You searched for: ""

  • CLICA: Implementing Cisco Collaboration Applications

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Applications (CLICA) training teaches you the knowledge and skills to configure and troubleshoot Single Sign-On (SSO), Cisco Unity Connection and Cisco Unity Express, and Application clients. Topics covered include streamlining communication procedures, strengthening compliance measures, and enhancing communication systems and devices. This course also earns you 40 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. This Cisco training course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools.

    In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course also earns you 30 Continuing Education (CE) credits towards recertification.

  • CLCOR: Implementing and Operating Cisco Collaboration Core Technologies

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) v1.3 course helps you prepare for advanced-level roles focused on implementation and operation of Cisco collaboration solutions.

    You will gain the knowledge and skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications. This course earns you 64 Continuing Education (CE) credits towards recertification.

    This course will help you:

    • Integrate and troubleshoot Cisco Unified Communications Manager with Lightweight Directory Access Protocol (LDAP) for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Configure and troubleshoot collaboration endpoints
  • CLCNF: Implementing Cisco Collaboration Conferencing v1.0

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.

  • CLCEI: Implementing Cisco Collaboration Cloud and Edge Solutions

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) training provides you with an understanding of Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Topics covered also include details about the Webex solutions, and the benefits of hybrid integrations between Cisco on-premises solutions and Webex Meetings in the cloud. This training also earns you 40 Continuing Education (CE) credits towards recertification.

    This training helps prepare you to take the exam:

    • 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)
  • CLACCM: Implementing Cisco Advanced Call Control and Mobility Services

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services. You will learn how to use Cisco® Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution.

    Through a combination of lessons and hands-on experiences, you will also learn about a wealth of other features such as Globalized Call Routing, Global Dial Plan Replication, Cisco Unified Mobility, Cisco Extension Mobility, Device Mobility, Session Initiation Protocol Uniform Resource Identifier (SIP/ URI) call routing, Call Admission Control, Cisco Unified Communications Manager Express and Survivable Remote Site Telephony (SRST) gateway technologies, Cisco Unified Board Element Call deployments, signaling and media protocols, call coverage, and time of day routing.

  • Out of stock
    1 Day ILT, VILT

    This course teaches database administrators how to plan, implement and manage Db2 11.1 databases using the High Availability Disaster Recovery HADR) feature. The lectures cover the processing performed for a Db2 Primary and Standby Db2 database. The Db2 database configuration options that define and control the HADR function are covered. The option to define and operate multiple HADR standby databases will be explained. The course also covers the special considerations for allowing read only access by applications to a HADR Standby database. Students will learn the Db2 commands like TAKEOVER, START HADR and STOP HADR that are used to control HADR primary and standby database activity. The monitoring for HADR status of the primary and standby databases using the db2pd commands will be presented. The course also presents usage of HADR with Db2 pureScale databases.

  • Out of stock
    3 Days ILT, VILT

    This course is designed to prepare DB2 Linux, UNIX and Windows database administrators for planning, installing, managing and monitoring a DB2 pureScale database system. This course covers the features and functions of the DB2 pureScale feature for DB2 10.5, including fixpack levels 4 and 5. This is a lecture-only course.

  • 4 Days ILT, VILT

    This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.

    The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.

    We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.

  • Out of stock
    2 Days ILT, VILT

    This course is designed to teach you how to: 

    • Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.
    • Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.
    • Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.
    • Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.
    • Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.
    • Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.
    • Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.
    • Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.
    • Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.
    • Implement Db2 Self Tuning Memory management for specific database memory areas.
  • Out of stock
    5 Days ILT, VILT

    This course is designed to teach you how to:

