You searched for: ""

  • 2 Days ILT, VILT

    This course is aimed at data scientists, machine learning engineers, and other data practitioners who want to build generative AI applications using the latest and most popular frameworks and Databricks capabilities.

    Below, we describe each of the four, four-hour modules included in this course.

    Generative AI Solution Development: This is your introduction to contextual generative AI solutions using the retrieval-augmented generation (RAG) method. First, you’ll be introduced to RAG architecture and the significance of contextual information using Mosaic AI Playground. Next, we’ll show you how to prepare data for generative AI solutions and connect this process with building a RAG architecture. Finally, you’ll explore concepts related to context embedding, vectors, vector databases, and the utilization of Mosaic AI Vector Search.

    Generative AI Application Development: Ready for information and practical experience in building advanced LLM applications using multi-stage reasoning LLM chains and agents? In this module, you’ll first learn how to decompose a problem into its components and select the most suitable model for each step to enhance business use cases. Following this, we’ll show you how to construct a multi-stage reasoning chain utilizing LangChain and HuggingFace transformers. Finally, you’ll be introduced to agents and will design an autonomous agent using generative models on Databricks.

    Generative AI Application Evaluation and Governance: This is your introduction to evaluating and governing generative AI systems. First, you’ll explore the meaning behind and motivation for building evaluation and governance/security systems. Next, we’ll connect evaluation and governance systems to the Databricks Data Intelligence Platform. Third, we’ll teach you about a variety of evaluation techniques for specific components and types of applications. Finally, the course will conclude with an analysis of evaluating entire AI systems with respect to performance and cost.

    Generative AI Application Deployment and Monitoring: Ready to learn how to deploy, operationalize, and monitor generative deploying, operationalizing, and monitoring generative AI applications? This module will help you gain skills in the deployment of generative AI applications using tools like Model Serving. We’ll also cover how to operationalize generative AI applications following best practices and recommended architectures. Finally, we’ll discuss the idea of monitoring generative AI applications and their components using Lakehouse Monitoring.

  • 5 Days ILT, VILT

    This instructor-led workshop covers the content and hands-on lab exercises provided in the following courses: Data Warehousing with SQL and NoSQL, ETL Offload with Hadoop and Spark, Data Governance, Security and Privacy for Big Data, Processing Streaming and IoT Data, Building Data Pipelines with Python.

    This training prepares the learner for a major portion of the Dell Technologies Proven Professional data engineering specialist-level certification exam (DES-7DE1). Review the exam description document to understand all the related data engineering training and consumption options.

  • EDU-VSANDM67: VMware vSAN: Deploy and Manage v6.7

    Price range: RM6,950.00 through RM7,950.00
    3 Days ILT, VILT

    In this three-day EDU-VSANDM67: VMware vSAN: Deploy and Manage v6.7 course, you focus on deploying and managing a software-defined storage solution with VMware vSAN™ 6.7. You learn how vSAN functions as an important component in the VMware software-defined data center. You gain practical experience with vSAN concepts through the completion of hands-on lab exercises.

    Product Alignment

    • ESXi 6.7
    • vCenter Server 6.7
    • vSAN 6.7
  • SESA: Securing Email with Cisco Email Security Appliance v3.1

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    Advanced protection to safeguard your inboxes.

    This hands-on course SESA: Securing Email with Cisco Email Security Appliance provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.

    This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP Security and the Certified Specialist – Email Content Security certifications.

    This course also earns you 24 Continuing Education (CE) credits towards recertification.

  • 4 Days ILT, VILT

    This ITIL4-HVIT: ITIL 4 Specialist High Velocity IT certification module provides the candidate with an understanding of the ways in which digital organizations and digital operating models function in high velocity environments, focusing on rapid delivery of products and services to obtain maximum business value.

