Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.
-
Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.
-
Microservices and Cloud-Native architectures have been goals of many organizations to help increase speed and agility, but as complexity grows, systems become increasingly challenging to observe. When issues occur, these issues are often di cult to triage and identify the root causes. This course introduces a range of practices for advancing resilience and how to architect end-to-end Observability for Cloud-Native applications. The advantages of building full-stack metrics, events, logs, and distributed tracing are introduced, along with the impact of DevSecOps on Observability and how AIOPs enhance Observability capabilities.
This course also covers how Network and Security Observability plays a key role in building reliability, the key aspects of security operations and automated responses are covered, The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in Observability by using real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage situations such as implementing MELT models effectively, that fit their organizational context, building distributed tracing and resiliency by design.
The course is developed by leveraging key experts in the fields of telemetry, sources of knowledge and engaging with thought-leaders in the Observability space, and working with organizations who have crossed the chasm of modern Observability to extract real-life best practices. This course positions learners to successfully complete the Observability Foundation certification exam.
-
Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.
Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Configure and manage Red Hat Identity Management (IdM)
Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.
This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Performance tuning and capacity planning for Red Hat Enterprise Linux
Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.
This course is based on Red Hat® Enterprise Linux 8.
Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.
-
Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage
Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.
Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.
-
Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage
Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.
The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0
-
Design, build, and deploy containerized applications on Red Hat OpenShift
Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.
Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.
The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.
This course is based on Red Hat OpenShift 4.14.
-
Design, build, and deploy containerized applications on Red Hat OpenShift
Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster
Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.
The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.
This course is based on Red Hat OpenShift 4.14. The Red Hat Certified OpenShift Application Developer Exam (EX288) is included in this offering
-
The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.
Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.
-
While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.
We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.
Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.
We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.
-
Get more done and unleash your creativity with Microsoft Copilot. In this learning path, you’ll explore how to use Microsoft Copilot to help you research, find information, and generate effective content.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation. The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.
Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!
-
Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.
- Level: Intermediate
- Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
- Role: Security Operations Analyst
- Subject: Threat protection
-
This blended course is for Devops/SREs and Developers.
The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
find insights using analytics in charts and detectors and to create detectors for common use cases. -
-33%
Expand your basic Splunk skill set with greater understanding of searching and reporting, creating objects, tags, models and more.
Prepare for the Splunk Core Certified Power User exam with nine essential eLearning courses in a single registration. Learn about field extraction creation, correlation analysis, result modification and more.
Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation. The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.
Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!
-
The Splunk Core Certified Advanced Power User course is designed to take your Power User skills to the next level. It focuses on complex searching and reporting, advanced use cases of knowledge objects, and best practices for dashboards and forms.
-
The Rocheston Certified Artificial Intelligence Engineer (RCAI) training and certification program is a professional certification course that equips students with a profound understanding of the algorithms, applications, and tools used for Artificial Intelligence (AI) in today’s digital world.
The RCAI training program is designed by Rocheston, a pioneering company in cybersecurity training and certification. It provides specialization in AI and its increasing role in several industries. It aims to prepare the students to solve complex AI problems and applications. Post certification, the students can work as AI Engineers or any interdisciplinary roles related to AI in corporate and industries.
Also, the RCAI program series are accordant with CE standard, a high standard within Rocheston’s cybersecurity framework which ensures the candidates are learning the best and latest in the innovation field.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Trend Vision One is a comprehensive cybersecurity platform designed to provide centralized visibility and control across your entire IT environment. It consolidates a wide range of security capabilities into a single platform, simplifying security operations and enhancing protection against modern threats.
This multi-day, instructor-led course provides the in-depth knowledge and hands-on skills to effectively manage your Trend Vision One platform. You’ll learn about the platform, user roles, and the core responsibilities of an administrator.
-
This course provides a deep dive into the core principles of Zero Trust and equips you with the knowledge and skills to implement them effectively using Trend Vision One.
You will learn how to configure and manage secure access rules, deploy Secure Access Modules, and ensure secure access to private applications, internet resources, and Al services. Through hands-on labs and real-world examples, you’ll gain practical experience in building and maintaining a robust Zero Trust security environment.
You will gain practical experience in building and maintaining a Zero Trust security environment through hands-on labs and real world examples.
-
Trend Vision One™ – Standard Endpoint Protection delivers XDR-powered threat defense, combining advanced endpoint security with cross-layer detection and response for comprehensive protection against sophisticated attacks.
-
This course provides an in-depth understanding and practical expertise needed to effectively secure servers and cloud workloads using Server & Workload Protection.
You will explore the intricate details of its core features and powerful protection modules, develop proficiency in advanced threat protection, and Extended Detection and Response (XDR) capabilities to defend against sophisticated threats across enterprise infrastructures.
-
This course introduces the AI and machine learning (ML) offerings on Google Cloud that build both predictive and generative AI projects.
It explores the technologies, products, and tools available throughout the data-to-AI life cycle, encompassing AI foundations, development, and solutions. It aims to help data scientists, AI developers, and ML engineers enhance their skills and knowledge through engaging learning experiences and practical hands-on exercises.
-
This course is designed for business users, business leaders, and, more generally, decision makers within organizations who are seeking to gain a comprehensive understanding of generative AI and its potential impact on their businesses.
