You searched for: ""

  • 3 Days ILT, VILT

    Trend Micro™ TippingPoint™ Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands – on activities, students will learn to implement the inspection device and the Security Management System (SMS).

  • 4 Days ILT, VILT

    A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.

    The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 4 Days ILT, VILT

    The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.

    They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.

    lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.

  • 4 Days ILT, VILT

    The Information Architect has mastered the management of information across and within their industry.

    They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.

    Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.

  • 4 Days ILT, VILT

    Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.

    This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.

  • 4 Days VILT

    This 4-day course is designed for the experienced Splunk administrators who are new to Splunk DSP. This hands-on class provides the fundamentals of deploying a Splunk DSP cluster and designing pipelines for core use cases. It covers installation, source and sink configurations, pipeline design and backup, and monitoring a DSP environment.

  • 4 Days VILT

    This 18 hour Implementing Splunk IT Service Intelligence course is designed for administrator users who will implement Splunk IT Service Intelligence for analysts to use. The first day includes the day of content from Using Splunk IT Service Intelligence.

  • 4 Days VILT

    This 4-day (18 hour) hands-on course prepares administrators to manage users and get data in Splunk Cloud. Topics include data inputs and forwarder configuration, data management, user accounts, and basic monitoring and problem isolation.

    The course provides administrators with the skills, knowledge and best practices for data management and system configuration for data collection and ingestion in a Splunk Cloud environment to maintain a productive Splunk SaaS deployment.

  • 5 Days ILT, VILT

    The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.

  • CCNA: Implementing and Administering Cisco Solutions

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Unlock the Potential of Network Programmability and Automation: Discover the new Cisco CCNA v2.0 course.

    The Implementing and Administering Cisco Solutions (CCNA) v2.1 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

    The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking, and sets the foundation for you to upgrade your skillset with Cisco’s professional-level certifications.

    This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    To gain a comprehensive understanding of CCNA, be sure to explore our blog on The CCNA: A Beginner’s Guide to Networking Certifications, take a read today!

  • DEVASC: Developing Applications and Automating Workflows using Cisco Platforms

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Developing Applications and Automating Workflows Using Cisco Platforms (DEVASC) course helps you prepare for Cisco DevNet Associate certification and for associate-level network automation engineer roles.

    You will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across network, security, collaboration, and computing infrastructure. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.

  • SVPN: Implementing Secure Solutions with Virtual Private Networks

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.

    This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.

  • CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals v1.0

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents.

    Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Focuses on the key tasks needed to become a full time Linux administrator.

    Red Hat System Administration II with exam (RH135) serves as the second part of the RHCSA training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux system administration skills in storage configuration and management, installation and deployment of Red Hat Enterprise Linux, management of security features such as SELinux, control of recurring system tasks, management of the boot process and troubleshooting, basic system tuning, and command-line automation and productivity.

    Experienced Linux administrators looking for rapid preparation for the RHCSA certification should instead start with RHCSA Rapid Track with exam (RH200).

    The Red Hat Certified System Administrator (RHCSA) exam (EX200) is included in this offering, which is based on Red Hat Enterprise Linux 9.0

  • 2 Days ILT, VILT

    This instructor- led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the  Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution .

    Multiple modules focus on how to leverage the collected data. You will create simple search queries in on e module an d XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact- related data, such as IP and Hash Views. Addition ally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external- data collection capabilities, including the use of Cortex XDR API to receive external alerts.

  • 2 Days ILT, VILT

    This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server.

    Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

  • 4 Days ILT, VILT

    The Implementing Cisco Nexus 9000 Switches in NX-OS Mode–Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features.

  • 4 Days ILT, VILT

    The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i.

  • 5 Days ILT, VILT

    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 2 Days ILT, VILT

    This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.

  • ENSLD: Designing Cisco Enterprise Networks v1.1

    Price range: RM7,500.00 through RM8,850.00
    5 Days ILT, VILT

    The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco® Enterprise Network Core Technologies (ENCOR) v1.0 course.

