Lead the way with EXIN DevOps Master™. EXIN DevOps Master™ is an advanced-level certification that tests candidates on their ability to develop and maintain sustainable work practices. It enables them to introduce and promote DevOps in their organization in order to better manage application and service life cycles whilst facilitating collaborative teamwork.
-
The VeriSM™ Professional certification tests a candidate’s knowledge of, and skills in, applying VeriSM™ in an organization. Those certified as VeriSM Professional understand the impact of digital transformation on the organization and on people, consumers as well as staff. They are able to translate strategic direction into a successful operating environment. The certified VeriSM™ Professional has proven his or her ability to create and use a Management Mesh that is based on the organization’s portfolio, principles, and governance needs. After creating or adapting the Management Mesh based on new requirements, a VeriSM Professional is able to manage the product or service through the Define, Produce, Provide and Respond stages.
-
This training course builds on the networking concepts covered in the Networking Fundamentals in Google Cloud course. Through presentations, demonstrations, and labs, participants explore and deploy Google Cloud networking technologies.
These technologies include: Virtual Private Cloud (VPC) networks, subnets, and firewalls; Interconnection among networks; Load balancing ;Cloud DNS; Cloud CDN; Cloud NAT.
The course will also cover common network design patterns.
-
Learn best practices in cloud security and how the Google Cloud security model can help protect your technology stack. Security Engineers actively assess existing Google Cloud implementations, identifying potential security issues, and prioritizing solutions.
This Google Cloud certification uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The Logging, Monitoring and Observability in Google Cloud training course teaches participants techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud.
Learn how to monitor, troubleshoot, and improve your infrastructure and application performance. Guided by the principles of Site Reliability Engineering (SRE), this official Google Cloud course features a combination of lectures, demos, hands-on labs, and real-world case studies. In this course, you’ll gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, and profiling CPU and memory usage.
-
-30%
The next generation of Dataflow: Dataflow Prime, Dataflow Go, and Dataflow ML.
This training is intended for big data practitioners who want to further their understanding of Dataflow in order to advance their data processing applications.
Beginning with foundations, this training explains how Apache Beam and Dataflow work together to meet your data processing needs without the risk of vendor lock-in. The section on developing pipelines covers how you convert your business logic into data processing applications that can run on Dataflow.
This training culminates with a focus on operations, which reviews the most important lessons for operating a data application on Dataflow, including monitoring, troubleshooting, testing, and reliability
-
In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.
Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.
Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.
-
PRINCE2® (Projects IN Controlled Environments) is a process-based approach for project management providing an easily tailored and scalable method for the management of all types of projects. The method is the de-facto standard for project management and is practiced worldwide. PRINCE2 is a flexible method that guides you through the essentials for running a successful project regardless of project type or scale. PRINCE2 can be tailored to meet your organization or industry-specific requirements. Upon completion of the course, learners will be able to:
- Define the key concepts of projects and PRINCE2
- Explain how the PRINCE2 principles underpin the PRINCE2 method
- Understand the importance of people in successful projects
- Describe the PRINCE2 practices and how they are applied throughout the project
- Explain the PRINCE2 processes and how they are carried out throughout the project
- Identify the relationships between processes, deliverables, roles, and the management dimensions of a project
In addition to these general learning objectives, the PRINCE2 7 Foundation course also aims to prepare learners for the PRINCE2 Foundation exam. The exam covers the following topics:
- The seven PRINCE2 principles
- The seven PRINCE2 themes
- The seven PRINCE2 processes
- The purpose and major content of all PRINCE2 roles
- The purpose and major content of all PRINCE2 management products
By completing the PRINCE2 7 Foundation course and passing the exam, learners will demonstrate that they have a sound understanding of the PRINCE2 methodology and are ready to apply it to their own projects.
-
This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).
In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.
-
From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.
Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia
-
Open new career doors – prove your Kubernetes & cloud native developer skills with the CKAD certification that is recognized globally, vendor-neutral, and relevant across all industries.
