You searched for: ""

  • 5 Days ILT, VILT

    The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.

    The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, covering the authentication and authorization of the administrators’ access. This training also earns you 26 Continuing Education (CE) credits toward recertification.

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The OCI 2024 Architect Professional Course is meticulously designed for seasoned cloud architects and IT professionals aiming to elevate their proficiency in Oracle Cloud Infrastructure (OCI). This advanced course offers an in-depth curriculum encompassing sophisticated OCI architecture, strategic design principles, and best practices for deployment and management.

    Learners will engage in hands-on labs, ensuring practical application of theoretical knowledge through real-world scenarios. These labs are pivotal in cementing the skills required to architect and manage robust, scalable, and secure OCI environments.

    The course is invaluable to learners, providing comprehensive insights into OCI’s advanced functionalities. By the end of the program, learners will possess the expertise and confidence to design and implement complex OCI solutions, making them highly capable and competitive in the field of cloud infrastructure.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.

    This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets.

    This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.

  • BGP: Configuring BGP on Cisco Routers

    Price range: RM8,000.00 through RM14,750.00
    5 Days ILT, VILT

    The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.

  • 1 Day ILT, VILT

    This learning path will teach you the essentials of Microsoft Intune, advanced threat detection and response with Microsoft Copilot for Security, and how to optimize the integration between Intune and Copilot.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 5 Days ILT, VILT

    This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere 8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure.

    This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.

  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 1 Day ILT, VILT

    Extend Microsoft Copilot for Microsoft 365 with Copilot Studio

    As a developer, you can enhance, enrich, and customize Microsoft Copilot for Microsoft 365 in 2 ways: you can extend Microsoft Copilot or build your own copilot.

    On its own, Copilot for Microsoft 365 is a powerful productivity tool for keeping users in the flow of their work across Microsoft 365 applications. It provides users with general skills that enhance personal productivity, such as understanding, summarizing, predicting, recalling, translating, and generating content. It draws from a baseline of your organizational knowledge by indexing content into Microsoft Graph, such as the emails, chats, and documents that users have permission to access.

    However, business workflows don’t typically run exclusively on Microsoft 365 applications and experiences. With Copilot extensibility, you can augment Copilot for Microsoft 365 with custom actions and ground your responses with connectors that access data in real-time. You can even extend Copilot’s experiences with declarative and custom copilots that focus on specific user experiences.

    IMPORTANT: This course retired 31 Mar 2025 and has been replaced with MS-4022

  • 1 Day ILT, VILT

    Build connectors and plugins for Microsoft Copilot for Microsoft 365

    What will you get from this course:

    • provides comprehensive knowledge and hands-on experience in building declarative agents using Visual Studio Code and Teams Toolkit
    • introduction to declarative agents, followed by practical labs that guide them through building their first agent
    • understanding API plugins, and implementing APIs.
    • advanced topics include creating adaptive cards, managing authentication for API plugins, and integrating Microsoft Graph connectors.

    By the end of the course, participants have a solid understanding of how to leverage declarative agents to enhance the functionality of Microsoft 365 Copilot.

Go to Top