You searched for: ""

  • 1 Day ILT, VILT

    Harness the power of data with modern machine learning tools and techniques. In this one-day course, you will gain hands-on experience with machine learning libraries and toolkits such as Pandas, NumPy, Seaborn and scikit-learn.

    This course is lab heavy and provides hands-on experience with a variety of ML libraries and toolkits.

  • 1 Day ILT, VILT

    In this one-day course, you will learn to maximize the benefits of generative AI systems, mastering techniques that lead to optimal output as well as learning entirely new ways to generate and refine documents and images! Learn and practice with hands-on labs that will greatly improve your ability to fully leverage the power of generative AI systems.

  • 3 Days ILT, VILT

    The Oracle Private Cloud Appliance: Administration course teaches students about administration of the Private Cloud Appliance to provide Infrastructure as a Service. The course also teaches the policy driven provisioning of application servers, and management of the hardware configuration. The primary focus areas of this course include the administration of storage, network, memory, and CPU resources, and the management and monitoring of the Private Cloud Appliance components.

    Learn To: Review the hardware and software installed and configured in the Private Cloud Appliance. Monitor the health of hardware. Allocate memory, CPU, network, and storage resources for effective virtualization support. Create, deploy, manage, and delete virtual machines. Configure the allocation of IaaS resources. Configure the Private Cloud Appliance Oracle VM environment in which virtualized servers run. Provide Infrastructure as a Service with Oracle Enterprise Manager Cloud Control. Manage the efficient allocation of appliance resources. Design an effective disaster recovery solution for the Private Cloud Appliance. Perform a selection of activities on a simulated lab environment. Benefits To You The Oracle Private Cloud Appliance delivers on the promise of simplified cloud management. The converged infrastructure solution consists of preconfigured Oracle servers, network, and storage hardware and software. With this engineered system you create and maintain a highly configurable pool of memory, CPU, and storage resources for running applications in a virtualization environment.

    The administration procedures and techniques covered in this course enables: Cost reduction by eliminating multi-vendor integration. Eliminating the risk of cabling, hardware or software configuration errors. Reducing the amount of time taken to deploy new applications. Ensuring business continuity for IaaS consumers. This course teaches you to create, deploy and manage virtualized servers and configure the Private Cloud Appliance Oracle VM environment in which virtualized servers run.

  • 2 Days ILT, VILT

    The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner.

    Today’s technology is moving fast and changing the way we do business. Companies digitize all information by default, store their data in the cloud and use open source software. This raises information security issues related to network and system infrastructure.

    The EEHF: EXIN Ethical Hacking Foundation module covers the basic steps of ethical hacking: intelligence gathering, scanning computer network/systems, and penetrating systems. Candidates are expected to be very aware of the difference between legal and illegal hacking, and the consequences of misuse.

    In more detail the candidate will develop an understanding of the following topics:

    • Network sniffing (gathering information from network traffic)
    • Cracking a WEP and WPA(2) key from a wireless network
    • Network vulnerability scanning
    • Basic penetration of computer systems
    • Password cracking
    • Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)

    The EXIN Ethical Hacking Foundation exam tests the knowledge of the candidate on:

    • the basics of Ethical Hacking, and
    • the practice of Ethical Hacking.
  • 2 Days ILT, VILT

    Security in IT is not only becoming more important but also more sophisticated. In light of this, organizations are dedicating roles to the safeguarding of their data and systems. The EXIN Cyber & IT Security program is geared towards providing candidates with the required knowledge to understand the technical side of information security.

    It covers the theoretical background, detailed information about security infrastructure and goes into the vulnerabilities, risks, and required measures.

     

  • 2 Days ILT, VILT

    The EXIN SIAM™ Foundation credential validates a professional’s knowledge about bringing together multiple service providers to strive for a common goal in order to support the client organization’s agreed objectives for service delivery.

    This certification includes the following topics:

    •  introduction to SIAM
    •  SIAM implementation roadmap
    • SIAM roles and responsibilities
    • SIAM practices
    • processes to support SIAM
    • SIAM challenges and risks
    • SIAM and other practices.

    SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization. A synonym for Service Integration and Management (SIAM™) is multi-sourcing integration (MSI). In this certification, the term SIAM is used. The EXIN SIAM™ Foundation certification tests a candidate’s knowledge and understanding of the terminology and the core principles. The certification covers themes such as: potential benefits as well as the challenges and risks of implementing SIAM. It also includes examples of implementation structures, governance, tooling and data considerations and the common processes used in a SIAM ecosystem. A candidate who successfully completes this certification knows how SIAM delivers business value and is able to contribute to the implementation and use of SIAM in an organization.

  • 1 Day ILT, VILT

    COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.

  • SC-200T00: Microsoft Security Operations Analyst

    Price range: RM3,000.00 through RM3,374.00
    4 Days ILT, VILT

    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.

    In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

    This SC-200T00: Microsoft Security Operations Analyst training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 4 Days ILT, VILT

    This MB-320T00: Microsoft Dynamics 365 Supply Chain Management, Manufacturing course has six modules and designed for 4 days learning experience. It can be taught in-person and/or virtually. Your instructor(s) will provide you with the agenda for this course. Module 1 will introduce you to the configure need for Dynamics 365 Supply Chain Management, Manufacturing. Module 2 will get deeper into managing the different types of manufacturing processes. Module 3 will be your address implementing master planning for production. Module 4 will be tackle Implementing several manufacturing features. Module 5 will focus on subcontracting for product manufacturing.

  • 2 Days ILT, VILT

    Most of today’s IoT connections are industrial. Industrial IoT (IoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution.

    NB-IoT allows IoT devices to operate over carrier networks such as GSM and “guard bands” between LTE channels. NB-IoT needs only 200kHz of bandwidth and can efficiently connect large numbers of endpoint devices (up to 50,000 per NB-IoT network cell). Its low power requirements makes it ideal for use in small, uncomplicated IoT gadgets such as smart parking, utilities and wearables.

  • 2 Days ILT, VILT

    Docker is an open-source platform for automating the process of building, shipping and running applications inside containers. This instructor-led, live training (onsite or remote) is aimed at engineers who wish to use Docker to deploy and manage software as containers instead of as traditional stand-alone software.

  • 2 Days ILT, VILT

    Participants will be able to learn comprehensively about Jenkins that provides many plugins to support building, deploying and automating any project. At the end of this course, one would be able to exhibit a good understanding on Jenkins as an extensible automation server and also that it can be used as a simple CI server or turned into the continuous delivery hub for any project.

Go to Top