You searched for: ""

  • 3 Days ILT, VILT

    Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.

    Camel development is organized around:

    • Routes that define a sequence or flow of processing.
    • Processors that transform, interpret, and modify messages within a Camel route.
    • Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.

    The Cloud-native Integration with Red Hat Fuse (AD221) course emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.

    This Red Hat course is based on Red Hat Fuse 7.10 and OpenShift 4.

  • 3 Days ILT, VILT

    Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.

    Camel development is organized around:

    • Routes that define a sequence or flow of processing.
    • Processors that transform, interpret, and modify messages within a Camel route.
    • Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.

    Cloud-native Integration with Red Hat Fuse (AD221) emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.

    This course is based on Red Hat Fuse 7.10 and OpenShift 4. The Red Hat Certified Specialist in Cloud-native Integration exam (EX221) is included in this offering.

  • 1 Day ILT, VILT

    Develop and deploy event-driven auto-scaling serverless applications and functions

    Learn how to develop, deploy, and auto-scale event driven serverless applications on the Red Hat OpenShift Container Platform. Red Hat OpenShift Serverless enables developers and Site Reliability Engineers (SREs) to focus on the core business logic of their applications and functions by delegating operational concerns and infrastructure services to the Red Hat® OpenShift Serverless platform.

    This Red Hat course is based on Red Hat OpenShift Serverless 1.23 and OpenShift Container Platform 4.10.

  • 2 Days ILT, VILT

    Introduction to configuring and managing Red Hat Single Sign-On for authenticating and authorizing applications

    Red Hat Single Sign-On Administration (DO313) is designed for system administrators who want to install, configure and manage Red Hat Single Sign-On servers for securing applications. Learn about the different ways to authenticate and authorize applications using single sign-on standards like OAuth and OpenID Connect (OIDC). You will also learn how to install and configure Red Hat SIngle Sign-On on the OpenShift Container Platform. This course is based on Red Hat Single Sign-On version 7.6.

  • 4 Days ILT, VILT

    Create and manage virtual machines on OpenShift using the Red Hat OpenShift Virtualization operator.

    Managing Virtual Machines with OpenShift Virtualization teaches the essential skills required to create and manage virtual machines (VM) on OpenShift using the Red Hat OpenShift Virtualization operator. This Red Hat course does not require previous knowledge of containers and Kubernetes.

    This course provides:

    • Skills required to create, access, and manage VMs on OpenShift clusters.
    • Skills required to control usage and access of cpu, memory, storage, and networking resources from VMs using the same Kubernetes features that would also control usage and access to these resources for containers.
    • Sample architectures to manage High Availability (HA) of VMs using standard Kubernetes features and extensions from OpenShift Virtualization.
    • Strategies to connect VMs on OpenShift to data center services outside of their OpenShift cluster, such as storage and databases.
  • 3 Days ILT, VILT

    Learn, train and grow with Cybersecurity Fundamentals.

    As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.

    This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.

    Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:

    • Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
    • Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
    • Stay ahead of the curve on your current career path or start your new cybersecurity career strong.

    The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 2 Days ILT, VILT

    Learn, train and grow with IT Risk Fundamentals.

    The IT Risk Fundamentals Certificate Program by ISACA offers a comprehensive understanding of IT risk management principles, methodologies, and best practices. Participants will develop the skills and knowledge needed to identify, assess, mitigate, and manage IT risks in alignment with ISACA’s standards and frameworks.

    The IT Risk Fundamentals Certificate covers the principles of IT risk management, the responsibilities and accountability for IT risk, how to build risk awareness and how to communicate risk.

  • 0.5 Days VILT

    How teams of all sizes connect, create and collaborate.

    Imagine a workplace where collaboration is effortless and seamless. In this training, you will learn the modern solution that transforms the way teams work together. With sharing tools, working on presentations becomes a truly engaging experience. Picture a group of people effortlessly working on a single document, simultaneously, in perfect harmony.

    This dynamic 3-hour course is designed to empower individuals and teams with the skills to foster true collaboration within the workplace using the powerful suite of tools provided by Google Workspace.  

  • 0.5 Days VILT

    Flexible collaboration tools designed for all the ways that work is changing.

    This 3-hour course is designed for end-users transitioning from Office 365 to Google Workspace, focusing on managing files and file permissions. Learn how to easily move your data, share files securely, and collaborate effectively with others using the powerful tools of Google Drive. 

  • 0.5 Days VILT

    Unleash Productivity with Gmail – The Heart of Google Workspace’s Communication Tools.

    Ever feel overwhelmed by your inbox? Discover the hidden power of Gmail and become a productivity pro with this 3-hour course. Learn essential features that pro users swear by, from mastering inbox organization and advanced collaboration tools to maximizing security and privacy. 

  • 0.5 Days VILT

    Google Workspace: Transforming the Digital Landscape with Integrated and Intuitive Tools for Every Business.

    Embark on a transformative learning journey with our immersive 3-hour course, tailored to empower participants, this course is strategically designed to equip individuals with the expertise to effortlessly manage large-scale events. Participants will gain practical insights into creating seamless event management processes, enhancing collaboration, and streamlining communication through the integration of Google Forms. 

  • 2 Days ILT

    In this GWS-CDWAS: Building No-Code Apps with AppSheet course, you will learn the fundamentals of no-code app development and recognize use cases for no-code apps. The course provides an overview of the AppSheet no-code app development platform and its capabilities. You learn how to create an app with data from spreadsheets, create the app’s user experience using AppSheet views and publish the app to end users.

  • 3 Days ILT, VILT

    Become a Cyber First Responder – Monitor, Detect, Prevent and Document Cyber Incidents.

