This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course introduces you to Copilot, examines how to implement and administer it, and then explores the fundamentals of Copilot extensibility.
-
Do you have information locked up in structured and unstructured data sources? Using Azure AI Search, you can extract key insights from this data, and enable applications to search and analyze them.
Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation. The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.
Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!
-
Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.
The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.
These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.
In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.
-
Understand the implementation and management of information security controls based on ISO/IEC 27002.
ISO/IEC 27002 Manager enables participants to acquire the necessary knowledge and skills to support an organization in selecting, implementing, and managing information security controls based on ISO/IEC 27002. The training course provides information that will help participants in gaining a thorough understanding of how information security risks can be treated by selecting relevant controls, especially in the context of an information security management system (ISMS).
A PECB ISO/IEC 27002 Manager certification will enable you to demonstrate your comprehensive knowledge in the implementation and management of information security controls based on industry best practices.
-
Master the implementation and management of information security incident management processes based on ISO/IEC 27035.
The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.
This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities.
In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.
-
The Cisco SD-WAN Operation and Deployment (SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.
You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.
The course will allow you to earn 12 Continuing Education (CE) credits toward recertification
-
Cisco DNA Spaces helps resolve physical-space ‘blind spots’ inside an organization. Through Cisco wireless infrastructure, organizations can gain insights into how people and things move throughout their physical spaces. Based on these insights, organizations can drive operational efficiencies by monitoring and managing the location, movement, and utilization of assets.
This course enables learners how to use DNA Spaces to drive operational efficiency across environment types. Learners will understand use-cases and obtain the ability to identify procedures and applications when implementing and operating DNA spaces that are getting ‘back to business’ or business as usual.
This course covers both basic and advanced operational elements of DNA Spaces while considering Data Analytics in the context of DNA Spaces. You will perform a hands-on ‘deep-dive’ into the solution and perform on-boarding of wireless infrastructure. Subsequently, you will configure the DNA Spaces solution both tactically and strategically. This will include elements such as behavioral metrics, location analytics, captive portals, profiling, customer engagements, Internet of Things, asset identification and management, and API interfaces for streaming and notifications. You will also explore DNA Spaces App Center and IoT Device Marketplace.
-
This deep-dive training covers Cisco UCS X-Series server family and how Intersight can be the enablement platform for all UCS servers.
We will cover Intersight features such as IWOM, IST, ICO, and programmability either On-Prem or in the Cloud. Attendees will learn the breadth of the physical X-Series (pools, policies, firmware, so much more) platform as well as maintaining existing infrastructure with Intersight Infrastructures Services. Also covered is how to manage physical, virtual, cloud platforms and deploy to any or all
-
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella works and what are the features is the key focus of this 3-day Cisco online IT class. Students who enter the course with a basic understanding of Cisco products and IT solutions will be able to describe the Cisco Umbrella, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, and use Cisco Roaming Client.
-
SDWSECis a Cisco SASE (Secure Access Service Edge) training targeted to engineers and technical personnel involved in designing, deploying, operating, and securing Cisco Edge solutions both in enterprise and Service Provider environments.
This training is specifically designed for partners and customers implementing secure Cisco SD-WAN integrated with the complete feature set of Cisco Umbrella including DNS Security, Cloud Based Firewall and Secure Internet Gateway. The course walks you through how each integration works and how to design and implement it step-by-step.
-
This 5-day deep dive training course explores the capabilities of the Cisco Software-Defined Access (SDA) solution. Students will learn how to implement SDA for different solution verticals. It also addresses the details of how to operate and troubleshoot the different capabilities of the underlying solution components.
-
Configuring Cisco Catalyst 9800 and Intro to Wi-Fi 6 (C98WF6) is a course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits.
This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to Wi-Fi 6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.






