You searched for: ""

  • 4 Days ILT, VILT

    Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

    Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 4 Days ILT, VILT

    Design, build, and deploy containerized applications on Red Hat OpenShift

    Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications (DO288) teaches you how to design, build, and deploy containerized software applications on an OpenShift cluster.

    Whether you are migrating existing applications or writing container-native applications, you will learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.

    The skills you learn in this course can be applied using all versions of Red Hat OpenShift, including Red Hat OpenShift on AWS (ROSA), Azure Red Hat OpenShift (ARO), and Red Hat OpenShift Container Platform.

    This course is based on Red Hat OpenShift 4.14.

  • 1 Day ILT, VILT

    While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.

    We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.

    Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.

    We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.

  • 1 Day ILT, VILT

    Get more done and unleash your creativity with Microsoft Copilot. In this learning path, you’ll explore how to use Microsoft Copilot to help you research, find information, and generate effective content.

    Lead the era of AI with Microsoft. Power your organization’s AI transformation with Microsoft Cloud. The AI you can trust.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!

  • 1 Day ILT, VILT

    Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

    • Level: Intermediate
    • Product: Microsoft DefenderMicrosoft Defender for EndpointMicrosoft Defender XDR
    • Role: Security Operations Analyst
    • Subject: Threat protection
  • 1 Day VILT

    This blended course is for Devops/SREs and Developers.

    The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
    find insights using analytics in charts and detectors and to create detectors for common use cases.

  • -33%

    SPLK-PUFS: Splunk Power User Fast Start

    Price range: RM12,000.00 through RM12,585.00
    4 Days VILT

    Expand your basic Splunk skill set with greater understanding of searching and reporting, creating objects, tags, models and more.

    Prepare for the Splunk Core Certified Power User exam with nine essential eLearning courses in a single registration. Learn about field extraction creation, correlation analysis, result modification and more.

    Discover opportunities in Malaysia’s growing digital economy. With billions of dollars invested by global tech giants like AWS, Microsoft, Google, and Oracle, Malaysia is rapidly emerging as a hub for digital innovation.​ The demand for certified Data and AI professionals has never been higher, making it the perfect time to elevate your career.

    Explore the top Data and AI certifications for 2025. Be the professional businesses are searching for—get Data & AI certified today!

  • 3 Days VILT

    The Splunk Core Certified Advanced Power User course is designed to take your Power User skills to the next level. It focuses on complex searching and reporting, advanced use cases of knowledge objects, and best practices for dashboards and forms.

  • 5 Days ILT, VILT

    The Rocheston Certified Artificial Intelligence Engineer (RCAI) training and certification program is a professional certification course that equips students with a profound understanding of the algorithms, applications, and tools used for Artificial Intelligence (AI) in today’s digital world.

    The RCAI training program is designed by Rocheston, a pioneering company in cybersecurity training and certification. It provides specialization in AI and its increasing role in several industries. It aims to prepare the students to solve complex AI problems and applications. Post certification, the students can work as AI Engineers or any interdisciplinary roles related to AI in corporate and industries.

    Also, the RCAI program series are accordant with CE standard, a high standard within Rocheston’s cybersecurity framework which ensures the candidates are learning the best and latest in the innovation field.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    Trend Vision One is a comprehensive cybersecurity platform designed to provide centralized visibility and control across your entire IT environment. It consolidates a wide range of security capabilities into a single platform, simplifying security operations and enhancing protection against modern threats.

    This multi-day, instructor-led course provides the in-depth knowledge and hands-on skills to effectively manage your Trend Vision One platform. You’ll learn about the platform, user roles, and the core responsibilities of an administrator.

  • 3 Days ILT, VILT

    This course provides a deep dive into the core principles of Zero Trust and equips you with the knowledge and skills to implement them effectively using Trend Vision One.

    You will learn how to configure and manage secure access rules, deploy Secure Access Modules, and ensure secure access to private applications, internet resources, and Al services. Through hands-on labs and real-world examples, you’ll gain practical experience in building and maintaining a robust Zero Trust security environment.

    You will gain practical experience in building and maintaining a Zero Trust security environment through hands-on labs and real world examples.

Go to Top