You searched for: ""

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

  • 3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • EDU-210: Firewall 11.1 Essentials: Configuration and Management

    Price range: RM15,000.00 through RM16,125.00
    5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

  • 3 Days ILT, VILT

    Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of troubleshooting the full line of Palo Alto Networks next-generation firewalls.
    Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall.

    Completing this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.

  • 5 Days ILT, VILT

    The Prisma SD-WAN Design and Operation course introduces you to Palo Alto Networks next-generation Prisma SDWAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.

    This course is intended for people who must configure, maintain, and use wide-area networks that connect data centers, branch offices, and cloud-based assets and infrastructures.

  • 4 Days ILT, VILT

    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in public cloud security and cybersecurity or anyone wanting to learn how to secure remote networks and mobile users.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 2 Days ILT, VILT

    A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 2 Days ILT, VILT

    A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • CT-DAI: CompTIA DataAI (formerly DataX)

    Price range: RM4,500.00 through RM6,246.00
    5 Days ILT, VILT

    CompTIA DataAI is an expert-level certification designed for experienced data professionals ready to work at the intersection of data science, AI, and enterprise operations.

    The certification targets senior data analysts, data scientists, data engineers, and IT professionals who are already working with analytics, cloud platforms, and AI-enabled tools—and who want to move into more advanced, AI-infused roles.

    Aligned with CompTIA’s Xpert Series, DataAI reflects how advanced data roles have evolved. Statistical rigor, machine learning, MLOps, and business outcomes are no longer separate concerns. The certification confirms that a professional can move beyond analysis into building trustworthy, scalable AI systems that deliver measurable results.

  • 1 Day ILT, VILT

    A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    SOA-C01: Alibaba Cloud SysOps Administrator

    Price range: RM1,800.00 through RM2,000.00
    1 Day ILT, VILT

    A SysOps Administrator manages, deploys, and optimizes Alibaba Cloud infrastructure to ensure performance, security, and cost-efficiency. This role involves implementing observability, automating processes for scalability and reliability, managing user permissions to protect resources, and applying cost optimization strategies to control expenses.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 1 Day ILT, VILT

    A Cloud Security Engineer is responsible for securing cloud workloads on Alibaba Cloud by implementing and managing robust security policies, practices, and technologies. This role emphasizes safeguarding applications and data from potential threats and vulnerabilities. The Cloud Security Engineer works closely with other roles to enhance the overall security posture

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 1 Day ILT, VILT

    A Generative AI Engineer is responsible for understanding generative AI concepts and Alibaba Cloud technologies that can be used to deploy such applications. This role focuses on identifying and describing appropriate generative AI services and solutions, playing a key part in the organization’s exploration of AI capabilities.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 1 Day ILT, VILT

    This course explores extending Copilot’s capabilities with Microsoft Graph connectors and custom engine copilots, guiding participants to choose the best development path. It concludes with agent management in the Microsoft 365 admin center.

  • 180 Days ILT, VILT

    The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.

    This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.

    This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

    In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

    This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • GCP-APPRUN: Application Development with Cloud Run

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    This course introduces you to fundamentals, practices, capabilities and tools applicable to modern cloud-native application development using Google Cloud Run.

    Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, implement, deploy, secure, manage, and scale applications on Google Cloud using Cloud Run.

  • 5 Days ILT, VILT

    The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities to help them ensure compliance with European Union’s Digital Operational Resilience Act (DORA).

  • 5 Days ILT, VILT

    ISO/IEC 27033 Lead Network Security Manager training course help participants gain a comprehensive understanding of the concepts, principles, methods, and design techniques used to implement and manage network security based on the ISO/IEC 27033 series of standards.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The Certified NIST Cybersecurity Consultant training course equips participants with the essential knowledge and skills required for cybersecurity compliance and resilience, based on NIST publications. It covers key NIST publications, including NIST SP 800-12 for information security fundamentals and best practices and NIST SP 800-53 for implementing security and privacy controls for information systems and organizations.

