You searched for: ""

  • 3 Days ILT, VILT

    ITIL 4 Specialist: Collaborate, Assure & Improve

    The ITIL® 4 Specialist: Collaborate, Assure and Improve is a combined ITIL 4 practice module that aims to help IT professionals collaborate effectively, ensure quality, and drive improvement with a combination of five practices.

    The ITIL® 4 Specialist: Collaborate, Assure and Improve course covers the key concepts of five ITIL practices, namely:

    • Relationship Management
    • Supplier Management
    • Service Level Management
    • Continual Improvement
    • Information Security Management
  • 3 Days ILT, VILT

    ITIL 4 Specialist: Plan Implement and Control

    The ITIL® 4 Specialist: Plan, Implement and Control is a comprehensive combined practice module designed for IT professionals seeking to establish seamless cross-practice collaboration and optimize service value streams.

    The ITIL® 4 Specialist: Plan, Implement and Control course encompasses key concepts from five essential ITIL practices:

    • Change Enablement
    • Deployment Management
    • Release Management
    • Service Configuration Management
    • IT Asset Management
  • 3 Days ILT, VILT

    Master relationship-building with ITIL 4 Specialist: Business Relationship Management—designed for IT pros who manage and grow trusted partnerships between service providers and consumers.

    The ITIL 4 Specialist: Business Relationship Management module is for IT professionals who are involved in establishing and nurturing the relationships between service providers and consumer organizations, and their stakeholders.

    Based on the ITIL 4 framework, this ITIL 4 certification provides both strategic and practical best practice guidance to help organizations understand the value of Business Relationship Management as well as its key concepts and challenges. Professionals should be able to use these concepts to deliver return on investment in digital technology, develop and apply service relationship models and integrate Business Relationship Management in the organisation’s service value streams for a holistic and end-to-end approach.

  • 2 Days ILT, VILT

    The Cisco SD-WAN Operation and Deployment (SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.

    You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.

    The course will allow you to earn 12 Continuing Education (CE) credits toward recertification

  • ENCC: Designing and Implementing Cloud Connectivity

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Cloud Connectivity (ENCC) training helps you develop the skills required to design and implement enterprise cloud connectivity solutions.

    You will learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You will explore the basic concepts surrounding public cloud infrastructure and how services like Software as a Service (SaaS), Direct Internet Access (DIA), and Cisco Umbrella can be integrated.

    You will practice how to analyze and recommend connectivity models that are scalable, resilient, secure, and provide the best quality of experience for users. You will learn to implement both Internet Protocol Security (IPsec) and Software-Defined Wide-Area Network (SD-WAN) cloud connectivity, as well as build overlay routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). You will also implement control and data policies across the SD-WAN fabric and integrate Cisco Umbrella cloud security.

    Finally, you will practice troubleshooting cloud connectivity issues relating to IPsec, SD-WAN, routing, application performance, and policy application.

  • ENNA: Designing and Implementing Enterprise Network Assurance

    Price range: RM7,000.00 through RM8,350.00
    4 Days ILT, VILT

    The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.

    This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification.

  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

  • 2 Days ILT, VILT

    Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.

    ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

    As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.

    AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:

    • Evaluate and secure AI-enabled systems across the enterprise
    • Integrate AI into existing security operations and workflows
    • Identify and respond to risks tied to AI technologies
    • Reinforce governance, compliance and responsible innovation
  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 4 Days ILT, VILT

    This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.

  • 4 Days ILT, VILT

    This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.

    To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.

    Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.

    Hands-On Labs

    Eight labs are included to address:

    • IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
    • tuning VSAM and the VSAM buffers
    • alternate indexes
  • 3 Days VILT

    This 13.5 hour Advanced SOAR Implementation course is intended for experienced SOAR consultants who will be responsible for complex SOAR solution development, and will prepare the attendee to integrate SOAR with Splunk as well as develop playbooks requiring custom coding and REST API usage.

    Potential attendees have received a passing grade in all prerequisite courses, and must ensure they can devote all of their attention to the class, as the course work is very challenging. Students will develop a custom solution with SOAR, Splunk and custom Python code. The labs provide requirements for the solution; the student must plan and execute the development. This will require thoughtful focus, experimentation and problem-solving skills.

Go to Top