    The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate level operations.

    CSA certification is a training and credentialing program that helps the candidate acquire trending and in demand cybersecurity skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

    As the security landscape is expanding, a SOC team offers high-quality IT-security services to detect potential cyber threats and attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analyst who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.

    The lab-intensive SOC analyst certification program emphasizes the holistic approach to deliver elementary as well as advanced knowledge of how to identity and validate intrusion attempts. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

     

  • 5 Days ILT, VILT

    The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

    From 9/11 to Hurricane Katrina to the recent WannaCry fiasco, the business community has been hit repeatedly by one disaster after another in the past decade and a half. The scary part is that the frequency is increasing exponentially in the past few years, thanks to the growing number of cyber-attacks.

    Even scarier is the study that shows that 2 out of 5 business still do not even have a disaster recovery and business continuity plan. And out of the ones that do, only about half of them even test it regularly to see if it is still relevant. Furthermore, industry experts have reiterated the fact in every forum possible, that the size of the business is irrelevant to having a recovery and business continuity plan. Everyone needs to have one to stay relevant in current times.

    This scenario can only be amended by trained BC/DR professionals who not only understand the gravity of the situation, but also are equipped to ensure that businesses are least impacted when a disaster strikes.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 1 Day ILT, VILT

    The Networking Essentials for Cloud Applications on AWS course provides a comprehensive understanding of networking concepts and services within the Amazon Web Services (AWS) cloud environment.

    Designed for novice and experienced networking engineers, this course covers essential topics, best practices, and hands-on labs. Its purpose is to equip learners with the knowledge and skills that are required to design, configure, and optimize network infrastructure on AWS.

    Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.

  • -26%

    DP-600T00: Microsoft Fabric Analytics Engineer

    Price range: RM2,499.00 through RM3,374.00
    4 Days ILT, VILT

    Microsoft Fabric Analytics Engineer.

    This Microsoft course covers methods and practices for implementing and managing enterprise-scale data analytics solutions using Microsoft Fabric. Students will build on existing analytics experience and will learn how to use Microsoft Fabric components, including lakehouses, data warehouses, notebooks, dataflows, data pipelines, and semantic models, to create and deploy analytics assets.

  • 2 Days ILT, VILT

    Machine Learning – Regression

    Machine Learning plays a pivotal role in predictive analytics, and regression is a fundamental technique within the field. This two-day course is designed for beginners and focuses on teaching the core concepts and practical application of regression algorithms. Participants will learn how to build, evaluate, and interpret regression models, making it an ideal starting point for a data science journey.

  • 2 Days ILT, VILT

    Machine Learning – Classification and Forecasting

    Machine learning is a powerful tool for classification and forecasting tasks, which are at the core of data-driven decision-making. This two day course, designed for beginners, provides a comprehensive introduction to classification and forecasting using machine learning algorithms. Participants will learn the fundamentals, practical application, and best practices in predictive modeling.

  • 3 Days ILT, VILT

    Machine Learning – Unsupervised Learning

    Unsupervised learning is a fascinating field of machine learning that discovers patterns, structures, and relationships within data without the need for labeled examples. This three-day course, designed for beginners, offers a comprehensive introduction to unsupervised learning techniques. Participants will gain a solid understanding of clustering, dimensionality reduction, and anomaly detection.

  • 4 Days ILT, VILT

    Deep Learning and Natural Language Processing

    Deep Learning and Natural Language Processing (NLP) have revolutionized the way we interact with and analyze text data. This four-day course, tailored for beginners, provides a comprehensive introduction to the foundations of deep learning and its application in NLP. Participants will gain a strong understanding of neural networks, language processing, and hands-on experience in building NLP models.

  • 3 Days ILT, VILT

    Big Data Hadoop

    Hadoop is a foundational technology for processing and analyzing massive volumes of data. This three-day course, tailored for beginners, provides a comprehensive introduction to the core concepts of Big Data and Hadoop. Participants will gain an understanding of distributed storage and processing, Hadoop ecosystem components, and hands-on experience with Hadoop tools.

  • 3 Days ILT, VILT

    Data Storytelling

    Data storytelling is a critical skill for conveying data-driven insights in a compelling and meaningful way. This three-day course, designed for beginners, focuses on teaching the art and science of data storytelling. Participants will learn how to structure, visualize, and present data to engage and inform their audience effectively.

  • 3 Days ILT, VILT

    ITIL 4 Specialist: IT Asset Management

    The ITIL 4 Specialist: IT Asset Management certification course is designed for IT professionals involved in managing costs and risks, monitoring and ensuring compliance, and good governance of IT assets.

    Based on the ITIL 4 framework, this ITIL 4 certification provides both strategic and practical best practice guidance to help organisations understand the value of IT Asset Management and its key concepts and challenges. Professionals should be able to use these concepts to foster effective financial stewardship and governance, control costs, manage risks, monitor and ensure compliance. The guidance in this course will also support effective decision making on the purchase, re-use, retirement and disposal of IT assets and assess the sustainability of IT asset decommissioning and disposal.

  • 3 Days ILT, VILT

    ITIL 4 Specialist: Collaborate, Assure & Improve

    The ITIL® 4 Specialist: Collaborate, Assure and Improve is a combined practice module that aims to help IT professionals collaborate effectively, ensure quality, and drive improvement with a combination of five practices.

    The ITIL® 4 Specialist: Collaborate, Assure and Improve course covers the key concepts of five ITIL practices, namely:

    • Relationship Management
    • Supplier Management
    • Service Level Management
    • Continual Improvement
    • Information Security Management
Go to Top