This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

    After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • 1 Day VILT

    This 3 hours course prepares IT professionals to configure and manage SOAR.

  • 1 Day VILT

    This virtual course targeted to SREs and DevOps enables you to monitor and troubleshoot your Kubernetes clusters with Splunk Observability Cloud. Through discussions and hands-on activities, learn to explore and use the Kubernetes Navigator, built-in dashboards, and AutoDetect to monitor the health of your cluster. Create custom dashboards and detectors to monitor and troubleshoot common Kubernetes trouble conditions. This course assumes basic knowledge of Kubernetes and familiarity with navigating Splunk IM.

    This lab-oriented class is designed to help you learn best practices and tips to use Splunk Observability Cloud to monitor and troubleshoot Kubernetes clusters. All hands-on labs are performed in the Observability Cloud UI.

  • 1 Day VILT

    This single subject course targeted to developers enables you to manually instrument your applications to send traces to Splunk APM. Through in-person discussions and hands-on activities, learn to manually instrument applications to create spans and add metadata to spans. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

    This lab-oriented class is designed to help you learn the fundamentals of instrumenting your code to send in traces and trace metadata. All hands-on labs are in Python and Java.

  • 1 Day VILT

    This course is targeted towards Splunk On-call admins responsible for setting up incident response with Splunk On-Call. This 4.5-hour virtual course describes the tasks required to set up on-call teams, including defining schedules, on-call rotations and shifts. Learn to set-up and configure alerts and integrations. Create post incident review reports, track response metrics and customize reports. Use advanced features such as the Rules engine for advanced customization and configure webhook integrations. All concepts are taught using lectures and scenario-based hands-on activities.

  • 1 Day VILT

    This single subject course targeted to DevOps enables you to learn configuration techniques to send traces to Splunk APM. Through inperson discussions and hands-on activities, learn to deploy the Splunk OpenTelemetry Collector on a Linux host. Use the OpenTelemetry Collector to configure processor components to modify trace metadata. Use auto-instrumentation to send in traces without altering your code. Enable AlwaysOn profiling to monitor code performance. This course assumes familiarity with navigating Splunk APM which is covered in the course Using Splunk Application Performance Monitoring.

  • 1 Day VILT

    This course is designed for developers responsible for debugging their own applications, and for SREs responsible for troubleshooting performance issues. Splunk Log Observer is built primarily for DevOps teams working on applications built on modern tech stacks (containerized microservices). However, the course can be taken by anyone who wants to view recent log data in a no-code environment.

    This 4.5-hour course describes how to use the tool to work with log data using the no-code user interface. Learn to create, save, and share search filters, and to investigate the shape of your log data. Learn to add log messages to dashboards. Analyze logs with aggregation functions and group by rules. Create rules to manipulate incoming data and generate synthetic metrics from log data.

    All concepts are taught using lectures and scenario-based hands-on activities.

  • 1 Day VILT

    This course serves as the foundation for all other Splunk Observability courses. It is targeted towards DevOps/SRE/Observability teams, Senior On-call Engineers, Onboarding and Monitoring Strategists and Developers. This 6-hr course provides a fundamental understanding of Metrics Monitoring in Splunk Observability such as the metrics data model and different types of metadata. See how you can interact with data using built-in content, search for metrics, find more information about a metric, visualize and alert on metrics. Learn to use appropriate rollups, interpret chart data based on chart resolution, rollups, and analytic functions. All concepts are taught using lectures and scenario-based hands-on activities.

  • MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

    Price range: RM3,500.00 through RM3,874.00
    5 Days ILT, VILT

    Modernize supply chain operations with Dynamics 365 Supply Chain Management.

    This Microsoft Dynamics 365 Supply Chain Management, Expert course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes.

    This course includes lectures and several hands-on exercises. The exercises will be introduced to you in the form of a case study presented to a Dynamics 365 Supply Chain Management Functional Consultant, Expert. Each exercise will be based on a business scenario followed by a question or discussion then a step-by-step guidance to perform the system related steps.

  • -20%

    EDU-NSXICM: VMware NSX: Install, Configure, Manage [V4.0]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    VMware NSX: Shaping the Future of Network Provisioning and Security.

    This VMware NSX: Install, Configure, Manage, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This VMware course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.

    Product Alignment

    • NSX 4.0.0.1
    • NSX 4.0.1
  • 3 Days ILT, VILT

    The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

  • 2 Days ILT, VILT

    Microsoft Cloud for Sustainability

    As a result of attending this course, the learner should be able to understand the sustainability concepts and how the business thinks of tracking and reporting emissions, describe Microsoft Cloud for Sustainability customer scenarios, and configure the features of Microsoft Sustainability Manage.

Go to Top