You searched for: ""

  • 3 Days ILT, VILT

    This course provides a deep dive into the core principles of Zero Trust and equips you with the knowledge and skills to implement them effectively using Trend Vision One.

    You will learn how to configure and manage secure access rules, deploy Secure Access Modules, and ensure secure access to private applications, internet resources, and Al services. Through hands-on labs and real-world examples, you’ll gain practical experience in building and maintaining a robust Zero Trust security environment.

    You will gain practical experience in building and maintaining a Zero Trust security environment through hands-on labs and real world examples.

  • 3 Days ILT, VILT

    Trend Vision One™ – Standard Endpoint Protection delivers XDR-­powered threat defense, combining advanced endpoint security with cross-layer detection and response for comprehensive protection against sophisticated attacks.

  • 3 Days ILT, VILT

    This course provides an in-depth understanding and practical expertise needed to effectively secure servers and cloud workloads using Server & Workload Protection.

    You will explore the intricate details of its core features and powerful protection modules, develop proficiency in advanced threat protection, and Extended Detection and Response (XDR) capabilities to defend against sophisticated threats across enterprise infrastructures.

  • 1 Day ILT, VILT

    This course introduces the AI and machine learning (ML) offerings on Google Cloud that build both predictive and generative AI projects.

    It explores the technologies, products, and tools available throughout the data-to-AI life cycle, encompassing AI foundations, development, and solutions. It aims to help data scientists, AI developers, and ML engineers enhance their skills and knowledge through engaging learning experiences and practical hands-on exercises.

  • 1 Day ILT, VILT

    This course is designed for business users, business leaders, and, more generally, decision makers within organizations who are seeking to gain a comprehensive understanding of generative AI and its potential impact on their businesses.

    The overall goal of the course is to educate decision makers on the potential impact generative AI can have in their organizations, educate them about generative AI services on Google Cloud and to inspire decision makers to start thinking about what is possible with generative AI technologies.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 1 Day ILT, VILT

    As generative AI becomes more common, the ability to interact with large language models is shifting from niche knowledge to a necessary skill across many different industries and roles.

    In this course, you will learn the fundamentals of prompting large language models and exploring further techniques for improving the output from large language models. You will also explore similar concepts when working with multimodal models such as Gemini Vision Pro.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 1 Day ILT, VILT

    In this course, you explore generative AI (Gen AI) use cases across specific industries using Google Cloud.

    After discussing generative AI in general, you will do a deep dive into two generative AI use cases and then explore your own use case within the same framework. This course targets professionals across different roles, including business analysts, data scientists, software developers, business users, and decision-makers, who are specifically interested in leveraging generative AI for business solutions.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 2 Days ILT, VILT

    Trend Vision One – Mobile Security is a security solution designed to proactively protect and manage mobile devices against a wide range of mobile threat attacks. It integrates advanced mobile threat detection technologies to mitigate mobile security risks and supports integration with third-party mobile device management (MDM) solutions for centralized management.

    This course provides a comprehensive overview of Trend Vision One™ Mobile Security’s core features designed to combat evolving mobile threats.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Cloud Email and Collaboration Protection safeguards your business-critical cloud applications like Microsoft 365, Google Workspace, Box, and Dropbox.

    This course will teach you how to defend against advanced threats such as ransomware, phishing, and BEC, while also preventing data leakage. Learn to leverage its cloud­to-cloud integration for seamless protection and easy management, ensuring high availability and administrative functionality.

    Gain the skills to secure your cloud collaboration tools and protect your organization from evolving cyberattacks.

  • 2 Days ILT, VILT

    Trend Vision One – Cloud Email Gateway Protection is an enterprise-class solution that delivers continuously updated protection to stop phishing, ransomware, Business Email Compromise (BEC) scams, spam and other advanced email threats before they reach your network.

    This course will provide you with the knowledge and skills that are required to administer and support Cloud Email Gateway Protection (CEGP).

  • 3 Days ILT, VILT

    Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.

    This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 1 Day ILT, VILT

    Large Language Models powered by world-class Google AI.

    Google Cloud brings innovations developed and tested by Google DeepMind to our enterprise-ready AI platform so customers can start using them to build and deliver generative AI capabilities today — not tomorrow.

    In this course, you explore tools and APIs available on Google Cloud for integrating large language models (LLMs) into your application.

    After exploring generative AI options on Google Cloud, you explore LLMs and prompt design in Vertex AI Studio. Then you learn about LangChain, an open-source framework for developing applications powered by language models.

    After a discussion around more advanced prompt engineering techniques, you put it all together to build a multi-turn chat application by using LangChain and the Vertex AI Gemini API.

  • 1 Day

    Vertex AI Agent Builder lets developers, even those with limited machine learning skills, tap into the power of Google’s foundation models, search expertise, and conversational AI technologies to create enterprise-grade generative AI applications.