The course, along with real-world experience and study, will provide the skills and knowledge also tested by the Certified Kubernetes Application Developer (CKAD) exam.
Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia
-
Deep Learning and Natural Language Processing
Deep Learning and Natural Language Processing (NLP) have revolutionized the way we interact with and analyze text data. This four-day course, tailored for beginners, provides a comprehensive introduction to the foundations of deep learning and its application in NLP. Participants will gain a strong understanding of neural networks, language processing, and hands-on experience in building NLP models.
-
The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.
Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.
-
Data Wrangling & Exploratory Data Analysis with Python
Data wrangling and exploratory data analysis (EDA) are essential steps in any data science or analysis project. This four-day course is designed for beginners and provides a comprehensive foundation in data preparation and exploration using Python. Participants will learn to clean, transform, and gain insights from real-world datasets, making them well-equipped for data-driven decision-making.
-
Learn everything you need to know about employee selection in this seminar!
Making the wrong hiring decision means throwing away a substantial investment of time and money on recruitment, training and benefits. This fundamentals seminar is your ticket to make the right hiring decisions and contribute more to your company’s bottom line.
-
You can no longer afford to expend energy on account development without a plan or focus. Major account selling requires a long cycle and a big investment of resources. That’s why today’s successful sales professionals are more than just tactical pros…they’re strategic experts.
Now, in this account management training seminar, learn how to develop a strategic selling plan that will save you time, money and hassles by identifying the right account and project, why your offer matters to them, what it takes to assure their long-term relationship and how to move them along the pipeline quickly.
-
AMA’s AMA-2528: Assertiveness Training for Women in Business gives you the opportunity to practice fundamental assertiveness skills and to share your concerns with other women in a supportive and encouraging learning environment. You’ll assess your leadership style and then apply the new skills and tools you learn directly to one of your own challenges, receive feedback, and refine your skills through videotaped practice.
Return to work with a complete and flexible plan for achieving the kind of assertiveness your position demands.
-
Whether it’s entering new markets, repositioning, outsourcing, or undertaking new initiatives or technology, execution of strategic goals is often a graveyard of good intentions. A recent strategy execution study of a broad group of leaders found that 65% of them do not consider their own organization successful at executing their strategies.
Overcoming these challenges requires organizations to invest in upskilling their workforce, promoting strong leadership, and fostering adaptability. The AMA-2209: AMA: Strategy Execution: Getting It Done program will empower your employees to:
- Communicate effectively, ensuring alignment and clarity in strategic goals across your organization.
- Develop strong leadership skills, enabling managers to inspire, support, and guide their teams toward successful goal execution.
- Adapt to changing market conditions and embrace new opportunities, helping your organization stay ahead of the competition.
-
When you’re focused on your organization’s future every day of every workweek, it’s vital that you are well equipped to optimize your company’s performance—as well as your own career—with executive leadership training.
What does it mean to be an executive leader? It means you’re a visionary, a trailblazer, a strategist, a communicator, a coach, a diplomat and a politician. Pride, commitment and camaraderie. Those are the words you describe your team. You’re able to focus on the big picture and uphold high standards while wearing many hats. We know It takes laser-precise vision to be an executive leader. Join your peers in this course to craft your own leadership style, build an extraordinary team and master the competencies of effective executive leadership.
-
In the Oracle Enterprise Manager Cloud Control 13c: Install & Upgrade course, you’ll learn about the architecture of Oracle Enterprise Manager Cloud Control 13c, implementation options and you’ll perform a standard single-server installation. In this course we will also review the available upgrade paths from previous versions and execute a 1-system upgrade from Enterprise Manager Cloud Control 12c 12.1.0.5
Learn To:
- Install Oracle Enterprise Manager Cloud Control 13c.
- Plan and execute a 1-system upgrade from Oracle Enterprise Manager Cloud Control 12c.
