You searched for: ""

  • 2 Days ILT, VILT

    This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server.

    Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

  • 2 Days ILT, VILT

    This instructor- led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the  Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution .

    Multiple modules focus on how to leverage the collected data. You will create simple search queries in on e module an d XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact- related data, such as IP and Hash Views. Addition ally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external- data collection capabilities, including the use of Cortex XDR API to receive external alerts.

  • 5 Days ILT, VILT

    Focuses on the key tasks needed to become a full time Linux administrator.

    Red Hat System Administration II with exam (RH135) serves as the second part of the RHCSA training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux system administration skills in storage configuration and management, installation and deployment of Red Hat Enterprise Linux, management of security features such as SELinux, control of recurring system tasks, management of the boot process and troubleshooting, basic system tuning, and command-line automation and productivity.

    Experienced Linux administrators looking for rapid preparation for the RHCSA certification should instead start with RHCSA Rapid Track with exam (RH200).

    The Red Hat Certified System Administrator (RHCSA) exam (EX200) is included in this offering, which is based on Red Hat Enterprise Linux 9.0

  • EDU-DCVCTS: VMware Data Center Virtualization: Core Technical Skills

    Price range: RM9,300.00 through RM10,425.00
    4 Days ILT, VILT

    This four-day, hands-on EDU-DCVCTS: VMware Data Center Virtualization: Core Technical Skills training course is an introduction to VMware vSphere®.  In this course, you acquire the skills needed to perform Day 2 operational tasks that are typically assigned to the roles of operator or junior administrator in a vSphere environment.

    Product Alignment

    • VMware ESXi 7.0
    • VMware vCenter Server 7.0
  • 4 Days VILT

    This 18 hour Implementing Splunk IT Service Intelligence course is designed for administrator users who will implement Splunk IT Service Intelligence for analysts to use. The first day includes the day of content from Using Splunk IT Service Intelligence.

  • 4 Days VILT

    This 4-day course is designed for the experienced Splunk administrators who are new to Splunk DSP. This hands-on class provides the fundamentals of deploying a Splunk DSP cluster and designing pipelines for core use cases. It covers installation, source and sink configurations, pipeline design and backup, and monitoring a DSP environment.

  • 4 Days ILT, VILT

    Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.

    This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.

  • 4 Days ILT, VILT

    The Information Architect has mastered the management of information across and within their industry.

    They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.

    Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.

  • 4 Days ILT, VILT

    The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.

    They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.

    lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 4 Days ILT, VILT

    A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.

    The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.

  • 3 Days ILT, VILT

    Trend Micro™ TippingPoint™ Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands – on activities, students will learn to implement the inspection device and the Security Management System (SMS).

  • 3 Days ILT, VILT

    Trend Micro Deep Discovery Advanced Threat Detection 4.0 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks. Participants explore key concepts and methodologies using the following blend of Deep Discovery products for a more complete approach to network security:

    • Trend Micro™ Deep Discovery™ Analyzer
    • Trend Micro™ Deep Discovery™ Inspector
    • Trend Micro™ Deep Discovery™ Email Inspector
    • Trend Micro™ Deep Discovery™ Director

    This cybersecurity course provides a variety of hands-on lab exercises allowing each student to put the lesson content into action. There will be an opportunity to set up and configure various Deep Discovery management and administration features and explore their functionality using a virtual lab environment. A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat Protection solutions. This includes recommendations on best practices and general troubleshooting steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions in your environment.

    The course also explores various deployment considerations and requirements needed to tie Deep Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat hunting and intelligence sharing, for better threat detection functionality.

  • DTCSM: Cisco Customer Success Manager

    Price range: RM9,460.00 through RM10,648.00
    3 Days ILT, VILT

    The Cisco Customer Success Manager (DTCSM) v2.1 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.

    This course is based on the concept of the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco® Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification.

  • 5 Days ILT, VILT

    The Understanding Cisco Wireless Foundations (WLFNDU) training teaches you the knowledge and skills you need to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of RF technology, industry standards for Wi-Fi and security, how to design, install, and configure a WLAN network of any size, and using Cisco DNA Center. This training also earns you 30 Continuing Education (CE) credits towards recertification.

    This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. This course also earns you 40 Continuing Education (CE) credits towards recertification.

     

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • FT-FCT: FortiClient EMS Training

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn how to use the FortiClient EMS feature, provision FortiClient endpoints, FortiClient EMS Security Fabric integration, explore different editions of FortiClient, and deploy and configure ZTNA agent and endpoint security features. These fundamentals of the product will provide you with a solid understanding of how to deploy, manage and maintain endpoint security using FortiClient EMS products

    In interactive labs, you will explore the FortiClient installation and features. You will also explore EMS components, database management, operation modes, how to deploy FortiClient, and more. These administration fundamentals will provide you with a solid understanding of how to implement and manage endpoint security and the Security Fabric.

