Learn how to build and distribute Microsoft Teams apps that retrieve user information using the Microsoft Graph API. Practice building and deploying apps in the guided project at the end of the learning path.
-
Discover how Microsoft Copilot for Microsoft 365 elevates workplace productivity and innovation. This experience, tailored for the modern business leader, provides insights on crafting contextual prompts for Copilot and includes engaging use case exercises that showcase seamless integration into daily workflows.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.
-
In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment. You will learn about various system customization options, HA deployment, security management using role-based access control (RBAC), and various system monitoring tools.
-
In this course, you will learn about the different components that make up the Amazon Web Services (AWS) infrastructure and the security challenges these environments present, including high availability (HA), load balancing, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.
-
In this course, you will learn about the different components that make up the Microsoft Azure infrastructure and the security challenges these environments present, including high availability (HA), autoscaling, Azure Virtual WAN, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.
-
The ITIL 4 Specialist: Business Relationship Management module is for IT professionals who are involved in establishing and nurturing the relationships between service providers and consumer organizations, and their stakeholders.
Based on the ITIL 4 framework, the module provides both strategic and practical best practice guidance to help organisations understand the value of Business Relationship Management as well as its key concepts and challenges. Professionals should be able to use these concepts to deliver return on investment in digital technology, develop and apply service relationship models and integrate Business Relationship Management in the organisation’s service value streams for a holistic and end-to-end approach.
-
ArchiMate, The Open Group Standard, is an open and independent modeling language for enterprise architecture that is supported by different tool vendors and consulting firms.
ArchiMate® provides instruments to enable enterprise architects to describe, analyse and visualise the relationships among business domains in an unambiguous way.
Upon completion, participant can enroll in the following certification exam:
- ArchiMate 3 Foundation
The purpose of this certification is to provide validation that the participant has gained knowledge of the notation, terminology, structure and concepts
of theArchiMate® modeling language. The learning objectives at this level focus on knowledge and comprehension. - ArchiMate® 3 Practitioner
The purpose of this certification is to provide validation that the participant has gained knowledge as in Level 1 and has the capability to use the ArchiMate® language for modeling.
- ArchiMate 3 Foundation
-
Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.
This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.
-
The Information Architect has mastered the management of information across and within their industry.
They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.
Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.
-
The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.
They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.
lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.
-
The Software Architect has mastered the value, use, development and delivery of intensive systems.
They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.
The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.
-
A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.
The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.
-
Gain a competitive edge in the rapidly evolving world of generative AI.
In this course, you will learn how to leverage generative artificial intelligence (AI) within your organization. We’ll cover how to drive business value with generative AI, the use cases across various industries, and the considerations to implement generative AI safely and responsibly. The goal of this course is to provide you with the fundamental concepts and tools you’ll need to successfully lead generative AI initiatives within your organization.
Invest in your team’s cloud future: Master AWS with 600+ courses, labs, and interactive experiences, elevate your team’s cloud expertise with AWS Skill Builder Team Subscription.
Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.
-
Extend Microsoft Copilot for Microsoft 365 with Copilot Studio
As a developer, you can enhance, enrich, and customize Microsoft Copilot for Microsoft 365 in 2 ways: you can extend Microsoft Copilot or build your own copilot.
On its own, Copilot for Microsoft 365 is a powerful productivity tool for keeping users in the flow of their work across Microsoft 365 applications. It provides users with general skills that enhance personal productivity, such as understanding, summarizing, predicting, recalling, translating, and generating content. It draws from a baseline of your organizational knowledge by indexing content into Microsoft Graph, such as the emails, chats, and documents that users have permission to access.
However, business workflows don’t typically run exclusively on Microsoft 365 applications and experiences. With Copilot extensibility, you can augment Copilot for Microsoft 365 with custom actions and ground your responses with connectors that access data in real-time. You can even extend Copilot’s experiences with declarative and custom copilots that focus on specific user experiences.
IMPORTANT: This course retired 31 Mar 2025 and has been replaced with MS-4022
-
Build connectors and plugins for Microsoft Copilot for Microsoft 365
This training course is designed to help you understand the extensibility options available for Microsoft Copilot for Microsoft 365. You learn about the different ways to extend Copilot, including building plugins and connectors, and how to choose the right option for your use case. The course also covers best practices for building high-quality plugins and connectors, as well as data, privacy, and security considerations. Whether you’re a pro-code or low/no-code developer, this course helps you chart your path to extending and customizing Copilot for Microsoft 365.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
Microsoft Copilot Web Based Interactive Experience for Executives
Discover how Microsoft Copilot and Copilot for Microsoft 365 elevates productivity and innovation. This experience, tailored for the modern business leader, provides insights on crafting contextual prompts for Copilot and includes engaging use case exercises that showcase seamless integration into daily workflows.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
Create and extend custom copilots in Microsoft Copilot Studio
Microsoft Copilot Studio is a graphical low-code tool for creating and maintaining copilots.
A copilot is an AI-powered conversational interface based on large language models (LLMs) and additional sources of knowledge. It’s a powerful AI companion that can handle a range of requests, from providing simple responses to common questions to resolving issues requiring complex conversations.
