This Cloud Fundamentals Certificate course introduces you to Cloud Computing, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
This Blockchain Fundamentals Certificate course introduces you to Blockchain, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
-
This AI Fundamentals Certificate course introduces you to Artificial Intelligence (AI), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
-
Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.
The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.
Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.
The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.
-
-10%
A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
The CE131G: IBM DB2 SQL Workshop for Experienced Users course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows.
-
This CE121G: IBM DB2 SQL Workshop course provides an introduction to the SQL language.
This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment.
-
This course provides you with information about the functions of IBM’s DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms.
DB2 runs under the z/OS, VM, Linux, UNIX, and Windows operating systems, to name a few.
The course includes discussion of how the DB2 products provide services. The focus is on the services DB2 provides and how we work with DB2, not on its internal workings.
-
The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
-
This CDEF: Continuous Delivery Ecosystem Foundation course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing, and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APIs and cultural considerations with Continuous Delivery.
Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.
Built upon the principles and practices highlighted in bestselling books such as “Continuous Delivery,” “Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations,” and more written by thought leaders in the DevOps movement. The Continuous Delivery Architecture course equips IT professionals with the broad-based competencies necessary in architecting and orchestrating effective and efficient automated deployment pipelines.
-
Certified Cybersecurity Technician
This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.
EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills
To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more
-
Attackers never rest, and along with all the traditional threats targeting internal networks and systems, an entirely new variety specifically targeting the cloud has emerged.
As more organizations adopt cloud-based systems, new complexities and challenges surface and the risks increase. Organizations need cloud security professionals with the requisite knowledge, skills and abilities to be able to audit, assess and secure cloud infrastructures.
To address this need, ISC2 and the Cloud Security Alliance (CSA) have developed the Certified Cloud Security Professional (CCSP) certification. This top cybersecurity credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.
In this 5-day course you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this (ISC)² Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official (ISC)² CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Gain technical ability to match your technical knowledge.
ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.
CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.
This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.
-
Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.
As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.
-
Unlock the Potential of Network Programmability and Automation: Discover the new Cisco CCNA v2.0 course.
The Implementing and Administering Cisco Solutions (CCNA) v2.1 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.
The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking, and sets the foundation for you to upgrade your skillset with Cisco’s professional-level certifications.
This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.
To gain a comprehensive understanding of CCNA, be sure to explore our blog on The CCNA: A Beginner’s Guide to Networking Certifications, take a read today!
-
As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.
That’s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what’s next.
-
The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.
In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.
This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.
Continuing Education: Earn 40 CE credits towards recertification
-
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents.
Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.
This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.
This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.
Continuing Education: Earn 40 CE credits towards recertification
-
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.
-
This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS
-
In this CATSP: ONTAP Troubleshooting course, you increase your proficiency as a NetApp ONTAP software engineer by learning how to troubleshoot ONTAP environments. Specifically, you learn how to troubleshoot the management component, scale-out networking, NAS protocols (NFS and SMB), and SAN protocols (iSCSI).
From lectures, demonstrations, and active exercises, you learn how to isolate issues, verify configurations, view logs, view trace messages, and use event management system messages for troubleshooting.
-
Cisco Catalyst Center (formerly Cisco DNA Center) enables programmable interactions and integrations through APIs (Application Programming Interfaces) and event notifications. This feature allows network administrators and developers to build custom integrations, automate tasks, and enhance network operations within the platform. By leveraging programmability in Catalyst Center, users can extend the functionality of the platform, achieve innovation, business agility, and improved visibility across their network infrastructure by creating custom solutions tailored to their specific needs, driving operational efficiency within their network environments.
CATCPF (Cisco Catalyst Center Programmability Integration Fundamentals) is a 3-day, instructor-led, Cisco Catalyst Center course that will help you to become familiar with programmable infrastructure concepts and integrations that support Catalyst Center and the Cisco Catalyst 9000 Series switch programming. In this course you will learn about production solutions that run on or interact with IOS-XE on the Catalyst 9000 switches and with Software Defined Access fabrics as well.
-
This CASM: Certified Agile Service Manager course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT’s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements.
As Dev and Ops have been working in parallel with Dev focused on Agile/Scrum and Ops focused on ITSM/ITIL, this course strives to bring together individual achievements to deliver full business value. The course cross-pollinates Agile and ITSM practices to support end-to-end Agile Service Management so Dev starts to manage services instead of products and Ops and ITSM become more agile by scaling to “just enough” process leading to improved flow of work and time to value.
Agile Service Management helps IT to meet customer requirements faster, improve the collaboration between Dev and Ops, overcome constraints in process workflows by taking an iterative approach to process design that will improve the velocity of process improvement teams to get more done. This course may be eligible for PMI’s PDUs.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.
This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
This course provides guidance into the Process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Participants learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ‘just enough’ process and how to continually align process performance with overall business goals.
A process owner is an individual accountable for the performance of a process and for ensuring the process delivers value to its stakeholders. Process owners manage the requirements of process stakeholders, translate those requirements into process performance objectives, and oversee the entire process design and improvement life cycle.
-
-10%
A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
-
Configuring Cisco Catalyst 9800 and Intro to Wi-Fi 6 (C98WF6) is a course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits.
This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to Wi-Fi 6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
-
-10%
A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
This 3-days instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity.
The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.
The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. Due to the technical programming lab content covered in this course, it is not recommended for those without programming knowledge and experience.
-
This dynamic Blockchain Security course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.
-
This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms.
-
This intensive 5-day training program is designed to equip supply chain professionals, executives, and C-level staff with the knowledge and skills needed to leverage blockchain and AI technologies to optimize their supply chain operations. Through a combination of lectures, interactive discussions, and hands-on exercises, participants will gain a deep understanding of how these technologies can enhance efficiency, reduce costs, and improve decision-making.