You searched for: ""

  • -25%

    MS-102T00: Microsoft 365 Administrator

    Price range: RM2,899.00 through RM3,874.00
    5 Days ILT, VILT

    Microsoft 365: Revolutionizing Workflows for the Modern Enterprise.

    This Microsoft 365 Administrator course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.

    In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments.

    The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management.

    In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365’s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization’s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint.

    Once you have this understanding of Microsoft 365’s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels.

  • MS-721T00: Collaboration Communications Systems Engineer

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    The Ultimate Training for Microsoft 365 Collaboration Engineers.

    This MS-721T00: Collaboration Communications Systems Engineer training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer. Participants should understand the fundamentals of networking, telecommunications, audio/visual and meeting room technologies, identity and access management, and Microsoft Teams.

    They will gain hands-on experience configuring and deploying Microsoft Teams Phone, meetings and certified devices including Microsoft Teams Rooms and Surface Hub. The course will also cover how to manage and monitor Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard.

    In addition, the course will cover configuring and deploying Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing.

    This course replaces MS-720T00: Microsoft Teams Voice Engineer which retired on 30 June 2023.

  • 2 Days ILT, VILT

    Learn how to administer NetApp ONTAP9 data-management software integrated security and compliance features. Learn how to create a secure IT environment according to Zero Trust principals such as ‘least privilege access’ and ‘encrypt everything’.

    This ONTAP Security and Compliance Solutions Administration course comprehensively describes the administration, configuration, and management of the integrated data security and compliance features in ONTAP 9, including data retention using SnapLock software and data integrity with autonomous ransomware protection.

  • IHCF: Integrating Hybrid Clouds Foundation

    Price range: RM3,636.00 through RM4,311.00
    1 Day ILT, VILT

    This Integrating Hybrid Clouds Foundation course describes the features and benefits of the NetApp® Cloud Volumes ONTAP® system. The course helps enable you to explain the architecture and functionality of cloud based ONTAP storage.

    Also, the course introduces basic administration, configuration, and management of the Cloud Volumes ONTAP system that uses NetApp BlueXP™ (formerly NetApp Cloud Manager).

  • 0.5 Days SPVC

    In this course, you will learn the basics of deploying, managing, and securing .NET applications with Amazon Web Services (AWS). You will learn about AWS services and tools specifically designed for .NET applications. Finally, the course will walk you through a hands-on example of deploying a .NET application to the AWS Cloud.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days SPVC

    This course is designed to help solution architects and developers who are looking to modernize their existing message-oriented middleware (MOM) or message broker architectures. You will learn the differences between traditional legacy architectures and modern messaging architectures.

    You will review several paths that customers may follow to modernize their messaging environments, including the benefits and costs of each approach. You will also be introduced to Amazon MQ and participate in several hands-on labs to better understand it. This fully managed message broker service uses industry-standard APIs and protocols (including JMS, NMS, AMQP, STOMP, MQTT, and WebSocket).

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • 0.5 Days VILT

    This course goes beyond the basic concepts and benefits of containerization and teaches you more about the Amazon Elastic Container Service (ECS). You will learn about the implementation of containers on AWS using ECS and complementary services, such as the Amazon Elastic Container Registry (ECR). You will also learn about common microservices scenarios.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • AZ-801T00: Configure Windows Server Hybrid Advanced Services

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Embrace the cloud future: Enhance your career with Azure certifications.

    This Configure Windows Server Hybrid Advanced Services course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server.

    The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor.

    Get Azure certified in 2024 with Microsoft Malaysia’s Learning Partner of the Year 2024 today.

  • SISE: Implementing and Configuring Cisco Identity Services Engine

    Price range: RM10,500.00 through RM11,850.00
    5 Days ILT, VILT

    The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist – Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification

  • 1 Day SPVC

    AWS Lambda is an event-driven, serverless compute service that lets you run code without provisioning or managing servers. This course focuses on what you need to start building Lambda functions and serverless applications.

    You learn how AWS Lambda works and how to write and configure Lambda functions. You explore deployment and testing considerations and finally end with a discussion on monitoring and troubleshooting Lambda functions.

    Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.

  • PCPP1: Certified Professional in Python Programming 1

    Price range: RM4,500.00 through RM5,378.00
    4 Days ILT, VILT

    Program your future with Python Institute.

    PCPP1™ – Certified Professional in Python Programming 1 certification (Exam PCPP-32-101) is a professional credential that measures the candidate’s ability to accomplish coding tasks related to advanced programming in the Python language and related technologies, advanced notions and techniques used in object-oriented programming, the use of selected Python Standard Library modules and packages, designing, building and improving programs and applications utilizing the concepts of GUI and network programming, as well as adopting the coding conventions and best practices for code writing.