    This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP® Enterprise and Cisco Certified Specialist – Enterprise Design certifications.

    This course also earns you 40 Continuing Education (CE) credits towards recertification.

  • DCID: Designing Cisco Data Center Infrastructure

    Price range: RM7,500.00 through RM8,850.00
    5 Days ILT, VILT

    Demonstrate your mastery of the design and deployment options focused on Cisco data center solutions and technologies across network, compute, virtualization, automation, and security.

    The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System™ (Cisco UCS®) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric.

    You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. You can expect theoretical content as well as design-oriented case studies in the form of activities.

    This course earns you 40 Continuing Education (CE) credits towards Cisco recertification.

  • -32%

    EDU-VSD: VMware vSphere: Design [v8]

    Price range: RM6,000.00 through RM8,775.00
    3 Days ILT, VILT

    VMware vSphere: Design

    This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.

  • EDU-VSD7: VMware vSphere: Design [V7]

    Price range: RM7,650.00 through RM8,775.00
    3 Days ILT, VILT

    This three-day EDU-VSD7: VMware vSphere: Design [V7] training course equips you with the knowledge, skills, and abilities to design a VMware vSphere® 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices.

    This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.

    Given a case study, you practice your design skills by working with peers on a design project.

    Product Alignment

    • VMware ESXi™ 7
    • VMware vCenter Server® 7

  • 5 Days ILT, VILT

    Learn how to configure, manage, and scale key services used in datacenters.

    Red Hat Services Management and Automation with exam (RH359) is designed for IT professionals with some experience managing Linux® systems and want to learn more about how to manage and deploy network services included with Red Hat® Enterprise Linux which are particularly important in modern IT datacenters. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible® Engine to automate your work in a scalable, repeatable manner.

    This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. The Red Hat Certified Specialist in Services Management and Automation exam (EX358) is included.

  • 5 Days ILT, VILT

    Learn and validate essential Red Hat Enterprise Linux 8 configuration, administration, and maintenance tasks and methods in a condensed format.

    The RHCSA Rapid Track course with exam (RH200) combines Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134), reviewing the tasks at an accelerated pace. The Red Hat Certified System Administrator (RHCSA) exam (EX200) is also included in this offering.

    This offering is based on Red Hat® Enterprise Linux® 8.2 and is designed for experienced Linux system administrators.

  • 4 Days ILT, VILT, SPVC

    This four-day EDU-KFCO: VMware Kubernetes Fundamentals and Cluster Operations course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.

    Learn more about Kubernetes Expertise here: Kubernetes Expertise: Unlocking Cloud Potential in Malaysia

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 5 Days ILT, VILT

    This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.

  • 5 Days ILT, VILT

    The course is updated for DB2 10 for z/OS. This course is the classroom delivered version of the Instructor led Online course

    • DB2 10 for z/OS System Administration – ILO (3V851).

    Administrators of DB2 10 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 10 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:

    • Relate the z/OS IPL process to a DB2 subsystem
    • Explain effects of stopping and starting DB2
    • Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
    • The use of DSN command processor running in batch and foreground
    • Use views to minimize your ability to see into the DB2 catalog
    • See how the catalog (through grant activity) controls access to data
    • Search the catalog for problem situations
    • Use the catalog and DB2 utilities to determine data recovery requirements
    • Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
    • Implement DB2 and Resource Access Control Facility (RACF) security
    • Describe DB2 program flow for all environments
    • Display normal and problem threads and database status
    • See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
    • Interpret lock displays
    • Identify and cancel particular threads
    • Describe available DB2 utilities to manage system and user page sets
  • 5 Days ILT, VILT

    This Application Performance and Tuning course is designed to teach the students how to prevent application performance problems and to improve the performance of existing applications. Students will learn about indexes, table design, locking, and other issues relevant to application performance. This course includes paper exercises and machine exercises designed to reinforce the lecture content.

Go to Top