The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
-
This five-day course provides comprehensive training on considerations and practices to design a VMware NSX® environment as part of a software-defined data center strategy.
This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer’s business needs.
-
This two-day, hands-on training course provides the knowledge to troubleshoot VMware vSAN™ clusters. In this course, you will learn the best practices to maintain a healthy vSAN environment and mitigate potential issues that might occur with operation of the software. The course provides a logical framework for a systematic troubleshooting approach.
You will learn about the GUI and CLI vSAN monitoring and troubleshooting tools, and you will learn how to troubleshoot common vSAN issues with examples. The labs provided in the course simulate real-world problems to evaluate and enhance your troubleshooting skills.
-
This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure. This course introduces you to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your VMware NSX environment.
In addition, various types of technical problems are presented to you, which you will identify, analyze, and solve through a systematic process.
-
Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.
The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.
Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
This class provides training applicable to Oracle E-Business Suite Releases 12.2. It does not provide training applicable to Oracle E-Business Suite Releases 12.0 and 12.1 (the architecture of Release 12.2 is different compared to Releases 12.0 and 12.1).
This E-Business Suite training teaches the essentials of installing and maintaining an Oracle E-Business Suite R12.2 system. Learn about the changes in Oracle E-Business Suite architecture and explore how to perform online patching using adop (the new patching utility).
-
The Oracle Cloud Infrastructure Operations Professional course caters to Administrators and Architects. It offers an in-depth technical introduction to essential OCI capabilities, covering various aspects such as using OCI CLI to create, discover, and terminate resources. Additionally, the course covers topics like creating shell scripts using OCI CLI, utilizing Oracle Resource Manager, provisioning a simple set of OCI resources with Ansible, managing custom images, and understanding Network Security Architecture, including Virtual Cloud Network (VCN), Load Balancer, and DNS.
Throughout the course, participants will engage in practical exercises, including provisioning and managing OCI resources, describing scaling options, handling billing and account management in the OCI Console, and troubleshooting OCI resources. They will learn to optimize performance, ensure security, and efficiently manage operational tasks within OCI
-
The Oracle Cloud Infrastructure DevOps Professional course is designed to equip DevOps Engineers and Developers with the skills and knowledge to effectively utilize (OCI) DevOps service: an end-to-end, continuous integration and continuous delivery (CI/CD) platform to build, test, and deploy their applications.
Through this course, you will gain a deep understanding of DevOps principles and learn how to leverage OCI for efficient automated workflows.
At the end of this training, you will be prepared to take on the Oracle Cloud Infrastructure DevOps Professional Certification.
-
The Oracle Cloud Infrastructure (OCI) Data Science Professional course is designed to equip Data Scientists, Machine Learning/AI Engineers with the skills and knowledge to effectively utilize OCI’s comprehensive suite of data science tools. Spanning the entire machine learning lifecycle, from establishing a data science workspace to deploying and overseeing machine learning models in real-world environments, this course enables participants to harness OCI’s robust capabilities. They will learn to construct, train, and deploy machine learning models, apply MLOps best practices, and integrate other OCI services to optimize their data science workflows.
By the end of this course, you’ll gain the necessary preparation to achieve the Oracle Cloud Infrastructure Data Science Professional Certification and advance your career in data science.
-
This course helps you learn how to gather and examine evidence. You will learn to solve case problems, diagnose their cause and find methods of resolution. Each of these practices challenges you to diagnose and troubleshoot the issue using the GoldenGate software.
-
The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.
This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.
-
This course is targeted at Developers and Database Administrators and begins with the concepts of a relational database and the SQL programming language. It includes writing queries against single and multiple tables, manipulate data in tables, and create database objects.
You’ll also learn how to create sequences, synonyms, indexes, and views, manage schema objects, and manage data using subqueries. Additionally, the course covers controlling User Access and managing data in different time zones.