You searched for: ""

  • CT-NETWORK+: CompTIA Network+ Certification

    Price range: RM3,500.00 through RM5,111.00
    5 Days ILT, VILT

    The Official CompTIA Network+ (Exam N10-009) course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career.

    It also addresses the content described in the exam objectives for the CompTIA Network+ certification. If you are pursuing a CompTIA technical certification path, obtaining the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ examination.

    It’s never too late to start a career in tech. Learn why tech certifications matter for beginners/novices. Explore: Top 7 IT Certifications for Beginners in 2025 blog post.

  • 3 Days ILT, VILT

    PRINCE2® (Projects IN Controlled Environments) is a process-based approach for project management providing an easily tailored and scalable method for the management of all types of projects. The method is the de-facto standard for project management and is practiced worldwide. PRINCE2 is a flexible method that guides you through the essentials for running a successful project regardless of project type or scale. PRINCE2 can be tailored to meet your organization or industry-specific requirements. Upon completion of the course, learners will be able to:

    • Define the key concepts of projects and PRINCE2
    • Explain how the PRINCE2 principles underpin the PRINCE2 method
    • Understand the importance of people in successful projects
    • Describe the PRINCE2 practices and how they are applied throughout the project
    • Explain the PRINCE2 processes and how they are carried out throughout the project
    • Identify the relationships between processes, deliverables, roles, and the management dimensions of a project

    In addition to these general learning objectives, the PRINCE2 7 Foundation course also aims to prepare learners for the PRINCE2 Foundation exam. The exam covers the following topics:

    • The seven PRINCE2 principles
    • The seven PRINCE2 themes
    • The seven PRINCE2 processes
    • The purpose and major content of all PRINCE2 roles
    • The purpose and major content of all PRINCE2 management products

    By completing the PRINCE2 7 Foundation course and passing the exam, learners will demonstrate that they have a sound understanding of the PRINCE2 methodology and are ready to apply it to their own projects.

  • GCP-GAIL: Generative AI Leader

    Price range: RM4,800.00 through RM5,070.00
    2 Days ILT, VILT

    In this course, you will take a journey from a broad overview of gen AI to understanding how to leverage gen AI and Google Cloud for organizational transformation.

    Upskill in Generative AI with 30% off – limited-time price: RM3360

  • -30%

    GCP-SDPD: Serverless Data Processing with Dataflow

    Original price was: RM7,200.00.Current price is: RM5,040.00.
    3 Days ILT, VILT

    The next generation of Dataflow: Dataflow Prime, Dataflow Go, and Dataflow ML.

    This training is intended for big data practitioners who want to further their understanding of Dataflow in order to advance their data processing applications.

    Beginning with foundations, this training explains how Apache Beam and Dataflow work together to meet your data processing needs without the risk of vendor lock-in. The section on developing pipelines covers how you convert your business logic into data processing applications that can run on Dataflow.

    This training culminates with a focus on operations, which reviews the most important lessons for operating a data application on Dataflow, including monitoring, troubleshooting, testing, and reliability

  • 3 Days ILT, VILT

    The VeriSM™ Professional certification tests a candidate’s knowledge of, and skills in, applying VeriSM™ in an organization. Those certified as VeriSM Professional understand the impact of digital transformation on the organization and on people, consumers as well as staff. They are able to translate strategic direction into a successful operating environment. The certified VeriSM™ Professional has proven his or her ability to create and use a Management Mesh that is based on the organization’s portfolio, principles, and governance needs. After creating or adapting the Management Mesh based on new requirements, a VeriSM Professional is able to manage the product or service through the Define, Produce, Provide and Respond stages.

  • 3 Days ILT, VILT

    Lead the way with EXIN DevOps Master™. EXIN DevOps Master™ is an advanced-level certification that tests candidates on their ability to develop and maintain sustainable work practices. It enables them to introduce and promote DevOps in their organization in order to better manage application and service life cycles whilst facilitating collaborative teamwork.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 2 Days ILT, VILT

    While advances in technology have had a profound impact on the modern workplace, the expectations of the role and responsibilities of a project manager have correspondingly increased. Project teams in today’s environment are expected to:

    • Manage greater amounts of quickly evolving data and information.
    • Work at a higher level of productivity and show increased Returns on Investment.
    • Derive more information and value from the vast amounts of data being created.

    Artificial intelligence (AI), the science of systems imbued with the same cognitive abilities as people, is one solution to the issues listed above.

    This course provides a basic understanding of how Artificial Intelligence is already contributing to project effectiveness, and ultimately to project success in today’s project environments.

  • 2 Days ILT, VILT

    The RSSD: Secure Software Developer course is an intensive,highly interactive two-day program designed to equip software developers with the essential knowledge and skills needed to build secure applications in today’s increasingly hostile digital
    landscape.

    This course is an invaluable resource for developers seeking to enhance their understanding of web application security, understand common threats and vulnerabilities, and implement security best practices from the ground up.

  • 3 Days ILT, VILT

    The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

  • 3 Days ILT, VILT

    Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

    The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

    Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

  • 5 Days ILT, VILT

    The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

    The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization.

    It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an  understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

Go to Top