    The PCPP1™ certification shows that the individual is familiar with the following concepts: advanced use of classes and modelling real-life problems in the OOP categories (classes, instances, attributes, methods; class and instance data; shallow and deep operations; inheritance and polymorphism; extended function argument syntax and decorators; static and class methods; attribute encapsulation; composition and inheritance; advanced exceptions; copying object data; serialization; metaclasses), best practices and standardization (PEP8, PEP 257, code layout, comments and docstrings, naming conventions, string quotes and whitespaces, programming recommendations), GUI programming (events, widgets, geometry, tools and toolkits, conventions), the elements of network programming (network sockets, client-server communication, JSON and XML files in network communication, HTTP methods, CRUD, building a simple REST client), and file processing and communicating with a program’s environment (processing files: sqlite3, xml, csv, logging, and configparser; communication: os, datetime, io, and time).

  • 5 Days ILT, VILT

    Certified Cybersecurity Technician

    This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

    EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

    To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

  • -20%

    EDU-VAAICM: VMware Aria Automation: Install, Configure, Manage [V8.17]

    Price range: RM8,800.00 through RM12,125.00
    5 Days ILT, VILT

    VMware Aria Automation: Install, Configure, Manage [V8.17]

    During this five-day official VMware course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments.

    The course covers how VMware Aria Automation Consumption™ can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config™ as a configuration management tool.

  • 1 Day ILT, VILT

    Cloud Security: Essential Knowledge for the Modern Tech Professionals.

    The CSF1: Cloud Security Fundamental Level 1 course provides a brief introduction to information security risks associated with cloud computing. Students can use this course to review what they already know about cloud security and to pinpoint any gaps in their understanding. Students who are interested in working with cloud technology or who will be part of an organisation transitioning to the cloud will benefit from this course.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    For those of you who want to use Google Cloud, Microsoft Azure, or Amazon Web Services, cloud security is less about setting up a secure cloud and more about using it securely. After all, these companies have already spent a lot of money to make sure their systems are safe. Still, anyone who wants to set up their own cloud needs to think about more things. These include security architecture, protecting physical infrastructure, disaster recovery, maintenance, and a stable connection.

    Cloud security also helps businesses stay in line with international rules like the General Data Protection Regulation (GDPR). It can also prepare businesses for future rules, which are always being thought about. For example, to follow the GDPR, companies must make sure that their cloud was built with the right architecture and that security and privacy were taken into account throughout the design process. If they don’t, regulators may fine them a lot if a security breach happens.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

  • 2 Days ILT, VILT

    Stay Ahead in a Digital World: Understand and Implement IT Governance & Risk Management.

    This hugely popular ITGRM: IT Governance and Risk Management provides a comprehensive review of the knowledge required for understanding IT Governance & Risk Management strategies. Students can use this crash course to review what they already know about IT Governance & Risk Management, pinpoint any gaps in their understanding and provide high level mitigation to address IT Governance & Risk Management gaps.

    The establishment of efficient IT governance is of the utmost importance with regard to the problem-free operation of IT businesses. The organization’s business goals can more easily be accomplished with the assistance of this concept when applied to its information systems. If you do not put into practice IT governance, it will become ineffective and may even be detrimental to the company.

    It is no longer necessary to argue that effective governance of information technology is essential because society and various markets are continuously undergoing change. It is a requirement for every business. In today’s world, where information occupies such an important role in our society, having strong governance in place for our information technology systems is absolutely necessary to ensure their smooth operation. By producing value, it ensures that the money your company invests in information technology will be put to good use.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • 4 Days ILT, VILT

    The Oracle WebLogic Server 14c: JMS Administration certification validates a professional’s skills to configure, manage, and tune JMS resources for Oracle WebLogic Server. JMS stands for Java Message Service, a messaging standard that allows Java EE applications to communicate with other messaging systems.

    With this certification, individuals can demonstrate their understanding of deploying JMS in a WebLogic domain, configuring message-driven beans, and tuning JMS for optimized performance. Industries use this certification to ensure their IT professionals have the required knowledge and skills to effectively implement and manage the JMS functionalities in Oracle WebLogic Server, improving productivity and communication across different systems.

  • 5 Days ILT, VILT

    This Oracle WebLogic Server 14c: Administration II training is a continuation of Oracle WebLogic Server 14c: Administration I. It teaches you how to perform important administrative tasks, employing best practices that enable you to make the most of your WebLogic applications.

  • 2 Days ILT, VILT

    This Oracle WebLogic Server 14c: Troubleshooting Workshop course teaches you how to monitor and tune Oracle WebLogic Server 14c. The lecture content is suitably reinforced with hands-on practices.