    In this course, you learn how to use Vertex AI Agent Builder to create search engines and chat applications. You will then explore how to integrate these search engineers and chat applications into your own applications.

    Finally, you learn how to manage the tools built in Vertex AI Agent Builder in production.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 1 Day ILT, VILT

    Generative AI is now at the center of transforming how software is designed, built, run, and managed. For developers, generative AI is a powerful tool for making coding more efficient and using APIs, such as the Gemini and PaLM APIs, within their applications.

    In this course, you are introduced to how generative AI can be used to make developers more efficient at writing code and implementing new features into applications. You will also explore available models in Vertex AI Model Garden.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 2 Days ILT, VILT

    Learn the essential skills to migrate virtual machines to Red Hat OpenShift Virtualization.

    The Migrating Virtual Machines to Red Hat OpenShift Virtualization with Ansible Automation Platform (DO346) course provides the essential knowledge to migrate virtual machines to Red Hat OpenShift Virtualization by using carefully selected content from Managing Virtual Machines in Red Hat OpenShift Virtualization (DO316) and Automate and Manage Red Hat OpenShift Virtualization with Ansible (DO336). This Red Hat course provides a shorter learning path for IT professionals to migrate their virtualized workloads to OpenShift Virtualization.

    This course provides the following information and skills:

    • An introduction to key OpenShift and Kubernetes concepts, such as nodes, pods, and operators
    • Skills to deploy the OpenShift Virtualization operator
    • Skills to configure networking and storage for virtual machines
    • Strategies to migrate virtual machines from another hypervisor to OpenShift Virtualization by using the migration toolkit for virtualization operator and Ansible Automation Platform

    This course is based on OpenShift Container Platform 4.16, OpenShift Virtualization 4.16, and Ansible Automation Platform 2.4.

  • 1 Day ILT, VILT

    Learn how to migrate existing CentOS Linux servers to supported versions of Red Hat Enterprise Linux.

    The RH174: Managing CentOS Migrations and RHEL Upgrades course will enable customers to transition successfully from CentOS Linux to Red Hat Enterprise Linux. It also enables them to upgrade from one major version of RHEL to the next. This course provides an overview of the migration process and discusses how to avoid and mitigate risks. “Managing CentOS Migrations and RHEL Upgrades” will help users to move from CentOS Linux to RHEL, or to upgrade to a newer version of RHEL.

  • 5 Days ILT, VILT

    Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.

    Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

  • 3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • EDU-210: Firewall 11.1 Essentials: Configuration and Management

    Price range: RM15,000.00 through RM16,125.00
    5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

  • 3 Days ILT, VILT

    Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of troubleshooting the full line of Palo Alto Networks next-generation firewalls.
    Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall.

    Completing this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.

  • 5 Days ILT, VILT

    The Prisma SD-WAN Design and Operation course introduces you to Palo Alto Networks next-generation Prisma SDWAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.

    This course is intended for people who must configure, maintain, and use wide-area networks that connect data centers, branch offices, and cloud-based assets and infrastructures.

  • 4 Days ILT, VILT

    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in public cloud security and cybersecurity or anyone wanting to learn how to secure remote networks and mobile users.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 2 Days ILT, VILT

    A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 2 Days ILT, VILT

    A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • CT-DAI: CompTIA DataAI (formerly DataX)

    Price range: RM4,500.00 through RM6,246.00
    5 Days ILT, VILT

    CompTIA DataAI is an expert-level certification designed for experienced data professionals ready to work at the intersection of data science, AI, and enterprise operations.

    The certification targets senior data analysts, data scientists, data engineers, and IT professionals who are already working with analytics, cloud platforms, and AI-enabled tools—and who want to move into more advanced, AI-infused roles.

    Aligned with CompTIA’s Xpert Series, DataAI reflects how advanced data roles have evolved. Statistical rigor, machine learning, MLOps, and business outcomes are no longer separate concerns. The certification confirms that a professional can move beyond analysis into building trustworthy, scalable AI systems that deliver measurable results.

  • 1 Day ILT, VILT

    A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    SOA-C01: Alibaba Cloud SysOps Administrator

    Price range: RM1,800.00 through RM2,000.00
    1 Day ILT, VILT

    A SysOps Administrator manages, deploys, and optimizes Alibaba Cloud infrastructure to ensure performance, security, and cost-efficiency. This role involves implementing observability, automating processes for scalability and reliability, managing user permissions to protect resources, and applying cost optimization strategies to control expenses.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 1 Day ILT, VILT

    A Cloud Security Engineer is responsible for securing cloud workloads on Alibaba Cloud by implementing and managing robust security policies, practices, and technologies. This role emphasizes safeguarding applications and data from potential threats and vulnerabilities. The Cloud Security Engineer works closely with other roles to enhance the overall security posture

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

Go to Top