You searched for: ""

  • 3 Days ILT, VILT

    Around the world, there are many organizations in both the public and private sectors, who recognize that their portfolio, programme and project management is best supported through a delivery support office. PRINCE2®, Managing Successful Programmes (MSP®), Management of Portfolio’s (MOP® )and Management of Risk (MoR®) all touch on the need to provide adequate support structures. P3O® provides a single source of information for guidance or
    advice on setting up or running an effective delivery support office.

    Portfolio, Programme and Project Offices (P3O®) is a Best Management Practice certification that brings together a set of principles, processes and techniques to facilitate effective portfolio, programme and project management through enablement, challenge and support structures.

  • ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    This Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) training gives you the knowledge and skills needed to:

    • configure, troubleshoot, and manage enterprise wired and wireless networks
    • implement security principles, implement automation and programmability within an enterprise network
    • to overlay network design by using SD-Access and SD-WAN solutions

    This course helps you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam, which is part of four new certifications:

    • CCNP® Enterprise
    • CCIE® Enterprise Infrastructure
    • CCIE Enterprise Wireless
    • Cisco Certified Specialist – Enterprise Core
  • UIPATH-ABAA: UiPath Automation Business Analyst Associate

    Price range: RM2,600.00 through RM3,275.00
    2 Days ILT, VILT

    The Automation Business Analyst Associate training is designed to equip you with the essential skills and knowledge needed to excel as an Automation Business Analyst, specifically focusing on the UiPath Automation Implementation Methodology. It covers both foundational and in-depth concepts.

    Additionally, it allows you to develop your skills by going through practical case studies, thus gaining some hands-on experience.

    Ready to embark on this transformative learning experience? Let’s go!

  • UIPATH-ADA: Automation Developer Associate

    Price range: RM6,500.00 through RM7,175.00
    5 Days ILT, VILT

    The Automation Developer Associate Training is a curriculum for those looking to build their automation development competency from the ground up while also diving into more broader areas to gain a holistic understanding of how automation intertwines with various technologies.

    It includes everything you need to know to pass the UiPath Certified Professional Automation Developer Associate Certification exam.

    You’ll expand your automation knowledge going through the course syllabus designed to help you develop enterprise automation projects. The full list of courses that make up the training can be found in the ‘learning plan curriculum’ tab. You can click specific courses to view each specific agenda and learning objectives.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

  • SISE: Implementing and Configuring Cisco Identity Services Engine

    Price range: RM10,500.00 through RM11,850.00
    5 Days ILT, VILT

    The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist – Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification

  • SCOR: Implementing and Operating Cisco Security Core Technologies

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

    This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.

  • AWS-MLE: Machine Learning Engineering on AWS

    Price range: RM5,400.00 through RM6,075.00
    3 Days ILT, VILT

    Machine Learning (ML) Engineering on Amazon Web Services (AWS) is a 3-day intermediate course designed for ML professionals seeking to learn machine learning engineering on  AWS. Participants learn to build, deploy, orchestrate, and operationalize ML solutions at scale through a balanced combination of theory, practical labs, and activities.

    Participants will gain practical experience using AWS services such as Amazon SageMaker AI and analytics tools such as Amazon EMR to develop robust, scalable, and production-ready machine learning applications.

  • 2 Days ILT, VILT

    The RSSD: Secure Software Developer course is an intensive,highly interactive two-day program designed to equip software developers with the essential knowledge and skills needed to build secure applications in today’s increasingly hostile digital
    landscape.

    This course is an invaluable resource for developers seeking to enhance their understanding of web application security, understand common threats and vulnerabilities, and implement security best practices from the ground up.

  • GCP-GAIL: Generative AI Leader

    Price range: RM4,800.00 through RM5,070.00
    2 Days ILT, VILT

    In this course, you will take a journey from a broad overview of gen AI to understanding how to leverage gen AI and Google Cloud for organizational transformation.

    Upskill in Generative AI with 30% off – limited-time price: RM3360

  • SC-401T00: Protect sensitive information with Microsoft Purview in the AI era

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Be the reason your organization survives the next cyberattack.

    The Information Security Administrator course equips you with the skills to:

    • to plan and implement information security for sensitive data using Microsoft Purview and related services
    • protect data within Microsoft 365 collaboration environments from internal and external threats.
    • to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases
    • protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

     

  • SPCNI: Designing and Implementing Cisco Service Provider Cloud Network Infrastructure

    Price range: RM13,000.00 through RM14,350.00
    5 Days ILT, VILT

    The Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI) training teaches you how to design and implement virtualization cloud infrastructures in a service provider network. You will learn about virtualized network function infrastructures and how to use programmability and orchestration to manage virtualization cloud infrastructures. You will also learn about cloud computing and implementation of cloud interconnect and data center interconnect solutions. In addition, you will learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures.

    This training prepares you for the 300-540 SPCNI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.

  • SCAZT: Designing and Implementing Secure Cloud Access for Users and Endpoints

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) training teaches you the skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats.

    This training prepares you for the 300-740 SCAZT v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Secure Cloud Access certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification.

  • ENNA: Designing and Implementing Enterprise Network Assurance

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.

    This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification.

  • ENCC: Designing and Implementing Cloud Connectivity

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Cloud Connectivity (ENCC) training helps you develop the skills required to design and implement enterprise cloud connectivity solutions.