    • Fully use the advanced technical functions and features of DB2 LUW 10.1 and 10.5.
    • Implement DB2 BLU Acceleration, column-organized table support, for a new or existing DB2 database.
    • Describe how the column dictionaries used for DB2 BLU Acceleration are built and utilized to provide extreme compression for column-organized tables.
    • Explain the default workload management used for DB2 BLU Acceleration processing and how you can tailor the WLM objects to efficiently use system resources.
    • Monitor a DB2 database or application that uses column-organized tables using SQL monitor functions.
    • Implement Shadow tables for selected row-organized tables to improve analytics query performance
    • Configure a DB2 database that supports a mixture of application processing, including OLTP and Analytics query processing with Shadow tables
    • Create the Infosphere CDC Datastore, Subscription and Table mappings required to support Shadow tables
    • Implement a User Maintained MQT for a column-organized table
    • Create optimization profiles that allow applications to control specific operations included in the access plans selected by the DB2 Optimizer, like which index is used to access a table or which join method to utilize for joining tables.
    • Perform advanced monitoring using the DB2 administrative views and routines in SQL queries.
    • Configure and manage the implementation of DB2 instance or database level auditing, including using the db2audit command and creation of audit policies which can be assigned to specific tables, users or database roles to perform selective collection of audit records.
    • Explore DB2 management of disk space usage in Database Managed Storage (DMS) table spaces, including the activities of the rebalancer. Use SQL queries and utilities to check the high water mark on table spaces and to monitor the rebalance operation.
    • Move data from one table to another or from one database to another using utilities like db2move.
    • Utilize the ADMIN_MOVE_TABLE procedure to implement table changes with a minimal impact to data availability for applications.
    • Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.
    • Exploit and monitor the REORG utility processing for offline and online table, and index reorganization This includes planning for the disk space and database log space necessary for reorganization.
    • Utilize the REORG Utility to implement row compression for large tables, to reduce disk utilization and improve I/O performance for a DB2 database and understand the automatic creation of compression dictionaries.
    • For Multidimensional Clustering (MDC) tables, determine how to select the dimension columns and table space extent size for efficient implementation of MDC tables. Compare the block indexes used with MDC tables with rows based indexes. Select the MDC rollout option that best matches application needs and achieves the best performance results.
    • Plan and implement range based table partitioning for large DB2 tables. Utilize the ALTER TABLE ATTACH and DETACH options to support roll-in and roll-out operations for range-partitioned tables. Compare the advantages of selecting or combining range partitioning with the hash-based partitioning used in DB2 partitioned databases or the multiple dimensions provided by MDC tables.
  • Out of stock
    2 Days ILT, VILT

    The course is intended for Data Administrators that need to prepare for using the DB2 BLU Acceleration facilities of DB2 11.1 for Linux, UNIX and Windows systems.

    The concepts and facilities of the BLU Acceleration feature of DB2 11 are presented including loading data into column-organized tables and monitoring the processing of SQL statements that access the tables.

    The DB2 10.5 Fix Pack 4, referred to as Cancun, added support for Shadow tables, a new type of Materialized Query Table, and also Column-organized User Maintained MQT tables. One lecture unit describes these features. A demonstration allows students to implement and experiment with these functions.

    With DB2 11.1, BLU Acceleration can be used in a clustered multiple database partition DB2 environment. This course includes a lecture and demonstration that allows students to create a set of column-organized tables from an existing set of row-organized tables and execute and analyze the performance of BLU Acceleration in a MPP database.

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux.

  • 4 Days ILT, VILT

    Learn how to tune for optimum performance the IBM DB2 10 for Linux, UNIX, and Windows relational database management system and associated applications written for this environment. Learn about DB2 10 for Linux, UNIX, and Windows in a single partition database environment. Explore performance issues affecting the design of the database and applications using the database, the major database performance parameters, and the different tools that assist in performance monitoring and tuning.

    Use tools in class that are common across the Linux, UNIX, and Windows environments. During labs running on DB2 10.1, develop your ability to use monitoring tools. Explain tools and DB2 utilities like RUNSTATS, REORG and db2batch to tune a database running on your local LINUX workstation.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage.

    The Cloud Storage with Red Hat Ceph Storage with exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0.

    If you do not intend to bundle with certification exam, consider opting for CL260: Cloud Storage with Red Hat Ceph Storage instead.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure.

    Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

  • 4 Days ILT, VILT

    This course teaches you to perform, basic database administrative tasks using DB2 10.1 for Linux, UNIX, and Windows. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the DB2 Optimizer will be examined using the DB2 Explain tools.

    Various diagnostic methods will be presented, including using the db2diag.log file messages to direct your investigation of problems, as well as using the db2pd commands.

