You searched for: ""

  • DTB-DED: Data Engineering with Databricks

    Price range: RM6,750.00 through RM7,650.00
    2 Days ILT, VILT

    This is an introductory course that serves as an appropriate entry point to learn Data Engineering with Databricks.

    Below, we describe each of the four, four-hour modules included in this course.

    1. Data Ingestion with Lakeflow Connect

    This course provides a comprehensive introduction to Lakeflow Connect as a scalable and simplified solution for ingesting data into Databricks from a variety of data sources. You will begin by exploring the different types of connectors within Lakeflow Connect (Standard and Managed), learn about various ingestion techniques, including batch, incremental batch, and streaming, and then review the key benefits of Delta tables and the Medallion architecture.

    From there, you will gain practical skills to efficiently ingest data from cloud object storage using Lakeflow Connect Standard Connectors with methods such as CREATE TABLE AS (CTAS), COPY INTO, and Auto Loader, along with the benefits and considerations of each approach. You will then learn how to append metadata columns to your bronze level tables during ingestion into the Databricks data intelligence platform. This is followed by working with the rescued data column, which handles records that don’t match the schema of your bronze table, including strategies for managing this rescued data.

    The course also introduces techniques for ingesting and flattening semi-structured JSON data, as well as enterprise-grade data ingestion using Lakeflow Connect Managed Connectors.

    Finally, learners will explore alternative ingestion strategies, including MERGE INTO operations and leveraging the Databricks Marketplace, equipping you with foundational knowledge to support modern data engineering ingestion.

    2. Deploy Workloads with Lakeflow Jobs

    Deploy Workloads with Lakeflow Jobs course teaches how to orchestrate and automate data, analytics, and AI workflows using Lakeflow Jobs. You will learn to make robust, production-ready pipelines with flexible scheduling, advanced orchestration, and best practices for reliability and efficiency-all natively integrated within the Databricks Data intelligence Platform. Prior experience with Databricks, Python and SQL is recommended.

    3. Build Data Pipelines with Lakeflow Spark Declarative Pipelines 

    This course introduces users to the essential concepts and skills needed to build data pipelines using Lakeflow Spark Declarative Pipelines (SDP) in Databricks for incremental batch or streaming ingestion and processing through multiple streaming tables and materialized views. Designed for data engineers new to Spark Declarative Pipelines, the course provides a comprehensive overview of core components such as incremental data processing, streaming tables, materialized views, and temporary views, highlighting their specific purposes and differences.

    Topics covered include:

    – Developing and debugging ETL pipelines with the multi-file editor in Spark Declarative Pipelines using SQL (with Python code examples provided)

    – How Spark Declarative Pipelines track data dependencies in a pipeline through the pipeline graph

    – Configuring pipeline compute resources, data assets, trigger modes, and other advanced options

    Next, the course introduces data quality expectations in Spark Declarative Pipelines, guiding users through the process of integrating expectations into pipelines to validate and enforce data integrity. Learners will then explore how to put a pipeline into production, including scheduling options, and enabling pipeline event logging to monitor pipeline performance and health.

    Finally, the course covers how to implement Change Data Capture (CDC) using the AUTO CDC INTO syntax within Spark Declarative Pipelines to manage slowly changing dimensions (SCD Type 1 and Type 2), preparing users to integrate CDC into their own pipelines.

    4. Data Management and Governance with Unity Catalog

    In this course, you’ll learn about data management and governance using Databricks Unity Catalog. It covers foundational concepts of data governance, complexities in managing data lakes, Unity Catalog’s architecture, security, administration, and advanced topics like fine-grained access control, data segregation, and privilege management.

    * This course seeks to prepare students to complete the Associate Data Engineering certification exam, and provides the requisite knowledge to take the course Advanced Data Engineering with Databricks.

  • DTB-ASPD: Apache Spark Programming with Databricks

    Price range: RM6,750.00 through RM7,650.00
    2 Days ILT, VILT

    This course serves as an appropriate entry point to learn Apache Spark Programming with Databricks.