    • Digital Transformation Strategies: Different strategies and approaches for transforming traditional IT operations into a more digitally-focused and agile environment.
    • Agile and DevOps Principles: Understand how Agile and DevOps practices can be applied to IT service management to accelerate service delivery, improve collaboration, and enhance efficiency.
    • Lean and Continuous Improvement: How lean principles can be applied to eliminate waste and streamline processes within IT operations. Explore the concept of continuous improvement to drive ongoing enhancements.
    • Automation: Gain insights into the role of automation as well as AI and ML in modern IT operations, including how to leverage these technologies for efficiency and innovation
    • Digital Product Management: Understand the concepts of digital product management and how to design, develop, and manage digital products and services that meet customer needs and deliver value.
    • Service Resilience: Understand how to ensure the resilience and security of digital services in a high-velocity environment, including strategies for addressing security threats and vulnerabilities.
    • Service Performance Metrics: Explore the measurement and reporting of key performance indicators (KPIs) and metrics to assess the performance and effectiveness of digital services.
    • Customer-Centric Approaches: Learn about the importance of having a customer-centric mindset and focus on delivering services that are aligned with customer expectations to create a positive experience.
    • Culture: Recognize the significance of culture when transitioning to high-velocity IT including strategies for fostering a culture of innovation, collaboration, and agility.
  • 4 Days ILT, VILT

    This ITIL4-DSV: ITIL 4 Specialist Drive Stakeholder Value certification module provides the candidate with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers, and partners, including key customer/user experience and journey mapping concepts.

    Understanding Stakeholder Needs And Expectations: Identify, assess and prioritise the needs and expectations of various stakeholders, including customers, employees, partners and regulators.

    • Customer Experience Management: Gain a deeper understanding of the principles of creating and maintaining a positive customer experience.
    • Service Relationships: Learn how to effectively manage relationships with a variety of stakeholders, including customers, users, suppliers and partners.
    • Value Co-creation: Explore the concept of value co-creation, where value is not just delivered to customers but created collaboratively with them.
    • Service Level Management: Learn how to establish, monitor and report on service levels to ensure that they meet stakeholder requirements and agreements.
    • Service Metrics And KPIs: Understand how to define and use KPIs and metrics to measure, report and improve service performance, customer satisfaction, and value.
    • Customer Journey Mapping: Explore techniques for mapping the customer journey to identify touchpoints, pain points and opportunities for improving the customer experience.
    • Service Improvement: Develop the skills to continually improve services based on stakeholder feedback. Implement a culture of continuous improvement to enhance value over time.
    • Communication And Collaboration: Foster positive stakeholder relationships through effective communication and collaboration.
  • 4 Days ILT, VILT

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Strategist: Direct, Plan and Improve (DPI) course helps ITSM practitioners acquire further insight into ITIL 4 – specifically in the areas that contribute to creating and sustaining an IT organization steeped in the growth mindset.

    The ITIL4-DPI: ITIL 4 Strategist Direct Plan and Improve certification course covers both practical and strategic elements related to improvement. Lean and Agile methodologies and techniques, a feature of ITIL 4, is embedded into directing, planning and improving services in support of business objectives. This interactive course is indispensable to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking to innovate and improve IT services delivered to the business.

  • 4 Days ILT, VILT

    Many city landmarks offer panoramic views from their observation decks. From a high viewpoint, the distances between some buildings might be closer and others further apart, than at first glance. Perspective is key and necessary component for the successful delivery of mature technology-enabled services.

    In service management, two vital elements for success are perspective and flexibility:

    • Perspective: understanding the overall picture of what a service does and how it is delivered. This involves a wide variety of skills, processes, knowledge, tools, and technologies to deliver business and customer value.
    • Flexibility: involves using the portfolio of tools and artefacts appropriately within complex environments. Service management is not a one-size-fits-all approach. The expectations around the customer experience and business value cannot be met with a single and isolated view.

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution.

    The ITIL 4 Specialist: Create, Deliver and Support (CDS) course helps ITSM practitioners assimilate further into the emerging practices of ITIL4 – specifically in the areas of the Service Value Stream and the use of the Value Stream with a specific focus on the creation, delivery and support of new services, and the provisioning of user support.

