You searched for: ""

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 2 Days ILT, VILT

    Microservices and Cloud-Native architectures have been goals of many organizations to help increase speed and agility, but as complexity grows, systems become increasingly challenging to observe. When issues occur, these issues are often di cult to triage and identify the root causes. This course introduces a range of practices for advancing resilience and how to architect end-to-end Observability for Cloud-Native applications. The advantages of building full-stack metrics, events, logs, and distributed tracing are introduced, along with the impact of DevSecOps on Observability and how AIOPs enhance Observability capabilities.

    This course also covers how Network and Security Observability plays a key role in building reliability, the key aspects of security operations and automated responses are covered, The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in Observability by using real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage situations such as implementing MELT models effectively, that fit their organizational context, building distributed tracing and resiliency by design.

    The course is developed by leveraging key experts in the fields of telemetry, sources of knowledge and engaging with thought-leaders in the Observability space, and working with organizations who have crossed the chasm of modern Observability to extract real-life best practices. This course positions learners to successfully complete the Observability Foundation certification exam.

  • 2 Days ILT, VILT

    As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.

    That’s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what’s next.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Red Hat Ceph Storage for OpenStack and Exam (CL261) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage.

    The Red Hat Certified Specialist in Ceph Cloud Storage (EX260) exam is included in this offering. This course is based on Red Hat Ceph Storage version 5.0

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam (DO289) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14. The Red Hat Certified OpenShift Application Developer Exam (EX288) is included in this offering

  • CKS: Certified Kubernetes Security Specialist

    Price range: RM5,200.00 through RM7,203.00
    4 Days ILT, VILT

    The CKS was created by the Linux Foundation and the Cloud Native Computing Foundation (CNCF) as a part of their ongoing effort to help develop the Kubernetes ecosystem. The exam is online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes.

    Once enrolled you will receive access to an exam simulator, provided by Killer.sh, allowing you to experience the exam environment. You will have two simulation attempts (36 hours of access for each attempt from the start of activation). The simulation includes 20-25 questions that are exactly the same for every attempt and every user, unlike the actual exam. The simulation will provide graded results.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM)

    Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

    Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14.

  • 1 Day ILT, VILT

    While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.

    We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.

    Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.

    We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.

  • 1 Day ILT, VILT

    Get more done and unleash your creativity with Microsoft Copilot. In this learning path, you’ll explore how to use Microsoft Copilot to help you research, find information, and generate effective content.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!

  • 1 Day ILT, VILT

    In this learning path, you learn about the capabilities of generative AI using Microsoft Copilot. Bring your personal creativity and passion to dream up a novel destination and create the content to help tell its story.

  • 1 Day ILT, VILT

    Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

    • Level: Intermediate
    • Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
    • Role: Security Operations Analyst
    • Subject: Threat protection
  • 1 Day VILT

    This blended course is for Devops/SREs and Developers.

    The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
    find insights using analytics in charts and detectors and to create detectors for common use cases.

  • 3 Days VILT

    The Splunk Core Certified Advanced Power User course is designed to take your Power User skills to the next level. It focuses on complex searching and reporting, advanced use cases of knowledge objects, and best practices for dashboards and forms.

  • 5 Days ILT, VILT

    The Rocheston Certified Artificial Intelligence Engineer (RCAI) training and certification program is a professional certification course that equips students with a profound understanding of the algorithms, applications, and tools used for Artificial Intelligence (AI) in today’s digital world.

    The RCAI training program is designed by Rocheston, a pioneering company in cybersecurity training and certification. It provides specialization in AI and its increasing role in several industries. It aims to prepare the students to solve complex AI problems and applications. Post certification, the students can work as AI Engineers or any interdisciplinary roles related to AI in corporate and industries.

    Also, the RCAI program series are accordant with CE standard, a high standard within Rocheston’s cybersecurity framework which ensures the candidates are learning the best and latest in the innovation field.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Trend Vision One is a comprehensive cybersecurity platform designed to provide centralized visibility and control across your entire IT environment. It consolidates a wide range of security capabilities into a single platform, simplifying security operations and enhancing protection against modern threats.

    This multi-day, instructor-led course provides the in-depth knowledge and hands-on skills to effectively manage your Trend Vision One platform. You’ll learn about the platform, user roles, and the core responsibilities of an administrator.

  • 3 Days ILT, VILT

    This intensive three-day, instructor-led course provides certified professionals with the knowledge and hands-on experience to master Trend Vision One’s XDR capabilities. You will delve into the concepts of extended detection and response, learn how to connect Trend Micro and third-party products, install XDR sensors, navigate workbenches, incorporate threat intelligence, search the data lake, and automate responses using Security Playbooks.

    Through a combination of expert instruction and hands-on lab exercises, you will gain the practical skills necessary to effectively utilize Trend Vision One for comprehensive threat detection, investigation, and response.

  • 3 Days ILT, VILT

    This course provides a deep dive into the core principles of Zero Trust and equips you with the knowledge and skills to implement them effectively using Trend Vision One.

    You will learn how to configure and manage secure access rules, deploy Secure Access Modules, and ensure secure access to private applications, internet resources, and Al services. Through hands-on labs and real-world examples, you’ll gain practical experience in building and maintaining a robust Zero Trust security environment.

    You will gain practical experience in building and maintaining a Zero Trust security environment through hands-on labs and real world examples.

  • 3 Days ILT, VILT

    This instructor-led course equips you with the necessary skills to become a certified expert in Trend Vision One’s Attack Surface Risk Management (ASRM) platform. You will understand the ASRM principles and methodologies through a combination of lectures, discussions, and hands-on labs.

