You searched for: ""

  • 1 Day ILT, VILT

    Extend Microsoft Copilot for Microsoft 365 with Copilot Studio

    As a developer, you can enhance, enrich, and customize Microsoft Copilot for Microsoft 365 in 2 ways: you can extend Microsoft Copilot or build your own copilot.

    On its own, Copilot for Microsoft 365 is a powerful productivity tool for keeping users in the flow of their work across Microsoft 365 applications. It provides users with general skills that enhance personal productivity, such as understanding, summarizing, predicting, recalling, translating, and generating content. It draws from a baseline of your organizational knowledge by indexing content into Microsoft Graph, such as the emails, chats, and documents that users have permission to access.

    However, business workflows don’t typically run exclusively on Microsoft 365 applications and experiences. With Copilot extensibility, you can augment Copilot for Microsoft 365 with custom actions and ground your responses with connectors that access data in real-time. You can even extend Copilot’s experiences with declarative and custom copilots that focus on specific user experiences.

    IMPORTANT: This course retired 31 Mar 2025 and has been replaced with MS-4022

  • 1 Day ILT, VILT

    Discover how to drive enablement of Copilot for Microsoft 365 in your organization

    Learn how to drive adoption of Microsoft Copilot for Microsoft 365 using the user enablement framework to create and implement a robust adoption plan.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    Craft effective prompts for Microsoft Copilot for Microsoft 365

    Discover ways to craft effective and contextual prompts for Microsoft Copilot for Microsoft 365 that create, simplify, transform, and compile content across Microsoft 365 applications. Learn the importance of providing a clear goal, context, source, and expectation in your prompt for the best results. This course covers real world scenarios and examples using Copilot in Microsoft 365 apps like Word, Excel, PowerPoint, Teams, Outlook, OneNote, and Chat.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    This Empower your workforce with Copilot for Microsoft 365 Use Cases course is composed of two parts – Getting started with Copilot for Microsoft 365 and Empower your workforce with Copilot for Microsoft 365 Use Cases. The first part of the course introduces you to Copilot for Microsoft 365, examines how you can use Copilot throughout the various Microsoft 365 apps, explores best practices for using Copilot and building effective prompts, and examines how you can extend Copilot with plugins and Graph connectors.

    The second part of this training content is really the heart of this course. Students perform a series of hands-on exercises involving seven Use Cases – Executives, Sales, Marketing, Finance, IT, HR, and Operations. These exercises focus on using Copilot in various Microsoft 365 apps (such as Word, PowerPoint, Outlook, and so on) to complete a series of common business-related tasks pertaining to each Use Case.

    To complete the Use Case exercises in this course, each student must have access to a Microsoft 365 subscription (BYOS) in which they’re licensed to use Copilot for Microsoft 365. Each student must also have a Microsoft OneDrive account, since Copilot requires OneDrive to complete the file sharing tasks used throughout the Use Case exercises.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    This learning path examines the key Microsoft 365 security and compliance features that administrators must prepare in order to successfully implement Microsoft 365 Copilot.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 1 Day VILT

    Learn how to build and distribute Microsoft Teams apps that retrieve user information using the Microsoft Graph API. Practice building and deploying apps in the guided project at the end of the learning path.

  • MS-102T00: Microsoft 365 Administrator

    Price range: RM3,500.00 through RM3,874.00
    5 Days ILT, VILT

    Microsoft 365: Revolutionizing Workflows for the Modern Enterprise.

    This Microsoft 365 Administrator course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.

    In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments.

    The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management.

    In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365’s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization’s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint.

    Once you have this understanding of Microsoft 365’s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels.

  • 4 Days ILT

    This MR-9CP-CISV3: Cloud Infrastructure and Services Version 3 course provides an overview of digital transformation, role of Cloud to help organizations address the current IT challenges to meet their overall digital transformation objectives. This “cloud essentials” course will help to gain the knowledge on technologies, processes, and mechanisms required to build a cloud infrastructure.

    This course takes an open approach, and uses the Cloud Reference Architecture to describe the concepts and technologies related to cloud computing, which is further illustrated and reinforced with DELL EMC product examples. The course follows the U.S. National Institute of Standards and Technology as a guide for all definitions of cloud computing.

  • 5 Days ILT, VILT

    This course builds on skills developed in the Data Science and Big Data Analytics course. The main focus areas cover Hadoop (including Pig, Hive, and HBase), Natural Language Processing, Social Network Analysis, Simulation, Random Forests, Multinomial Logistic Regression, and Data Visualization. Taking an “Open” or technology-neutral approach, this course utilizes several open-source tools to address big data challenges.

  • 1 Day ILT, VILT

    This course gives business leaders the skills and knowledge to better manage such analytical efforts. It describes how to get started and what is required to effectively run projects which leverage Big Data analytics. Specifically, it addresses: deriving business value from Big Data, leading Data Science projects using a data analytics lifecycle, developing Data Science teams, and driving innovation using analytics.

  • 5 Days ILT, VILT

    The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets.

    This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.

  • 1 Day ILT, VILT

    In the digital age, data is a vital asset—powering businesses, enabling innovation, and driving public services. However, the increased reliance on data also brings significant risks and responsibilities. Recognising this, the Malaysian government has taken major strides in strengthening the legal and regulatory landscape around cybersecurity, personal data protection, and data sharing.

    This comprehensive 1-day workshop is designed to provide participants with a clear and practical understanding of Malaysia’s current and emerging legislative framework governing cybersecurity, privacy, and data sharing. It is tailored for professionals across both the public and private sectors who need to understand how these laws impact their operations, compliance obligations, and data governance strategies.

    Participants will gain in-depth insights into the following key legislations:

    • Cyber Security Act 2024 (Act 854)  – Explore the newly enacted law governing critical national infrastructure, incident reporting requirements, and enforcement mechanisms for cybersecurity threats.
    • Personal Data Protection Act 2010 (Act 709) – Revisit the cornerstone legislation regulating the processing of personal data in commercial transactions.
    • Personal Data Protection (Amendment) Act 2024 (Act A1727) – Understand the significant amendments made in 2024, including new obligations, rights, and penalties.
    • Data Sharing Act 2025 (Act 864) – Learn how the new framework governs the sharing of data within the public sector, including standards for secure and ethical data exchange.
    • Through a mix of presentations, case studies, and interactive discussions, participants will be equipped to navigate compliance, manage risks, and foster a culture of data responsibility in their organisations.
Go to Top