    Relevant supporting ITIL Practices to these value streams are examined. Team collaboration, integration and organizational cultural aspects critical to the success of the adoption of the value streams are discussed. The course also covers the management and prioritization of work through several techniques and scrutinizes the contribution of continual improvement.

    This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business.

  • 5 Days ILT, VILT

    Supercharge your skills with PMP certification. 

    Project Management Professional (PMP) credential awarded by Project Management Institute (PMI), USA is the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to successfully lead and direct projects.

    Why get PMP certified

    • The PMP certification is a professional designation offered by the Project Management Institute (PMI).
    • It signifies that a project manager has the knowledge, experience, and competency to lead and direct projects successfully.
    • It is considered the gold standard in project management and is recognized globally across various industries.

    Benefits of PMP certification

    • Higher earning potential: PMP-certified project managers earn an average of 20% more than their non-certified counterparts, according to PMI’s Earning Power: Project Management Salary Survey.
    • Global recognition: The certification opens doors to opportunities both locally and internationally.
    • Improved project success: Organizations with PMP-certified managers are more likely to deliver projects on time, within budget, and on scope.\
    • Career advancement: It helps you stand out to employers and can lead to new job opportunities.
  • 4 Days ILT, VILT

    Gain the skills to drive sustainable digital practices, reduce environmental impact, and align IT services with ESG goals through the ITIL 4 sustainability lens.

    As the environment in which we operate continue to evolve and present new challenges, organizations are considering the social and environmental impacts of their operations. With the IT space projected to be responsible for up to 20% of global energy consumption by 2030*, business leaders and professionals are proactively looking for ways to tackle this challenge.

    As part of the ITIL 4 Specialist extension module, a stream of the globally recognized and adopted ITIL 4 framework, this course has been developed to support IT professionals who are looking to understand the role IT and digitally enabled services have in relation to the environment, whilst exploring opportunities to positively impact it by driving sustainable and ethical behaviour and mindset.

    The ITIL4-SDIT: Sustainability in Digital and IT course covers key sustainability competencies and capabilities that IT service organizations need to develop to address current and future sustainability challenges. It also involves providing a framework to support organizations during procurement and supply chain activities helping with interactions across the value chain to evolve sustainability practices.

  • 3 Days ILT, VILT

    Certify your expertise in managing IT services, making you the preferred choice for roles in IT service management and support.

    This 3-day course compiles for the candidates the understanding of the key concepts, principles, value and challenges of ITIL 4’s five management practices, namely, the ITIL 4 Incident Management Practice, the ITIL 4 Service Desk Practice, the ITIL 4 Service Request Management Practice, the ITIL 4 Monitoring and Event Management Practice, and the ITIL 4 Problem Management Practice.

    It is intended to provide candidates with best practice guidance at both strategic and operational levels of maximizing value from the Practices.

    The ITIL 4 Monitor, Support, and Fulfil Practices module is structured and aligned around the ITIL framework. This ITIL 4 certification is intended to assess whether the candidate can demonstrate sufficient understanding and application of the concepts covered in the ITIL 4 Incident Management Practice, ITIL 4 Service Desk Practice, ITIL 4 Service Request Management Practice, ITIL 4 Monitoring and Event Management Practice, ITIL 4 Problem Management Practice publications.

  • 3 Days ILT, VILT

    ITIL 4 Specialist: IT Asset Management

    The ITIL 4 Specialist: IT Asset Management certification course is designed for IT professionals involved in managing costs and risks, monitoring and ensuring compliance, and good governance of IT assets.

    Based on the ITIL 4 framework, this ITIL 4 certification provides both strategic and practical best practice guidance to help organisations understand the value of IT Asset Management and its key concepts and challenges. Professionals should be able to use these concepts to foster effective financial stewardship and governance, control costs, manage risks, monitor and ensure compliance.

