You searched for: ""

  • 5 Days ILT, VILT

    Lead Cybersecurity Manager

    Organizations nowadays are affected by the ever-evolving digital landscape and constantly face new threats and complex and sophisticated cyberattacks. There is a pressing need for skilled individuals capable of effectively managing and implementing robust cybersecurity programs to counter these threats. Our Lead Cybersecurity Manager training course has been developed to address this need.

    By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Additionally, this training course empowers participants to enhance their organization’s readiness and resilience against cyber threats. Participants will be well-prepared to support their organization’s ongoing cybersecurity efforts and make valuable contributions in today’s ever-evolving cybersecurity landscape.

  • 5 Days ILT, VILT

    Lead Pen Test Professional

    Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills.

    This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts.

    Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises.

  • 5 Days ILT, VILT

    ISO/IEC 27002 Lead Manager.

    The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.

  • 5 Days ILT, VILT

    Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.

    The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.

    These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.

    In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

  • 5 Days ILT, VILT

    Master the implementation and management of information security incident management processes based on ISO/IEC 27035.

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities.

    In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

  • 5 Days ILT, VILT

    The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities to help them ensure compliance with European Union’s Digital Operational Resilience Act (DORA).

  • 5 Days ILT, VILT

    ISO/IEC 27033 Lead Network Security Manager training course help participants gain a comprehensive understanding of the concepts, principles, methods, and design techniques used to implement and manage network security based on the ISO/IEC 27033 series of standards.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The Certified NIST Cybersecurity Consultant training course equips participants with the essential knowledge and skills required for cybersecurity compliance and resilience, based on NIST publications. It covers key NIST publications, including NIST SP 800-12 for information security fundamentals and best practices and NIST SP 800-53 for implementing security and privacy controls for information systems and organizations.

    This training course also covers the NIST risk management framework, guiding participants through the strategic management of cybersecurity risks. Additionally, participants can learn about NIST SP 800-171, focusing on protecting Controlled Unclassified Information in nonfederal systems and organizations.

    The course introduces the NIST Cybersecurity Framework’s core functions—Identify, Protect, Detect, Respond, and Recover— to effectively enhance an organization’s cybersecurity posture.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The PECB Chief Information Security Officer (CISO) training course is tailored for aspiring CISOs, providing them with the necessary knowledge, skills, and strategies to lead information security programs effectively and safeguard information and assets in today’s dynamic digital environment.

  • 3 Days ILT, VILT

    Whether you’re already delivering AI initiatives or eager to start, this certification gives you the structure and credibility to turn innovation into measurable, lasting value.

    With PMI-CPMAI you’ll learn how to:

    • Turn bold AI visions into clear, achievable project plans
    • Navigate fast-changing technologies without needing tool-specific training
    • Unite cross-functional teams around a shared process
    • Deliver outcomes that are ethical, measurable, and built to withstand business scrutiny

    No matter your role (Project Manager, technologist, data expert, or consultant) PMI-CPMAI helps you grow your skills and your career in a market that rewards professionals and AI-savvy leaders.

  • 5 Days ILT, VILT

    Learn how to automate Linux system administration tasks with Red Hat Ansible Automation Platform.

    Red Hat Enterprise Linux Automation with Ansible and exam (RH295) is designed for Linux system administrators and developers who need to automate provisioning, configuration, application deployment, and orchestration.

    The Red Hat Certified Engineer (RHCE) exam (EX294) is included in this offering. This offering is based on Red Hat® Enterprise Linux 9 and Red Hat Ansible Automation Platform 2.2.

  • 4 Days ILT, VILT

    Digital and information technologies have changed the world. Every aspect of life has been impacted in some way by technology that did not exist just 50 years ago. Digital and information technologies have disrupted the business world, but they have also provided the keys to success. Each wave of innovation brings opportunities and capabilities to those organizations that are willing to change how they think and work.

