You searched for: ""

  • 5 Days ILT, VILT

    ISO/IEC 38500 Lead IT Corporate Governance Manager

    ISO/IEC 38500 Lead IT Corporate Governance Manager training enables you to acquire the expertise to support and lead an organization to successfully evaluate, direct and monitor an IT Governance model based on ISO/IEC 38500. During this training course, you will also gain comprehensive knowledge of the best practices and core principles of IT Governance and be able to effectively apply them in an organization in order to ensure good governance of IT.

    After mastering all the necessary concepts and core principles of IT Governance, you can sit for the exam and apply for a “PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager” credential. By holding a PECB Certificate, you will demonstrate that you have the professional capabilities and competencies to effectively govern the use of IT within an organization.

  • 2 Days ILT, VILT

    Computer Forensics Foundation training enables you to learn the basic elements to implement Computer Forensics processes. During this training course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.

    After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in Computer Forensics Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach.

  • 2 Days ILT, VILT

    The Cybersecurity Foundation training course offers an in-depth exploration of core cybersecurity principles and concepts aligned with industry best practices, such as ISO/IEC 27032 and NIST Cybersecurity Framework.

    As cyber threats continue to increase, organizations worldwide are searching for individuals who thoroughly understand cybersecurity principles and concepts. The PECB Cybersecurity Foundation training course directly responds to this demand, equipping participants with the necessary knowledge to actively contribute to implementing and managing robust cybersecurity programs.

    The PECB Cybersecurity Foundation training course covers fundamental concepts related to cybersecurity program implementation, attack mechanisms, threat mitigation measures, risk management, incident response best practices, and information sharing and coordination policies and procedures. By acquiring a comprehensive understanding of these aspects, participants will gain the required competencies to participate in cybersecurity management projects effectively.

  • 5 Days ILT, VILT

    The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities to help them ensure compliance with European Union’s Digital Operational Resilience Act (DORA).

  • 5 Days ILT, VILT

    Lead Cybersecurity Manager

    Organizations nowadays are affected by the ever-evolving digital landscape and constantly face new threats and complex and sophisticated cyberattacks. There is a pressing need for skilled individuals capable of effectively managing and implementing robust cybersecurity programs to counter these threats. Our Lead Cybersecurity Manager training course has been developed to address this need.

    By attending the PECB Certified Lead Cybersecurity Manager, participants will learn the fundamental cybersecurity concepts, strategies, methodologies, and techniques utilized to effectively establish and manage a cybersecurity program based on the guidance of international standards and industry best practices for cybersecurity. Additionally, this training course empowers participants to enhance their organization’s readiness and resilience against cyber threats. Participants will be well-prepared to support their organization’s ongoing cybersecurity efforts and make valuable contributions in today’s ever-evolving cybersecurity landscape.

  • 5 Days ILT, VILT

    Lead Forensics Examiner

    Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques.

    This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

    After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a “PECB Certified Lead Computer Forensics Examiner” credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition.

  • 5 Days ILT, VILT

    Lead Pen Test Professional

    Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills.

    This course is designed by industry experts with in-depth experience in the Penetration Testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, Web Application security, Mobile security and Social Engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts.

    Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises.

  • 5 Days ILT, VILT

    Master the implementation and management of SOC 2 framework to ensure organizational data privacy and security compliance.

    The Lead SOC 2 Analyst training course equips participants with the knowledge and skills necessary to support organizations in establishing and implementing security measures based on the SOC 2 requirements.

    These requirements are established by the American Institute of Certified Public Accountants (AICPA), specifying how service organizations should handle sensitive customer data based on five trust security services: security, availability, integrity, confidentiality, and privacy.

    In addition to earning proficiency in SOC 2, participants will also learn about the role of key stakeholders and the importance of working with other organizations to ensure effective compliance management and possess the necessary competencies to manage a SOC 2 implementation team.

  • 5 Days ILT, VILT

    The Certified NIST Cybersecurity Consultant training course equips participants with the essential knowledge and skills required for cybersecurity compliance and resilience, based on NIST publications. It covers key NIST publications, including NIST SP 800-12 for information security fundamentals and best practices and NIST SP 800-53 for implementing security and privacy controls for information systems and organizations.

    This training course also covers the NIST risk management framework, guiding participants through the strategic management of cybersecurity risks. Additionally, participants can learn about NIST SP 800-171, focusing on protecting Controlled Unclassified Information in nonfederal systems and organizations.

    The course introduces the NIST Cybersecurity Framework’s core functions—Identify, Protect, Detect, Respond, and Recover— to effectively enhance an organization’s cybersecurity posture.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    This NetApp course enables you to collect and analyze system performance data from NetApp® storage systems that run NetApp ONTAP® 9 software. You learn how to interpret data and how to identify and implement changes that improve system efficiency. You also learn how to use system commands and features to monitor and enhance storage system performance. You learn from hands-on exercises, case studies, and technical discussions.

  • -25%

    PL-200T00: Microsoft Power Platform Functional Consultant

    Price range: RM2,899.00 through RM3,874.00
    5 Days ILT, VILT

    Discover Microsoft Certified: Power Platform Functional Consultant Associate.

    Microsoft Power Platform empowers organizations to automate business processes, develop their own rich app experiences, and connect with customers better and faster.

    In this PL-200T00: Microsoft Power Platform Functional Consultant course, students will learn to perform discovery, capture requirements, engage subject matter experts and stakeholders, translate requirements, and configure Power Platform solutions and apps. They will supplement their learnings with hands-on labs to create application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and custom visualizations. Power Platform is comprised of four key products: Power Apps, Power Automate, Power BI, and Power Virtual Agents.

    In this Power Platform course, we will cover these four applications in depth, with additional focus on Microsoft Dataverse (formerly Common Data Service), AI Builder, connectors, and portals.

    Get Microsoft Power Platform certified with Microsoft Malaysia’s Learning Partner of the Year 2024 today.

  • 1 Day ILT, VILT

    This session will explore what is the concept of Report Automation where you can create Advanced Dynamic Report in few steps. Working with few useful options while cleaning & preparing data. Designing a data model with non-active relationship which help us in Realtime scenario. Will also make understand Customization in Dashboard.

Go to Top