You searched for: ""

  • 5 Days ILT, VILT

    Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux.

    The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

    This course also includes the exam, Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342). This offering is based on Red Hat Enterprise Linux 7.2.

    Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

  • 5 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM).

    The Red Hat Security: Identity Management and Active Directory Integration with exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

  • 5 Days ILT, VILT

    Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments.

    Red Hat Security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

    This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. The Red Hat Certified Specialist in Security: Linux exam (EX415) is included.

    Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

  • 4 Days ILT, VILT

    Design and deploy a high availability cluster.

    The Red Hat® High Availability Clustering with exam (RH437) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1 and includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436).

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud with exam (RH443) teaches and validates skills related to the methodology of performance tuning for senior Linux® system administrators. This offering discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift.

    Red Hat OpenShift Development II: Containerizing Applications with exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The Red Hat Certified Specialist in OpenShift Application Development exam (EX288) is included in this offering, which is based on Red Hat® OpenShift Container Platform 4.6.

  • 5 Days ILT, VILT

    Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software

    Red Hat Satellite 6 Administration with exam (RH404) explores and validates the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn and demonstrate your ability to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

    This offering includes the Red Hat Certified Specialist in Deployment and Systems Management exam (EX403) and is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage.

    The Cloud Storage with Red Hat Ceph Storage with exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0.

    If you do not intend to bundle with certification exam, consider opting for CL260: Cloud Storage with Red Hat Ceph Storage instead.

  • 5 Days ILT, VILT

    Deploy, configure, manage, and migrate virtual environments

    Red Hat Virtualization with exam (RH319) teaches and validates the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for and includes the Red Hat Certified Specialist in Virtualization exam.

    This offering is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

  • 4 Days ILT, VILT

    Configure and manage OpenShift clusters to maintain security and reliability across multiple applications and development teams.

    Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster with exam (DO281) prepares OpenShift Cluster Administrators to perform daily administration tasks on clusters that host applications provided by internal teams and external vendors, enable self-service for cluster users with different roles, and deploy applications that require special permissions such as such as CI/CD tooling, performance monitoring, and security scanners. This course focuses on configuring multi-tenancy and security features of OpenShift as well as managing OpenShift add-ons based on operators.

    The skills you learn in this course can be applied using all versions of OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift, and OpenShift Container Platform.

    This course is based on Red Hat® OpenShift® 4.14. The Red Hat Certified OpenShift Administrator exam (EX280) is included in this offering.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM)

    Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14. The Red Hat Certified OpenShift Application Developer Exam (EX288) is included in this offering

  • SANADM: ONTAP SAN Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.

  • DATAPROT: ONTAP Data Protection Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    Explore key concepts and techniques for protecting data on NetApp® ONTAP® based storage systems. Learn about the data protection solutions that are integrated in ONTAP software and examine the tools to manage ONTAP data protection features. In the hands-on exercises, use NetApp ONTAP System Manager and the ONTAP CLI to perform key data protection tasks. This course is updated for ONTAP 9.14.1 software.

  • 2 Days ILT, VILT

    Through brief lectures, exercises, and classroom discussion in this AOCMCDOT: ONTAP Administration of Active IQ Unified Manager course you discover how to deploy and maintain an ActiveIQ Unified Manager and pair it with OnCommand Workflow Automation (WFA) data-management solution. You learn how the performance-management features of Unified Manager provide a unified approach to storage management that reduces complexity. You also learn to how to extend Unified Manager’s data protection capabilities with WFA. This course can be delivered in a traditional classroom or a virtual classroom.

  • 2 Days ILT, VILT

    ONTAP SMB Administration is a one day course that extends the CIFS information found in the ONTAP Cluster Administration course. You will review and explore SMB 3.x and the features of ONTAP 9 software that support the SMB protocol. Hands-on labs are completed using ONTAP 9 software.

  • 2 Days ILT, VILT

    In this 2-days IMPVMWAR: Implementing VMware vSphere on ONTAP instructor led course, you learn how to implement NetApp’s Virtual Storage Console by deploying, managing, and protecting a VMware virtual infrastructure in both SAN and NAS environments using ONTAP.

    This official NetApp training also covers the implementation details for both traditional datastores and Virtual Volumes using Storage Policy Based Management. Monitoring of both traditional and VVOL performance characteristics are covered in lecture and hands on labs. Updated to align with ONTAP v9.4.

  • MCCIPIW: ONTAP MetroCluster IP Implementation

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    MetroCluster software is a unique, high-availability, and disaster-recovery solution. . In this MCCIPIW: ONTAP MetroCluster IP Implementation NetApp training course, you learn how to cable and set up a NetApp ONTAP MetroCluster environment. You will complete participatory exercises to practice the configuration and verification steps. You also learn how to identify component failures and practice recovery steps.

  • 2 Days ILT, VILT

    Learn how to administer NetApp ONTAP9 data-management software integrated security and compliance features. Learn how to create a secure IT environment according to Zero Trust principals such as ‘least privilege access’ and ‘encrypt everything’.