    The disruptive nature of innovations like artificial intelligence, machine learning, virtual working, and internet of things is compounded by the frequency of the innovations. Organizations must adapt quickly and repeatedly; continually adjusting their strategies.

    The IITL 4 Leader: Digital and IT Strategy course adds a new perspective to the ITIL 4 guidance and elevates the discussion to an organizational strategy level.

    The course enables IT and digital leaders to influence and drive strategic business decisions through creating an appropriate digital strategy aligned to the wider business goals, understanding how business and IT leaders respond to digital disruption and exploiting the ITIL 4 framework to support organizations on their challenging digital transformation journey.

    The course will cover how ITIL 4 can be integrated with emerging practices and new technologies to meet new internal and external challenges in the age of volatility, uncertainty, complexity and ambiguity (VUCA).

    In this course, there is a mandatory case study assessment for student to pass prior to taking up the actual exam. This assessment is an open-book assessment with the passing score of 75% (30 correct out of 40).

  • 5 Days ILT, VILT

    This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.

  • 5 Days ILT, VILT

    This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems.

  • 3 Days ILT, VILT

    This three-day EDU-VSD7: VMware vSphere: Design [V7] training course equips you with the knowledge, skills, and abilities to design a VMware vSphere® 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices.

    This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.

    Given a case study, you practice your design skills by working with peers on a design project.

    Product Alignment

    • VMware ESXi™ 7
    • VMware vCenter Server® 7

  • 3 Days ILT, VILT

    Customers demand a scalable, secure, and manageable VMware SD-WAN™ by VeloCloud®. To deliver a successful solution you must understand VMware SD-WAN architecture, know how the features can solve customer use cases, and be able to design a VMware SD-WAN that can be easily deployed, managed, and expanded.

  • EDU-VSD: VMware vSphere: Design [v8]

    Price range: RM7,650.00 through RM8,775.00
    3 Days ILT, VILT

    VMware vSphere: Design

    This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.

  • 4 Days ILT, VILT

    Architect a cloud-based infrastructure using Oracle Cloud Infrastructure services. Building on your skills obtained from the Oracle Cloud Infrastructure Administration Essentials course, explore deeper into the Oracle Cloud Infrastructure services to design and implement a secure and scalable cloud solution that meets HA and DR requirements. Design secure networks with disaster recovery options, and explore database capacity planning and advanced database features on OCI. Also explore the gamut of new services on OCI such as Streaming, Events, and Functions.

  • OCI-GAIP: Oracle Cloud Infrastructure AI Foundations: Hands-on Workshop

    Price range: RM7,750.00 through RM8,812.00
    4 Days ILT, VILT

    The Oracle Cloud Infrastructure (OCI) AI Foundations course aims to introduce beginners to AI and ML, with a specific focus on their practical applications within Oracle Cloud Infrastructure. You will gain a comprehensive overview of the AI landscape, the fundamentals of deep learning, and the role of generative AI and large language models (LLMs) in modern computing. Learn about OCI Generative AI Services, Oracle 23ai Vector Database, and other OCI AI Services, such as vision, speech, language, and document understanding, using a structured approach that is both effective and engaging.

  • 2 Days ILT, VILT

    This course teaches you the skills needed to install, configure, and operate Nutanix Era for the purpose of managing databases. The installation and management of databases themselves is not part of this course.

  • 2 Days ILT, VILT

    This course teaches you the skills needed to install, configure, operate, and manage Nutanix X-Play and Nutanix Calm.

  • 4 Days ILT

    The Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 course shows you how to deploy Snort® in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You’ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more.

  • SVPN: Implementing Secure Solutions with Virtual Private Networks

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.

    This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.

  • 4 Days ILT, VILT

    The Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco® Internetwork Operating System (Cisco IOS®) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting.

    Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, basic software operations, configuration file overview, Authentication, Authorization, and Accounting (AAA) services, Network Time Protocol (NTP) configuration, packet filtering, and management plane protection. You also learn how to monitor the Cisco IOS XR operating system, and how to work with error messages and core dumps.

Go to Top