Build intelligent Microsoft Teams apps using the LLMs and AI components of your choice with Teams AI Library. These custom copilots can also be used to extend Microsoft Copilot for Microsoft 365.
-
This course provides a comprehensive guide to designing and implementing platform engineering within modern enterprises. It covers the foundational principles, strategic alignment with business goals, and the practical aspects of building scalable, secure, and future-proof platforms.
By taking this course, learners will gain the knowledge and skills needed to enhance developer productivity, ensure operational excellence, and drive continuous innovation.
-
-17%
This one-day Agentic AI Foundations course guides you through building autonomous, goal-driven AI agents using AWS technologies.
What will you get out of this course:
- Understand how Agentic AI differs from traditional conversational systems
- Explore tools such as Amazon Q, Kiro, and Amazon Bedrock Agents/AgentCore
- Learn design patterns, architectural strategies, and observability practices for agent systems
By the end of the course, you will be able to:
- Distinguish between workflow, autonomous, and hybrid agents
- Select suitable AWS services for agent development
- Develop basic implementation patterns and interoperability strategies
- Explain how to monitor, optimize, and scale agentic systems
-
This intensive three-day, instructor-led course provides certified professionals with the knowledge and hands-on experience to master Trend Vision One’s SecOps capabilities.
You will delve into the concepts of Security Operations, learn how to connect Trend Micro and third-party products, install SecOps sensors, navigate workbenches, incorporate threat intelligence, search the data lake, and automate responses using Security Playbooks.
Through a combination of expert instruction and hands-on lab exercises, you will gain the practical skills necessary to effectively utilize Trend Vision One for comprehensive threat detection. investigation, and response.
-
The only true blue team network defense program!
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.
The only program built for the world’s largest work-from-home experiment!
Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:
- Only comprehensive network defense program built to incorporate critical
secure network skills – Protect, Detect, Respond and Predict - Maps to NICE 2.0 Framework
- Comes packed with the latest tools, technologies, and techniques
- Deploys a hands-on approach to learning
- Designed with an enhanced focus on Threat Prediction, Business Continuity
and Disaster Recovery
- Only comprehensive network defense program built to incorporate critical
-
In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.
The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.
The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.
The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.
-
This course explores how to work smarter with Copilot in Microsoft Fabric. Learn how to integrate, transform, store data, and create insightful reports using Copilot in Microsoft Fabric.
- Level: Intermediate
- Product: Microsoft Fabric
- Role: Data Analyst, Data Engineer, Data Scientist
- Subject: Data analytics, Data engineering, Data integration, Data management, Data modeling, Data storage, Data visualization
-
-20%
This comprehensive five-day hands-on training is designed to provide you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware Cloud Foundation® (VCF) 9.0 environments.
This course blends lecture and hands-on lab exercises to deliver advanced skills to diagnose and resolve problems in VMware Cloud Foundation 9.0 environments. This course also focuses on investigating and resolving problems and analyzing log files to help you recognize log file entries that identify root causes.
-
This five day course explores the architecture and design considerations for an initial deployment of VMware Cloud Foundation (VCF).
The course explains the architecture framework and language, as well as design considerations for building, operationalizing, and consuming a VMware Cloud Foundation deployment. The scope of the course is centered on the core design considerations applicable to a VMware Cloud Foundation deployment in a single site.
-
-20%
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in automating and operating a VCF private cloud using VMware Cloud Foundation® Automation and VMware Cloud Foundation® Operations.
- learn about the architecture of VCF Automation, provider and organization management, provider and organization networking, and content library management.
- covers blueprints, catalogs, Supervisor management, and deploying workloads using the Catalog and IaaS portals.
- learn about VCF Operations overview, architecture, and navigating the user interface.
- explore customizing alerts, views, reports, dashboards, and policies.
- explains VCF logs, storage, and network operations, health and diagnostics, service discovery, and application monitoring concepts.
-
-20%
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates.
In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.
-
Discover how to modernize, manage, and observe applications at scale using Google Kubernetes Engine Enterprise. This course uses lectures and hands-on labs to help you explore and deploy using Google Kubernetes Engine (GKE), GKE Fleets, Cloud Service Mesh, and Config Controller capabilities that will enable you to work with modern applications, even when they are split among multiple clusters hosted by multiple providers.
-
Learn how to design and build data processing systems.
LookML not only serves as the foundation for visualization assets in Looker, but is also capable of dynamic aggregations, incrementally refreshed persistent derived tables, and more. In this course you will practice the skills to be an advanced Looker Developer through guided lectures and independent exercises using sample data.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
This course is an introduction to data analytics on Google Cloud.
It is designed for learners who have no prior experience with data analytics or Google Cloud. The course covers the basics of data analysis, including collection, storage, exploration, visualization, and sharing. It also introduces learners to Google Cloud’s data analytics tools and services.
Through video lectures, demos, quizzes, and hands-on labs, the course demonstrates how to go from raw data to impactful visualizations and dashboards.
Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.