    The guidance in this course will also support effective decision making on the purchase, re-use, retirement and disposal of IT assets and assess the sustainability of IT asset decommissioning and disposal.

  • 3 Days ILT, VILT

    ITIL 4 Specialist: Collaborate, Assure & Improve

    The ITIL® 4 Specialist: Collaborate, Assure and Improve is a combined ITIL 4 practice module that aims to help IT professionals collaborate effectively, ensure quality, and drive improvement with a combination of five practices.

    The ITIL® 4 Specialist: Collaborate, Assure and Improve course covers the key concepts of five ITIL practices, namely:

    • Relationship Management
    • Supplier Management
    • Service Level Management
    • Continual Improvement
    • Information Security Management
  • 3 Days ILT, VILT

    ITIL 4 Specialist: Plan Implement and Control

    The ITIL® 4 Specialist: Plan, Implement and Control is a comprehensive combined practice module designed for IT professionals seeking to establish seamless cross-practice collaboration and optimize service value streams.

    The ITIL® 4 Specialist: Plan, Implement and Control course encompasses key concepts from five essential ITIL practices:

    • Change Enablement
    • Deployment Management
    • Release Management
    • Service Configuration Management
    • IT Asset Management
  • 3 Days ILT, VILT

    Master relationship-building with ITIL 4 Specialist: Business Relationship Management—designed for IT pros who manage and grow trusted partnerships between service providers and consumers.

    The ITIL 4 Specialist: Business Relationship Management module is for IT professionals who are involved in establishing and nurturing the relationships between service providers and consumer organizations, and their stakeholders.

    Based on the ITIL 4 framework, this ITIL 4 certification provides both strategic and practical best practice guidance to help organizations understand the value of Business Relationship Management as well as its key concepts and challenges. Professionals should be able to use these concepts to deliver return on investment in digital technology, develop and apply service relationship models and integrate Business Relationship Management in the organisation’s service value streams for a holistic and end-to-end approach.

  • 2 Days ILT, VILT

    The Cisco SD-WAN Operation and Deployment (SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.

    You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.

    The course will allow you to earn 12 Continuing Education (CE) credits toward recertification

  • ENCC: Designing and Implementing Cloud Connectivity

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Cloud Connectivity (ENCC) training helps you develop the skills required to design and implement enterprise cloud connectivity solutions.

    You will learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You will explore the basic concepts surrounding public cloud infrastructure and how services like Software as a Service (SaaS), Direct Internet Access (DIA), and Cisco Umbrella can be integrated.

    You will practice how to analyze and recommend connectivity models that are scalable, resilient, secure, and provide the best quality of experience for users. You will learn to implement both Internet Protocol Security (IPsec) and Software-Defined Wide-Area Network (SD-WAN) cloud connectivity, as well as build overlay routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). You will also implement control and data policies across the SD-WAN fabric and integrate Cisco Umbrella cloud security.

    Finally, you will practice troubleshooting cloud connectivity issues relating to IPsec, SD-WAN, routing, application performance, and policy application.

  • ENNA: Designing and Implementing Enterprise Network Assurance

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.

    This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification.

  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

  • 2 Days ILT, VILT

    Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.

    ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

    As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.

    AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:

    • Evaluate and secure AI-enabled systems across the enterprise
    • Integrate AI into existing security operations and workflows
    • Identify and respond to risks tied to AI technologies
    • Reinforce governance, compliance and responsible innovation
  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 4 Days ILT, VILT

    This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.

  • 4 Days ILT, VILT

    This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.

    To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.

    Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.

    Hands-On Labs

    Eight labs are included to address:

    • IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
    • tuning VSAM and the VSAM buffers
    • alternate indexes
  • 3 Days VILT

    This 13.5 hour Advanced SOAR Implementation course is intended for experienced SOAR consultants who will be responsible for complex SOAR solution development, and will prepare the attendee to integrate SOAR with Splunk as well as develop playbooks requiring custom coding and REST API usage.

