You searched for: ""

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 1 Day ILT, VILT

    In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.

  • 1 Day ILT, VILT

    Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.

    This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.

  • 1 Day ILT, VILT

    Learn about Large Language Models (LLM) and how RAGs combine generative and retrieval-based AI models to extend the already powerful capabilities of LLMs. Get the knowledge you need about how a RAG works and how it’s assembled from component parts.

    With our hands-on labs, you will develop a RAG using existing LLM and AI tools and apply RAG techniques to designs to solve problems.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 2 Days ILT, VILT

    We offer Leading SAFe Agilist 5.1 Certification Training in Malaysia, a 2-day training program that would get you the theoretical and practical basics of the Scaled Agile Framework (SAFe). The training helps you lead agile transformation within your enterprise using the Scaled Agile Framework and its underlying principles of lean thinking and product development flow.

    The Scaled Agile Framework (SAFe) is a knowledge base of proven, integrated principles, practices, and competencies for achieving business agility using Lean, Agile, and DevOps. Created by Dean Leffingwell, this framework effortlessly aligns and synchronizes for large-scale, multi-team Agile projects to develop and deliver enterprise-class technology-based solutions with high quality and faster time-to-market.

  • SANADM: ONTAP SAN Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.

  • SANIMP: Data ONTAP SAN Implementation

    Price range: RM10,917.00 through RM11,592.00
    3 Days ILT, VILT

    In this NetApp training course, you will learn the installation process for ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, NVMe, and iSCSI, on Microsoft Windows Server, Linux and VMware ESXi host operating systems. The learning will be reinforced through hands-on guided labs. The course materials include a lab workbook that will serve as an on-the-job reference guide.

  • 1 Day ILT, VILT

    Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • SC-100T00: Microsoft Cybersecurity Architect

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Advance your Microsoft SCI expertise with the all new Microsoft Certified: Cybersecurity Architect Expert certification.

    This SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

    Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

     

  • SC-200T00: Defend against cyberthreats with Microsoft’s security operations platform

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.

    In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Defend against cyberthreats with Microsoft’s security operations platform.

    This SC-200: Defend against cyberthreats with Microsoft’s security operations platform.

    training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • SC-300T00: Microsoft Identity and Access Administrator

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Discover the Microsoft Certified: Identity and Access Administrator Associate certification.

    This SC-300T00: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.

    Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects.

    The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

    This SC-300T00: Microsoft Identity and Access Administrator training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our guide to top cybersecurity training and certifications in 2025.

  • SC-401T00: Protect sensitive information with Microsoft Purview in the AI era

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Be the reason your organization survives the next cyberattack.

    The Information Security Administrator course equips you with the skills to:

    • to plan and implement information security for sensitive data using Microsoft Purview and related services
    • protect data within Microsoft 365 collaboration environments from internal and external threats.
    • to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases
    • protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

     

  • 1 Day VILT

    Real skills for real-time results with Microsoft Applied Skills credentials.

    Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization’s data.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

    • Level: Intermediate
    • Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
    • Role: Security Operations Analyst
    • Subject: Threat protection
  • 1 Day VILT

    Learn about Microsoft Copilot for Security, an AI-powered security analysis tool that enables analysts to process security signals and respond to threats at a machine speed, and the AI concepts upon which it’s built.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    Implement retention, eDiscovery, and Communication compliance in Microsoft Purview

    In today’s digital environment, managing organizational data efficiently and securely is crucial. Microsoft Purview Data Lifecycle and Records Management solutions help businesses govern their data throughout its lifecycle, ensuring compliance with regulatory requirements. By implementing retention labels and policies, organizations can consistently manage data, minimize risks associated with breaches, and reduce unnecessary storage.

    Understanding these tools ensures data is available when needed and securely deleted when it’s not.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events.

  • SC-900: Microsoft Security, Compliance and Identity Fundamentals

    Price range: RM1,200.00 through RM1,425.00
    1 Day ILT, VILT

    Get started with cybersecurity with the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

    In this 1-day SC-900 Microsoft Certified: Security, Compliance, and Identity Fundamentals training course, you’ll learn about the core concepts and principles of security, compliance, and identity solutions. You’ll also get familiarized with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services. So if you’re looking to protect your data against the latest security risks, this cybersecurity certification is for you.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    This NetApp training course covers the deployment of the SnapCenter Software 4.0 release. In this course you learn how to install, monitor, and manage SnapCenter Server and SnapCenter Plug-ins. You learn how to install licenses, configure role-based access control (RBAC), and install the SnapCenter Plug-ins for Windows, Linux, and Oracle. You learn how to prepare hosts and connect to the NetApp ONTAP storage system.