    Below, we describe each of the four, four-hour modules included in this course.

    Introduction to Apache Spark

    This course offers essential knowledge of Apache Spark, with a focus on its distributed architecture and practical applications for large-scale data processing. Participants will explore programming frameworks, learn the Spark DataFrame API, and develop skills for reading, writing, and transforming data using Python-based Spark workflows.

    Developing Applications with Apache Spark

    Master scalable data processing with Apache Spark in this hands-on course. Learn to build efficient ETL pipelines, perform advanced analytics, and optimize distributed data transformations using Spark’s DataFrame API. Explore grouping, aggregation, joins, set operations, and window functions. Work with complex data types like arrays, maps, and structs while applying best practices for performance optimization.

    Stream Processing and Analysis with Apache Spark

    Learn the essentials of stream processing and analysis with Apache Spark in this course. Gain a solid understanding of stream processing fundamentals and develop applications using the Spark Structured Streaming API. Explore advanced techniques such as stream aggregation and window analysis to process real-time data efficiently. This course equips you with the skills to create scalable and fault-tolerant streaming applications for dynamic data environments.

    Monitoring and Optimizing Apache Spark Workloads on Databricks

    This course explores the Lakehouse architecture and Medallion design for scalable data workflows, focusing on Unity Catalog for secure data governance, access control, and lineage tracking. The curriculum includes building reliable, ACID-compliant pipelines with Delta Lake. You’ll examine Spark optimization techniques, such as partitioning, caching, and query tuning, and learn performance monitoring, troubleshooting, and best practices for efficient data engineering and analytics to address real-world challenges.

  • 3 Days ILT, VILT

    Customers demand a scalable, secure, and manageable VMware SD-WAN™ by VeloCloud®. To deliver a successful solution you must understand VMware SD-WAN architecture, know how the features can solve customer use cases, and be able to design a VMware SD-WAN that can be easily deployed, managed, and expanded.

  • 3 Days ILT, VILT

    This three-day EDU-VSD7: VMware vSphere: Design [V7] training course equips you with the knowledge, skills, and abilities to design a VMware vSphere® 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices.

    This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.

    Given a case study, you practice your design skills by working with peers on a design project.

    Product Alignment

    • VMware ESXi™ 7
    • VMware vCenter Server® 7

  • 5 Days ILT, VILT

    This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems.

  • 5 Days ILT, VILT

    This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.

  • 3 Days ILT, VILT

    During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual machines, vSphere Pods, Supervisor Services, and VMware Tanzu® Kubernetes Grid™ clusters.

    You will also gain experience with day 2 operations and life cycle management of a vSphere with Tanzu environmen

  • UIPATH-RPAADD: RPA Advanced Design and Development v4.0

    Price range: RM6,500.00 through RM7,625.00
    5 Days ILT, VILT

    The Robotic Process Automation (RPA) Advanced Design and Development course aims at providing a deep understanding and extensive hands-on experience on UiPath technologies such as Studio, Robots, and Orchestrator. It prepares the student to independently build or lead production level automation and complex RPA solutions in the Robotic Enterprise Framework.

    The course should be delivered in an instructor-led training environment. It has a 20-hour theory component and an associated lab component followed by 20-hours of Project work. The course is based on UiPath Studio version 2020.10.

  • 4 Days ILT, VILT

    Digital and information technologies have changed the world. Every aspect of life has been impacted in some way by technology that did not exist just 50 years ago. Digital and information technologies have disrupted the business world, but they have also provided the keys to success. Each wave of innovation brings opportunities and capabilities to those organizations that are willing to change how they think and work.

    The disruptive nature of innovations like artificial intelligence, machine learning, virtual working, and internet of things is compounded by the frequency of the innovations. Organizations must adapt quickly and repeatedly; continually adjusting their strategies.

    The IITL 4 Leader: Digital and IT Strategy course adds a new perspective to the ITIL 4 guidance and elevates the discussion to an organizational strategy level.