Copilots can engage with customers and employees in multiple languages across websites, mobile apps, Facebook, Microsoft Teams, or any channel supported by the Azure Bot Service.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
Implement retention, eDiscovery, and Communication compliance in Microsoft Purview
In today’s digital environment, managing organizational data efficiently and securely is crucial. Microsoft Purview Data Lifecycle and Records Management solutions help businesses govern their data throughout its lifecycle, ensuring compliance with regulatory requirements. By implementing retention labels and policies, organizations can consistently manage data, minimize risks associated with breaches, and reduce unnecessary storage.
Understanding these tools ensures data is available when needed and securely deleted when it’s not.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
The Oracle Private Cloud Appliance: Administration course teaches students about administration of the Private Cloud Appliance to provide Infrastructure as a Service. The course also teaches the policy driven provisioning of application servers, and management of the hardware configuration. The primary focus areas of this course include the administration of storage, network, memory, and CPU resources, and the management and monitoring of the Private Cloud Appliance components.
Learn To: Review the hardware and software installed and configured in the Private Cloud Appliance. Monitor the health of hardware. Allocate memory, CPU, network, and storage resources for effective virtualization support. Create, deploy, manage, and delete virtual machines. Configure the allocation of IaaS resources. Configure the Private Cloud Appliance Oracle VM environment in which virtualized servers run. Provide Infrastructure as a Service with Oracle Enterprise Manager Cloud Control. Manage the efficient allocation of appliance resources. Design an effective disaster recovery solution for the Private Cloud Appliance. Perform a selection of activities on a simulated lab environment. Benefits To You The Oracle Private Cloud Appliance delivers on the promise of simplified cloud management. The converged infrastructure solution consists of preconfigured Oracle servers, network, and storage hardware and software. With this engineered system you create and maintain a highly configurable pool of memory, CPU, and storage resources for running applications in a virtualization environment.
The administration procedures and techniques covered in this course enables: Cost reduction by eliminating multi-vendor integration. Eliminating the risk of cabling, hardware or software configuration errors. Reducing the amount of time taken to deploy new applications. Ensuring business continuity for IaaS consumers. This course teaches you to create, deploy and manage virtualized servers and configure the Private Cloud Appliance Oracle VM environment in which virtualized servers run.
-
This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere 8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure.
This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):
- planning
- creating
- testing
- deploying an application.
Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.
The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.
This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.
The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).
Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.
-
The OCI 2024 Architect Professional Course is meticulously designed for seasoned cloud architects and IT professionals aiming to elevate their proficiency in Oracle Cloud Infrastructure (OCI). This advanced course offers an in-depth curriculum encompassing sophisticated OCI architecture, strategic design principles, and best practices for deployment and management.
Learners will engage in hands-on labs, ensuring practical application of theoretical knowledge through real-world scenarios. These labs are pivotal in cementing the skills required to architect and manage robust, scalable, and secure OCI environments.
The course is invaluable to learners, providing comprehensive insights into OCI’s advanced functionalities. By the end of the program, learners will possess the expertise and confidence to design and implement complex OCI solutions, making them highly capable and competitive in the field of cloud infrastructure.
-
The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.
-
This learning path will teach you the essentials of Microsoft Intune, advanced threat detection and response with Microsoft Copilot for Security, and how to optimize the integration between Intune and Copilot.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
This course is targeted at Database Administrators and begins with explaining the architecture of an Oracle Database instance and the tools used to access it. The course includes creating and managing a database, configuring and managing Oracle Net Services along with creating and administering pluggable databases (PDBs). You learn how to create and manage database storage, users, backup, and implement database security.
Additionally, the course covers protection of database against failures, loading, and transporting data.
-
The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets.
This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.
-
The Implementing Cisco Nexus 9000 Switches in NX-OS Mode–Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features.
-
The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.
The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, covering the authentication and authorization of the administrators’ access. This training also earns you 26 Continuing Education (CE) credits toward recertification.
-
The Implementing the Cisco NCS 540 Series Routers (NCS540HWE) training teaches you how to deploy Cisco Network Convergence System (NCS) 540 Series routers in a network environment. You will be introduced to the features and functions of the Cisco NCS 540 series platforms, system architecture, services implementation, quality of service (QoS), system security, model-driven telemetry, and programmability. This training also earns you 40 Continuing Education (CE) credits towards recertification.
-
The Cisco Network Services Orchestrator (NSO) Advance Python Programmers (NSO300) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 course with NSO to include customizing templates with Python programming, Docker deployment, and Nano services.
You will learn to create advanced services using the NSO application framework and Python scripting with both new and existing Layer 3 Multiprotocol Label Switching (MPLS) VPN services. You will also learn how to manage and scale these services to reduce operation consumption, and increase both security and available physical space, since virtualized network functions (VNFs) replace physical hardware. You will use Network Functions Virtualization (NFV) orchestration features, and Cisco Elastic Services Controller (ESC) to manage virtualized network functions.
-
The Gold Standard.
CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.
This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager.
-
-20%
This three-day training course provides the advanced knowledge, skills, and tools to achieve competency in troubleshooting problems in VMware Cloud Foundation™ infrastructure. In this course, you are exposed to tools and methodologies that help you support and troubleshoot your VMware Cloud Foundation environment.
In addition, various scenarios are presented to you in hands-on student labs and simulations in which you learn to identify, analyze, and solve problems systematically in the VMware Cloud Foundation infrastructure.