You searched for: ""

  • 3 Days ILT, VILT

    This instructor-led course equips you with the necessary skills to become a certified expert in Trend Vision One’s Attack Surface Risk Management (ASRM) platform. You will understand the ASRM principles and methodologies through a combination of lectures, discussions, and hands-on labs.

  • 3 Days ILT, VILT

    Trend Vision One™ – Standard Endpoint Protection delivers XDR-­powered threat defense, combining advanced endpoint security with cross-layer detection and response for comprehensive protection against sophisticated attacks.

  • 3 Days ILT, VILT

    This course provides an in-depth understanding and practical expertise needed to effectively secure servers and cloud workloads using Server & Workload Protection.

    You will explore the intricate details of its core features and powerful protection modules, develop proficiency in advanced threat protection, and Extended Detection and Response (XDR) capabilities to defend against sophisticated threats across enterprise infrastructures.

  • 3 Days ILT, VILT

    Cloud Email and Collaboration Protection safeguards your business-critical cloud applications like Microsoft 365, Google Workspace, Box, and Dropbox.

    This course will teach you how to defend against advanced threats such as ransomware, phishing, and BEC, while also preventing data leakage. Learn to leverage its cloud­to-cloud integration for seamless protection and easy management, ensuring high availability and administrative functionality.

    Gain the skills to secure your cloud collaboration tools and protect your organization from evolving cyberattacks.

  • 3 Days ILT, VILT

    Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.

    This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    This ES712OCMCIPD2: Cloud Infrastructure Planning and Design v2 course explores the business needs and challenges that have led the organization to adopt a cloud solution. This course highlights the benefits, challenges, and considerations of design choices and emphasizes the importance of proper requirements gathering in the design process. Additionally, students are provided with opportunities to practice these new skills while performing exercises and labs. This course prepares the student for the Dell EMC Proven Professional Cloud Architect certification exam.

  • 5 Days ILT, VILT

    This ES722OCMDSBDA: Data Science and Big Data Analytics v2 course provides practical foundation level training that enables immediate and effective participation in Big Data and other analytics projects. It includes an introduction to Big Data and the data analytics lifecycle to address business challenges that leverage Big Data.

    The course provides grounding in basic and advanced analytic methods and an introduction to Big Data analytics technology and tools, including MapReduce and Hadoop. Labs offer opportunities for students to understand how these methods and tools may be applied to real world business challenges by a practicing data scientist.

    The course takes an “open”, or technology-neutral approach and includes a final lab which addresses a big data analytics challenge by applying the concepts taught in the course in the context of the data analytics lifecycle. The course prepares the student for the Dell EMC Proven™ Professional Data Scientist Associate (EMCDSA) certification exam.

  • 5 Days ILT, VILT

    IBM App Connect Enterprise provides connectivity and universal data transformation in heterogeneous IT environments. It enables businesses of any size to eliminate point-to-point connections and batch processing, regardless of operating system, protocol, and data format.

    This course teaches you how to use IBM App Connect Enterprise to develop, deploy, and support message flow applications. These applications use various messaging topologies to transport messages between service requesters and service providers, and allow the messages to be routed, transformed, and enriched during processing.

    In this course, you learn how to construct applications to transport and transform data. The course explores how to control the flow of data by using various processing nodes, and how to use databases and maps to transform and enrich data during processing. You also learn how to construct data models by using the Data Format Description Language (DFDL).

  • 5 Days ILT, VILT

    DB2 11 for z/OS beginning DBAs can develop fundamental skills or recognition through lectures and hands-on exercises of:

    • TSO/E and ISPF
    • Data sets
    • DB2 Objects
    • Structured Query Language
    • DB2 Commands
    • JCL and SDSF
    • DB2 Utilities
    • DB2 Logging
    • DB2 Program Preparation

    The course materials cover DB2 11 for z/OS.

  • 5 Days ILT, VILT

    This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment.

  • 5 Days ILT, VILT

    This course is for installers of DB2 10 z/OS and/or migration to DB2 11 for z/OS using the Install CLIST. The participants are involved in lectures that explain DB2 11 components and pointers, and the processes used to install or migrate from DB2 10 for z/OS. To reinforce the lectures, a series of labs are provided to give each participant hands-on experience installing DB2 10 for z/OS and migrating to DB2 11 for z/OS.

  • 5 Days ILT, VILT

    This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS

  • 5 Days ILT, VILT

    This CV832G: DB2 11 for z/OS Database Administration Workshop Part 1 course provides you with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities such as LOAD and REORG, and security considerations.

    Note: This course material is at the DB2 11 for z/OS level.

  • 5 Days ILT, VILT

    This Application Performance and Tuning course is designed to teach the students how to prevent application performance problems and to improve the performance of existing applications. Students will learn about indexes, table design, locking, and other issues relevant to application performance. This course includes paper exercises and machine exercises designed to reinforce the lecture content.

  • 5 Days ILT, VILT

    The course is updated for DB2 10 for z/OS. This course is the classroom delivered version of the Instructor led Online course

    • DB2 10 for z/OS System Administration – ILO (3V851).

