You searched for: ""

  • 2 Days ILT, VILT

    This 2-day course introduces learners to Google Cloud’s data integration capability using Cloud Data Fusion. In this course, we discuss challenges with data integration and the need for a data integration platform (middleware). We then discuss how Cloud Data Fusion can help to effectively integrate data from a variety of sources and formats and generate insights.

    We take a look at Cloud Data Fusion’s main components and how they work, how to process batch data and real time streaming data with visual pipeline design, rich tracking of metadata and data lineage, and how to deploy data pipelines on various execution engines.

  • 1 Day ILT, VILT

    In this course you will learn how to translate various concepts in Teradata to the analogous concepts in BigQuery. You will learn how the high-level architectures of Teradata and BigQuery compare, understand differences in how to configure datasets and tables, map data types in Teradata to data types in BigQuery, understand schema mapping from Teradata to BigQuery, optimize your new schemas in BigQuery, and do a high-level comparison of SQL dialects in Teradata and BigQuery

  • 1 Day ILT, VILT

    In this course you will learn how to translate various concepts in Snowflake to the analogous concepts in BigQuery. You will learn how the high-level architectures of Snowflake and BigQuery compare, understand differences in how to configure datasets and tables, map data types in Snowflake to data types in BigQuery, understand schema mapping from Snowflake to BigQuery, optimize your new schemas in BigQuery, and do a high-level comparison of SQL dialects in Snowflake and BigQuery.

  • 1 Day ILT, VILT

    In this course you will learn how to translate various concepts in Amazon Redshift to the analogous concepts in BigQuery. You will learn how the high-level architectures of Amazon Redshift and BigQuery compare, understand differences in how to configure datasets and tables, map data types in Amazon Redshift to data types in BigQuery, understand schema mapping from Amazon Redshift to BigQuery, optimize your new schemas in BigQuery, and do a high-level comparison of SQL dialects in Amazon Redshift and BigQuery.

  • 2 Days ILT, VILT

    Dataplex is an intelligent data fabric that enables organizations to centrally discover, manage, monitor, and govern their data across data lakes, data warehouses, and data marts. You can use Dataplex to build a data mesh architecture to decentralize data ownership among domain data owners. In this course, you will learn how to discover, manage, monitor, and govern your data across data lakes, data warehouses, and data marts through guided lectures and independent exercises using sample data.

  • 3 Days ILT, VILT

    Discover the key benefits of ITIL 4 and see how it can have a transformative impact on your career journey.

    This essential ITIL 4 module introduces you to key concepts at the start of your ITIL 4 journey, providing a solid foundation for understanding IT service management and its core elements.

    • Industry-recognized certification: Showcase your ability to excel in essential IT service management, and to handle critical tasks in the field.
    • Employers’ first choice: Certify your expertise in managing IT services, making you the preferred choice for roles in IT service management and support.
    • New career opportunities: Advance your career in IT with an ITIL certification, opening doors to new roles and cutting-edge opportunities in the evolving tech landscape.

    What skills will you acquire?

    • Service Operation: Develop operational support and analysis skills for ITSM activities, including monitoring and maintaining IT systems and infrastructure.
    • Digital Transformation: Learn the processes involved in transforming IT systems to support a digital model. Learn how to collaborate with stakeholders, manage and lead plans.
    • Problem Management: Learn how to reduce the likelihood and impact of incidents by identifying actual and potential causes of incidents and managing workarounds and known errors.
  • CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals v1.2

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Launch your career in cybersecurity operations.

    The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) training provides an understanding of:

    • network infrastructure devices, operations, and vulnerabilities of the TCP/IP protocol suite
    • basic information security concepts
    • common network application operations and attacks
    • Windows and Linux operating systems
    • types of data that are used to investigate security incidents

    After completing this training, you will have the basic knowledge that is required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center (SOC).

    This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    This course is intended to give architects, engineers, and developers the skills required to help enterprise customers architect, plan, execute, and test database migration projects. Through a combination of presentations, demos, and hands-on labs participants move databases to GCP while taking advantage of various GCP services.

    This course covers how to move on-premises, enterprise databases like SQL Server to Google Cloud (Compute Engine and Cloud SQL) and Oracle to Google Cloud bare metal.

  • 3 Days ILT, VILT

    In this course, you learn about Cloud Spanner. You will get an introduction to Cloud Spanner and understand how it differs from other database products. You also learn when and how to use Cloud Spanner to solve your relational database needs at scale.

  • 3 Days ILT, VILT

    In this course, you learn how to design APIs, and how to use OpenAPI specifications to document them. You learn about the API life cycle, and how the Apigee API platform helps you manage all aspects of the life cycle.

    You learn how APIs can be designed using API proxies, and how APIs are packaged as API products to be used by app developers. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, build, secure, deploy, and manage API solutions using Google Cloud’s Apigee API Platform.

  • 3 Days ILT, VILT

    This course introduces you to the fundamentals and advanced practices used to install and manage Google Cloud’s Apigee API Platform for private cloud. Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, install, secure, manage, and scale the Apigee API Platform for Private Cloud.

  • 1 Day ILT, VILT

    In the digital age, data is a vital asset—powering businesses, enabling innovation, and driving public services. However, the increased reliance on data also brings significant risks and responsibilities. Recognising this, the Malaysian government has taken major strides in strengthening the legal and regulatory landscape around cybersecurity, personal data protection, and data sharing.

