You searched for: ""

  • DATAPROT: ONTAP Data Protection Administration

    Price range: RM7,277.00 through RM7,952.00
    2 Days ILT, VILT

    Explore key concepts and techniques for protecting data on NetApp® ONTAP® based storage systems. Learn about the data protection solutions that are integrated in ONTAP software and examine the tools to manage ONTAP data protection features. In the hands-on exercises, use NetApp ONTAP System Manager and the ONTAP CLI to perform key data protection tasks. This course is updated for ONTAP 9.14.1 software.

  • 2 Days ILT, VILT

    Extend Agile beyond a single approach: Because true agility comes from freedom, not frameworks.

    Do you want to learn how to successfully lead one, or perhaps several agile teams? Are you looking to accelerate your ability to manage high-profile initiatives that are critical to enterprise success? Do you want to take business agility to the next level by applying agile and lean techniques in a wide range of situations, including non-software teams?

    Disciplined Agile Senior Scrum Master (DASSM) teaches experienced agile practitioners how to use the Disciplined Agile (DA) tool kit to optimize how teams work, work with allies within their organization, and solve a variety of advanced problems. This 14 PDU course will prepare you to take the DASSM exam and start using Disciplined Agile immediately within your leadership role.

  • 5 Days ILT, VILT

    The Perl Programming course is a comprehensive course that explains the Perl programming language, from basic through advanced syntax. This course is aimed at a wide range of job roles, including Programmers, System Administrators, Web Authors, and Operators. The course provides the fundamentals needed to use the Perl programming language to write quick yet powerful scripts for a range of purposes, as well as provides an overview of Common Gateway Interface Programming, Object-Oriented Perl and Perl Debugging.

    The course is taught on the Oracle Solaris Operating Environment. However, the material is suitable for any operating system, including Linux, UNIX, and Windows.

    Learn To:

    • Describe the Perl Programming Language.
    • Implement Scalars.
    • List Control Structures.
    • Implement Arrays.
    • Describe Hashes.
    • Implement Basic I/O and Regular Expressions.
    • Describe Subroutines and Modules.
    • Manipulate Files and Directories.
    • Implement Perl.

    Benefits To You

    The Perl Programming course provides students with the fundamentals to create functional Perl scripts. The course introduces students to data structures, flow control mechanisms, regular expressions, and subroutines and modules in the form of example scripts and lab scripts. The course concludes with an overview of implementing Perl with regard to Common Gateway Interface (CGI) Programming, Object-Oriented Perl and Perl Debugging. This course however, does not cover the construct of the Perl Programming Language itself or complex Perl functions used for high-level programming. Rather, it focuses mainly on the implementation of the language to create simple and functional Perl scripts.

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

  • 3 Days ILT, VILT

    This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.

  • 2 Days ILT, VILT

    This course will introduce the student to advanced database administration skills, including program preparation and the use of packages, online schema changes, partition management, and stored procedures; as well as performance and availability features of utilities (including LOAD, REBUILD INDEX, REORG, and UNLOAD). This course does not cover distributed data processing, nor does it cover data sharing.

  • 3 Days ILT, VILT

    This CV853G: Db2 12 for z/OS Introduction to System Administration course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system.

  • 3 Days ILT, VILT

    This course will expose the beginning z/OS DBAs (Database Administrators) to fundamentals of Database Administration for a Db2 12 for z/OS. This course will teach the students how to physically implement a logical database design using DDL, and teaches considerations of referentially related tables. This course discusses the use of basic utilities, program preparation, serialization, and basic database security. This course does not cover distributed data processing, nor does it cover data sharing.

  • 3 Days ILT, VILT

    This course enables you to acquire the skills necessary to produce application programs that manipulate DB2 databases. Emphasis is on embedding Structured Query Language (SQL) statements and preparing programs for execution.

  • 3 Days ILT, VILT

    DB2 11 for z/OS beginning DBAs can develop fundamental skills or recognition through lectures and hands-on exercises of:

    • DB2 Objects
    • Structured Query Language
    • DB2 Commands
    • DB2 Utilities
    • DB2 Logging
    • DB2 Program Preparation

    The course materials cover DB2 11 for z/OS.

  • 2 Days ILT, VILT

    This comprehensive course by DevOps Institute addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams.

    The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation.

    Actionable and exciting exercises will be used to apply the concepts covered in the course and sample documents, templates, tools, and techniques will be provided to leverage after the class.

  • CT-Tech: CompTIA Tech+

    Price range: RM2,800.00 through RM3,151.00
    3 Days ILT, VILT

    CompTIA Tech+ is the foundational certification program designed to build essential tech knowledge across a range of essential domains and provide instructors with the tools they need to guide learners toward a successful career in tech.

    As one of the top IT certifications for beginners globally, this course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.

Go to Top