You searched for: ""

  • B6098G: IBM Cognos Analytics – Author Active Reports v11.0

    Price range: RM1,470.00 through RM2,060.00
    1 Day ILT, VILT

    This course provides participants with an understanding of Active Report content and functionality within IBM Cognos Analytics – Reporting. Through lecture, demonstrations, and exercises, participants increase their IBM Cognos Analytics experience by building highly interactive reports using Active Report controls, which can then be distributed to and consumed by users in a disconnected environment, including on mobile devices.

  • 4 Days ILT, VILT

    This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation to publishing of metadata to the web, enabling end-users to easily author reports and analyze data.

  • 2 Days ILT, VILT

    This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.

  • Out of stock
    3 Days ILT, VILT

    This offering introduces business and professional authors to the basics of creating reports using relational data models. Techniques to improve, personalize and manage professional relationships will be explored. During this training, activities will illustrate and reinforce the concepts.

  • 3 Days ILT, VILT

    This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.

  • 2 Days ILT, VILT

    This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course.

    Activities will illustrate and reinforce key concepts during this learning activity.

  • 2 Days ILT, VILT

    This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity.

  • B6252G: IBM Cognos Framework Manager: Design Metadata Models v11.x

    Price range: RM4,200.00 through RM6,240.00
    4 Days ILT, VILT

    This B6252G: IBM Cognos Framework Manager: Design Metadata Models v11.x offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager.

    Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data.

  • 2 Days ILT, VILT

    This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment.

    In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.

  • B6258G: IBM Cognos Analytics: Author Reports Fundamentals v11.1.x

    Price range: RM3,150.00 through RM5,200.00
    3 Days ILT, VILT

    This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.

  • B6259G: IBM Cognos Analytics: Author Reports Advanced v11.x

    Price range: RM2,100.00 through RM3,685.00
    2 Days ILT, VILT

    This B6259G: IBM Cognos Analytics: Author Reports Advanced v11.x course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports.

  • 1 Day SPVC

    This B6289G: IBM Cognos Analytics: Dashboard Essentials v11.1.x course teaches authors how to create dashboards in IBM Cognos Analytics so users can explore and interact with their data and gain insight into their business. You will learn how to add data sources, create and interact with dashboards, and customize content for presentation. You will also learn how to create effective narratives by using stories, and how to use explorations to perform a deeper analysis on your data.

  • 1 Day ILT, VILT

    This training teaches data modelers how to model data using data modules in IBM Cognos Analytics. Users will learn how to create data modules from different sources, such as uploaded files. They will also identify how to customize their data modules by adding joins, calculations, and filters. In addition, they will examine how to group their data (for example, by using navigation paths), how to share their data modules with others, and how to make use of some advanced modeling techniques, such as relative date analysis.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 4 Days ILT, VILT

    Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.

    This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.

  • 5 Days ILT, VILT

    The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 2 Days ILT, VILT

    IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.

    This 2-days BQ203G: IBM QRadar SIEM Advanced Topics course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts.

    The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.

  • 5 Days

    This intensive 5-day training program is designed to equip supply chain professionals, executives, and C-level staff with the knowledge and skills needed to leverage blockchain and AI technologies to optimize their supply chain operations. Through a combination of lectures, interactive discussions, and hands-on exercises, participants will gain a deep understanding of how these technologies can enhance efficiency, reduce costs, and improve decision-making.

  • 3 Days ILT, VILT

    This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms.

  • 3 Days ILT, VILT

    This dynamic Blockchain Security course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.

  • 3 Days ILT, VILT

    This 3-days instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity.

    The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.

    The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. Due to the technical programming lab content covered in this course, it is not recommended for those without programming knowledge and experience.

  • -10%

    BUF-C01: Alibaba Cloud Business User (Practitioner)

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 3 Days ILT, VILT

    Configuring Cisco Catalyst 9800 and Intro to Wi-Fi 6 (C98WF6) is a course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits.

    This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to Wi-Fi 6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.

  • 3 Days ILT, VILT

    The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

  • -10%

    CAP-C01: Alibaba Cloud Architect

    Original price was: RM4,000.00.Current price is: RM3,600.00.
    2 Days ILT, VILT

    A Cloud Architect is responsible for designing and implementing scalable and resilient solutions on Alibaba Cloud. This advanced role requires deep technical knowledge of cloud services and networking best practices, enabling the architect to create effective solutions tailored to meet complex organizational needs.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 2 Days ILT, VILT

    This course provides guidance into the Process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Participants learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ‘just enough’ process and how to continually align process performance with overall business goals.

