This course is to equip senior leaders with the strategic, governance, and organisational capabilities required to design, adopt, and scale AI responsibly and competitively across the enterprise—while managing risk, cost, and long-term value.
-
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:
-
ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).
Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.
After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:
-
ISO/IEC 27005 Lead Risk Manager
The ISO/IEC 27005 Lead Risk Manager training course enables participants to acquire the necessary competencies to assist organizations in establishing, managing, and improving an information security risk management (ISRM) program based on the guidelines of ISO/IEC 27005.
Apart from introducing the activities required for establishing an information security risk management program, the training course also elaborates on the best methods and practices related to information security risk management.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:
-
Developing Generative AI Applications on AWS
What will you get from this course:
- Learn to build and customize AI solutions by using Amazon Bedrock programmatically
- Invoke foundation models through Amazon Bedrock APIs
- Implement Retrieval Augmented Generation (RAG) patterns with Amazon Bedrock Knowledge Bases
- Develop AI agents with tool integration
The course focuses on the practical implementation of prompt engineering techniques, responsible AI practices with Amazon Bedrock Guardrails, open source framework integration, and architectural patterns for real-world business applications.
This course includes presentations, demonstrations, hands-on labs, and group exercises.
Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation. The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.
Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get certified today!
-
A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.
This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.
This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.
Continuing Education: Earn 40 CE credits towards recertification
-
This NFSAD: ONTAP NFS Administration course extends the NFS information that is found in the ONTAP Cluster Administration course. This course reviews NFS and explores in more detail different NFS versions and the features of ONTAP 9 software that support the NFS protocol. The exercises are accomplished using ONTAP 9 software.
-
This Integrating Hybrid Clouds Foundation course describes the features and benefits of the NetApp® Cloud Volumes ONTAP® system. The course helps enable you to explain the architecture and functionality of cloud based ONTAP storage.
Also, the course introduces basic administration, configuration, and management of the Cloud Volumes ONTAP system that uses NetApp BlueXP™ (formerly NetApp Cloud Manager).
-
Identify the features and benefits of NetApp® ONTAP® 9 data management software. Understand the architecture and functionality of an ONTAP cluster. Learn the basics of how to configure and manage an ONTAP cluster by using the CLI, NetApp ONTAP System Manager, and NetApp BlueXP.
-
No involved lab condition for the Training On Demand course format This Oracle Database Cloud for Oracle DBAs training shows you how to regulate the Oracle Database Cloud Service. It’s optimal for existing DBAs who need to figure out how to manage Oracle Database in the cloud.