    You also learn how to back up and restore Windows file system data and configure SnapMirror and SnapVault relationships for use with SnapCenter software. The course materials include a guide for hands-on exercises that you perform in a lab setting.

  • SCAZT: Designing and Implementing Secure Cloud Access for Users and Endpoints

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) training teaches you the skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats.

    This training prepares you for the 300-740 SCAZT v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Secure Cloud Access certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification.

  • SCOR: Implementing and Operating Cisco Security Core Technologies

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

    This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.

  • 5 Days ILT, VILT

    Security resilience for the unpredictable with Cisco Security solutions.

    You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features.

    This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist – Security Core certifications.

    This course also earns you 64 Continuing Education (CE) credits towards recertification.

  • 3 Days ILT, VILT

    The SDA qualification course is for front-line IT service and support analysts with some experience in a first-line or second-line service desk environment. This course is perfect for analysts looking to grow in their role and gain a recognized qualification in their profession. This course will help them to develop practical skills whilst earning a certificate that endorses their commitment and knowledge.

    Covering three days of learning, plus the qualification exam at the end of the course, analysts will fully explore the modules covered in SDI’s professional standard for Service Desk Analysts and will equip all Service Desk Analysts the essential skills and knowledge needed for delivering customer service and support excellence.

  • 2 Days ILT, VILT

    Introduction to Cisco SD-Access and Catalyst Center (formerly DNA Center) offer Cisco’s nextgeneration programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure.

    This 2-day network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks using integration with Cisco ISE for Policy Enforcement with Cisco Catalyst Center (formerly DNA Center).

  • 5 Days ILT, VILT

    This 5-day deep dive training course explores the capabilities of the Cisco Software-Defined Access (SDA) solution. Students will learn how to implement SDA for different solution verticals. It also addresses the details of how to operate and troubleshoot the different capabilities of the underlying solution components.

  • 4 Days ILT, VILT

    This interactive four-day SDM qualification course is designed for existing and aspiring service desk managers and supervisors who wish to develop their understanding of service desk management best practice and how to run an effective support operation.

    The training will provide a thorough grounding in the skills required to lead, motivate and manage a service desk team. The complete service desk management toolkit covering strategy, leadership, employee development, relationship building, service improvement, ITSM processes, performance measurement, finance and tools and technologies will also be provided as part of the course.

    Candidates will achieve an internationally recognised SDM qualification from APMG International and the ability to master the key areas of service desk management with SDI’s SDM qualification course and lead your team to lasting success.

  • 4 Days ILT, VILT

    This Cisco SD-WAN training is targeted to engineers and technical personnel involved in deploying, implementing, operating and optimizing Cisco SD-WAN solution, both in enterprise and Service Provider environments, including advanced features for centralized AAR/Data policies, QoS, application performance routing, configuration templates, control policies and troubleshooting common and advanced operating issues. The Cisco SD-WAN course is lab-intensive, and objectives are accomplished mainly through hands on learning.

    Students taking this Cisco SD-Wan training course should be familiar with Wide Area Networks (WANs) in a variety of ways, which can be found below. Ideal candidates for this course include engineering and planning teams who evaluate WAN evolution, personnel involved in SD-WAN Design, Implementation and Operation, and others.

  • 2 Days ILT, VILT

    The Cisco SD-WAN Operation and Deployment (SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.

    You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.

    The course will allow you to earn 12 Continuing Education (CE) credits toward recertification

  • 3 Days ILT, VILT

    This 3-day course is hands-on training on Cisco Meraki SD-WAN implementations, basic and advanced Cisco Meraki SD-WAN Security features that are available on Meraki MX routers. Deep dive into capabilities like Firewall and Traffic, Application Aware Firewall, AMP Integration, Content Filtering and Threat protection and many other advanced features are covered as a part of this training. This course also provides hands-on training on Cisco Meraki SD-WAN Programmability features.

  • 5 Days ILT, VILT

    This five-day course covers the new deployment, options and features of version 20.16 Cisco Software-Defined WAN (SD-WAN). SD-WAN is an overlay architecture that overcomes the biggest drawbacks of traditional WAN. Students will learn how to design, configure and operate a Cisco SD-WAN utilizing any transport (MPLS, Broadband, LTE, VSAT etc.).

    Candidates will discuss and build an SD-WAN environment starting from Day 0 provisioning and will also be able to provide troubleshooting, management, policy control and application visibility across the enterprise network. This hands-on Course covers the Cisco SD-WAN product and contains extensive labs to reinforce the knowledge learned.

Go to Top