    The course enables IT and digital leaders to influence and drive strategic business decisions through creating an appropriate digital strategy aligned to the wider business goals, understanding how business and IT leaders respond to digital disruption and exploiting the ITIL 4 framework to support organizations on their challenging digital transformation journey.

    The course will cover how ITIL 4 can be integrated with emerging practices and new technologies to meet new internal and external challenges in the age of volatility, uncertainty, complexity and ambiguity (VUCA).

    In this course, there is a mandatory case study assessment for student to pass prior to taking up the actual exam. This assessment is an open-book assessment with the passing score of 75% (30 correct out of 40).

  • 5 Days ILT, VILT

    Learn how to automate Linux system administration tasks with Red Hat Ansible Automation Platform.

    Red Hat Enterprise Linux Automation with Ansible and exam (RH295) is designed for Linux system administrators and developers who need to automate provisioning, configuration, application deployment, and orchestration.

    The Red Hat Certified Engineer (RHCE) exam (EX294) is included in this offering. This offering is based on Red Hat® Enterprise Linux 9 and Red Hat Ansible Automation Platform 2.2.

  • 3 Days ILT, VILT

    Whether you’re already delivering AI initiatives or eager to start, this certification gives you the structure and credibility to turn innovation into measurable, lasting value.

    With PMI-CPMAI you’ll learn how to:

    • Turn bold AI visions into clear, achievable project plans
    • Navigate fast-changing technologies without needing tool-specific training
    • Unite cross-functional teams around a shared process
    • Deliver outcomes that are ethical, measurable, and built to withstand business scrutiny

    No matter your role (Project Manager, technologist, data expert, or consultant) PMI-CPMAI helps you grow your skills and your career in a market that rewards professionals and AI-savvy leaders.

  • 5 Days ILT, VILT

    The PECB Chief Information Security Officer (CISO) training course is tailored for aspiring CISOs, providing them with the necessary knowledge, skills, and strategies to lead information security programs effectively and safeguard information and assets in today’s dynamic digital environment.

  • 5 Days ILT, VILT

    The Certified NIST Cybersecurity Consultant training course equips participants with the essential knowledge and skills required for cybersecurity compliance and resilience, based on NIST publications. It covers key NIST publications, including NIST SP 800-12 for information security fundamentals and best practices and NIST SP 800-53 for implementing security and privacy controls for information systems and organizations.

    This training course also covers the NIST risk management framework, guiding participants through the strategic management of cybersecurity risks. Additionally, participants can learn about NIST SP 800-171, focusing on protecting Controlled Unclassified Information in nonfederal systems and organizations.

    The course introduces the NIST Cybersecurity Framework’s core functions—Identify, Protect, Detect, Respond, and Recover— to effectively enhance an organization’s cybersecurity posture.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    ISO/IEC 27033 Lead Network Security Manager training course help participants gain a comprehensive understanding of the concepts, principles, methods, and design techniques used to implement and manage network security based on the ISO/IEC 27033 series of standards.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 5 Days ILT, VILT

    The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities to help them ensure compliance with European Union’s Digital Operational Resilience Act (DORA).

  • 5 Days ILT, VILT

    Master the implementation and management of information security incident management processes based on ISO/IEC 27035.

    The ISO/IEC 27035 Lead Incident Manager training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing a process for managing information security incidents.

    This training course is based on the ISO/IEC 27035 series and other good practices of incident management and covers the entire incident lifecycle, from incident planning to post-incident activities.

    In addition, participants will also learn about the role of key stakeholders and the importance of working with other organizations to handle information security incidents.

  • 5 Days ILT, VILT

    Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.

    The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.

    These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.

    In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

  • 5 Days ILT, VILT

    ISO/IEC 27002 Lead Manager.

    The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.

  • 5 Days ILT, VILT

    Lead Pen Test Professional

    Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills.

    This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts.

    Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises.