    A process owner is an individual accountable for the performance of a process and for ensuring the process delivers value to its stakeholders. Process owners manage the requirements of process stakeholders, translate those requirements into process performance objectives, and oversee the entire process design and improvement life cycle.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more. This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC):

    • planning
    • creating
    • testing
    • deploying an application.

    Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices to include secure requirement gathering, robust application design, and handling security issues in post development phases of application development.

    The CASE certification exam and training program prepare application security engineers, analysts, testers, and anyone with exposure to any phase of SDLC to build secure applications that are robust enough to meet today’s challenging operational environment by focusing not just on secure coding, but much more.

    This makes CASE one of the most comprehensive certifications on the market today. It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 2 Days ILT, VILT

    This CASM: Certified Agile Service Manager course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT’s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements.

    As Dev and Ops have been working in parallel with Dev focused on Agile/Scrum and Ops focused on ITSM/ITIL, this course strives to bring together individual achievements to deliver full business value. The course cross-pollinates Agile and ITSM practices to support end-to-end Agile Service Management so Dev starts to manage services instead of products and Ops and ITSM become more agile by scaling to “just enough” process leading to improved flow of work and time to value.

    Agile Service Management helps IT to meet customer requirements faster, improve the collaboration between Dev and Ops, overcome constraints in process workflows by taking an iterative approach to process design that will improve the velocity of process improvement teams to get more done. This course may be eligible for PMI’s PDUs.

  • 3 Days ILT, VILT

    Cisco Catalyst Center (formerly Cisco DNA Center) enables programmable interactions and integrations through APIs (Application Programming Interfaces) and event notifications. This feature allows network administrators and developers to build custom integrations, automate tasks, and enhance network operations within the platform. By leveraging programmability in Catalyst Center, users can extend the functionality of the platform, achieve innovation, business agility, and improved visibility across their network infrastructure by creating custom solutions tailored to their specific needs, driving operational efficiency within their network environments.

    CATCPF (Cisco Catalyst Center Programmability Integration Fundamentals) is a 3-day, instructor-led, Cisco Catalyst Center course that will help you to become familiar with programmable infrastructure concepts and integrations that support Catalyst Center and the Cisco Catalyst 9000 Series switch programming. In this course you will learn about production solutions that run on or interact with IOS-XE on the Catalyst 9000 switches and with Software Defined Access fabrics as well.

  • CATSP: ONTAP Troubleshooting

    Price range: RM14,558.00 through RM15,233.00
    4 Days ILT, VILT

    In this CATSP: ONTAP Troubleshooting course, you increase your proficiency as a NetApp ONTAP software engineer by learning how to troubleshoot ONTAP  environments. Specifically, you learn how to troubleshoot the management component, scale-out networking, NAS protocols (NFS and SMB), and SAN protocols (iSCSI).

    From lectures, demonstrations, and active exercises, you learn how to isolate issues, verify configurations, view logs, view trace messages, and use event management system messages for troubleshooting.

  • 5 Days ILT, VILT

    This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS

  • CBRCOR: Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

    Price range: RM8,500.00 through RM10,300.00
    5 Days ILT, VILT

    The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.

    This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.

  • 180 Days ILT, VILT

    The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for Cybersecurity (CBRFIR) training builds your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills.

    This training prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents. Additionally, you will be introduced to digital forensics, including the collection and examination of digital evidence on electronic devices and learn to build the subsequent response threats and attacks. You will also learn to proactively conduct audits to prevent future attacks.

    This training prepares you for the 300-215 CBRFIR v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Cybersecurity Forensic Analysis and Incident Response certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

  • CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals v1.0

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents.

    Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

    Price range: RM8,500.00 through RM9,850.00
    5 Days ILT, VILT

    The Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity (CBRTHD) training introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools.

    In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.

    This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Cybersecurity Specialist – Threat Hunting and Defending certification and satisfy the concentration requirement for the Cisco Certified Cybersecurity Professional certification.

    Continuing Education: Earn 40 CE credits towards recertification

Go to Top