You searched for: ""

  • UIPATH-RPADD: Robotic Process Automation Design & Development v4.0

    Price range: RM6,500.00 through RM7,175.00
    5 Days ILT, VILT

    The Robotic Process Automation (RPA) Design & Development course offers comprehensive knowledge and professional-level skills focused on developing and deploying software robots. The course assumes no prior knowledge of RPA. It starts with the basic concepts of Robotic Process Automation. It further builds on these concepts and introduces key RPA Design and Development strategies and methodologies, specifically in the context of UiPath products. A student undergoing the course shall develop the competence to design and develop a robot for a defined process.

    The course also prepares the student for UiPath-ADA – UiPath Automation Developer Associate exam. The course consists of 40 hours of a theory component and an associated 20 hours of practice/lab exercises component.

  • 3 Days ILT, VILT

    Trend Micro Deep Discovery Advanced Threat Detection 4.0 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks. Participants explore key concepts and methodologies using the following blend of Deep Discovery products for a more complete approach to network security:

    • Trend Micro™ Deep Discovery™ Analyzer
    • Trend Micro™ Deep Discovery™ Inspector
    • Trend Micro™ Deep Discovery™ Email Inspector
    • Trend Micro™ Deep Discovery™ Director

    This cybersecurity course provides a variety of hands-on lab exercises allowing each student to put the lesson content into action. There will be an opportunity to set up and configure various Deep Discovery management and administration features and explore their functionality using a virtual lab environment. A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat Protection solutions. This includes recommendations on best practices and general troubleshooting steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions in your environment.

    The course also explores various deployment considerations and requirements needed to tie Deep Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat hunting and intelligence sharing, for better threat detection functionality.

  • 3 Days ILT, VILT

    Trend Micro™ TippingPoint™ Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands – on activities, students will learn to implement the inspection device and the Security Management System (SMS).

  • 2 Days ILT, VILT

    Professional Scrum with Kanban (PSK) is a 2-day course that teaches Scrum practitioners how to apply Kanban practices to their work. Through theory, case studies, and hands-on exercises, participants will understand the importance of transparency and flow as it pertains to the Scrum framework. Scrum is the defacto standard for how Agile teams work. Scrum exists only in its entirety and functions well as a container for other techniques and practices. Scrum Teams keep improving how they work, based on what they learn by inspecting and adapting on an ongoing basis.

    In this class, students will learn how additional practices from Kanban can be introduced into their Scrum Teams without changing Scrum.  They will learn how to add the right practices and the benefits that their Scrum Teams can achieve from using Scrum with Kanban.

  • 2 Days ILT, VILT

    The Professional Agile Leadership Essentials (PAL-E) is a 2-day hands-on workshop that uses a combination of instruction and hands-on exercises to help managers and other leaders who work directly with agile teams understand how to best support, guide, and coach their teams to improve their agile capabilities. The workshop provides a foundation for the role that leaders play in creating the conditions for a successful agile transformation.

    Leaders and managers are critical enablers in helping their organizations be successful, yet the role of leaders and managers in an agile organization can be quite different from what they are used to.  This workshop uses a  combination of instruction and team-based exercises to help participants learn how to form and support agile teams to  achieve better results, and how to lead the cultural and behavioral changes that organizations must make to reap the benefits of an agile product delivery approach.

  • 2 Days ILT, VILT

    Mastering the Product Owner Stances.

    This 2-day Professional Product Owner – Advanced (PSPO-A) course focuses on helping experienced practitioners expand their ability to establish a solid vision, validate their hypotheses, and ultimately deliver more value to their stakeholders. The PSPO-A course is intended for Product Owners who are looking to grow their knowledge and abilities. The course goes beyond the topics explored in the Professional Scrum Product Owner (PSPO) class by deepening the attendee’s understanding of the role through the exploration of the many stances of a professional Product Owner.

    This Advanced Scrum Product Owner certification course is an interactive, experiential workshop where attendees explore topics through a series of exercises and discussions. Students should have at least one year of Product Owner experience and a practical knowledge of Scrum in order to participate in and benefit from these exercises. Having previously taken the PSPO class is recommended, but not required. The course also includes a free attempt at the globally recognized Professional Scrum Product Owner II certification exam (PSPO II).

  • 2 Days ILT, VILT

    Professional Scrum Master II (PSM II) course is a 2-day advanced Scrum Master class designed to support Scrum Masters in their professional development. The PSM II course is intended for Scrum Masters with at least one year of experience who are looking to grow their knowledge and abilities as a Scrum Master. This course is one step in that journey. The course also includes a free attempt at the globally recognized Professional Scrum Master II (PSM II) certification exam.

    Unlike the Professional Scrum Master (PSM) course which focuses on how to use Scrum, the Scrum framework and the role of the Scrum Master, PSM II is an advanced Scrum Master certification course helping students to understand the stances that characterize an effective Scrum Master and servant-leader while diving deep into how they serve the Development Team, Product Owner and organization. The course then teaches students about related practices and skills to enable them to have the right types of conversations and how to apply them to become better Scrum Masters.

    MDEC Digital Up Campaign: Enjoy up to RM2,500 Training Fee Reimbursement when you sign-up and attend this course from 15 July – 30 Sept 2023 (Open to Malaysians, Employed, Unemployed, Fresh Graduates, OR Gig workers aged 21-55 years old).

  • 5 Days ILT, VILT

    The RCCE Cybersecurity Certification Program.

    Cybersecurity engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime. They’ll often serve as a go-to team member for security policies and procedures.

    The RCCE2: Rocheston Certified Cybersecurity Engineer – Level 2 program will give you a detailed, in-depth knowledge and hands-on labs. You will have mastery over hacking technologies and tools. The Level 2 program covers advanced futuristic hacking stuff. For instance, it looks at advanced blockchain exploits, quantum computing and cryptography, advanced ransomware and cryptojacking, etc. The RCCE Level 1 is a mandatory requirement, to move to the Level 2 program.

    PRO Tip: Learn more about our range of role-based cybersecurity training courses in our new blog post.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    The Modern Certification for the Modern Times.

    The RCCE1: Rocheston Certified Cybersecurity Engineer – Level 1 course will delve into the basics of cybersecurity along with hands-on labs. You will gain an insight into hacking technologies and tools. Level 1 covers the foundation of hacking technologies. For instance, it looks at Web application attacks, Trojans and Malware, Denial of Service attacks, metasploit, firewalls, cryptography, cracking passwords, hacking the cloud etc. The RCCE Level 1 is a mandatory requirement, to move to the Level 2 program. The course is 100% Linux based.

    The RCCE certification covers advanced futuristic technologies like Blockchain, Artificial Intelligence, Cyberthreat Intelligence, Incident Handling, Cloud technologies, Quantum Computing, Biometrics, Deep Learning etc.

    Most sought after Ethical Hacking Training & Certification to get your started with Cybersecurity and serves as a mandatory requirements before attending RCCE2: Rocheston Certified Cybersecurity Engineer – Level 2 certification course.

    NEW: The RCCE now includes RCAI Engineer certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.

    As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.

  • 3 Days ILT, VILT

    The RCCS curriculum has been created by subject matter experts (SMEs) of Rocheston, who have gone through extensive research to create content that is practical and connects perfectly with current industry standards.

    The program acts as a stepping stone for becoming an accomplished cybersecurity specialist, who can turn tables at a dynamic organization with the acquired insights. The program teaches you about the best practices associated with security risks, both at home and otherwise.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1.

    Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

Go to Top