    This comprehensive 1-day workshop is designed to provide participants with a clear and practical understanding of Malaysia’s current and emerging legislative framework governing cybersecurity, privacy, and data sharing. It is tailored for professionals across both the public and private sectors who need to understand how these laws impact their operations, compliance obligations, and data governance strategies.

    Participants will gain in-depth insights into the following key legislations:

    • Cyber Security Act 2024 (Act 854)  – Explore the newly enacted law governing critical national infrastructure, incident reporting requirements, and enforcement mechanisms for cybersecurity threats.
    • Personal Data Protection Act 2010 (Act 709) – Revisit the cornerstone legislation regulating the processing of personal data in commercial transactions.
    • Personal Data Protection (Amendment) Act 2024 (Act A1727) – Understand the significant amendments made in 2024, including new obligations, rights, and penalties.
    • Data Sharing Act 2025 (Act 864) – Learn how the new framework governs the sharing of data within the public sector, including standards for secure and ethical data exchange.
    • Through a mix of presentations, case studies, and interactive discussions, participants will be equipped to navigate compliance, manage risks, and foster a culture of data responsibility in their organisations.
  • 1 Day

    Welcome to “Supercharging Productivity with Gemini in Google Workspace.” In the modern workplace, efficiency is not just about working harder, but smarter. Your Google Workspace (Docs, Sheets, Slides, Gmail, etc.) is the hub of your daily activity.

    This course is designed to transform your relationship with these familiar tools by integrating the power of Gemini directly into your workflow. We will move beyond theory to provide hands-on, practical strategies for using Gemini as an intelligent collaborator within your documents, spreadsheets, presentations, and communications, turning everyday tasks into opportunities for accelerated productivity and innovation.

  • SPRI: Implementing Cisco Service Provider Advanced Routing Solutions

    Price range: RM13,000.00 through RM14,350.00
    5 Days ILT, VILT

    The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.

    This training prepares you for the 300-510 SPRI. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.

  • 1 Day ILT, VILT

    This course is an introduction to data analytics on Google Cloud.

    It is designed for learners who have no prior experience with data analytics or Google Cloud. The course covers the basics of data analysis, including collection, storage, exploration, visualization, and sharing. It also introduces learners to Google Cloud’s data analytics tools and services.

    Through video lectures, demos, quizzes, and hands-on labs, the course demonstrates how to go from raw data to impactful visualizations and dashboards.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 2 Days ILT, VILT

    Learn how to design and build data processing systems.

    LookML not only serves as the foundation for visualization assets in Looker, but is also capable of dynamic aggregations, incrementally refreshed persistent derived tables, and more. In this course you will practice the skills to be an advanced Looker Developer through guided lectures and independent exercises using sample data.

    Limited Time Offer: Get up to 45% OFF selected Google Cloud courses in H2 2025 via our Google Cloud Certified program.

  • 3 Days ILT, VILT

    Discover how to modernize, manage, and observe applications at scale using Google Kubernetes Engine Enterprise. This course uses lectures and hands-on labs to help you explore and deploy using Google Kubernetes Engine (GKE), GKE Fleets, Cloud Service Mesh, and Config Controller capabilities that will enable you to work with modern applications, even when they are split among multiple clusters hosted by multiple providers.

  • -20%

    EDU-VCFBMS: VMware Cloud Foundation: Build, Manage, and Secure [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates.

    In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.

  • -20%

    EDU-VCFAOP: VMware Cloud Foundation: Automate and Operate [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in automating and operating a VCF private cloud using VMware Cloud Foundation® Automation and VMware Cloud Foundation® Operations.

    • learn about the architecture of VCF Automation, provider and organization management, provider and organization networking, and content library management.
    • covers blueprints, catalogs, Supervisor management, and deploying workloads using the Catalog and IaaS portals.
    • learn about VCF Operations overview, architecture, and navigating the user interface.
    • explore customizing alerts, views, reports, dashboards, and policies.
    • explains VCF logs, storage, and network operations, health and diagnostics, service discovery, and application monitoring concepts.
  • EDU-VCFSAD: VMware Cloud Foundation: Solution Architecture and Design [V9.0]

    Price range: RM12,400.00 through RM13,500.00
    5 Days ILT, VILT

    This five day course explores the architecture and design considerations for an initial deployment of VMware Cloud Foundation (VCF).

    The course explains the architecture framework and language, as well as design considerations for building, operationalizing, and consuming a VMware Cloud Foundation deployment. The scope of the course is centered on the core design considerations applicable to a VMware Cloud Foundation deployment in a single site.

  • -20%

    EDU-VCFTS: VMware Cloud Foundation: Troubleshooting [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This comprehensive five-day hands-on training is designed to provide you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware Cloud Foundation® (VCF) 9.0 environments.

    This course blends lecture and hands-on lab exercises to deliver advanced skills to diagnose and resolve problems in VMware Cloud Foundation 9.0 environments. This course also focuses on investigating and resolving problems and analyzing log files to help you recognize log file entries that identify root causes.

  • 1 Day ILT, VILT

    This course explores how to work smarter with Copilot in Microsoft Fabric. Learn how to integrate, transform, store data, and create insightful reports using Copilot in Microsoft Fabric.

    • Level: Intermediate
    • Product: Microsoft Fabric
    • Role: Data Analyst, Data Engineer, Data Scientist
    • Subject: Data analytics, Data engineering, Data integration, Data management, Data modeling, Data storage, Data visualization
  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
Go to Top