  • 4 Days ILT, VILT

    Build advanced skills for performing Red Hat OpenStack Platform day 2 operations and management of hybrid cloud infrastructure.

    Red Hat OpenStack Administration II: Day 2 Operations for Cloud Operators with exam (CL2110) is designed for cloud operators, service administrators, and automation engineers who operate and manage a full-featured hybrid and private cloud-computing environment using Red Hat OpenStack Platform. You will learn how to manage, monitor, troubleshoot, and scale a Red Hat OpenStack Platform infrastructure. This course focuses on using the OpenStack Client command-line user interface to configure metrics, policies, and architecture in order to support enterprise cloud applications and daily operations.

    This course is based on Red Hat OpenStack version 16.1, and Red Hat Enterprise Linux version 8.2. The Red Hat Certified Specialist in Cloud Infrastructure exam (EX210) is included in this offering.

  • 4 Days ILT, VILT

    Build advanced skills for performing Red Hat OpenStack Platform day 2 operations and management of hybrid cloud infrastructure

    Red Hat OpenStack Administration II: Day 2 Operations for Cloud Operators (CL210) is designed for cloud operators, service administrators, and automation engineers who operate and manage a full-featured hybrid and private cloud-computing environment using Red Hat OpenStack Platform. You will learn how to manage, monitor, troubleshoot, and scale a Red Hat OpenStack Platform infrastructure. This course focuses on using the OpenStack Client command-line user interface to configure metrics, policies, and architecture in order to support enterprise cloud applications and daily operations.

    This course is based on Red Hat OpenStack version 16.1 and Red Hat Enterprise Linux version 8.2

  • CL207G: Db2 11.1 Administration Workshop for Linux

    Price range: RM3,360.00 through RM6,240.00
    4 Days ILT, VILT

    This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs.

    The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database.

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

  • 5 Days ILT, VILT

    Learn to operate a Red Hat® OpenStack Platform private cloud and manage domain resources to secure and deploy modern, scalable cloud applications, networks and storage.

    Red Hat OpenStack Administration I: Core Operations for Domain Operators (CL110) teaches you how to operate and manage a production Red Hat OpenStack Platform (RHOSP) single-site overcloud. You will learn how to create secure project environments in which to provision resources and manage security privileges that cloud users need to deploy scalable cloud applications. You will learn about OpenShift integration with load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

    This course is based on Red Hat OpenStack Platform 16.1.

  • 30 Days SPVC

    An overview of Red Hat OpenStack Platform.

    Red Hat OpenStack Technical Overview (CL010) is a series of on-demand, online videos to help you better understand the basics of cloud computing and Red Hat® OpenStack® Platform. Several online demonstrations and use cases are included.

  • CKS: Certified Kubernetes Security Specialist

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.

    Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.

  • CKAD: Certified Kubernetes Application Developer

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    What are the most in-demand IT skills/jobs in the 2021 and beyond? Google any reputable sites (e.g. forbes.com, cio.com,  techrepublic.com, sdxcentral.com, etc) and you will notice that “Cloud” and “Container” technologies are always in the top 10 most in-demand list.

    Especially now during the Covid19 period, many companies are pivoting to the cloud to streamline their operations and become more agile. Having a CKAD certification will definitely make you more in demand, and enables you to command a higher pay with the potential employers.

    This CKAD Training course is NOT the official training course offered by the LinuxFoundation – but is structured according to the official CKAD Exam Curriculum.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • CKA: Certified Kubernetes Administrator

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 2 Days ILT, VILT

    Security in IT is not only becoming more important but also more sophisticated. In light of this, organizations are dedicating roles to the safeguarding of their data and systems. The EXIN Cyber & IT Security program is geared towards providing candidates with the required knowledge to understand the technical side of information security.

    It covers the theoretical background, detailed information about security infrastructure and goes into the vulnerabilities, risks, and required measures.

     

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    ONTAP SMB Administration is a one day course that extends the CIFS information found in the ONTAP Cluster Administration course. You will review and explore SMB 3.x and the features of ONTAP 9 software that support the SMB protocol. Hands-on labs are completed using ONTAP 9 software.

  • 5 Days ILT, VILT

    The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

    CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 3 Days ILT, VILT

    This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

Go to Top