You searched for: ""

  • CT-Tech: CompTIA Tech+

    Price range: RM2,800.00 through RM3,151.00
    3 Days ILT, VILT

    CompTIA Tech+ is the foundational certification program designed to build essential tech knowledge across a range of essential domains and provide instructors with the tools they need to guide learners toward a successful career in tech.

    As one of the top IT certifications for beginners globally, this course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.

  • 2 Days ILT, VILT

    Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.

    ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

    As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.

    AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:

    • Evaluate and secure AI-enabled systems across the enterprise
    • Integrate AI into existing security operations and workflows
    • Identify and respond to risks tied to AI technologies
    • Reinforce governance, compliance and responsible innovation
  • -17%

    AWS-AAIF: Agentic AI Foundations

    Price range: RM1,500.00 through RM1,800.00
    1 Day ILT, VILT

    This one-day Agentic AI Foundations course guides you through building autonomous, goal-driven AI agents using AWS technologies.

    What will you get out of this course:

    • Understand how Agentic AI differs from traditional conversational systems
    • Explore tools such as Amazon Q, Kiro, and Amazon Bedrock Agents/AgentCore
    • Learn design patterns, architectural strategies, and observability practices for agent systems

    By the end of the course, you will be able to:

    • Distinguish between workflow, autonomous, and hybrid agents
    • Select suitable AWS services for agent development
    • Develop basic implementation patterns and interoperability strategies
    • Explain how to monitor, optimize, and scale agentic systems
  • 1 Day ILT, VILT

    This course provides a comprehensive guide to designing and implementing platform engineering within modern enterprises. It covers the foundational principles, strategic alignment with business goals, and the practical aspects of building scalable, secure, and future-proof platforms.

    By taking this course, learners will gain the knowledge and skills needed to enhance developer productivity, ensure operational excellence, and drive continuous innovation.

  • 1 Day ILT, VILT

    Build intelligent Microsoft Teams apps using the LLMs and AI components of your choice with Teams AI Library. These custom copilots can also be used to extend Microsoft Copilot for Microsoft 365.

  • 3 Days ILT, VILT

    This intensive three-day, instructor-led course provides certified professionals with the knowledge and hands-on experience to master Trend Vision One’s SecOps capabilities.

    You will delve into the concepts of Security Operations, learn how to connect Trend Micro and third-party products, install SecOps sensors, navigate workbenches, incorporate threat intelligence, search the data lake, and automate responses using Security Playbooks.

    Through a combination of expert instruction and hands-on lab exercises, you will gain the practical skills necessary to effectively utilize Trend Vision One for comprehensive threat detection. investigation, and response.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v3 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v3 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • 5 Days ILT, VILT

    In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.

    The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.

    The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.

    The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.

  • 1 Day

    Welcome to “Supercharging Productivity with Gemini in Google Workspace.” In the modern workplace, efficiency is not just about working harder, but smarter. Your Google Workspace (Docs, Sheets, Slides, Gmail, etc.) is the hub of your daily activity.

    This course is designed to transform your relationship with these familiar tools by integrating the power of Gemini directly into your workflow. We will move beyond theory to provide hands-on, practical strategies for using Gemini as an intelligent collaborator within your documents, spreadsheets, presentations, and communications, turning everyday tasks into opportunities for accelerated productivity and innovation.

  • 1 Day ILT, VILT

    This course explores how to work smarter with Copilot in Microsoft Fabric. Learn how to integrate, transform, store data, and create insightful reports using Copilot in Microsoft Fabric.

    • Level: Intermediate
    • Product: Microsoft Fabric
    • Role: Data Analyst, Data Engineer, Data Scientist
    • Subject: Data analytics, Data engineering, Data integration, Data management, Data modeling, Data storage, Data visualization
  • -20%

    EDU-VCFBMS: VMware Cloud Foundation: Build, Manage, and Secure [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates.

    In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.

  • -20%

    EDU-VCFAOP: VMware Cloud Foundation: Automate and Operate [V9.0]

    Price range: RM10,800.00 through RM13,500.00
    5 Days ILT, VILT

    This five-day course provides you with the knowledge, skills, and abilities to achieve competence in automating and operating a VCF private cloud using VMware Cloud Foundation® Automation and VMware Cloud Foundation® Operations.

    • learn about the architecture of VCF Automation, provider and organization management, provider and organization networking, and content library management.
    • covers blueprints, catalogs, Supervisor management, and deploying workloads using the Catalog and IaaS portals.
    • learn about VCF Operations overview, architecture, and navigating the user interface.
    • explore customizing alerts, views, reports, dashboards, and policies.
    • explains VCF logs, storage, and network operations, health and diagnostics, service discovery, and application monitoring concepts.
Go to Top