This eLearning course teaches students how to create visualizations in Splunk, using Splunk’s Search Processing Language as well as the Splunk Web interface. Students will learn commands that allow data to be displayed on charts and graphs, transform geographic data into maps, create single value visualizations, and use Splunk’s visual formatting options to change the look of statistical tables.
-
This eLearning course gives students additional insight into how Splunk processes searches. Students will learn about Splunk architecture, how components of a search are broken down and distributed across the pipeline, and how to troubleshoot searches when results are not returning as expected.
-
This eLearning course teaches students about how different types of knowledge objects to extract additional insights from their data. Students will learn the basics of how to create knowledge objects, define their settings, edit, and manage existing knowledge objects.
-
This three-hour course is designed for power users who want to create maps in Splunk. It focuses on the data and components required to create cluster and choropleth maps. It also shows how to format, customize and make maps interactive.
-
This three-hour SPLK-SO: Search Optimization course is for power users who want to improve search performance. Topics will cover how search modes affect performance, how to create an efficient basic search, how to accelerate reports and data models, and how to use the tstats command to quickly query data.
-
The just-discharged COBIT 2019 is the best COBIT yet, highlighting numerous positive changes including adjusted standards, new structure factors, refreshed objectives course, altered procedures (from 37 to 40), refreshed execution the board, new point by point administration and the executives goals.
This COBIT2019DAI: COBIT 2019 Design and Implementation course is planned for progressively experienced clients to COBIT who are keen on further developed utilization of the system, for example structuring administration frameworks and running administration improvement programs. This course requires the COBIT 2019 Foundation Certificate to be effectively accomplished. This two-day course is organized around the COBIT 2019 Design Guide and the COBIT 2019 Implementation Guide
-
COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.
-
DevOps is a complex maze that has many leaders frustrated. Many enterprises struggle with their DevOps journey, or even knowing where to start. There are many layers of people, process and technologies across each organization that are instrumental to engineering a successful DevOps solution. DevOps is not something you go get a quote for and simply buy. It’s an evolving journey.
This DOEF: DevOps Engineering Foundation course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution.
This course positions learners to successfully complete the DevOps Engineering Foundation exam.
-
Elevate the digital workspace experience with the efficient and secure delivery of virtual desktops and apps from on-premises to the cloud.
This EDU-HVDT8: VMware Horizon 8: Virtual Desktop Troubleshooting course, equivalent to 2 days of training, builds your skills in resolving common issues that occur in a VMware Horizon® environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators.
-
For the economy today, leaders need to be equipped to use different set of tools , values and principles to manage the workforce today to achieve greatness.
VUCA is an acronym that stands for Volatility, Uncertainty, Complexity, and Ambiguity. It was originally used by the military to describe the conditions of the post-Cold War world. However, VUCA has since been adopted by business leaders and academics to describe the contemporary business environment. VUCA represents a shift from the traditional assumptions about organizations and their environments. In a VUCA world, organizations must be able to adapt and respond to change at a moment’s notice.
This VUCA’s training will focus on:
- Strategic leadership
- Design Thinking
- Competencies of flawless communication, resilience & team synergy
-
Learn to present with confidence.
When presenting, it’s important to project confidence. This will help you engage with your audience and deliver your message effectively. But how can you present with confidence in the 21st century?
There are a few key things to keep in mind. First, remember that your audience is composed of individuals with their own unique perspectives. So it’s important to be respectful and open-minded when presenting. Second, don’t be afraid to use technology to enhance your presentation. There are a number of great tools available that can help you deliver your message in an engaging way. Finally, keep in mind that it is all about the connection. Use your body language and voice to create an intimate connection with your audience, and you’ll be sure to deliver a confident and impactful presentation.
This is a 1+1 day course. The participants are critiqued on their first presentation on Day 1. Then, they learn the concepts, revise the same presentation and rehearse before making a second presentation on Day 2. They get personal coaching to enhance their presentation skills on the second day.
-
Every sales leader have a subtle way of influence over the audience. Have you ever wondered how they do it? Have you ever wanted to have the same subtle influence over your prospect? What if I tell you that this skill can be learnt and you too can learn how to use influence the decision making part of the mind and get your prospects to buy?
Participants will learn, practice and assimilate these skills into their daily activities until they become unconsciously competent in these skills.
Training is delivered in a highly interactive and experiential way. Concepts and background information are presented through group exercises, discussion and activities creating an environment that facilitates accelerated learning and application.
The trainer will facilitate discussion of real issues and challenges that the participants face in their work and private lives. Each activity will be thoroughly de-briefed to link the learning to real life situations.
-
The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.
CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
The only true blue team network defense program!
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.
The only program built for the world’s largest work-from-home experiment!
Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.The Certified Network Defender v2 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have for 5 reasons:
- Only comprehensive network defense program built to incorporate critical
secure network skills – Protect, Detect, Respond and Predict - Maps to NICE 2.0 Framework
- Comes packed with the latest tools, technologies, and techniques
- Deploys a hands-on approach to learning
- Designed with an enhanced focus on Threat Prediction, Business Continuity
and Disaster Recovery
- Only comprehensive network defense program built to incorporate critical
-
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, the CPENT: Certified Penetration Testing Professional teaches you how to perform an effective penetration test across filtered networks.
