You searched for: ""

  • 2 Days ILT, VILT

    The EASF: EXIN Agile Scrum Foundation certification is designed to test a professional’s fundamental understanding of agile principles and scrum methodology. It is especially useful for those leading or participating in projects. This EXIN Agile Scrum certification is especially interesting for professionals who work in areas including project management, software development, IT service management and business management.

    EXIN Agile Scrum Foundation offers professionals a unique certification that combines agile principles and scrum practices. The exam tests candidates on their understanding of key concepts and their application.

    MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).

  • 2 Days ILT, VILT

    Agile Scrum is about working together to successfully reach a goal. Agile methodologies are popular approaches in software development and are increasingly being used in other areas. Scrum practices include establishing cross-functional and self-managed teams, producing a working deliverable at the end of each iteration or Sprint. This EXIN Agile Scrum certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Scrum Master.

    This 2-days EXIN Agile Scrum Master certification with the assignment workshop course is designed to illustrate this best practice project management approach and give candidates an understanding of Agile as it should be managed within projects. Within project environments there will always be times where there is uncertainty and high volumes of change, and these should managed effectively.

    EXIN Agile Scrum Master is a certification that looks to confirm both skills and knowledge of the Agile framework and Scrum methodology.

    MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).

     

  • 2 Days ILT, VILT

    The EASPO: EXIN Agile Scrum Product Owner certification focuses on bringing value to the customer and value for the business, through Agile project management techniques. This certification is especially suitable for professionals working in the areas of project management, software development, IT service management and business management.

    EXIN Agile Scrum Product Owner tests a candidate’s skills and knowledge of Agile principles and Scrum practices specifically with the role of Product Owner in mind. This certification focuses on adopting Agile or Scrum in the workplace and taking on the role of Product Owner.

  • 4 Days ILT, VILT

    Explore the breadth and depth of Prism Central’s centralized management capabilities.

    If you already have experience with administering a Nutanix environment, this Nutanix Enterprise Cloud Administration course will extend, deepen, and broaden your knowledge as you grow in your career as a Nutanix administrator.

    Designed with Prism Central as the focal point, this Nutanix course illustrates the breadth and depth of Nutanix’s centralized management capabilities, and allows you to explore the wide variety of features that are available in this one, single web console.

    ECA is divided into four major sections:

    1. Understanding core Nutanix concepts, such as hyperconverged infrastructure (HCI) and the various Nutanix cloud solution packages. Also, the basic configuration of a cluster and the components that are needed to create and manage VMs – namely, networks and images.
    2. Creating and managing VMs, how to protect VMs and their data, how to apply storage optimization features at the VM level, and how to migrate your workloads to a Nutanix environment.
    3. Learn about alerts, events, log collection, reporting, and how to use various features in Prism Central to identify, analyze, and remediate performance issues.
    4. Learn how to set up a cluster for maintenance activities – such as starting and stopping nodes and clusters – and how to manage and upgrade licenses and installed software with just a few clicks.
  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 3 Days ILT, VILT

    Master the critical first line of cyber defense.

    EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

    This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

    The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.

    The E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH&R, from preparing/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

    With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.

    The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today`

  • ECMS: Engineering Cisco Meraki Solutions

    Price range: RM9,500.00 through RM10,850.00
    4 Days ILT, VILT

    The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.

    This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

    The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

    It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

    This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 3 Days ILT, VILT

    The Nutanix Enterprise Cloud Solution Design Boot Camp is designed to provide you with a technical deep dive into Nutanix-based solutions and the Nutanix solution design methodology, which is based on the Nutanix Platform Expert (NPX) Program. And has been used to consistently deliver business critical solutions to the most demanding customers – from SMB to the G2000.

    The goal of this three-day boot camp is to prepare you to engage with enterprise customers and design Nutanix Enterprise Cloud solutions that deliver real business value. The boot camp is led by an onsite team of dedicated NPX-certified instructors who will focus on designing multi-hypervisor solutions capable of supporting enterprise-class applications according to clearly defined service level agreements.

    During the boot camp you will be asked to choose a hypervisor, divide into teams, and engage in a multi-day, interactive role-play exercise to extract the business requirements, technical requirements, risks, and constraints that will shape their solutions. And requires daily design presentations from each team and participation in Q&A sessions with instructors and peers. You will be required to defend your team’s design decisions at each stage of the exercise.

    This is an intense and immersive learning experience that will change how you approach enterprise solution design and delivery. The cost of this bootcamp is completely covered, you will just be responsible for your own travel and expenses.

  • 5 Days ILT, VILT

    The gateway to acquire in-demand technical skills in cybersecurity.

    EC-Council Certified Security Specialist (ECSS) is an entry level cybersecurity certification covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

    This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

    From 9/11 to Hurricane Katrina to the recent WannaCry fiasco, the business community has been hit repeatedly by one disaster after another in the past decade and a half. The scary part is that the frequency is increasing exponentially in the past few years, thanks to the growing number of cyber-attacks.

    Even scarier is the study that shows that 2 out of 5 business still do not even have a disaster recovery and business continuity plan. And out of the ones that do, only about half of them even test it regularly to see if it is still relevant. Furthermore, industry experts have reiterated the fact in every forum possible, that the size of the business is irrelevant to having a recovery and business continuity plan. Everyone needs to have one to stay relevant in current times.

    This scenario can only be amended by trained BC/DR professionals who not only understand the gravity of the situation, but also are equipped to ensure that businesses are least impacted when a disaster strikes.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Go to Top