Lead the way with EXIN DevOps Master™. EXIN DevOps Master™ is an advanced-level certification that tests candidates on their ability to develop and maintain sustainable work practices. It enables them to introduce and promote DevOps in their organization in order to better manage application and service life cycles whilst facilitating collaborative teamwork.
-
The VeriSM™ Professional certification tests a candidate’s knowledge of, and skills in, applying VeriSM™ in an organization. Those certified as VeriSM Professional understand the impact of digital transformation on the organization and on people, consumers as well as staff. They are able to translate strategic direction into a successful operating environment. The certified VeriSM™ Professional has proven his or her ability to create and use a Management Mesh that is based on the organization’s portfolio, principles, and governance needs. After creating or adapting the Management Mesh based on new requirements, a VeriSM Professional is able to manage the product or service through the Define, Produce, Provide and Respond stages.
-
This training course builds on the networking concepts covered in the Networking Fundamentals in Google Cloud course. Through presentations, demonstrations, and labs, participants explore and deploy Google Cloud networking technologies.
These technologies include: Virtual Private Cloud (VPC) networks, subnets, and firewalls; Interconnection among networks; Load balancing ;Cloud DNS; Cloud CDN; Cloud NAT.
The course will also cover common network design patterns.
-
Learn best practices in cloud security and how the Google Cloud security model can help protect your technology stack. Security Engineers actively assess existing Google Cloud implementations, identifying potential security issues, and prioritizing solutions.
This Google Cloud certification uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The Logging, Monitoring and Observability in Google Cloud training course teaches participants techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud.
Learn how to monitor, troubleshoot, and improve your infrastructure and application performance. Guided by the principles of Site Reliability Engineering (SRE), this official Google Cloud course features a combination of lectures, demos, hands-on labs, and real-world case studies. In this course, you’ll gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, and profiling CPU and memory usage.
-
-30%
The next generation of Dataflow: Dataflow Prime, Dataflow Go, and Dataflow ML.
This training is intended for big data practitioners who want to further their understanding of Dataflow in order to advance their data processing applications.
Beginning with foundations, this training explains how Apache Beam and Dataflow work together to meet your data processing needs without the risk of vendor lock-in. The section on developing pipelines covers how you convert your business logic into data processing applications that can run on Dataflow.
This training culminates with a focus on operations, which reviews the most important lessons for operating a data application on Dataflow, including monitoring, troubleshooting, testing, and reliability
-
In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.
Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.
Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.
-
PRINCE2® (Projects IN Controlled Environments) is a process-based approach for project management providing an easily tailored and scalable method for the management of all types of projects. The method is the de-facto standard for project management and is practiced worldwide. PRINCE2 is a flexible method that guides you through the essentials for running a successful project regardless of project type or scale. PRINCE2 can be tailored to meet your organization or industry-specific requirements. Upon completion of the course, learners will be able to:
- Define the key concepts of projects and PRINCE2
- Explain how the PRINCE2 principles underpin the PRINCE2 method
- Understand the importance of people in successful projects
- Describe the PRINCE2 practices and how they are applied throughout the project
- Explain the PRINCE2 processes and how they are carried out throughout the project
- Identify the relationships between processes, deliverables, roles, and the management dimensions of a project
In addition to these general learning objectives, the PRINCE2 7 Foundation course also aims to prepare learners for the PRINCE2 Foundation exam. The exam covers the following topics:
- The seven PRINCE2 principles
- The seven PRINCE2 themes
- The seven PRINCE2 processes
- The purpose and major content of all PRINCE2 roles
- The purpose and major content of all PRINCE2 management products
By completing the PRINCE2 7 Foundation course and passing the exam, learners will demonstrate that they have a sound understanding of the PRINCE2 methodology and are ready to apply it to their own projects.
-
This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).
In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.
-
From the cloud to hybrid environments and on-premise data centers, Kubernetes is essential to managing containerized applications, making it one of the highest-demand IT skills. Set your IT career up for success by learning the key concepts needed to build and administer a Kubernetes cluster, including application lifecycle management, configuring security, and more.
Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia
-
Open new career doors – prove your Kubernetes & cloud native developer skills with the CKAD certification that is recognized globally, vendor-neutral, and relevant across all industries.
The course, along with real-world experience and study, will provide the skills and knowledge also tested by the Certified Kubernetes Application Developer (CKAD) exam.
Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia
-
Deep Learning and Natural Language Processing
Deep Learning and Natural Language Processing (NLP) have revolutionized the way we interact with and analyze text data. This four-day course, tailored for beginners, provides a comprehensive introduction to the foundations of deep learning and its application in NLP. Participants will gain a strong understanding of neural networks, language processing, and hands-on experience in building NLP models.