The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies. In summary, there is no program of its kind in the world.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Validate your broad knowledge of cloud concepts and the products, services, tools, features, benefits, and use cases of Google Cloud.
If you’re wondering how cloud can transform your business then this course is for you. Aimed at business leaders new to cloud, this GCP-CDL: Cloud Digital Leader training with Google Cloud course provides insight into Google’s approach to digital transformation, and how to embrace cloud in your business.
This Google Cloud training is designed to give you foundational knowledge about cloud technology, data, and Google Cloud products that enable digital transformation. Empowering you and your team(s) to contribute to cloud-related business initiatives in your organization.
Learn more about Multicloud Strategies in Malaysia: Adopting Multicloud Strategies in Malaysia: A 2024 Roadmap
-
Professional Scrum™ with User Experience (PSU) is a 2-day hands-on course where students who already have a fundamental understanding of Scrum and some experience using it will learn how to integrate modern UX practices, (UX is more than UI) into the way they are working in Scrum and how to work most effectively within Scrum Teams. Design work can sometimes feel slow, and not well suited to quick agile cadences and Scrum events, but that isn’t the case. Learn UX techniques that fit beautifully into Scrum, and practice these techniques with cross-functional teams in the class.
In this two day class* students will leverage an ongoing case study as a way of applying techniques learned throughout the class and preparing to take what they learn back to their workplace. This course is designed for Product Owners and Scrum Masters to enable them to better incorporate design, research and learning into their Scrum process.
Lean UX techniques focus the team toward customer-centric design and discovery. Scrum focuses the team toward rapid delivery and customer feedback. By bringing together Lean UX and Scrum, teams learn how to drive the design together with delivery in short, iterative cycles to assess what works best for the business and the user.
Leveraging Lean UX techniques, the course takes core design and research activities, illustrating how they come together with development and delivery. Attendees explore how these activities fit into a dual-track agile process (Design and Development) where cross-functional teams can work together to explore, experiment and deliver value-based outcomes.
-
Teaches the essential skills required to design, implement, and manage a Red Hat OpenShift Data Foundation cluster and perform day-to-day Kubernetes storage management tasks.
Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This Red Hat OpenShift course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services.
-
This ZZ930G: InfoSphere MDM Physical Domains course is designed for anyone who wants to get an understanding of the Data Domains for the InfoSphere Master Data Management Physical Module. This course takes a comprehensive look at the three core data domains of InfoSphere MDM: Party, Account, and Product. For each of the domains spanned by InfoSphere MDM, participants will be exposed to the data model, services, and rules associated with the main entities of that domain. Heavy emphasis is put on exercises and activities so that the participants can apply the knowledge that they learn after course conclusion.
-
In this W7069G: IBM Watson OpenScale Methodology training course, uou will learn how Watson OpenScale lets business analysts, data scientists, and developers build monitors for artificial intelligence (AI) models to manage risks. You will understand how to use Watson OpenScale to build monitors for quality, fairness, and drift, and how monitors impact business KPIs. You will also learn how monitoring for unwanted biases and viewing explanations of predictions helps provide business stakeholders confidence in the AI being launched into production.
Note: This course contains the same topics as 6X240G IBM Watson OpenScale on IBM Cloud Pak for Data WBT.
-
This TX318G: IBM Workload Scheduler 9.4 Administration course teaches the administrative functions necessary to plan, install, configure, maintain, and troubleshoot an IBM Workload Scheduler 9.4 network. This course includes an in-depth look at designing an IBM Workload Scheduler network architecture, background processes in Workload Scheduler, workstation and network configuration options, workload production cycle and processing, effective use of Workload Scheduler security, and techniques for Identifying and resolving common problems.
Hands-on lab exercises include planning a network, defining workstations and domains, and installing and configuring Workload Scheduler components.
-
This TV384G: IBM Agent Builder 6.3.4 course teaches you how to use the IBM Agent Builder software to create, modify, debug, and package agents for use with IBM Performance Management and IBM Tivoli Monitoring products. You create agents that monitor many different data sources. You learn to mix, match, and manipulate monitored data to create custom data points to monitor. You also learn to add custom components specific to the different IBM monitoring environments. IBM Agent Builder can create custom agents for both the IBM Tivoli Monitoring 6.x and IBM Performance Management 8.x on-premises and SaaS environments.
This course is applicable to students from either environment, and a single class might have students from each environment.
-
This AMA-2605: Extraordinary Productivity: The 5 Choices That Drive Success productivity seminar combines current neuroscience research with proven productivity principles to help you better manage your decisions, attention, and energy.
You’ll learn how to apply a process—which incorporates the use of Microsoft Outlook®—to dramatically increase your ability to achieve life’s most important outcomes by consistently making choices that create extraordinary value for yourself and your organization. This solution not only produces a measurable increase in productivity but can also provide you with a renewed sense of engagement and accomplishment.
-
This 0A069G: IBM SPSS Modeler Foundations v18.2 course provides the foundations of using IBM SPSS Modeler and introduces the participant to data science. The principles and practice of data science are illustrated using the CRISP-DM methodology. The course provides training in the basics of how to import, explore, and prepare data with IBM SPSS Modeler v18.2, and introduces the student to modeling.