  • 5 Days ILT, VILT

    Lead Cybersecurity Manager

    Organizations nowadays are affected by the ever-evolving digital landscape and constantly face new threats and complex and sophisticated cyberattacks. There is a pressing need for skilled individuals capable of effectively managing and implementing robust cybersecurity programs to counter these threats. Our Lead Cybersecurity Manager training course has been developed to address this need.

    By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Additionally, this training course empowers participants to enhance their organization’s readiness and resilience against cyber threats. Participants will be well-prepared to support their organization’s ongoing cybersecurity efforts and make valuable contributions in today’s ever-evolving cybersecurity landscape.

  • 5 Days ILT, VILT

    ISO/IEC 38500 Lead IT Corporate Governance Manager

    ISO/IEC 38500 Lead IT Corporate Governance Manager training enables you to acquire the expertise to support and lead an organization to successfully evaluate, direct and monitor an IT Governance model based on ISO/IEC 38500. During this training course, you will also gain comprehensive knowledge of the best practices and core principles of IT Governance and be able to effectively apply them in an organization in order to ensure good governance of IT.

    After mastering all the necessary concepts and core principles of IT Governance, you can sit for the exam and apply for a “PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager” credential. By holding a PECB Certificate, you will demonstrate that you have the professional capabilities and competencies to effectively govern the use of IT within an organization.

  • PECB-27005LRM: ISO/IEC 27005 Lead Risk Manager

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27005 Lead Risk Manager

    The ISO/IEC 27005 Lead Risk Manager training course enables participants to acquire the necessary competencies to assist organizations in establishing, managing, and improving an information security risk management (ISRM) program based on the guidelines of ISO/IEC 27005.

    Apart from introducing the activities required for establishing an information security risk management program, the training course also elaborates on the best methods and practices related to information security risk management.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • PECB-27001LI: ISO/IEC 27001 Lead Implementer

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Implementer training course enables participants to acquire the knowledge necessary to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an information security management system (ISMS).

    Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.

    This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.

    After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • PECB-27001LA: ISO/IEC 27001 Lead Auditor

    Price range: RM3,600.00 through RM7,500.00
    5 Days ILT, VILT

    ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.

    During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

    Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.

    After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Be the reason your organization survives the next cyberattack:

  • 3 Days ILT, VILT

    The PMI Agile Certified Practitioner (PMI-ACP) formally recognizes your knowledge of agile principles and your skill with agile techniques. It will make you shine even brighter to your employers, stakeholders and peers.

    The PMI-ACP® is our fastest growing PMI certification, and it’s no wonder. Organizations that are highly agile and responsive to market dynamics complete more of their projects successfully than their slower-moving counterparts.

    The PMI-ACP spans many approaches to agile such as Scrum, Kanban, Lean, extreme programming (XP) and test-driven development (TDD.) So it will increase your versatility, wherever your projects may take you.

  • TDT-A: Tableau Desktop Training (Accelerated)

    Price range: RM6,300.00 through RM7,425.00
    3 Days ILT, VILT

    Familiarize yourself with Tableau Desktop quickly with curated content from Tableau Desktop I: Fundamentals and Tableau Desktop II: Intermediate.

    In this fast-paced, 3-day instructor-led course, you’ll learn both foundational and more advanced Tableau skills. Build a range of visualizations, customize your data to enhance your analysis, and implement interactive features to engage your audience.

  • OD-ISPT: Oracle Cloud Infrastructure Security Professional Training

    Price range: RM6,250.00 through RM7,312.00
    4 Days ILT, VILT

    As organisations increasingly migrate to cloud environments, securing cloud infrastructure has become a top priority. Oracle Cloud Infrastructure (OCI) offers robust security measures, and professionals skilled in OCI security are in high demand. This course equips delegates with the expertise to implement, manage, and enhance security within OCI, ensuring compliance, mitigating threats, and strengthening overall cloud security strategies.

    This course is ideal for security professionals, cloud architects, and IT administrators looking to deepen their understanding of OCI security. By mastering security best practices, access controls, and compliance frameworks, delegates can enhance their career prospects in cloud security. Gaining OCI security expertise will help them stand out in a competitive job market and open doors to advanced roles in cloud security and architecture.

