You searched for: ""

  • CT-Tech: CompTIA Tech+

    Price range: RM2,800.00 through RM3,151.00
    3 Days ILT, VILT

    CompTIA Tech+ is the foundational certification program designed to build essential tech knowledge across a range of essential domains and provide instructors with the tools they need to guide learners toward a successful career in tech.

    As one of the top IT certifications for beginners globally, this course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.

  • 2 Days ILT, VILT

    Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.

    ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

    As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.

    AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:

    • Evaluate and secure AI-enabled systems across the enterprise
    • Integrate AI into existing security operations and workflows
    • Identify and respond to risks tied to AI technologies
    • Reinforce governance, compliance and responsible innovation
  • -17%

    AWS-AAIF: Agentic AI Foundations

    Price range: RM1,500.00 through RM1,800.00
    1 Day ILT, VILT

    This one-day Agentic AI Foundations course guides you through building autonomous, goal-driven AI agents using AWS technologies.

    What will you get out of this course:

    • Understand how Agentic AI differs from traditional conversational systems
    • Explore tools such as Amazon Q, Kiro, and Amazon Bedrock Agents/AgentCore
    • Learn design patterns, architectural strategies, and observability practices for agent systems

    By the end of the course, you will be able to:

    • Distinguish between workflow, autonomous, and hybrid agents
    • Select suitable AWS services for agent development
    • Develop basic implementation patterns and interoperability strategies
    • Explain how to monitor, optimize, and scale agentic systems
  • 1 Day ILT, VILT

    This course provides a comprehensive guide to designing and implementing platform engineering within modern enterprises. It covers the foundational principles, strategic alignment with business goals, and the practical aspects of building scalable, secure, and future-proof platforms.

    By taking this course, learners will gain the knowledge and skills needed to enhance developer productivity, ensure operational excellence, and drive continuous innovation.

  • 1 Day ILT, VILT

    Build intelligent Microsoft Teams apps using the LLMs and AI components of your choice with Teams AI Library. These custom copilots can also be used to extend Microsoft Copilot for Microsoft 365.

  • 3 Days ILT, VILT

    This intensive three-day, instructor-led course provides certified professionals with the knowledge and hands-on experience to master Trend Vision One’s SecOps capabilities.

    You will delve into the concepts of Security Operations, learn how to connect Trend Micro and third-party products, install SecOps sensors, navigate workbenches, incorporate threat intelligence, search the data lake, and automate responses using Security Playbooks.

    Through a combination of expert instruction and hands-on lab exercises, you will gain the practical skills necessary to effectively utilize Trend Vision One for comprehensive threat detection. investigation, and response.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 1 Day

    Welcome to “Supercharging Productivity with Gemini in Google Workspace.” In the modern workplace, efficiency is not just about working harder, but smarter. Your Google Workspace (Docs, Sheets, Slides, Gmail, etc.) is the hub of your daily activity.

    This course is designed to transform your relationship with these familiar tools by integrating the power of Gemini directly into your workflow. We will move beyond theory to provide hands-on, practical strategies for using Gemini as an intelligent collaborator within your documents, spreadsheets, presentations, and communications, turning everyday tasks into opportunities for accelerated productivity and innovation.

  • 1 Day ILT, VILT

    This course explores how to work smarter with Copilot in Microsoft Fabric. Learn how to integrate, transform, store data, and create insightful reports using Copilot in Microsoft Fabric.

    • Level: Intermediate
    • Product: Microsoft Fabric
    • Role: Data Analyst, Data Engineer, Data Scientist
    • Subject: Data analytics, Data engineering, Data integration, Data management, Data modeling, Data storage, Data visualization
  • -20%

    EDU-VCFBMS: VMware Cloud Foundation: Build, Manage, and Secure [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates.

    In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.

  • -20%

    EDU-VCFAOP: VMware Cloud Foundation: Automate and Operate [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in automating and operating a VCF private cloud using VMware Cloud Foundation® Automation and VMware Cloud Foundation® Operations.

    • learn about the architecture of VCF Automation, provider and organization management, provider and organization networking, and content library management.
    • covers blueprints, catalogs, Supervisor management, and deploying workloads using the Catalog and IaaS portals.
    • learn about VCF Operations overview, architecture, and navigating the user interface.
    • explore customizing alerts, views, reports, dashboards, and policies.
    • explains VCF logs, storage, and network operations, health and diagnostics, service discovery, and application monitoring concepts.
  • EDU-VCFSAD: VMware Cloud Foundation: Solution Architecture and Design [V9.0]

    Price range: RM12,400.00 through RM13,500.00
    5 Days ILT, VILT

    This five day course explores the architecture and design considerations for an initial deployment of VMware Cloud Foundation (VCF).

    The course explains the architecture framework and language, as well as design considerations for building, operationalizing, and consuming a VMware Cloud Foundation deployment. The scope of the course is centered on the core design considerations applicable to a VMware Cloud Foundation deployment in a single site.