    Potential attendees have received a passing grade in all prerequisite courses, and must ensure they can devote all of their attention to the class, as the course work is very challenging. Students will develop a custom solution with SOAR, Splunk and custom Python code. The labs provide requirements for the solution; the student must plan and execute the development. This will require thoughtful focus, experimentation and problem-solving skills.

  • 2 Days VILT

    This 12-hour course is designed for system administrators who are responsible for managing the Splunk Enterprise environment. The course provides the fundamental knowledge of Splunk license manager, indexers and search heads. It covers configuration, management, and monitoring core Splunk Enterprise components.

  • 3 Days VILT

    This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.

  • 3 Days VILT

    This 13.5 hour course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES). It covers ES event processing and normalization, deployment requirements, technology add-ons, dashboard dependencies, data models, managing risk, and customizing threat intelligence.

  • 3 Days VILT

    This 13.5-hour course is for users who want to attain operational intelligence level 4, (business insights) and covers implementing analytics and data science projects using Splunk’s statistics, machine learning, built-in and custom visualization capabilities.

  • 2 Days VILT

    This course is for architects and others tasked with implementing and managing large enterprise deployments. The course covers Splunk deployment planning, Index and resource planning, an overview of Splunk clustering, forwarder selections and forwarder management, integration with other Splunk and third-party products, performance monitoring and tuning, and Splunk use cases.

  • 2 Days VILT

    This two-day course focuses on Splunk Enterprise app development. It’s designed for advanced users, administrators, and developers who want to create apps for Splunk Enterprise and Splunk Cloud. Major topics include planning apps, building data generators, adding data, custom search commands and REST endpoints, using the KV Store, app vetting using AppInspect and app packaging.

  • 3 Days VILT

    This 3-virtual day course is for an experienced Splunk Enterprise administrator who is new to Splunk Clusters. The course provides the fundamental knowledge of deploying and managing Splunk Enterprise in a clustered environment. It covers installation, configuration, management, and monitoring of Splunk clusters. While Splunk Clusters are supported in Windows environments, the class lab environment is running Linux instances only.

  • GCPGKE: Architecting with Google Kubernetes Engine

    Price range: RM7,200.00 through RM7,763.00
    2 Days ILT, VILT

    Learn how to deploy and manage containerized applications on Google Kubernetes Engine (GKE) and the other tools on Google Cloud. This course features a combination of lectures, demos, and hands-on labs to help you explore and deploy solution elements—including infrastructure components like pods, containers, deployments, and services—along with networks and application services. You’ll also learn how to deploy practical solutions, including security and access management, resource management, and resource monitoring.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • GCP-DEVA: Developing Applications with Google Cloud

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    Learn how to design, develop, and deploy applications that seamlessly integrate components from the Google Cloud ecosystem. This course uses lectures, demos, and hands-on labs to show you how to use Google Cloud services and pre-trained machine learning APIs to build secure, scalable, and intelligent cloud-native applications.

    In this course, application developers learn how to design and develop cloud-native applications that seamlessly integrate managed services from Google Cloud. Participants learn how to apply best practices for application development and use the appropriate Google Cloud storage services for object storage, relational data, caching, and analytics.

  • 3 Days ILT, VILT

    Get the best of on-premises and Apigee cloud advantages.

    Learn how to install and manage Google Cloud’s Apigee API Platform in a hybrid cloud. This course uses lectures, hands-on labs, and supplemental resources to show you how to design, install, manage, and scale your Apigee API Platform.

  • 5 Days ILT, VILT

    Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.

    The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

    This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.

  • GCP-APPRUN: Application Development with Cloud Run

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    This course introduces you to fundamentals, practices, capabilities and tools applicable to modern cloud-native application development using Google Cloud Run.

    Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, implement, deploy, secure, manage, and scale applications on Google Cloud using Cloud Run.

Go to Top