You searched for: ""

  • 5 Days ILT, VILT

    Attackers never rest, and along with all the traditional threats targeting internal networks and systems, an entirely new variety specifically targeting the cloud has emerged.

    As more organizations adopt cloud-based systems, new complexities and challenges surface and the risks increase. Organizations need cloud security professionals with the requisite knowledge, skills and abilities to be able to audit, assess and secure cloud infrastructures.

    To address this need, ISC2 and the Cloud Security Alliance (CSA) have developed the Certified Cloud Security Professional (CCSP) certification. This top cybersecurity credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.

    In this 5-day course you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this ISC2 Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official ISC2 CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • FT-FCT: FortiClient EMS Training

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn how to use the FortiClient EMS feature, provision FortiClient endpoints, FortiClient EMS Security Fabric integration, explore different editions of FortiClient, and deploy and configure ZTNA agent and endpoint security features. These fundamentals of the product will provide you with a solid understanding of how to deploy, manage and maintain endpoint security using FortiClient EMS products

    In interactive labs, you will explore the FortiClient installation and features. You will also explore EMS components, database management, operation modes, how to deploy FortiClient, and more. These administration fundamentals will provide you with a solid understanding of how to implement and manage endpoint security and the Security Fabric.

  • FT-EDR: FortiEDR

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

  • FT-FSR-ADM: FortiSOAR Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment. You will learn about various system customization options, HA deployment, security management using role-based access control (RBAC), and various system monitoring tools.

  • FT-AWS-CDS: AWS Cloud Security Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about the different components that make up the Amazon Web Services (AWS) infrastructure and the security challenges these environments present, including high availability (HA), load balancing, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.

  • FT-AZR-CDS: Azure Cloud Security Administrator

    Price range: RM9,500.00 through RM10,400.00
    2 Days ILT, VILT

    In this course, you will learn about the different components that make up the Microsoft Azure infrastructure and the security challenges these environments present, including high availability (HA), autoscaling, Azure Virtual WAN, and software-defined networking (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • GCP-MPGC: ML Pipelines on Google Cloud

    Price range: RM9,600.00 through RM10,442.00
    4 Days ILT, VILT

    In this GCP-MPGC: ML Pipelines on Google Cloud course, you will learn about TensorFlow Extended (or TFX), which is Google’s production machine learning platform based on TensorFlow for management of ML pipelines and metadata. The first few modules discuss pipeline components, pipeline orchestration with TFX, how you can automate your pipeline through CI/CD, and how to manage ML metadata.

    Then we will discuss how to automate and reuse ML pipelines across multiple ML frameworks such as tensorflow, pytorch, scikit learn, and xgboost. You will also learn how to use Cloud Composer to orchestrate your continuous training pipelines, and MLflow for managing the complete machine learning life cycle.

  • 4 Days ILT, VILT

    Take your customer conversations to the next level.

    In this GCP-CXCCES: Customer Experiences with Contact Center AIDialogflow ES course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow ES to create virtual agents and test them using the simulator.

    Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures. Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • 4 Days ILT, VILT

    Empower your business with Dialogflow CX’s Advanced AI capabilities.

    In this Google Cloud course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow CX to create virtual agents and test them using the simulator. Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures.

    Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • 4 Days ILT, VILT

    This course is intended to give architects, engineers, and developers the skills required to help enterprise customers architect, plan, execute, and test database migration projects. Through a combination of presentations, demos, and hands-on labs participants move databases to GCP while taking advantage of various GCP services.

    This course covers how to move on-premises, enterprise databases like SQL Server to Google Cloud (Compute Engine and Cloud SQL) and Oracle to Google Cloud bare metal.

  • 4 Days ILT, VILT

    Develop microservice-based applications in Java EE with Micro Profile and OpenShift   Building on Red Hat Application Development I: Programming in Java EE (AD183), the introductory course for Java EE application development, Red Hat Application Development II: Implementing Microservice Architectures with exam (DO284) emphasizes learning architectural principles and implementing microservices in Java EE, primarily based on Micro Profile with WildFly Swarm and OpenShift. You will build on Java EE application development fundamentals and focus on how to develop, monitor, test, and deploy modern microservices applications. Many enterprises are looking for a way to take advantage of cloud-native architectures, but many do not know the best way to go about it. These enterprises have monolithic applications written in Java Enterprise Edition (JEE).   The Red Hat Certified Enterprise Microservices Developer exam (EX283) is included in this bundle. This course is based on Red Hat® Enterprise Application Platform 7.4 and Wildfly Swarm 2018.3.3.

  • 5 Days VILT

    The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals.

    You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.

  • 5 Days ILT, VILT

    The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course is a new five-days ILT class that is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks.

    The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks.

  • 5 Days ILT, VILT

    The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco® routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully.

  • 5 Days ILT, VILT

    The Understanding Cisco Collaboration Foundations (CLFNDU) course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. This Cisco training course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools.

    In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course also earns you 30 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.

    As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.

  • 5 Days ILT, VILT

    Program management is the centralized, coordinated management of a program to achieve the program’s strategic benefits and objectives. Organizations are increasingly seeking to better integrate and coordinate multiple projects to deliver business value.

    A Program Management Professional (PgMP) oversees programs, defines projects and assigns project managers.​ Be recognized for your Elite-level Capabilities PgMP certification is PMI’s most elite qualification – proving that you have the advanced experience, knowledge, and skills necessary to define and oversee multiple projects, and deliver on important organizational objectives.

    The Project Management Institute (PMI)®’s Program Management Professional (PgMP)® credential defines the global standard of best practices for program management professionals. As a result of attending this course, you will be equipped with the knowledge and skills to successfully deliver programs in the real world and prepare for the PgMP® certification exam. Good Program Management practices are crucial for a successful Program Benefits. Delivering timely and maximizing resources to produce quality results are crucial.

  • 5 Days ILT, VILT

    Leading the way to an inclusive Internet for the Future.

    The Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.0 course is designed to provide you with the foundational knowledge for the suite of Cisco® CCNP® Service Provider courses. The course expands what you learned from the Cisco CCNA course with a focus on theoretical and practical knowledge needed for the Service Provider environment.

    Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. This course also earns you 30 Continuing Education (CE) credits towards recertification.

  • 5 Days ILT, VILT

    Rocheston Certified Cybercrime Investigator

    The RCCI (Rocheston Certified Cybercrime Investigator) course offered by Rocheston will equip you with the necessary tools and skillsets to become a cybercrime investigator, a role that is expected to see increased demand over the next few years.

  • 5 Days ILT, VILT

    The Rocheston Certified Artificial Intelligence Engineer (RCAI) training and certification program is a professional certification course that equips students with a profound understanding of the algorithms, applications, and tools used for Artificial Intelligence (AI) in today’s digital world.

    The RCAI training program is designed by Rocheston, a pioneering company in cybersecurity training and certification. It provides specialization in AI and its increasing role in several industries. It aims to prepare the students to solve complex AI problems and applications. Post certification, the students can work as AI Engineers or any interdisciplinary roles related to AI in corporate and industries.

    Also, the RCAI program series are accordant with CE standard, a high standard within Rocheston’s cybersecurity framework which ensures the candidates are learning the best and latest in the innovation field.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

Go to Top