  • 2 Days ILT, VILT

    Microsoft Cloud for Sustainability

    As a result of attending this course, the learner should be able to understand the sustainability concepts and how the business thinks of tracking and reporting emissions, describe Microsoft Cloud for Sustainability customer scenarios, and configure the features of Microsoft Sustainability Manage.

  • CT-DataSys+: CompTIA DataSys+

    Price range: RM3,500.00 through RM5,111.00
    5 Days ILT, VILT

    Gain skills and knowledge needed to deploy, maintain and protect data.

    If you are a database professional wanting to land a database administrator role, a DBA who wants to validate their skill set or another type of IT pro seeking database management skills, you need CompTIA DataSys+. By earning this certification, you’ll prove to employers that you can identify database structure types; develop, modify and run code; and gather, store and drive data assets. You’ll also confirm your knowledge of:

    • The various aspects of database design and planning
    • The different phases of the implementation, testing and deployment of data
    • The purpose of monitoring and reporting database performance
    • Common database maintenance processes
    • The production of essential documentation
    • Best practices for backup and data restoration

    CompTIA DataSys+ certified professionals demonstrate their ability to secure databases, protect against cyberattacks and control authorization. Moreover, they prove they can ensure governance and regulatory compliance.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get certified today!

  • 3 Days ILT, VILT

    The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

  • PECB-27001F: ISO/IEC 27001 Foundation

    Price range: RM1,440.00 through RM4,500.00
    2 Days ILT, VILT

    ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • PECB-27001LA: ISO/IEC 27001 Lead Auditor

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Auditor 

    ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.

    During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

    Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

    After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • PECB-27001LI: ISO/IEC 27001 Lead Implementer

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

    Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

    This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

    After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • -20%

    EDU-NSXICM: VMware NSX: Install, Configure, Manage [V4.0]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    VMware NSX: Shaping the Future of Network Provisioning and Security.

    This VMware NSX: Install, Configure, Manage, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This VMware course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.

    Product Alignment

    • NSX 4.0.0.1
    • NSX 4.0.1
  • MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

    Price range: RM3,500.00 through RM3,874.00
    5 Days ILT, VILT

    Modernize supply chain operations with Dynamics 365 Supply Chain Management.

    This Microsoft Dynamics 365 Supply Chain Management, Expert course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes.

    This course includes lectures and several hands-on exercises. The exercises will be introduced to you in the form of a case study presented to a Dynamics 365 Supply Chain Management Functional Consultant, Expert. Each exercise will be based on a business scenario followed by a question or discussion then a step-by-step guidance to perform the system related steps.

  • 3 Days ILT, VILT

    A developer introduction to building and managing containers with Podman for deploying applications on Red Hat OpenShift Container Platform.

    Red Hat OpenShift Development I: Introduction to Containers with Podman (DO188) introduces students to building, running, and managing containers with Podman and Red Hat OpenShift. This course helps students build the core skills for developing containerized applications through hands-on experience. These skills can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift, and OpenShift Container Platform.

    This course is based on Red Hat® Enterprise Linux® 8, Podman 4.2 and Red Hat OpenShift® 4.12.

  • CT-P+: CompTIA Project+

    Price range: RM3,500.00 through RM5,111.00
    5 Days ILT, VILT

    CompTIA Project+ Opens the Door to Your Project Management Career!

    With a median annual salary of $104360 for Project+ certified professionals in the United States and Canada, CompTIA Project+ is ideal for IT professionals who manage smaller, less-complex projects as part of their job duties but still require foundational project management skills. Project+ is versatile because it covers essential project management concepts beyond the scope of just one methodology or framework.

     

  • FT-FAZ-ANS: FortiAnalyzer Analyst

    Price range: RM4,750.00 through RM5,650.00
    1 Day ILT, VILT

    An integrated security architecture with analytics and automation capabilities to dramatically improve visibility and response.

    In this FortiAnalyzer Analyst course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.

    Product Versions: FortiAnalyzer 7.2

  • FT-FAZ-ADM: FortiAnalyzer Administrator

    Price range: RM4,750.00 through RM5,650.00
    1 Day VILT

    In this FortiAnalyzer Administrator course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.

    Product Versions: FortiAnalyzer 7.2

  • 3 Days ILT, VILT

    Prepare yourself for Red Hat Enterprise Linux 8 by learning about changes to the operating system

    Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release.

    This course is based on Red Hat Enterprise Linux 8.

  • 4 Days ILT, VILT

    Python programming for beginners

    Python is a popular programming language used by system administrators, data scientists, and developers to create web applications, custom Red Hat Ansible Automation modules, perform statistical analysis, and train AI/ML models.

    This Red Hat course introduces the Python language and teaches fundamental concepts like control flow, loops, data structures, functions, file I/O, regular expressions, parsing JSON, and debugging.

    This course is based on Python 3 and RHEL 9.0.

Go to Top