    This 4-day course provided by The Knowledge Academy offers a structured approach to mastering OCI security. It provides practical insights into securing cloud environments, managing identities, and implementing best practices. Delegates will learn how to mitigate security risks, handle incidents, and align with industry regulations. Completing this course will validate their ability to secure OCI resources, boosting their credibility and career opportunities in cloud security.

  • OD-AI-MA: Oracle AI Database Multitenant Architecture

    Price range: RM6,250.00 through RM7,312.00
    4 Days ILT, VILT

    Use the Multitenant feature of Oracle AI Database for it to function as a container database (CDB), thereby improving resource utilization, management, and overall security. Learn the benefits, configuration, and management of container and pluggable databases, including backup, security, and data migration using Oracle AI Database. With hands-on practices, you’ll be able to reinforce the learning of the new Oracle Multitenant feature and its capabilities.

  • OD-19c-MA: Oracle Database 19c: Multitenant Architecture 

    Price range: RM6,250.00 through RM7,312.00
    4 Days ILT, VILT

    The best database architecture for the hybrid cloud.

    The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Through a blend of hands-on labs and interactive lectures, you will explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs).

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using ONTAP REST APIs and Ansible. Explore how to use the Ansible framework to automate and deploy storage administration tasks by calling ONTAP modules from Ansible playbooks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols.

  • 2 Days ILT, VILT

    Discover how to automate administration of a NetApp® ONTAP® based storage system by using modern ONTAP REST APIs and Python. Explore how to use the Python client library (PCL) in your Python program to automate storage administration tasks. Also, learn how to configure your system for SMB, NFS, Simple Storage Service (S3), and SAN protocols by writing Python programs.

  • 2 Days ILT, VILT

    Learn how to install, configure, and use NetApp® Astra Trident to manage Kubernetes with NetApp ONTAP® based storage systems. Deploy Astra Trident by using the Trident operator and use the tridentctl and kubectl methods to manage configurations.

    Configure NFS-backed, iSCSI-backed, and NVMe over TCP (NVMe/TCP) backed storage by using Astra Trident. Also, manage Snapshot copies, expand volumes, and import non-Astra Trident volumes to become managed volumes.

    Written for Kubernetes v1.29 and Astra Trident 24.02, this course includes an appendix on how to monitor Astra Trident by using Prometheus and Grafana.

  • 2 Days ILT, VILT

    Learn about the basic administration tasks of managing a Kubernetes cluster.

    Use the kubectl and kubeadm command-line tools and an integrated development environment (IDE) to provision cluster and network resources. Explain the configuration and deployment of basic workload objects and common Kubernetes cluster tasks.

    This course was written for the Kubernetes 1.29 release.

  • 2 Days ILT, VILT

    Learn how to work with and troubleshoot NetApp® Cloud Volumes ONTAP® for each supported public cloud provider. Use hands-on experience to collect and analyze troubleshooting data to better triage and resolve issues.

  • 2 Days ILT, VILT

    Learn how to administer NetApp ONTAP9 data-management software integrated security and compliance features. Learn how to create a secure IT environment according to Zero Trust principals such as ‘least privilege access’ and ‘encrypt everything’.

    This ONTAP Security and Compliance Solutions Administration course comprehensively describes the administration, configuration, and management of the integrated data security and compliance features in ONTAP 9, including data retention using SnapLock software and data integrity with autonomous ransomware protection.

  • 2 Days ILT, VILT

    In this 2-days IMPVMWAR: Implementing VMware vSphere on ONTAP instructor led course, you learn how to implement NetApp’s Virtual Storage Console by deploying, managing, and protecting a VMware virtual infrastructure in both SAN and NAS environments using ONTAP.

    This official NetApp training also covers the implementation details for both traditional datastores and Virtual Volumes using Storage Policy Based Management. Monitoring of both traditional and VVOL performance characteristics are covered in lecture and hands on labs. Updated to align with ONTAP v9.4.

Go to Top