You searched for: ""

  • SC-401T00: Protect sensitive information with Microsoft Purview in the AI era

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Be the reason your organization survives the next cyberattack.

    The Information Security Administrator course equips you with the skills to:

    • to plan and implement information security for sensitive data using Microsoft Purview and related services
    • protect data within Microsoft 365 collaboration environments from internal and external threats.
    • to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases
    • protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

     

  • SC-300T00: Microsoft Identity and Access Administrator

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Discover the Microsoft Certified: Identity and Access Administrator Associate certification.

    This SC-300T00: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.

    Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects.

    The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

    This SC-300T00: Microsoft Identity and Access Administrator training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our guide to top cybersecurity training and certifications in 2025.

  • SC-200T00: Defend against cyberthreats with Microsoft’s security operations platform

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.

    In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Defend against cyberthreats with Microsoft’s security operations platform.

    This SC-200: Defend against cyberthreats with Microsoft’s security operations platform.

    training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • SC-100T00: Microsoft Cybersecurity Architect

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Advance your Microsoft SCI expertise with the all new Microsoft Certified: Cybersecurity Architect Expert certification.

    This SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

    Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

     

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day ILT, VILT

    Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.

  • SANIMP: Data ONTAP SAN Implementation

    Price range: RM10,917.00 through RM11,592.00
    3 Days ILT, VILT

    In this NetApp training course, you will learn the installation process for ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, NVMe, and iSCSI, on Microsoft Windows Server, Linux and VMware ESXi host operating systems. The learning will be reinforced through hands-on guided labs. The course materials include a lab workbook that will serve as an on-the-job reference guide.

  • SANADM: ONTAP SAN Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    In this NetApp training course, you learn about configuring ONTAP 9 Data Management Software for a SAN environment. The course provides information about block-level protocols, including FC, FCoE, and iSCSI on Microsoft Windows Server, Linux, and VMware ESXi host operating systems. The course also discusses best practices for managing SAN storage provisioning, protocols, hosts, availability, and data protection. An introduction to NVMe over Fabrics (NVMe-oF) is provided. The course focuses on ONTAP 9 functionality and includes lecture and a hands-on exercise environment.

  • 2 Days ILT, VILT

    We offer Leading SAFe Agilist 5.1 Certification Training in Malaysia, a 2-day training program that would get you the theoretical and practical basics of the Scaled Agile Framework (SAFe). The training helps you lead agile transformation within your enterprise using the Scaled Agile Framework and its underlying principles of lean thinking and product development flow.

    The Scaled Agile Framework (SAFe) is a knowledge base of proven, integrated principles, practices, and competencies for achieving business agility using Lean, Agile, and DevOps. Created by Dean Leffingwell, this framework effortlessly aligns and synchronizes for large-scale, multi-team Agile projects to develop and deliver enterprise-class technology-based solutions with high quality and faster time-to-market.

  • 4 Days ILT, VILT

    The Software Architect has mastered the value, use, development and delivery of intensive systems.

    They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.

    The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.

  • 1 Day ILT, VILT

    Learn about Large Language Models (LLM) and how RAGs combine generative and retrieval-based AI models to extend the already powerful capabilities of LLMs. Get the knowledge you need about how a RAG works and how it’s assembled from component parts.

    With our hands-on labs, you will develop a RAG using existing LLM and AI tools and apply RAG techniques to designs to solve problems.

  • 1 Day ILT, VILT

    Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.

    This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.

  • 1 Day ILT, VILT

    In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 5 Days ILT, VILT

    Deploy SAP HANA on Red Hat Enterprise Linux for SAP Solutions in a high availability environment.

    Learn how to deploy, protect, and scale SAP infrastructure with Red Hat Enterprise Linux for SAP Solutions. This course teaches best practices for deploying SAP HANA and SAP S/4HANA in a high availability configuration. In addition, you will discover how to efficiently automate deployments with Red Hat Ansible Automation Platform and Red Hat supported Ansible roles specific to SAP.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud with exam (RH443) teaches and validates skills related to the methodology of performance tuning for senior Linux® system administrators. This offering discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Design and deploy a high availability cluster.

    The Red Hat® High Availability Clustering with exam (RH437) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1 and includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436).

  • 4 Days ILT, VILT

    Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1.

    Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

  • 5 Days ILT, VILT

    Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments.

    Red Hat Security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

    This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. The Red Hat Certified Specialist in Security: Linux exam (EX415) is included.

    Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

  • 4 Days ILT, VILT

    Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments.

    The Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) course is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances.

    This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

    Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    Red Hat Server Hardening – builds on a student’s Red Hat Certified Engineer (RHCE®) certification or equivalent experience to teach how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns.

  • 5 Days ILT, VILT

    Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software

    Red Hat Satellite 6 Administration with exam (RH404) explores and validates the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn and demonstrate your ability to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

    This offering includes the Red Hat Certified Specialist in Deployment and Systems Management exam (EX403) and is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

  • 4 Days ILT, VILT

    Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software.

    Red Hat Satellite 6 Administration (RH403) is a lab-based course that explores the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn how to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

    This course is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.6.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM)

    Red Hat Security: Identity Management and Authentication with Exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Red Hat Certified Specialist in Identity Management exam is included in this bundle.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

    Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM).

    Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

  • 5 Days ILT, VILT

    Learn how to configure, manage, and scale key services used in datacenters.

    Red Hat Services Management and Automation with exam (RH359) is designed for IT professionals with some experience managing Linux® systems and want to learn more about how to manage and deploy network services included with Red Hat® Enterprise Linux which are particularly important in modern IT datacenters. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible® Engine to automate your work in a scalable, repeatable manner.

    This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. The Red Hat Certified Specialist in Services Management and Automation exam (EX358) is included.

  • 5 Days ILT, VILT

    Learn how to configure, manage, and scale key services used in the data center

    Red Hat Services Management and Automation (RH358) is designed for IT professionals with some experience managing Linux® systems and want to learn more about how to manage and deploy network services included with Red Hat Enterprise Linux which are particularly important in the modern IT data center. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible® Engine to automate your work in a scalable, repeatable manner.

    This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1.

  • 3 Days ILT, VILT

    Prepare yourself for Red Hat Enterprise Linux 8 by learning about changes to the operating system

    Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release.

    This course is based on Red Hat Enterprise Linux 8.

  • 5 Days ILT, VILT

    Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux.

    The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

    This course also includes the exam, Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342). This offering is based on Red Hat Enterprise Linux 7.2.

    Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

  • 4 Days ILT, VILT

    Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux.

    The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

    Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

    This course is based on Red Hat Enterprise Linux 7.2.

  • 5 Days ILT, VILT

    Deploy, configure, manage, and migrate virtual environments

    Red Hat Virtualization with exam (RH319) teaches and validates the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for and includes the Red Hat Certified Specialist in Virtualization exam.

    This offering is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

Go to Top