    This ONTAP Security and Compliance Solutions Administration course comprehensively describes the administration, configuration, and management of the integrated data security and compliance features in ONTAP 9, including data retention using SnapLock software and data integrity with autonomous ransomware protection.

  • 2 Days ILT, VILT

    Learn how to work with and troubleshoot NetApp® Cloud Volumes ONTAP® for each supported public cloud provider. Use hands-on experience to collect and analyze troubleshooting data to better triage and resolve issues.

  • 2 Days ILT, VILT

    Learn about the basic administration tasks of managing a Kubernetes cluster.

    Use the kubectl and kubeadm command-line tools and an integrated development environment (IDE) to provision cluster and network resources. Explain the configuration and deployment of basic workload objects and common Kubernetes cluster tasks.

    This course was written for the Kubernetes 1.29 release.

  • 2 Days ILT, VILT

    Learn how to install, configure, and use NetApp® Astra Trident to manage Kubernetes with NetApp ONTAP® based storage systems. Deploy Astra Trident by using the Trident operator and use the tridentctl and kubectl methods to manage configurations.

    Configure NFS-backed, iSCSI-backed, and NVMe over TCP (NVMe/TCP) backed storage by using Astra Trident. Also, manage Snapshot copies, expand volumes, and import non-Astra Trident volumes to become managed volumes.

    Written for Kubernetes v1.29 and Astra Trident 24.02, this course includes an appendix on how to monitor Astra Trident by using Prometheus and Grafana.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • DCID: Designing Cisco Data Center Infrastructure

    Price range: RM7,500.00 through RM8,850.00
    5 Days ILT, VILT

    Demonstrate your mastery of the design and deployment options focused on Cisco data center solutions and technologies across network, compute, virtualization, automation, and security.

    The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System™ (Cisco UCS®) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric.

    You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. You can expect theoretical content as well as design-oriented case studies in the form of activities.

    This course earns you 40 Continuing Education (CE) credits towards Cisco recertification.

  • ENSLD: Designing Cisco Enterprise Networks v1.1

    Price range: RM7,500.00 through RM8,850.00
    5 Days ILT, VILT

    The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco® Enterprise Network Core Technologies (ENCOR) v1.0 course.

    This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP® Enterprise and Cisco Certified Specialist – Enterprise Design certifications.

    This course also earns you 40 Continuing Education (CE) credits towards recertification.

  • 4 Days ILT, VILT

    Architect a cloud-based infrastructure using Oracle Cloud Infrastructure services. Building on your skills obtained from the Oracle Cloud Infrastructure Administration Essentials course, explore deeper into the Oracle Cloud Infrastructure services to design and implement a secure and scalable cloud solution that meets HA and DR requirements. Design secure networks with disaster recovery options, and explore database capacity planning and advanced database features on OCI. Also explore the gamut of new services on OCI such as Streaming, Events, and Functions.

  • 5 Days ILT, VILT

    ISO/IEC 38500 Lead IT Corporate Governance Manager

    ISO/IEC 38500 Lead IT Corporate Governance Manager training enables you to acquire the expertise to support and lead an organization to successfully evaluate, direct and monitor an IT Governance model based on ISO/IEC 38500. During this training course, you will also gain comprehensive knowledge of the best practices and core principles of IT Governance and be able to effectively apply them in an organization in order to ensure good governance of IT.

    After mastering all the necessary concepts and core principles of IT Governance, you can sit for the exam and apply for a “PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager” credential. By holding a PECB Certificate, you will demonstrate that you have the professional capabilities and competencies to effectively govern the use of IT within an organization.

  • 5 Days ILT, VILT

    Lead Cybersecurity Manager

    Organizations nowadays are affected by the ever-evolving digital landscape and constantly face new threats and complex and sophisticated cyberattacks. There is a pressing need for skilled individuals capable of effectively managing and implementing robust cybersecurity programs to counter these threats. Our Lead Cybersecurity Manager training course has been developed to address this need.

    By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Additionally, this training course empowers participants to enhance their organization’s readiness and resilience against cyber threats. Participants will be well-prepared to support their organization’s ongoing cybersecurity efforts and make valuable contributions in today’s ever-evolving cybersecurity landscape.

  • 5 Days ILT, VILT

    Lead Pen Test Professional

    Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills.

    This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts.

    Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises.

  • 5 Days ILT, VILT

    Lead Forensics Examiner

    Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques.

    This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

    After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a “PECB Certified Lead Computer Forensics Examiner” credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition.

  • 5 Days ILT, VILT

    ISO/IEC 27002 Lead Manager.

    The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.

  • 5 Days ILT, VILT

    Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.

    The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.

    These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.

    In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

  • 5 Days ILT, VILT

    Master the implementation and management of information security incident management processes based on ISO/IEC 27035.

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities.

    In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

  • 5 Days ILT, VILT

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities. In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

Go to Top