You searched for: ""

  • 4 Days ILT, VILT

    Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software.

    Red Hat Satellite 6 Administration (RH403) is a lab-based course that explores the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn how to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

    This course is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

  • 5 Days ILT, VILT

    Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software

    Red Hat Satellite 6 Administration with exam (RH404) explores and validates the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn and demonstrate your ability to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

    This offering includes the Red Hat Certified Specialist in Deployment and Systems Management exam (EX403) and is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

  • 4 Days ILT, VILT

    Red Hat Server Hardening – builds on a student’s Red Hat Certified Engineer (RHCE®) certification or equivalent experience to teach how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns.

  • 4 Days ILT, VILT

    Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments.

    The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) course is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

    This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

    Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments.

    Red Hat Security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

    This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. The Red Hat Certified Specialist in Security: Linux exam (EX415) is included.

    Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

  • 4 Days ILT, VILT

    Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1.

    Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

  • 4 Days ILT, VILT

    Design and deploy a high availability cluster.

    The Red Hat® High Availability Clustering with exam (RH437) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1 and includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436).

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud with exam (RH443) teaches and validates skills related to the methodology of performance tuning for senior Linux® system administrators. This offering discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 5 Days ILT, VILT

    Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.

    Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 1 Day ILT, VILT

    In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.

  • 1 Day ILT, VILT

    Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.

    This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.

  • 1 Day ILT, VILT

    Learn about Large Language Models (LLM) and how RAGs combine generative and retrieval-based AI models to extend the already powerful capabilities of LLMs. Get the knowledge you need about how a RAG works and how it’s assembled from component parts.

    With our hands-on labs, you will develop a RAG using existing LLM and AI tools and apply RAG techniques to designs to solve problems.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 2 Days ILT, VILT

    We offer Leading SAFe Agilist 5.1 Certification Training in Malaysia, a 2-day training program that would get you the theoretical and practical basics of the Scaled Agile Framework (SAFe). The training helps you lead agile transformation within your enterprise using the Scaled Agile Framework and its underlying principles of lean thinking and product development flow.

    The Scaled Agile Framework (SAFe) is a knowledge base of proven, integrated principles, practices, and competencies for achieving business agility using Lean, Agile, and DevOps. Created by Dean Leffingwell, this framework effortlessly aligns and synchronizes for large-scale, multi-team Agile projects to develop and deliver enterprise-class technology-based solutions with high quality and faster time-to-market.

  • SANADM: ONTAP SAN Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.

  • SANIMP: Data ONTAP SAN Implementation

    Price range: RM10,917.00 through RM11,592.00
    3 Days ILT, VILT

    In this NetApp training course, you will learn the installation process for ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, NVMe, and iSCSI, on Microsoft Windows Server, Linux and VMware ESXi host operating systems. The learning will be reinforced through hands-on guided labs. The course materials include a lab workbook that will serve as an on-the-job reference guide.

  • SAUI: Implementing Automation for Cisco Security Solutions

    Price range: RM14,100.00 through RM15,450.00
    3 Days ILT, VILT

    The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful Application Program Interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco® Identity Services Engine (ISE) to strengthen cybersecurity for your web services, network, and devices. You will learn to work within the following platforms: Cisco Firepower® Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch® Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella®, Cisco Advanced Malware Protection (AMP), Cisco Threat grid, and Cisco Security Management Appliances. This course will teach you when to use the API for each Cisco security solution to drive network efficiency and reduce complexity.

    This course prepares you for 300-735 Automating and Programming Cisco Security Solutions (SAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Security Solutions (SAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification.

  • 1 Day ILT, VILT

    Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • -26%

    SC-100T00: Microsoft Cybersecurity Architect

    Price range: RM2,499.00 through RM3,374.00
    4 Days ILT, VILT

    Advance your Microsoft SCI expertise with the all new Microsoft Certified: Cybersecurity Architect Expert certification.

    This SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

    Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

     

  • SC-200T00: Microsoft Security Operations Analyst

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.

    In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

    This SC-200T00: Microsoft Security Operations Analyst training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • SC-300T00: Microsoft Identity and Access Administrator

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Discover the Microsoft Certified: Identity and Access Administrator Associate certification.

    This SC-300T00: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.

    Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects.

    The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

    This SC-300T00: Microsoft Identity and Access Administrator training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our guide to top cybersecurity training and certifications in 2025.

  • SC-401T00: Information Security Administrator

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats.

    Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 1 Day VILT

    Real skills for real-time results with Microsoft Applied Skills credentials.

    Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization’s data.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day ILT, VILT

    Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

    • Level: Intermediate
    • Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
    • Role: Security Operations Analyst
    • Subject: Threat protection
  • 1 Day VILT

    Learn about Microsoft Copilot for Security, an AI-powered security analysis tool that enables analysts to process security signals and respond to threats at a machine speed, and the AI concepts upon which it’s built.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    Implement retention, eDiscovery, and Communication compliance in Microsoft Purview

    In today’s digital environment, managing organizational data efficiently and securely is crucial. Microsoft Purview Data Lifecycle and Records Management solutions help businesses govern their data throughout its lifecycle, ensuring compliance with regulatory requirements. By implementing retention labels and policies, organizations can consistently manage data, minimize risks associated with breaches, and reduce unnecessary storage.

    Understanding these tools ensures data is available when needed and securely deleted when it’s not.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

  • 1 Day VILT

    Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events.

  • -23%

    SC-900: Microsoft Security, Compliance and Identity Fundamentals

    Price range: RM1,099.00 through RM1,425.00
    1 Day ILT, VILT

    Get started with cybersecurity with the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

    Advance your knowledge on a range of cybersecurity topics and build a foundation for advanced cybersecurity certifications that prepare you for in-demand roles in security operations, identity and access management, and information protection. Recommended for early career IT security professionals and aspiring students.

    This SC-900T00: Microsoft Security, Compliance and Identity Fundamentals certification course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions and is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

Go to Top