The overall goal of the course is to educate decision makers on the potential impact generative AI can have in their organizations, educate them about generative AI services on Google Cloud and to inspire decision makers to start thinking about what is possible with generative AI technologies.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
As generative AI becomes more common, the ability to interact with large language models is shifting from niche knowledge to a necessary skill across many different industries and roles.
In this course, you will learn the fundamentals of prompting large language models and exploring further techniques for improving the output from large language models. You will also explore similar concepts when working with multimodal models such as Gemini Vision Pro.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
In this course, you explore generative AI (Gen AI) use cases across specific industries using Google Cloud.
After discussing generative AI in general, you will do a deep dive into two generative AI use cases and then explore your own use case within the same framework. This course targets professionals across different roles, including business analysts, data scientists, software developers, business users, and decision-makers, who are specifically interested in leveraging generative AI for business solutions.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
Trend Vision One – Mobile Security is a security solution designed to proactively protect and manage mobile devices against a wide range of mobile threat attacks. It integrates advanced mobile threat detection technologies to mitigate mobile security risks and supports integration with third-party mobile device management (MDM) solutions for centralized management.
This course provides a comprehensive overview of Trend Vision One™ Mobile Security’s core features designed to combat evolving mobile threats.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Cloud Email and Collaboration Protection safeguards your business-critical cloud applications like Microsoft 365, Google Workspace, Box, and Dropbox.
This course will teach you how to defend against advanced threats such as ransomware, phishing, and BEC, while also preventing data leakage. Learn to leverage its cloudto-cloud integration for seamless protection and easy management, ensuring high availability and administrative functionality.
Gain the skills to secure your cloud collaboration tools and protect your organization from evolving cyberattacks.
-
Trend Vision One – Cloud Email Gateway Protection is an enterprise-class solution that delivers continuously updated protection to stop phishing, ransomware, Business Email Compromise (BEC) scams, spam and other advanced email threats before they reach your network.
This course will provide you with the knowledge and skills that are required to administer and support Cloud Email Gateway Protection (CEGP).
-
Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.
This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Large Language Models powered by world-class Google AI.
Google Cloud brings innovations developed and tested by Google DeepMind to our enterprise-ready AI platform so customers can start using them to build and deliver generative AI capabilities today — not tomorrow.
In this course, you explore tools and APIs available on Google Cloud for integrating large language models (LLMs) into your application.
After exploring generative AI options on Google Cloud, you explore LLMs and prompt design in Vertex AI Studio. Then you learn about LangChain, an open-source framework for developing applications powered by language models.
After a discussion around more advanced prompt engineering techniques, you put it all together to build a multi-turn chat application by using LangChain and the Vertex AI Gemini API.
-
Vertex AI Agent Builder lets developers, even those with limited machine learning skills, tap into the power of Google’s foundation models, search expertise, and conversational AI technologies to create enterprise-grade generative AI applications.
In this course, you learn how to use Vertex AI Agent Builder to create search engines and chat applications. You will then explore how to integrate these search engineers and chat applications into your own applications.
Finally, you learn how to manage the tools built in Vertex AI Agent Builder in production.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
Generative AI is now at the center of transforming how software is designed, built, run, and managed. For developers, generative AI is a powerful tool for making coding more efficient and using APIs, such as the Gemini and PaLM APIs, within their applications.
In this course, you are introduced to how generative AI can be used to make developers more efficient at writing code and implementing new features into applications. You will also explore available models in Vertex AI Model Garden.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
Learn the essential skills to migrate virtual machines to Red Hat OpenShift Virtualization.
The Migrating Virtual Machines to Red Hat OpenShift Virtualization with Ansible Automation Platform (DO346) course provides the essential knowledge to migrate virtual machines to Red Hat OpenShift Virtualization by using carefully selected content from Managing Virtual Machines in Red Hat OpenShift Virtualization (DO316) and Automate and Manage Red Hat OpenShift Virtualization with Ansible (DO336). This Red Hat course provides a shorter learning path for IT professionals to migrate their virtualized workloads to OpenShift Virtualization.
This course provides the following information and skills:
- An introduction to key OpenShift and Kubernetes concepts, such as nodes, pods, and operators
- Skills to deploy the OpenShift Virtualization operator
- Skills to configure networking and storage for virtual machines
- Strategies to migrate virtual machines from another hypervisor to OpenShift Virtualization by using the migration toolkit for virtualization operator and Ansible Automation Platform
This course is based on OpenShift Container Platform 4.16, OpenShift Virtualization 4.16, and Ansible Automation Platform 2.4.
-
Learn how to migrate existing CentOS Linux servers to supported versions of Red Hat Enterprise Linux.
The RH174: Managing CentOS Migrations and RHEL Upgrades course will enable customers to transition successfully from CentOS Linux to Red Hat Enterprise Linux. It also enables them to upgrade from one major version of RHEL to the next. This course provides an overview of the migration process and discusses how to avoid and mitigate risks. “Managing CentOS Migrations and RHEL Upgrades” will help users to move from CentOS Linux to RHEL, or to upgrade to a newer version of RHEL.
-
Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.
Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.