    Administrators of DB2 10 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 10 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:

    • Relate the z/OS IPL process to a DB2 subsystem
    • Explain effects of stopping and starting DB2
    • Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
    • The use of DSN command processor running in batch and foreground
    • Use views to minimize your ability to see into the DB2 catalog
    • See how the catalog (through grant activity) controls access to data
    • Search the catalog for problem situations
    • Use the catalog and DB2 utilities to determine data recovery requirements
    • Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
    • Implement DB2 and Resource Access Control Facility (RACF) security
    • Describe DB2 program flow for all environments
    • Display normal and problem threads and database status
    • See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
    • Interpret lock displays
    • Identify and cancel particular threads
    • Describe available DB2 utilities to manage system and user page sets
  • 5 Days ILT, VILT

    This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 4 Days ILT, VILT, SPVC

    This four-day EDU-KFCO: VMware Kubernetes Fundamentals and Cluster Operations course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • EDU-TKGICM: VMware Tanzu Kubernetes Grid: Install, Configure, Manage [2.0]

    Price range: RM8,700.00 through RM9,825.00
    4 Days ILT, VILT

    Power your modern applications with VMware Tanzu Kubernetes Grid.

    During this four-day course, you learn about installing VMware Tanzu® Kubernetes GridTM in a VMware vSphere® environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages to provide services such as image registry, authentication, logging, ingress, multipod network i nterfaces, service discovery, image registry, and monitoring, in addition to day 2 operations such as backup, life cycle management, and application-specific tools.

    The concepts learned in this course are applicable for users who must install Tanzu Kubernetes Grid on supported clouds.

  • 5 Days ILT, VILT

    Learn and validate essential Red Hat Enterprise Linux 8 configuration, administration, and maintenance tasks and methods in a condensed format.

    The RHCSA Rapid Track course with exam (RH200) combines Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134), reviewing the tasks at an accelerated pace. The Red Hat Certified System Administrator (RHCSA) exam (EX200) is also included in this offering.

    This offering is based on Red Hat® Enterprise Linux® 8.2 and is designed for experienced Linux system administrators.

  • 5 Days ILT, VILT

    Learn how to configure, manage, and scale key services used in datacenters.

    Red Hat Services Management and Automation with exam (RH359) is designed for IT professionals with some experience managing Linux® systems and want to learn more about how to manage and deploy network services included with Red Hat® Enterprise Linux which are particularly important in modern IT datacenters. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible® Engine to automate your work in a scalable, repeatable manner.

    This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. The Red Hat Certified Specialist in Services Management and Automation exam (EX358) is included.

  • DCMDS: Configuring Cisco MDS 9000 Series Switches v3.6

    Price range: RM8,800.00 through RM10,150.00
    4 Days ILT, VILT

    Through expert instruction and extensive hands-on practice during this DCMDS: Configuring Cisco MDS 9000 Series Switches v3.6 course, you will learn how to deploy and use capabilities such as Virtual Storage Area Networks (VSANs), Role-Based Access Control (RBAC), N-Port Virtualization (NPV) fabric security, zoning, automation with NX-API, Slow Drain Analysis, SAN analytics, Fibre Channel over TCP/IP (FCIP) tunnels, and more.

    You will learn how to configure and implement platform features and learn troubleshooting techniques pertaining to Fibre Channel (FC) domains, firmware upgrades, zones, and zone mergers.

    .

  • -20%

    EDU-VSICM8: VMware vSphere: Install, Configure, Manage [V8]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8. This course prepares you to administer a vSphere infrastructure for an organization of any size.

    This course is the foundation for most VMware technologies in the software-defined data center.

    Thinking about upgrading your IT skills? Now’s the perfect time! Enjoy up to 20% off on VMware training course.

    Learn more today!

  • -20%

    EDU-VAAICM: VMware Aria Automation: Install, Configure, Manage [V8.17]

    Price range: RM8,800.00 through RM12,125.00
    5 Days ILT, VILT

    VMware Aria Automation: Install, Configure, Manage [V8.17]

    During this five-day official VMware course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments.

    The course covers how VMware Aria Automation Consumption™ can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config™ as a configuration management tool.

  • -20%

    EDU-NSXICM: VMware NSX: Install, Configure, Manage [V4.0]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    VMware NSX: Shaping the Future of Network Provisioning and Security.

    This VMware NSX: Install, Configure, Manage, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This VMware course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.

    Product Alignment

    • NSX 4.0.0.1
    • NSX 4.0.1
  • -20%

    EDU-VCDDCM: VMware Cloud Foundation: Deploy, Configure, Manage [V5.2]

    Price range: RM8,800.00 through RM11,000.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, and operating VMware® Cloud Foundation™. You will learn about the architecture of VMware Cloud Foundation, storage and network management, licensing, and certificates.

    In addition to workload domains, availability, life cycle management, and troubleshooting, the course also covers VMware® Aria Suite™ integration and VMware® Private AI Foundation with NVIDIA architecture and components

  • FT-FAD: FortiADC Training

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.

    These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.

  • FT-FVC: FortiVoice

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.

    In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.

  • 2 Days ILT, VILT

    This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.

  • 5 Days ILT, VILT

    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 4 Days ILT, VILT

    The Implementing Cisco Nexus 9000 Switches in NX-OS Mode–Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features.

Go to Top