-
The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.
This training prepares you for the 300-510 SPRI. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.
-
Welcome to “Supercharging Productivity with Gemini in Google Workspace.” In the modern workplace, efficiency is not just about working harder, but smarter. Your Google Workspace (Docs, Sheets, Slides, Gmail, etc.) is the hub of your daily activity.
This course is designed to transform your relationship with these familiar tools by integrating the power of Gemini directly into your workflow. We will move beyond theory to provide hands-on, practical strategies for using Gemini as an intelligent collaborator within your documents, spreadsheets, presentations, and communications, turning everyday tasks into opportunities for accelerated productivity and innovation.
-
In the digital age, data is a vital asset—powering businesses, enabling innovation, and driving public services. However, the increased reliance on data also brings significant risks and responsibilities. Recognising this, the Malaysian government has taken major strides in strengthening the legal and regulatory landscape around cybersecurity, personal data protection, and data sharing.
This comprehensive 1-day workshop is designed to provide participants with a clear and practical understanding of Malaysia’s current and emerging legislative framework governing cybersecurity, privacy, and data sharing. It is tailored for professionals across both the public and private sectors who need to understand how these laws impact their operations, compliance obligations, and data governance strategies.
Participants will gain in-depth insights into the following key legislations:
- Cyber Security Act 2024 (Act 854) – Explore the newly enacted law governing critical national infrastructure, incident reporting requirements, and enforcement mechanisms for cybersecurity threats.
- Personal Data Protection Act 2010 (Act 709) – Revisit the cornerstone legislation regulating the processing of personal data in commercial transactions.
- Personal Data Protection (Amendment) Act 2024 (Act A1727) – Understand the significant amendments made in 2024, including new obligations, rights, and penalties.
- Data Sharing Act 2025 (Act 864) – Learn how the new framework governs the sharing of data within the public sector, including standards for secure and ethical data exchange.
- Through a mix of presentations, case studies, and interactive discussions, participants will be equipped to navigate compliance, manage risks, and foster a culture of data responsibility in their organisations.
-
This course introduces you to the fundamentals and advanced practices used to install and manage Google Cloud’s Apigee API Platform for private cloud. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, install, secure, manage, and scale the Apigee API Platform for Private Cloud.
-
In this course, you learn how to design APIs, and how to use OpenAPI specifications to document them. You learn about the API life cycle, and how the Apigee API platform helps you manage all aspects of the life cycle.
You learn how APIs can be designed using API proxies, and how APIs are packaged as API products to be used by app developers. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, build, secure, deploy, and manage API solutions using Google Cloud’s Apigee API Platform.
-
In this course, you learn about Cloud Spanner. You will get an introduction to Cloud Spanner and understand how it differs from other database products. You also learn when and how to use Cloud Spanner to solve your relational database needs at scale.
-
This course is intended to give architects, engineers, and developers the skills required to help enterprise customers architect, plan, execute, and test database migration projects. Through a combination of presentations, demos, and hands-on labs participants move databases to GCP while taking advantage of various GCP services.
This course covers how to move on-premises, enterprise databases like SQL Server to Google Cloud (Compute Engine and Cloud SQL) and Oracle to Google Cloud bare metal.
-
Launch your career in cybersecurity operations.
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) training provides an understanding of:
- network infrastructure devices, operations, and vulnerabilities of the TCP/IP protocol suite
- basic information security concepts
- common network application operations and attacks
- Windows and Linux operating systems
- types of data that are used to investigate security incidents
After completing this training, you will have the basic knowledge that is required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center (SOC).
This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Discover the key benefits of ITIL 4 and see how it can have a transformative impact on your career journey.
This essential ITIL 4 module introduces you to key concepts at the start of your ITIL 4 journey, providing a solid foundation for understanding IT service management and its core elements.
- Industry-recognized certification: Showcase your ability to excel in essential IT service management, and to handle critical tasks in the field.
- Employers’ first choice: Certify your expertise in managing IT services, making you the preferred choice for roles in IT service management and support.
- New career opportunities: Advance your career in IT with an ITIL certification, opening doors to new roles and cutting-edge opportunities in the evolving tech landscape.
What skills will you acquire?
- Service Operation: Develop operational support and analysis skills for ITSM activities, including monitoring and maintaining IT systems and infrastructure.
- Digital Transformation: Learn the processes involved in transforming IT systems to support a digital model. Learn how to collaborate with stakeholders, manage and lead plans.
- Problem Management: Learn how to reduce the likelihood and impact of incidents by identifying actual and potential causes of incidents and managing workarounds and known errors.
-
Dataplex is an intelligent data fabric that enables organizations to centrally discover, manage, monitor, and govern their data across data lakes, data warehouses, and data marts. You can use Dataplex to build a data mesh architecture to decentralize data ownership among domain data owners. In this course, you will learn how to discover, manage, monitor, and govern your data across data lakes, data warehouses, and data marts through guided lectures and independent exercises using sample data.