    You will learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You will explore the basic concepts surrounding public cloud infrastructure and how services like Software as a Service (SaaS), Direct Internet Access (DIA), and Cisco Umbrella can be integrated.

    You will practice how to analyze and recommend connectivity models that are scalable, resilient, secure, and provide the best quality of experience for users. You will learn to implement both Internet Protocol Security (IPsec) and Software-Defined Wide-Area Network (SD-WAN) cloud connectivity, as well as build overlay routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). You will also implement control and data policies across the SD-WAN fabric and integrate Cisco Umbrella cloud security.

    Finally, you will practice troubleshooting cloud connectivity issues relating to IPsec, SD-WAN, routing, application performance, and policy application.

  • 5 Days ILT, VILT

    The Certified NIST Cybersecurity Consultant training course equips participants with the essential knowledge and skills required for cybersecurity compliance and resilience, based on NIST publications. It covers key NIST publications, including NIST SP 800-12 for information security fundamentals and best practices and NIST SP 800-53 for implementing security and privacy controls for information systems and organizations.

    This training course also covers the NIST risk management framework, guiding participants through the strategic management of cybersecurity risks. Additionally, participants can learn about NIST SP 800-171, focusing on protecting Controlled Unclassified Information in nonfederal systems and organizations.

    The course introduces the NIST Cybersecurity Framework’s core functions—Identify, Protect, Detect, Respond, and Recover— to effectively enhance an organization’s cybersecurity posture.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    ISO/IEC 27033 Lead Network Security Manager training course help participants gain a comprehensive understanding of the concepts, principles, methods, and design techniques used to implement and manage network security based on the ISO/IEC 27033 series of standards.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities to help them ensure compliance with European Union’s Digital Operational Resilience Act (DORA).

  • GCP-APPRUN: Application Development with Cloud Run

    Price range: RM7,200.00 through RM8,100.00
    3 Days ILT, VILT

    This course introduces you to fundamentals, practices, capabilities and tools applicable to modern cloud-native application development using Google Cloud Run.

    Through a combination of lectures, hands-on labs, and supplemental materials, you will learn how to design, implement, deploy, secure, manage, and scale applications on Google Cloud using Cloud Run.

  • CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

    In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

    This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • 180 Days ILT, VILT

    The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.

    This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.

    This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • 1 Day ILT, VILT

    This course explores extending Copilot’s capabilities with Microsoft Graph connectors and custom engine copilots, guiding participants to choose the best development path. It concludes with agent management in the Microsoft 365 admin center.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 5 Days ILT, VILT

    The Prisma SD-WAN Design and Operation course introduces you to Palo Alto Networks next-generation Prisma SDWAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.

    This course is intended for people who must configure, maintain, and use wide-area networks that connect data centers, branch offices, and cloud-based assets and infrastructures.

  • EDU-210: Firewall 11.1 Essentials: Configuration and Management

    Price range: RM15,000.00 through RM16,125.00
    5 Days ILT, VILT

    Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

  • 3 Days ILT, VILT

    Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of troubleshooting the full line of Palo Alto Networks next-generation firewalls.
    Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall.

    Completing this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.

  • 4 Days ILT, VILT

    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in public cloud security and cybersecurity or anyone wanting to learn how to secure remote networks and mobile users.

  • 4 Days ILT, VILT

    Designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM.

    The course is designed to enable cybersecurity professionals, particularly those in SOC/CERT/CSIRT and Security Engineering roles, to use XSIAM. The course reviews XSIAM intricacies, from fundamental components to advanced strategies and automation techniques, including skills needed to navigate incident handling, optimize log sources, and orchestrate cybersecurity excellence.

  • 4 Days ILT, VILT

    Designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

    The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.

  • 3 Days ILT, VILT

    In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.

    Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.

    Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.

  • 3 Days ILT, VILT

    Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

    Customers want to learn how Red Hat Advanced Cluster Security for Kubernetes (RHACS) can help them solve their security challenges. However, their security teams might lack experience with Kubernetes and OpenShift, and so they have challenges with implementation. In particular, their security teams have several needs:

    • Integrate RHACS with DevOps practices and know how to use it to automate DevSecOps, to enable their teams to operationalize and secure their supply chain, infrastructure, and workloads
    • Assess compliance based on industry-standard benchmarks and get remediation guidance
    • Apply vulnerability management, policy enforcement, and network segmentation to secure their workloads

    RHACS customers might already be using external image registries and Security Information and Event Management (SIEM) tools. They need to integrate RHACS with their existing set of external components to achieve their security goals.

  • 5 Days ILT, VILT

    Official ISC2 Training Seminar for the Certified in Governance, Risk and Compliance (CGRC) provides a comprehensive review of the knowledge required for authorizing and maintaining information systems within the NIST Risk Management Framework. This training course will help students review and refresh their knowledge and identify areas they need to study for the CGRC exam.

    Content aligns with and comprehensively covers the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the CGRC CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CGRC and have completed intensive training to teach ISC2 content.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 2 Days ILT, VILT

    Use Red Hat OpenShift to manage OpenStack services and RHEL compute nodes that run VM-based workloads.

    The CL170: OpenStack Administration: Control Plane Management course helps Red Hat OpenStack cluster administrators to manage the health and performance of OpenStack control plane services, to troubleshoot issues by inspecting Kubernetes operators and workloads, and to configure OpenStack control plane services by using Kubernetes custom resources.

    This course is based on Red Hat OpenShift Services on OpenStack 18.

Go to Top