You searched for: ""

  • CT-CSX: CompTIA SecurityX

    Price range: RM4,500.00 through RM6,246.00
    5 Days ILT, VILT

    CompTIA SecurityX serves as the capstone certification in the CompTIA Cybersecurity Career Pathway, intended to be the final certification for those seeking to prove their mastery of advanced cybersecurity skills.

    Targeted at professionals with 5 to 10 years of experience, SecurityX represents the pinnacle of cybersecurity certifications. It is specifically designed for senior security engineers and security architects tasked with leading and improving an enterprise’s cybersecurity readiness.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • CT-DAI: CompTIA DataAI (formerly DataX)

    Price range: RM4,500.00 through RM6,246.00
    5 Days ILT, VILT

    CompTIA DataAI is an expert-level certification designed for experienced data professionals ready to work at the intersection of data science, AI, and enterprise operations.

    The certification targets senior data analysts, data scientists, data engineers, and IT professionals who are already working with analytics, cloud platforms, and AI-enabled tools—and who want to move into more advanced, AI-infused roles.

    Aligned with CompTIA’s Xpert Series, DataAI reflects how advanced data roles have evolved. Statistical rigor, machine learning, MLOps, and business outcomes are no longer separate concerns. The certification confirms that a professional can move beyond analysis into building trustworthy, scalable AI systems that deliver measurable results.

  • 4 Days ILT, VILT

    Learn to write easy to use and efficient control language (CL) programs which may be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input).

    You will learn to write Control Language (CL) programs which may be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input).

  • 4 Days ILT, VILT

    This introductory course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i. Focus is given to using the GUI (IBM i Access Client Solutions and IBM Navigator for i) as well as 5250 emulation sessions to perform tasks including job control, monitoring, sending messages, managing systems devices, and more. Hands-on exercises reinforce the lecture topics and prepare the student to successfully operate a Power System with IBM i.

  • 5 Days ILT, VILT

    Install, configure, and manage Red Hat JBoss Enterprise Application Platform

    Red Hat JBoss Application Administration I with exam teaches you the best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform 7. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively manage applications on JBoss Enterprise Application Platform.

    This course is a combination of AD248: Red Hat JBoss Application Administration I and includes the Red Hat Certified Specialist in Enterprise Application Server Administration exam (EX248).

    This course will cover best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7. This hands-on class covers the real-world tasks that a system administrator needs to know to deploy and manage applications on JBoss EAP. The topics in this course cover all of the exam objectives of the Red Hat Certified Specialist in Enterprise Application Server Administration exam.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 5 Days ILT, VILT

    Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.

    The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

    This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v11 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

    CHFI v11 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 4 Days ILT, VILT

    Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1.

    Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Deploy, configure, manage, and migrate virtual environments

    Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.

    This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM).

    Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Go to Top