    This training course also covers the NIST risk management framework, guiding participants through the strategic management of cybersecurity risks. Additionally, participants can learn about NIST SP 800-171, focusing on protecting Controlled Unclassified Information in nonfederal systems and organizations.

    The course introduces the NIST Cybersecurity Framework’s core functions—Identify, Protect, Detect, Respond, and Recover— to effectively enhance an organization’s cybersecurity posture.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • ENCC: Designing and Implementing Cloud Connectivity

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Cloud Connectivity (ENCC) training helps you develop the skills required to design and implement enterprise cloud connectivity solutions.

    You will learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You will explore the basic concepts surrounding public cloud infrastructure and how services like Software as a Service (SaaS), Direct Internet Access (DIA), and Cisco Umbrella can be integrated.

    You will practice how to analyze and recommend connectivity models that are scalable, resilient, secure, and provide the best quality of experience for users. You will learn to implement both Internet Protocol Security (IPsec) and Software-Defined Wide-Area Network (SD-WAN) cloud connectivity, as well as build overlay routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). You will also implement control and data policies across the SD-WAN fabric and integrate Cisco Umbrella cloud security.

    Finally, you will practice troubleshooting cloud connectivity issues relating to IPsec, SD-WAN, routing, application performance, and policy application.

  • ENNA: Designing and Implementing Enterprise Network Assurance

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.

    This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification.

  • SCAZT: Designing and Implementing Secure Cloud Access for Users and Endpoints

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) training teaches you the skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats.

    This training prepares you for the 300-740 SCAZT v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Secure Cloud Access certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification.

  • SPCNI: Designing and Implementing Cisco Service Provider Cloud Network Infrastructure

    Price range: RM13,000.00 through RM14,350.00
    5 Days ILT, VILT

    The Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI) training teaches you how to design and implement virtualization cloud infrastructures in a service provider network. You will learn about virtualized network function infrastructures and how to use programmability and orchestration to manage virtualization cloud infrastructures. You will also learn about cloud computing and implementation of cloud interconnect and data center interconnect solutions. In addition, you will learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures.

    This training prepares you for the 300-540 SPCNI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.

  • SC-401T00: Protect sensitive information with Microsoft Purview in the AI era

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Be the reason your organization survives the next cyberattack.

    The Information Security Administrator course equips you with the skills to:

    • to plan and implement information security for sensitive data using Microsoft Purview and related services
    • protect data within Microsoft 365 collaboration environments from internal and external threats.
    • to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases
    • protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

     

  • GCP-GAIL: Generative AI Leader

    Price range: RM4,800.00 through RM5,070.00
    2 Days ILT, VILT

    In this course, you will take a journey from a broad overview of gen AI to understanding how to leverage gen AI and Google Cloud for organizational transformation.

    Upskill in Generative AI with 30% off – limited-time price: RM3360

  • 2 Days ILT, VILT

    The RSSD: Secure Software Developer course is an intensive,highly interactive two-day program designed to equip software developers with the essential knowledge and skills needed to build secure applications in today’s increasingly hostile digital
    landscape.

    This course is an invaluable resource for developers seeking to enhance their understanding of web application security, understand common threats and vulnerabilities, and implement security best practices from the ground up.

  • AWS-MLE: Machine Learning Engineering on AWS

    Price range: RM5,400.00 through RM6,075.00
    3 Days ILT, VILT

    Machine Learning (ML) Engineering on Amazon Web Services (AWS) is a 3-day intermediate course designed for ML professionals seeking to learn machine learning engineering on  AWS. Participants learn to build, deploy, orchestrate, and operationalize ML solutions at scale through a balanced combination of theory, practical labs, and activities.

    Participants will gain practical experience using AWS services such as Amazon SageMaker AI and analytics tools such as Amazon EMR to develop robust, scalable, and production-ready machine learning applications.

  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

Go to Top