You searched for: ""

  • 3 Days ILT, VILT

    Trend Vision One – Cloud Security is a leading cloud security platform that gives you complete visibility, prioritizes risks, and automates responses across different cloud environments.

    This course provides a comprehensive understanding of how to leverage Trend Vision One to secure your cloud environments. You will learn to implement and manage container security, file security, and cloud posture management within the Trend Vision One platform.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • -30%

    GCP-ADLLM: Application Development with LLMs on Google Cloud

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day ILT, VILT

    In this course, you explore tools and APIs available on Google Cloud for integrating large language models (LLMs) into your application.

    After exploring generative AI options on Google Cloud, you explore LLMs and prompt design in Vertex AI Studio. Then you learn about LangChain, an open-source framework for developing applications powered by language models.

    After a discussion around more advanced prompt engineering techniques, you put it all together to build a multi-turn chat application by using LangChain and the Vertex AI Gemini API.

  • -30%

    GCP-VAISC: Vertex AI Agent Builder

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day

    Vertex AI Agent Builder lets developers, even those with limited machine learning skills, tap into the power of Google’s foundation models, search expertise, and conversational AI technologies to create enterprise-grade generative AI applications.

    In this course, you learn how to use Vertex AI Agent Builder to create search engines and chat applications. You will then explore how to integrate these search engineers and chat applications into your own applications.

    Finally, you learn how to manage the tools built in Vertex AI Agent Builder in production.

  • -30%

    GCP-DEVEFF: Introduction to Developer Efficiency with Gemini on Google Cloud

    Original price was: RM2,400.00.Current price is: RM1,680.00.
    1 Day ILT, VILT

    Generative AI is now at the center of transforming how software is designed, built, run, and managed. For developers, generative AI is a powerful tool for making coding more efficient and using APIs, such as the Gemini and PaLM APIs, within their applications.

    In this course, you are introduced to how generative AI can be used to make developers more efficient at writing code and implementing new features into applications. You will also explore available models in Vertex AI Model Garden.

  • 2 Days ILT, VILT

    Learn the essential skills to migrate virtual machines to Red Hat OpenShift Virtualization.

    The Migrating Virtual Machines to Red Hat OpenShift Virtualization with Ansible Automation Platform (DO346) course provides the essential knowledge to migrate virtual machines to Red Hat OpenShift Virtualization by using carefully selected content from Managing Virtual Machines in Red Hat OpenShift Virtualization (DO316) and Automate and Manage Red Hat OpenShift Virtualization with Ansible (DO336). This Red Hat course provides a shorter learning path for IT professionals to migrate their virtualized workloads to OpenShift Virtualization.

    This course provides the following information and skills:

    • An introduction to key OpenShift and Kubernetes concepts, such as nodes, pods, and operators
    • Skills to deploy the OpenShift Virtualization operator
    • Skills to configure networking and storage for virtual machines
    • Strategies to migrate virtual machines from another hypervisor to OpenShift Virtualization by using the migration toolkit for virtualization operator and Ansible Automation Platform

    This course is based on OpenShift Container Platform 4.16, OpenShift Virtualization 4.16, and Ansible Automation Platform 2.4.

  • 1 Day ILT, VILT

    Learn how to migrate existing CentOS Linux servers to supported versions of Red Hat Enterprise Linux.

    The RH174: Managing CentOS Migrations and RHEL Upgrades course will enable customers to transition successfully from CentOS Linux to Red Hat Enterprise Linux. It also enables them to upgrade from one major version of RHEL to the next. This course provides an overview of the migration process and discusses how to avoid and mitigate risks. “Managing CentOS Migrations and RHEL Upgrades” will help users to move from CentOS Linux to RHEL, or to upgrade to a newer version of RHEL.

  • 5 Days ILT, VILT

    Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.

    Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 3 Days ILT, VILT

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

  • -30%

    GCP-DWBQ: Data Warehousing with BigQuery: Storage Design, Query Optimization, and Administration

    Original price was: RM7,200.00.Current price is: RM5,040.00.
    3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • 5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

  • 2 Days ILT, VILT

    This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server.

    Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

  • 3 Days ILT, VILT

    Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of troubleshooting the full line of Palo Alto Networks next-generation firewalls.
    Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall.

    Completing this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.

  • 5 Days ILT, VILT

    The Prisma SD-WAN Design and Operation course introduces you to Palo Alto Networks next-generation Prisma SDWAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.

    This course is intended for people who must configure, maintain, and use wide-area networks that connect data centers, branch offices, and cloud-based assets and infrastructures.

  • 4 Days ILT, VILT

    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in public cloud security and cybersecurity or anyone wanting to learn how to secure remote networks and mobile users.

  • 2 Days ILT, VILT

    This instructor- led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the  Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution .

    Multiple modules focus on how to leverage the collected data. You will create simple search queries in on e module an d XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact- related data, such as IP and Hash Views. Addition ally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external- data collection capabilities, including the use of Cortex XDR API to receive external alerts.

  • 3 Days ILT, VILT

    This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.

    The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. It concludes by discussing basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 2 Days ILT, VILT

    Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in Computer Forensics Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach.

  • -10%

    CEA-C01: Alibaba Cloud Engineer

    Original price was: RM4,000.00.Current price is: RM3,600.00.
    2 Days ILT, VILT

    A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    CAP-C01: Alibaba Cloud Architect

    Original price was: RM4,000.00.Current price is: RM3,600.00.
    2 Days ILT, VILT

    A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • CT-DX: CompTIA DataX

    Price range: RM3,500.00 through RM5,790.00
    5 Days ILT, VILT

    Professionals in the data field looking to upskill and close existing knowledge gaps will benefit from CompTIA DataX. This new certification falls under CompTIA Xpert — a new series of certifications and trainings offered through CompTIA that are geared towards professionals who are looking to gain expert knowledge in business-critical technologies.

    DataX equips highly experienced professionals with essential skills that meet the demands of the rapidly evolving field of data science. Learners will have access to a comprehensive curriculum that covers concepts ranging from the foundations of machine learning to more specialized data science applications.

    While covering these emerging concepts, learners won’t spend time revisiting familiar concepts that they’ve already encountered in their careers. Instead, DataX helps learners focus their efforts on filling existing knowledge gaps due to a lack of available training.

  • -10%

    BUF-C01: Alibaba Cloud Business User (Practitioner)

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    SOA-C01: Alibaba Cloud SysOps Administrator

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A SysOps Administrator manages, deploys, and optimizes Alibaba Cloud infrastructure to ensure performance, security, and cost-efficiency. This role involves implementing observability, automating processes for scalability and reliability, managing user permissions to protect resources, and applying cost optimization strategies to control expenses.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    CSA-C01: Alibaba Cloud Security Engineer

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Cloud Security Engineer is responsible for securing cloud workloads on Alibaba Cloud by implementing and managing robust security policies, practices, and technologies. This role emphasizes safeguarding applications and data from potential threats and vulnerabilities. The Cloud Security Engineer works closely with other roles to enhance the overall security posture

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • -10%

    GAA-C01: Alibaba Cloud Generative AI Engineer

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Generative AI Engineer is responsible for understanding generative AI concepts and Alibaba Cloud technologies that can be used to deploy such applications. This role focuses on identifying and describing appropriate generative AI services and solutions, playing a key part in the organization’s exploration of AI capabilities.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 1 Day ILT, VILT

    This course explores extending Copilot’s capabilities with Microsoft Graph connectors and custom engine copilots, guiding participants to choose the best development path. It concludes with agent management in the Microsoft 365 admin center.

  • 180 Days ILT, VILT

    The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.

    This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.

    This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

    In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

    This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • 3 Days ILT, VILT

    This course introduces you to fundamentals, practices, capabilities and tools applicable to modern cloud-native application development using Google Cloud Run.

    Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, implement, deploy, secure, manage, and scale applications on Google Cloud using Cloud Run.

  • 5 Days ILT, VILT

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities. In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

Go to Top