You searched for: ""

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 3 Days ILT, VILT

    COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance.  In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.

    COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.

    COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.

  • 4 Days ILT, VILT

    This ITIL4-HVIT: ITIL 4 Specialist High Velocity IT certification module provides the candidate with an understanding of the ways in which digital organizations and digital operating models function in high velocity environments, focusing on rapid delivery of products and services to obtain maximum business value. Take what was established as THE best practice guidance of IT Service Management – then make it better.

    ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL 4 Specialist: High Velocity IT (HVIT) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding practitioners who work in organizations that are becoming more digitally enabled. It will help those who are familiar with traditional IT and service management concepts to discuss ‘digital’ confidently, develop practical competencies, and integrate new concepts, techniques, and technologies into their ways of working. It also covers Agile and Lean, and technical practices and technologies such as the Cloud, Automation, and Automatic Testing.

    This interactive course is essential to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 High Velocity IT qualification is one of the pre-requisites for the designation of ITIL4 Managing Professional.

  • 4 Days ILT, VILT

    This ITIL4-DSV: ITIL 4 Specialist Drive Stakeholder Value certification module provides the candidate with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers, and partners, including key customer/user experience and journey mapping concepts. Take what was established as THE best practice guidance of IT Service Management – then make it better.

    ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Specialist: Drive Stakeholder Value (DSV) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding stakeholders, whether they are customers or service providers, through the principles and practices of co-creating value through services.

    This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 Drive Stakeholder Value qualification is one of the prerequisites for the designation of ITIL 4 Managing Professional which assesses the candidates practical and technical knowledge about how to run successful, modern, IT-enabled services, teams, and workflows.

  • 4 Days ILT, VILT

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Strategist: Direct, Plan and Improve (DPI) course helps ITSM practitioners acquire further insight into ITIL 4 – specifically in the areas that contribute to creating and sustaining an IT organization steeped in the growth mindset.

    The ITIL4-DPI: ITIL 4 Strategist Direct Plan and Improve certification course covers both practical and strategic elements related to improvement. Lean and Agile methodologies and techniques, a feature of ITIL 4, is embedded into directing, planning and improving services in support of business objectives. This interactive course is indispensable to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking to innovate and improve IT services delivered to the business.

    Level up your skills and stand out with a globally recognized ITIL 4 certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 4 Days ILT, VILT

    Digital and information technologies have changed the world. Every aspect of life has been impacted in some way by technology that did not exist just 50 years ago. Digital and information technologies have disrupted the business world, but they have also provided the keys to success. Each wave of innovation brings opportunities and capabilities to those organizations that are willing to change how they think and work.

    The disruptive nature of innovations like artificial intelligence, machine learning, virtual working, and internet of things is compounded by the frequency of the innovations. Organizations must adapt quickly and repeatedly; continually adjusting their strategies.

    The IITL 4 Leader: Digital and IT Strategy course adds a new perspective to the ITIL 4 guidance and elevates the discussion to an organizational strategy level.

    The course enables IT and digital leaders to influence and drive strategic business decisions through creating an appropriate digital strategy aligned to the wider business goals, understanding how business and IT leaders respond to digital disruption and exploiting the ITIL 4 framework to support organizations on their challenging digital transformation journey.

    The course will cover how ITIL 4 can be integrated with emerging practices and new technologies to meet new internal and external challenges in the age of volatility, uncertainty, complexity and ambiguity (VUCA).

    In this course, there is a mandatory case study assessment for student to pass prior to taking up the actual exam. This assessment is an open-book assessment with the passing score of 75% (30 correct out of 40).

  • 4 Days ILT, VILT

    Many city landmarks offer panoramic views from their observation decks. From a high viewpoint, the distances between some buildings might be closer and others further apart, than at first glance. Perspective is key and necessary component for the successful delivery of mature technology-enabled services.

    In service management, two vital elements for success are perspective and flexibility:

    • Perspective: understanding the overall picture of what a service does and how it is delivered. This involves a wide variety of skills, processes, knowledge, tools, and technologies to deliver business and customer value.
    • Flexibility: involves using the portfolio of tools and artefacts appropriately within complex environments. Service management is not a one-size-fits-all approach. The expectations around the customer experience and business value cannot be met with a single and isolated view.

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution.

    The ITIL 4 Specialist: Create, Deliver and Support (CDS) course helps ITSM practitioners assimilate further into the emerging practices of ITIL4 – specifically in the areas of the Service Value Stream and the use of the Value Stream with a specific focus on the creation, delivery and support of new services, and the provisioning of user support.

    Relevant supporting ITIL Practices to these value streams are examined. Team collaboration, integration and organizational cultural aspects critical to the success of the adoption of the value streams are discussed. The course also covers the management and prioritization of work through several techniques and scrutinizes the contribution of continual improvement.

    This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business.

  • 5 Days ILT, VILT

    This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.

    The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 1 Day ILT, VILT

    This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.

    A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.

    OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.

    OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.

     

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 3 Days ILT, VILT

    This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.

Go to Top