  • FT-EDR: FortiEDR

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

  • FT-FSR-ADM: FortiSOAR Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment. You will learn about various system customization options, HA deployment, security management using role-based access control (RBAC), and various system monitoring tools.

  • FT-AWS-CDS: AWS Cloud Security Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about the different components that make up the Amazon Web Services (AWS) infrastructure and the security challenges these environments present, including high availability (HA), load balancing, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.

  • FT-AZR-CDS: Azure Cloud Security Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about the different components that make up the Microsoft Azure infrastructure and the security challenges these environments present, including high availability (HA), autoscaling, Azure Virtual WAN, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • ECMS: Engineering Cisco Meraki Solutions

    Price range: RM9,500.00 through RM10,850.00
    4 Days ILT, VILT

    The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.

    This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • GCP-MPGC: ML Pipelines on Google Cloud

    Price range: RM9,600.00 through RM10,442.00
    4 Days ILT, VILT

    In this GCP-MPGC: ML Pipelines on Google Cloud course, you will learn about TensorFlow Extended (or TFX), which is Google’s production machine learning platform based on TensorFlow for management of ML pipelines and metadata. The first few modules discuss pipeline components, pipeline orchestration with TFX, how you can automate your pipeline through CI/CD, and how to manage ML metadata.

    Then we will discuss how to automate and reuse ML pipelines across multiple ML frameworks such as tensorflow, pytorch, scikit learn, and xgboost. You will also learn how to use Cloud Composer to orchestrate your continuous training pipelines, and MLflow for managing the complete machine learning life cycle.

  • -20%

    EDU-VSOSS: VMware vSphere: Operate, Scale and Secure [V8]

    Price range: RM9,600.00 through RM12,000.00
    5 Days ILT, VILT

    Enterprise workload platform for traditional and next gen apps.

    This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect.

    Attend this VMware course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.

    Product Alignment

    • VMware ESXi 8.0
    • VMware vCenter 8.0
  • 4 Days ILT, VILT

    Take your customer conversations to the next level.

    In this GCP-CXCCES: Customer Experiences with Contact Center AIDialogflow ES course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow ES to create virtual agents and test them using the simulator.

    Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures. Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • 4 Days ILT, VILT

    Empower your business with Dialogflow CX’s Advanced AI capabilities.

    In this Google Cloud course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow CX to create virtual agents and test them using the simulator. Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures.

    Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • -20%

    EDU-VSTS8: VMware vSphere: Troubleshooting [V8]

    Original price was: RM12,000.00.Current price is: RM9,600.00.
    5 Days ILT, VILT

    Troubleshoot VMware vSphere 8 Like a Pro

    Are you looking to enhance your troubleshooting skills for VMware vSphere 8? Look no further than this five-day training course, designed to equip you with the knowledge, skills, and abilities to troubleshoot even the most complex issues.

    Through hands-on training, you’ll learn how to use the command-line interface, VMware vSphere® Client™, log files, and other essential tools to analyze and solve problems. This course will increase your skill level and competence in troubleshooting the VMware vSphere 8 environment.

    From basic troubleshooting techniques to advanced problem resolution strategies, this course covers it all. You’ll learn how to identify and resolve performance issues, networking problems, storage issues, and more.

  • 4 Days ILT, VILT

    Develop microservice-based applications in Java EE with Micro Profile and OpenShift   Building on Red Hat Application Development I: Programming in Java EE (AD183), the introductory course for Java EE application development, Red Hat Application Development II: Implementing Microservice Architectures with exam (DO284) emphasizes learning architectural principles and implementing microservices in Java EE, primarily based on Micro Profile with WildFly Swarm and OpenShift. You will build on Java EE application development fundamentals and focus on how to develop, monitor, test, and deploy modern microservices applications. Many enterprises are looking for a way to take advantage of cloud-native architectures, but many do not know the best way to go about it. These enterprises have monolithic applications written in Java Enterprise Edition (JEE).   The Red Hat Certified Enterprise Microservices Developer exam (EX283) is included in this bundle. This course is based on Red Hat® Enterprise Application Platform 7.4 and Wildfly Swarm 2018.3.3.

  • 5 Days VILT

    The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals.

    You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.

  • 5 Days ILT, VILT

    The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course is a new five-days ILT class that is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks.

    The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks.

  • 5 Days ILT, VILT

    The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco® routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully.

  • 5 Days ILT, VILT

    The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. This Cisco training course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools.

    In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course also earns you 30 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.

    As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.

Go to Top