Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.
-
In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.
-
Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.
This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.
-
Learn about Large Language Models (LLM) and how RAGs combine generative and retrieval-based AI models to extend the already powerful capabilities of LLMs. Get the knowledge you need about how a RAG works and how it’s assembled from component parts.
With our hands-on labs, you will develop a RAG using existing LLM and AI tools and apply RAG techniques to designs to solve problems.
-
The Software Architect has mastered the value, use, development and delivery of intensive systems.
They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.
The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.
-
We offer Leading SAFe Agilist 5.1 Certification Training in Malaysia, a 2-day training program that would get you the theoretical and practical basics of the Scaled Agile Framework (SAFe). The training helps you lead agile transformation within your enterprise using the Scaled Agile Framework and its underlying principles of lean thinking and product development flow.
The Scaled Agile Framework (SAFe) is a knowledge base of proven, integrated principles, practices, and competencies for achieving business agility using Lean, Agile, and DevOps. Created by Dean Leffingwell, this framework effortlessly aligns and synchronizes for large-scale, multi-team Agile projects to develop and deliver enterprise-class technology-based solutions with high quality and faster time-to-market.
-
In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.
-
In this NetApp training course, you will learn the installation process for ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, NVMe, and iSCSI, on Microsoft Windows Server, Linux and VMware ESXi host operating systems. The learning will be reinforced through hands-on guided labs. The course materials include a lab workbook that will serve as an on-the-job reference guide.
-
The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful Application Program Interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco® Identity Services Engine (ISE) to strengthen cybersecurity for your web services, network, and devices. You will learn to work within the following platforms: Cisco Firepower® Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch® Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella®, Cisco Advanced Malware Protection (AMP), Cisco Threat grid, and Cisco Security Management Appliances. This course will teach you when to use the API for each Cisco security solution to drive network efficiency and reduce complexity.
This course prepares you for 300-735 Automating and Programming Cisco Security Solutions (SAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Security Solutions (SAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification.
-
Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.
-
Defending Digital Frontiers: An Intensive Security Awareness workshop.
This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.
Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.
This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.
Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.
An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.
In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.
Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.
Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.
Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.
-
-26%
Advance your Microsoft SCI expertise with the all new Microsoft Certified: Cybersecurity Architect Expert certification.
This SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.
Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
This SC-200T00: Microsoft Security Operations Analyst training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Discover the Microsoft Certified: Identity and Access Administrator Associate certification.
This SC-300T00: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.
Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects.
The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.
This SC-300T00: Microsoft Identity and Access Administrator training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.
Explore more about cybersecurity certifications with our guide to top cybersecurity training and certifications in 2025.
-
The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats.
Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
Real skills for real-time results with Microsoft Applied Skills credentials.
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization’s data.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.
- Level: Intermediate
- Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
- Role: Security Operations Analyst
- Subject: Threat protection
-
Learn about Microsoft Copilot for Security, an AI-powered security analysis tool that enables analysts to process security signals and respond to threats at a machine speed, and the AI concepts upon which it’s built.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI
-
Implement retention, eDiscovery, and Communication compliance in Microsoft Purview
In today’s digital environment, managing organizational data efficiently and securely is crucial. Microsoft Purview Data Lifecycle and Records Management solutions help businesses govern their data throughout its lifecycle, ensuring compliance with regulatory requirements. By implementing retention labels and policies, organizations can consistently manage data, minimize risks associated with breaches, and reduce unnecessary storage.
Understanding these tools ensures data is available when needed and securely deleted when it’s not.
Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.
-
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events.
-
-23%
Get started with cybersecurity with the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.
Advance your knowledge on a range of cybersecurity topics and build a foundation for advanced cybersecurity certifications that prepare you for in-demand roles in security operations, identity and access management, and information protection. Recommended for early career IT security professionals and aspiring students.
This SC-900T00: Microsoft Security, Compliance and Identity Fundamentals certification course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions and is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world.
Check it out – Microsoft Lead The Era of AI