  • -20%

    EDU-VCFTS: VMware Cloud Foundation: Troubleshooting [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This comprehensive five-day hands-on training is designed to provide you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware Cloud Foundation® (VCF) 9.0 environments.

    This course blends lecture and hands-on lab exercises to deliver advanced skills to diagnose and resolve problems in VMware Cloud Foundation 9.0 environments. This course also focuses on investigating and resolving problems and analyzing log files to help you recognize log file entries that identify root causes.

  • 1 Day ILT, VILT

    This course is an introduction to data analytics on Google Cloud.

    It is designed for learners who have no prior experience with data analytics or Google Cloud. The course covers the basics of data analysis, including collection, storage, exploration, visualization, and sharing. It also introduces learners to Google Cloud’s data analytics tools and services.

    Through video lectures, demos, quizzes, and hands-on labs, the course demonstrates how to go from raw data to impactful visualizations and dashboards.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 2 Days ILT, VILT

    Learn how to design and build data processing systems.

    LookML not only serves as the foundation for visualization assets in Looker, but is also capable of dynamic aggregations, incrementally refreshed persistent derived tables, and more. In this course you will practice the skills to be an advanced Looker Developer through guided lectures and independent exercises using sample data.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 3 Days ILT, VILT

    Discover how to modernize, manage, and observe applications at scale using Google Kubernetes Engine Enterprise. This course uses lectures and hands-on labs to help you explore and deploy using Google Kubernetes Engine (GKE), GKE Fleets, Cloud Service Mesh, and Config Controller capabilities that will enable you to work with modern applications, even when they are split among multiple clusters hosted by multiple providers.

  • SPRI: Implementing Cisco Service Provider Advanced Routing Solutions

    Price range: RM13,000.00 through RM14,350.00
    5 Days ILT, VILT

    The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.

    This training prepares you for the 300-510 SPRI. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.

  • 1 Day ILT, VILT

    In the digital age, data is a vital asset—powering businesses, enabling innovation, and driving public services. However, the increased reliance on data also brings significant risks and responsibilities. Recognising this, the Malaysian government has taken major strides in strengthening the legal and regulatory landscape around cybersecurity, personal data protection, and data sharing.

    This comprehensive 1-day workshop is designed to provide participants with a clear and practical understanding of Malaysia’s current and emerging legislative framework governing cybersecurity, privacy, and data sharing. It is tailored for professionals across both the public and private sectors who need to understand how these laws impact their operations, compliance obligations, and data governance strategies.

    Participants will gain in-depth insights into the following key legislations:

    • Cyber Security Act 2024 (Act 854)  – Explore the newly enacted law governing critical national infrastructure, incident reporting requirements, and enforcement mechanisms for cybersecurity threats.
    • Personal Data Protection Act 2010 (Act 709) – Revisit the cornerstone legislation regulating the processing of personal data in commercial transactions.
    • Personal Data Protection (Amendment) Act 2024 (Act A1727) – Understand the significant amendments made in 2024, including new obligations, rights, and penalties.
    • Data Sharing Act 2025 (Act 864) – Learn how the new framework governs the sharing of data within the public sector, including standards for secure and ethical data exchange.
    • Through a mix of presentations, case studies, and interactive discussions, participants will be equipped to navigate compliance, manage risks, and foster a culture of data responsibility in their organisations.
  • 4 Days ILT, VILT

    This course is intended to give architects, engineers, and developers the skills required to help enterprise customers architect, plan, execute, and test database migration projects. Through a combination of presentations, demos, and hands-on labs participants move databases to GCP while taking advantage of various GCP services.

    This course covers how to move on-premises, enterprise databases like SQL Server to Google Cloud (Compute Engine and Cloud SQL) and Oracle to Google Cloud bare metal.

  • 3 Days ILT, VILT

    In this course, you learn about Cloud Spanner. You will get an introduction to Cloud Spanner and understand how it differs from other database products. You also learn when and how to use Cloud Spanner to solve your relational database needs at scale.

  • 3 Days ILT, VILT

    In this course, you learn how to design APIs, and how to use OpenAPI specifications to document them. You learn about the API life cycle, and how the Apigee API platform helps you manage all aspects of the life cycle.

    You learn how APIs can be designed using API proxies, and how APIs are packaged as API products to be used by app developers. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, build, secure, deploy, and manage API solutions using Google Cloud’s Apigee API Platform.

  • 3 Days ILT, VILT

    This course introduces you to the fundamentals and advanced practices used to install and manage Google Cloud’s Apigee API Platform for private cloud. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, install, secure, manage, and scale the Apigee API Platform for Private Cloud.

  • 2 Days ILT, VILT

    This 2-day course introduces learners to Google Cloud’s data integration capability using Cloud Data Fusion. In this course, we discuss challenges with data integration and the need for a data integration platform (middleware). We then discuss how Cloud Data Fusion can help to effectively integrate data from a variety of sources and formats and generate insights.

    We take a look at Cloud Data Fusion’s main components and how they work, how to process batch data and real time streaming data with visual pipeline design, rich tracking of metadata and data lineage, and how to deploy data pipelines on various execution engines.

Go to Top