You searched for: ""

  • -21%

    EDU-VSANICM: VMware vSAN: Install, Configure, Manage [V8]

    Price range: RM6,900.00 through RM9,825.00
    4 Days ILT, VILT

    Reduce storage cost and complexity with VMware vSAN, enterprise-class storage virtualization software that provides the easiest path to HCI and hybrid cloud.

    During this four-day VMware course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises.

    Product Alignment:

    • VMware ESXi™ 8.0
    • VMware vCenter Server® 8.0
    • VMware vSAN 8.0
  • FT-FVC: FortiVoice

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.

    In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.

  • FT-FAD: FortiADC Training

    Price range: RM8,930.00 through RM9,680.00
    2 Days ILT, VILT

    In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.

    These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.

  • 4 Days ILT, VILT

    Empower your business with Dialogflow CX’s Advanced AI capabilities.

    In this Google Cloud course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow CX to create virtual agents and test them using the simulator. Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures.

    Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • 4 Days ILT, VILT

    Take your customer conversations to the next level.

    In this GCP-CXCCES: Customer Experiences with Contact Center AIDialogflow ES course, learn how to design customer conversations using Contact Center Artificial Intelligence (CCAI). You’ll use Dialogflow ES to create virtual agents and test them using the simulator.

    Learn to add functionality to access data from external systems, making virtual agents conversationally dynamic. You’ll be introduced to testing methods, connectivity protocols, APIs, environment management, and compliance measures. Learn best practices for integrating conversational solutions with your existing contact center software and implementing solutions securely and at scale.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining
    information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

  • 5 Days ILT, VILT

    The Gold Standard.

    CISSP is long regarded as the gold standard of security qualifications. It draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. It is based on the CBK (Common Body of Knowledge) which comprises eight subject domains that the ISC2 compiles and maintains through ongoing peer review by subject matter experts.

    This 5-day concentrated course provides information security professionals with a fully-immersed, minimum-distraction CISSP training and certification experience. The course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in 2021. The course will broaden and deepen your understanding of the domains and give you full preparation for the ISC2 CISSP examination.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Attackers never rest, and along with all the traditional threats targeting internal networks and systems, an entirely new variety specifically targeting the cloud has emerged.

    As more organizations adopt cloud-based systems, new complexities and challenges surface and the risks increase. Organizations need cloud security professionals with the requisite knowledge, skills and abilities to be able to audit, assess and secure cloud infrastructures.

    To address this need, ISC2 and the Cloud Security Alliance (CSA) have developed the Certified Cloud Security Professional (CCSP) certification. This top cybersecurity credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.

    In this 5-day course you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this (ISC)² Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official (ISC)² CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    The Understanding Cisco Wireless Foundations (WLFNDU) training teaches you the knowledge and skills you need to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of RF technology, industry standards for Wi-Fi and security, how to design, install, and configure a WLAN network of any size, and using Cisco DNA Center. This training also earns you 30 Continuing Education (CE) credits towards recertification.

    This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. This course also earns you 40 Continuing Education (CE) credits towards recertification.

     

  • 3 Days ILT, VILT

    Trend Micro Deep Discovery Advanced Threat Detection 4.0 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Deep Discovery Advanced Threat Protection solutions to detect, analyze, and respond to advanced threats and targeted attacks. Participants explore key concepts and methodologies using the following blend of Deep Discovery products for a more complete approach to network security:

    • Trend Micro™ Deep Discovery™ Analyzer
    • Trend Micro™ Deep Discovery™ Inspector
    • Trend Micro™ Deep Discovery™ Email Inspector
    • Trend Micro™ Deep Discovery™ Director

    This cybersecurity course provides a variety of hands-on lab exercises allowing each student to put the lesson content into action. There will be an opportunity to set up and configure various Deep Discovery management and administration features and explore their functionality using a virtual lab environment. A comprehensive look at the purpose, features, and capabilities of Deep Discovery Advanced Threat Protection solutions. This includes recommendations on best practices and general troubleshooting steps for a successful implementation, along with long-term maintenance of Deep Discovery solutions in your environment.

    The course also explores various deployment considerations and requirements needed to tie Deep Discovery into various other Trend Micro solutions, like Trend Micro Vision One™, to enhance threat hunting and intelligence sharing, for better threat detection functionality.

  • 3 Days ILT, VILT

    Trend Micro™ TippingPoint™ Security Solutions 1.0 Training for Certified Professionals is a three-day, instructor-led training course that teaches the concepts and best practices necessary for installation, configuration, security management, and system administration of TippingPoint solutions. Through interactive lectures and hands – on activities, students will learn to implement the inspection device and the Security Management System (SMS).

  • 4 Days ILT, VILT

    A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.

    The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 4 Days ILT, VILT

    The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.

    They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.

    lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.

  • 4 Days ILT, VILT

    The Information Architect has mastered the management of information across and within their industry.

    They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.

    Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.

  • 4 Days ILT, VILT

    Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.

    This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.

  • 4 Days VILT

    This 4-day course is designed for the experienced Splunk administrators who are new to Splunk DSP. This hands-on class provides the fundamentals of deploying a Splunk DSP cluster and designing pipelines for core use cases. It covers installation, source and sink configurations, pipeline design and backup, and monitoring a DSP environment.

  • 4 Days VILT

    This 18 hour Implementing Splunk IT Service Intelligence course is designed for administrator users who will implement Splunk IT Service Intelligence for analysts to use. The first day includes the day of content from Using Splunk IT Service Intelligence.

  • 4 Days VILT

    This 4-day (18 hour) hands-on course prepares administrators to manage users and get data in Splunk Cloud. Topics include data inputs and forwarder configuration, data management, user accounts, and basic monitoring and problem isolation.

    The course provides administrators with the skills, knowledge and best practices for data management and system configuration for data collection and ingestion in a Splunk Cloud environment to maintain a productive Splunk SaaS deployment.

  • 5 Days ILT, VILT

    The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.

  • CCNA: Implementing and Administering Cisco Solutions

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Unlock the Potential of Network Programmability and Automation: Discover the new Cisco CCNA v2.0 course.

    The Implementing and Administering Cisco Solutions (CCNA) v2.1 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

    The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking, and sets the foundation for you to upgrade your skillset with Cisco’s professional-level certifications.

    This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    To gain a comprehensive understanding of CCNA, be sure to explore our blog on The CCNA: A Beginner’s Guide to Networking Certifications, take a read today!

  • DEVASC: Developing Applications and Automating Workflows using Cisco Platforms

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Developing Applications and Automating Workflows Using Cisco Platforms (DEVASC) course helps you prepare for Cisco DevNet Associate certification and for associate-level network automation engineer roles.

    You will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across network, security, collaboration, and computing infrastructure. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.

Go to Top