You searched for: ""

  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.

    This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Master the critical first line of cyber defense.

    EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

    This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

    The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.

    The E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH&R, from preparing/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

    With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.

    The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today`

  • 3 Days ILT, VILT

    Become a Cyber First Responder – Monitor, Detect, Prevent and Document Cyber Incidents.

    The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate level operations.

    CSA certification is a training and credentialing program that helps the candidate acquire trending and in demand cybersecurity skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

    As the security landscape is expanding, a SOC team offers high-quality IT-security services to detect potential cyber threats and attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analyst who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.

    The lab-intensive SOC analyst certification program emphasizes the holistic approach to deliver elementary as well as advanced knowledge of how to identity and validate intrusion attempts. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

     

  • 4 Days ILT, VILT

    The goal of this course is to enhance your basic teaching techniques. You will acquire a broad range of necessary knowledge and become able to put it into practice in order to provide high-quality training as a trainer.

  • 2 Days VILT

    This 9-hour virtual course targeted towards DevOps, Observability and SRE teams is a follow-up to the course “Automation Using the REST and SignalFlow APIs”. Learn to use the Splunk IM Terraform provider to manage Splunk IM resources for visualization, alerting and teams. Create and manage detectors and muting rules. Learn to create and modify teams including team notification policies. All concepts are taught through discussions and hands-on lab exercises.

  • 2 Days VILT

    Splunk IM exposes a comprehensive API that allows you to automate any action that can be done using the User Interface. This 2-day virtual course provides the foundation for you to use the API to automate bulk actions such as the creation of charts, dashboards, and alerts. See how to programmatically perform computations that can be used in charts and detectors or streamed in real-time. Use the API to manage Splunk IMteams.

  • 2 Days VILT

    This 9-hour course is for developers who want to use the Splunk REST API to interact with Splunk servers. In this course, use curl and Python to send requests to Splunk REST endpoints and learn how to parse and use the results. Create a variety of objects in Splunk, learn how to change properties, work with and apply security to Splunk objects, run different types of searches and parse its results, ingest data using the HTTP Event Collector and manipulate collections and KV Stores.

  • 2 Days VILT

    This 9-hour virtual course highlights key differences between Splunk Enterprise deployed on-premises and Splunk Enterprise Cloud to allow Splunk Administrators to transition to Splunk Cloud.

    This course provides the skills and knowledge for experienced on-prem administrators to migrate the collection and data ingest as well as manage their Splunk Cloud environment and maintain a productive Splunk SaaS deployment.

  • 2 Days VILT

    This course provides Splunk users in-depth information about metrics, ingesting and searching metrics data, and how to use the Metrics Workspace to analyze and create visualizations.

  • 2 Days VILT

    This 9 hour introductory course prepares IT and security practitioners to plan, design, create and debug basic playbooks for SOAR. Students will learn fundamentals of SOAR playbook capabilities, creation and testing. This course is a pre-requisite for the Advanced SOAR Implementation course.

  • 2 Days VILT

    This 2-virtual day course is designed for Splunk administrators. It covers topics and techniques for troubleshooting a standard Splunk distributed deployment using the tools available on Splunk Enterprise

    This lab-oriented class is designed to help you gain troubleshooting experience before attending more advanced courses. You will debug a distributed Splunk Enterprise environment using the live system.

    This course does not cover the issues surrounding Splunk Cloud, Splunk Clusters, or Splunk premium apps.

  • 1 Day VILT

    This 24-hour practical lab exercise is designed to take you through the tasks of a complete mock deployment. Each participant is given access to a specified number of Linux servers and a set of requirements. Participants then perform a mock deployment according to requirements which adhere to Splunk Deployment Methodology and best-practices.

  • 1 Day ILT, VILT

    This course gives business leaders the skills and knowledge to better manage such analytical efforts. It describes how to get started and what is required to effectively run projects which leverage Big Data analytics. Specifically, it addresses: deriving business value from Big Data, leading Data Science projects using a data analytics lifecycle, developing Data Science teams, and driving innovation using analytics.

  • TDT-B: Tableau Desktop Training (Basic)

    Price range: RM4,200.00 through RM4,650.00
    2 Days ILT, VILT

    Learn the fundamentals of Tableau Desktop in this introductory course. In this 2-day instructor-led course, you’ll gain a comprehensive introduction to data analysis and visual design to build a range of visualizations—from single worksheets to dashboards—and learn techniques to apply to your own data analysis with Tableau.

  • 3 Days ILT, VILT

    Prepare yourself for Red Hat Enterprise Linux 8 by learning about changes to the operating system

    Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release.

    This course is based on Red Hat Enterprise Linux 8.

  • 2 Days ILT, VILT

    Elevate Your Career with vSphere 8 Training and Certification

    In this 2-day official VMware Learning course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0. Through use-case scenarios, demonstrations, labs, and simulations, you develop skills to implement and configure vSphere 8.0.

  • 2 Days ILT, VILT

    This two-day, hands-on EDU-SDWANDM4: VMware SD-WAN: Deploy and Manage [V4.x] training course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud® environment.

    In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud.

  • CT-Data+: CompTIA Data+ Certification

    Price range: RM3,500.00 through RM4,607.00
    5 Days ILT, VILT

    The Official CompTIA Data+ training course (DA0-001) have been developed by CompTIA for the CompTIA Data+ candidate.

    Rigorously evaluated to validate coverage of the CompTIA Data+ (DA0-001) exam objectives, CompTIA Data+ teaches learners the knowledge and skills required to transform business requirements in support of data-driven decisions by mining data, manipulating data, applying basic statistical methods, and analyzing complex data sets while adhering to governance and quality standards throughout the entire data lifecycle.

    In addition, it will help prepare candidates to take the CompTIA Data+ certification exam.

    Level up your skills and stand out with a globally recognized certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

    Looking to learn more on CompTIA Data+ certification? Check out the blogs below:

    5 Job Opportunities with CompTIA Data+ Certification
    How to Become a Data Analyst: Step by Step Guide
    Become a Data Analyst with CompTIA Data+
    Your Guide to Top CompTIA Certifications in 2024

  • 3 Days ILT, VILT

    The SDA qualification course is for front-line IT service and support analysts with some experience in a first-line or second-line service desk environment. This course is perfect for analysts looking to grow in their role and gain a recognized qualification in their profession. This course will help them to develop practical skills whilst earning a certificate that endorses their commitment and knowledge.

    Covering three days of learning, plus the qualification exam at the end of the course, analysts will fully explore the modules covered in SDI’s professional standard for Service Desk Analysts and will equip all Service Desk Analysts the essential skills and knowledge needed for delivering customer service and support excellence.

  • 2 Days ILT, VILT

    Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in Computer Forensics Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 3 Days ILT, VILT

    This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

Go to Top