-
In the Oracle NoSQL Database for Developers Ed 1 course, you will learn how to use the Oracle NoSQL Database developer APIs for Java. You will also discover how to access the KVStore from a Java application to store and manipulate data in a KVStore.
Learn To:
- Understand the key concepts of the NoSQL technology and when to use the Oracle NoSQL Database versus an RDBMS.
- Learn to design the schema for a Java application using a table based approach as well as a key value pair approach.
- Learn to create the code for storing, manipulating and deleting data stored in a KVStore.
- Handle exceptions and implement security, consistency, and durability policies for the KVStore and an application.
You will identify the features and benefits of the Oracle NoSQL Database and will discover why and how Oracle NoSQL Database is used to store data, generally Big Data.
-
This Oracle NoSQL Database for Administrators training teaches you how to deploy a KVStore and troubleshoot installation and hardware failures. Expert Oracle University instructors will also teach you how to monitor and manage a KVStore.
Learn To:
- Plan installation of Oracle NoSQL Database.
- Install and configure Oracle NoSQL Database.
- Deploy Oracle NoSQL Database KVStore.
- Secure the configuration.
- Extend a KVStore by increasing the replication factor or capacity of the KVStore.
- Troubleshoot installation and hardware failures.
- Monitor and optimize Oracle NoSQL Database performance.
- Perform backup, recovery, and upgrades.
When you walk away from this course, you’ll be able to identify the features and benefits of the Oracle NoSQL Database. You’ll have a deeper understanding of how to optimize the KVStore’s performance.
-
The Java SE: Exploiting Modularity and Other New Features introduces the Java module system and other new features, including JShell, convenience methods, new techniques for working with streams, and managing deprecated APIs. These features were introduced in versions after Java 8, and therefore new to developers migrating to Java 11.
Learn To:
Design applications to take advantage of the module system and its more reliable configuration, improved security and performance, and more easily scalable applications. Migrate existing applications to a modular applications in a step-by-step manner, choosing which parts of the application to migrate first. Deal with common problems encountered in migrating an application, including, cyclic dependencies and split packages. Use services to make modularized applications more robust and easily extensible. Create multi-release JAR files that can be run on different Java releases. Use convenience methods to reduce code that seems verbose, inefficient or boilerplate, and increase readability. Use JShell to quickly run small code experiments and test new APIs.
Benefits To You:
By enrolling in this course, you’ll learn how to use the module system to design applications with explicit dependencies and encapsulation at the JAR level, ensuring more reliable configuration, improved security and enhanced performance. You’ll also get a chance to experiment with new features that ease development. These include convenience methods that make your code more readable and succinct, and JShell, an easy way to test code snippets and APIs.
-
This Oracle WebLogic Server 12c: Troubleshooting Workshop training teaches administrators how to diagnose and troubleshoot Oracle WebLogic Server 12c problems and issues. Emphasizing hands-on practices rather than lectures, the course requires prior WebLogic Server 12c administration experience.
Learn How To:
- Diagnose WebLogic Server problems.
- Enable debugging for a WebLogic Server feature.
- Troubleshoot common WebLogic Server problems.
Knowing how to diagnose and troubleshoot Oracle WebLogic Server issues increases the performance and scalability of your organization’s applications and services. Use Troubleshooting Tool. You learn how to use tools to assist in troubleshooting, including the WebLogic Server Administration Console, the Monitoring Dashboard, and the WebLogic Diagnostic Framework. In hands-on practices, you solidify your understanding of new topics by learning how to apply this knowledge to your daily job. Practice Troubleshooting Problems Enrolling in this course gives you a chance to practice troubleshooting problems. You’ll use Oracle WebLogic server itself, along with the Java Virtual Machine, deployment of Java Enterprise Edition applications, Java Database Connectivity, Node Manager, WebLogic Server clusters, and WebLogic Server security.