  • 3 Days ILT, VILT

    Trend Vision One™ – Standard Endpoint Protection delivers XDR-­powered threat defense, combining advanced endpoint security with cross-layer detection and response for comprehensive protection against sophisticated attacks.

  • -30%

    GCP-AIMLGC: Introduction to AI and Machine Learning on Google Cloud

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day ILT, VILT

    This course introduces the AI and machine learning (ML) offerings on Google Cloud that build both predictive and generative AI projects.

    It explores the technologies, products, and tools available throughout the data-to-AI life cycle, encompassing AI foundations, development, and solutions. It aims to help data scientists, AI developers, and ML engineers enhance their skills and knowledge through engaging learning experiences and practical hands-on exercises.

  • -30%

    GCP-GAIDM: Introduction to Generative AI for Decision Makers

    Original price was: RM1,200.00.Current price is: RM840.00.
    1 Day ILT, VILT

    This course is designed for business users, business leaders, and, more generally, decision makers within organizations who are seeking to gain a comprehensive understanding of generative AI and its potential impact on their businesses.

    The overall goal of the course is to educate decision makers on the potential impact generative AI can have in their organizations, educate them about generative AI services on Google Cloud and to inspire decision makers to start thinking about what is possible with generative AI technologies.

  • -30%

    GCP-WEPGAI: Writing Effective Prompts for Generative AI

    Original price was: RM1,200.00.Current price is: RM840.00.
    1 Day ILT, VILT

    As generative AI becomes more common, the ability to interact with large language models is shifting from niche knowledge to a necessary skill across many different industries and roles.

    In this course, you will learn the fundamentals of prompting large language models and exploring further techniques for improving the output from large language models. You will also explore similar concepts when working with multimodal models such as Gemini Vision Pro.

  • -35%
    1 Day

    In this course, you explore generative AI (Gen AI) use cases across specific industries using Google Cloud.

    After discussing generative AI in general, you will do a deep dive into two generative AI use cases and then explore your own use case within the same framework. This course targets professionals across different roles, including business analysts, data scientists, software developers, business users, and decision-makers, who are specifically interested in leveraging generative AI for business solutions.

  • -30%

    GCP-ADLLM: Application Development with LLMs on Google Cloud

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day ILT, VILT

    In this course, you explore tools and APIs available on Google Cloud for integrating large language models (LLMs) into your application.

    After exploring generative AI options on Google Cloud, you explore LLMs and prompt design in Vertex AI Studio. Then you learn about LangChain, an open-source framework for developing applications powered by language models.

    After a discussion around more advanced prompt engineering techniques, you put it all together to build a multi-turn chat application by using LangChain and the Vertex AI Gemini API.

  • -30%

    GCP-VAISC: Vertex AI Agent Builder

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day

    Vertex AI Agent Builder lets developers, even those with limited machine learning skills, tap into the power of Google’s foundation models, search expertise, and conversational AI technologies to create enterprise-grade generative AI applications.

    In this course, you learn how to use Vertex AI Agent Builder to create search engines and chat applications. You will then explore how to integrate these search engineers and chat applications into your own applications.

    Finally, you learn how to manage the tools built in Vertex AI Agent Builder in production.

  • -30%

    GCP-DEVEFF: Introduction to Developer Efficiency with Gemini on Google Cloud

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day ILT, VILT

    Generative AI is now at the center of transforming how software is designed, built, run, and managed. For developers, generative AI is a powerful tool for making coding more efficient and using APIs, such as the Gemini and PaLM APIs, within their applications.

    In this course, you are introduced to how generative AI can be used to make developers more efficient at writing code and implementing new features into applications. You will also explore available models in Vertex AI Model Garden.

  • 3 Days ILT, VILT

    This course provides an in-depth understanding and practical expertise needed to effectively secure servers and cloud workloads using Server & Workload Protection.

    You will explore the intricate details of its core features and powerful protection modules, develop proficiency in advanced threat protection, and Extended Detection and Response (XDR) capabilities to defend against sophisticated threats across enterprise infrastructures.

  • 2 Days ILT, VILT

    Trend Vision One – Mobile Security is a security solution designed to proactively protect and manage mobile devices against a wide range of mobile threat attacks. It integrates advanced mobile threat detection technologies to mitigate mobile security risks and supports integration with third-party mobile device management (MDM) solutions for centralized management.

    This course provides a comprehensive overview of Trend Vision One™ Mobile Security’s core features designed to combat evolving mobile threats.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Cloud Email and Collaboration Protection safeguards your business-critical cloud applications like Microsoft 365, Google Workspace, Box, and Dropbox.

    This course will teach you how to defend against advanced threats such as ransomware, phishing, and BEC, while also preventing data leakage. Learn to leverage its cloud­to-cloud integration for seamless protection and easy management, ensuring high availability and administrative functionality.

    Gain the skills to secure your cloud collaboration tools and protect your organization from evolving cyberattacks.

  • 2 Days ILT, VILT

    Trend Vision One – Cloud Email Gateway Protection is an enterprise-class solution that delivers continuously updated protection to stop phishing, ransomware, Business Email Compromise (BEC) scams, spam and other advanced email threats before they reach your network.

    This course will provide you with the knowledge and skills that are required to administer and support Cloud Email Gateway Protection (CEGP).

  • 3 Days ILT, VILT

    Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.

    This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

Go to Top