You searched for: ""

  • -10%

    CSA-C01: Alibaba Cloud Security Engineer

    Original price was: RM2,000.00.Current price is: RM1,800.00.
    1 Day ILT, VILT

    A Cloud Security Engineer is responsible for securing cloud workloads on Alibaba Cloud by implementing and managing robust security policies, practices, and technologies. This role emphasizes safeguarding applications and data from potential threats and vulnerabilities. The Cloud Security Engineer works closely with other roles to enhance the overall security posture

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 2 Days ILT, VILT

    Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint.

    Creating and Configuring Production ROSA Clusters (CS220) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch.

  • 2 Days ILT, VILT

    Learn how to deploy, access, and perform day-to-day operations to a ROSA cluster.

    This course teaches IT operations staff how to deploy a public Red Hat OpenShift Service on AWS (ROSA) cluster for experimentation and to provision projects for development teams to work within. IT operations staff will learn how to perform day-to-day operation of ROSA clusters and support application teams which use that cluster. IT operations staff can then apply the same skills and similar procedures to private ROSA clusters of their organizations.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, the CPENT: Certified Penetration Testing Professional teaches you how to perform an effective penetration test across filtered networks.

    The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies. In summary, there is no program of its kind in the world.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

    Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.

    Be the reason your organization survives the next cyberattack.

  • 3 Days ILT, VILT

    COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance.  In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.

    COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.

    COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.

  • 4 Days ILT, VILT

    The just-discharged COBIT 2019 is the best COBIT yet, highlighting numerous positive changes including adjusted standards, new structure factors, refreshed objectives course, altered procedures (from 37 to 40), refreshed execution the board, new point by point administration and the executives goals.

    This COBIT2019DAI: COBIT 2019 Design and Implementation course is planned for progressively experienced clients to COBIT who are keen on further developed utilization of the system, for example structuring administration frameworks and running administration improvement programs. This course requires the COBIT 2019 Foundation Certificate to be effectively accomplished. This two-day course is organized around the COBIT 2019 Design Guide and the COBIT 2019 Implementation Guide

  • 1 Day ILT, VILT

    COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.

  • 5 Days ILT, VILT

    The only true blue team network defense program!

    Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

    The only program built for the world’s largest work-from-home experiment!
    Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post pandemic world is every Network Defense Team’s acid test.

    The Certified Network Defender v2 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have for 5 reasons:

    • Only comprehensive network defense program built to incorporate critical
      secure network skills – Protect, Detect, Respond and Predict
    • Maps to NICE 2.0 Framework
    • Comes packed with the latest tools, technologies, and techniques
    • Deploys a hands-on approach to learning
    • Designed with an enhanced focus on Threat Prediction, Business Continuity
      and Disaster Recovery
  • CMESERIES: Configuring and Monitoring NetApp E-Series and EF-Series Storage Systems

    Price range: RM14,558.00 through RM15,233.00
    4 Days ILT, VILT

    In this course, you learn how to deploy, configure, and monitor NetApp ESeries or EF-Series storage systems. In the deployment phase, you use both the NetApp SANtricity® Storage Management and System Management software to create the configuration, perform administrative tasks, and employ data protection features.

    You also learn how to configure attached servers for I/O operations. During post-deployment, you use SANtricity Unified Manager and System Management software and to collect storage system information for trend analysis, troubleshooting, performance monitoring, and tuning.

  • Out of stock
    2 Days ILT, VILT

    Learn how to write application programs that use Data Language One (DL/I) to process terminal input and output messages in an Information Management System / Data Communications (IMS/DC) system.

  • Out of stock
    3 Days ILT, VILT

    Database Control (DBCTL) is an Information Management System (IMS) facility that provides CICS access to an IMS database subsystem. DBCTL provides access for CICS transactions to IMS managed databases. Get a detailed description of the activities required to install, tailor, maintain, and support an IMS DBCTL system. Additionally, learn about aspects of the IMS architecture that apply to database management and attaching to CICS systems and transactions.

Go to Top