• 3 Days ILT, VILT

    This digital workshop is essential for any business who seeks to optimize your digital presence and gain maximum online revenue opportunities. The workshop will introduce you to fundamental key digital marketing specialisms such as Paid Per Click (PPC) marketing and Search Engine Optimization(SEO) and social media marketing

    The program is developed in collaboration with the industry and consultation from digital industry experts(Global Industry Advisory Council) to design and develop standards that define the digital e-commerce skills and capabilities required of today’s professionals. The program deliver best current practice, theory and applied skills in digital, and are recognized and respected across all industry sectors.

    Attending the workshop, will ensure you have the essential skills and knowledge needed to excel as a digital e-commerce specialist. Through a series of comprehensive, structured modules you will know how to integrate key digital e-commerce tactics and practices into your digital marketing techniques and measure and iterate the success of your overall digital marketing plans.

    This course is provided in partnership with Sapience Consulting Pte. Ltd

  • 1 Day ILT, VILT

    The Securing WAN and SD-WAN 1-day workshop provides what is available from Cisco’s portfolio of solution to secure the Branch office and Software Defined WAN. Attendees will have the opportunity to go through preliminary design and implementation guidance for organizations looking to deploy an enterprise network that delivers an uncompromised secured user experience over any WAN connection. There is a plethora of security solutions that Cisco offers to have a secure WAN connectivity like DMVPN, Zone-based Firewall, Stealth watch, Cisco Umbrella, Snort IPS, FirePOWER and Introduction to Software Defined WAN. The course is focused on real world use cases which attendees can easily understand and relate.

  • 1 Day ILT, VILT

    Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.

  • 2 Days ILT, VILT

    This course broadens the skills of the student who are required to implement and manage a Kubernetes-based Platform as a Service (PaaS) environment based on Red Hat OpenShift Container Platform on Power Systems. The course covers basic administration and configuration of Red Hat OpenShift Container Platform within a POWER processor-based server configured with IBM PowerVC. Hands-on exercises reinforce the lecture material, and allow students to use the Red Hat OpenShift Container Platform to work with images, applications, and manage a cluster.

  • 2 Days WBT

    This course covers the steps to follow to update a Red Hat OpenShift Container Platform 4.3.18 environment on Power Systems to 4.3.23.  Lessons learned, and hints and tips will be provided to help you perform the update successfully.

  • 4 Days ILT, VILT

    System z continues to extend the value of the mainframe by leveraging robust security solutions to help meet the needs of today’s on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and life cycle management, improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z/OS Intrusion Detection Services. This advanced z/OS security course presents the evolution of the current z/OS security architecture and explores in detail the various technologies involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF), and z/OS Integrated Security Services.

    In the hands-on exercises, you begin with your own z/OS HTTP Server in a TCP/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication by using RACF, SSL and the use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services and RACF auto registration. You will also implement different scenarios to implement ssl security for a typical tcpip application; FTP: SSL, TLS, server authentication, client certificates and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures.

  • NULL Days Days ILT, VILT

    This course covers the concepts and implementation details of the software-defined networking and storage features of PowerVC on IBM Power Systems servers, known as IBM Cloud PowerVC Manager Software Defined Infrastructure (SDI). Students learn to implement a PowerVM infrastructure with software-defined storage based on IBM Spectrum Scale using NovaLink in SDE-mode, and software-defined networking based on Open vSwitch (OVS). Methods for capturing, deploying, and managing virtual machines in a software defined infrastructure are also explored.

  • 5 Days ILT, VILT

    The Perl Programming course is a comprehensive course that explains the Perl programming language, from basic through advanced syntax. This course is aimed at a wide range of job roles, including Programmers, System Administrators, Web Authors, and Operators. The course provides the fundamentals needed to use the Perl programming language to write quick yet powerful scripts for a range of purposes, as well as provides an overview of Common Gateway Interface Programming, Object-Oriented Perl and Perl Debugging.

    The course is taught on the Oracle Solaris Operating Environment. However, the material is suitable for any operating system, including Linux, UNIX, and Windows.

    Learn To:

    • Describe the Perl Programming Language.
    • Implement Scalars.
    • List Control Structures.
    • Implement Arrays.
    • Describe Hashes.
    • Implement Basic I/O and Regular Expressions.
    • Describe Subroutines and Modules.
    • Manipulate Files and Directories.
    • Implement Perl.

    Benefits To You

    The Perl Programming course provides students with the fundamentals to create functional Perl scripts. The course introduces students to data structures, flow control mechanisms, regular expressions, and subroutines and modules in the form of example scripts and lab scripts. The course concludes with an overview of implementing Perl with regard to Common Gateway Interface (CGI) Programming, Object-Oriented Perl and Perl Debugging. This course however, does not cover the construct of the Perl Programming Language itself or complex Perl functions used for high-level programming. Rather, it focuses mainly on the implementation of the language to create simple and functional Perl scripts.

  • 1 Day

    This course teaches developers, database administrators, and system programmers various features of SQL, including column functions, grouping, unions, subqueries, and maintaining data.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 1 Day SPVC

    This course is intended for Developers, Database Administrators, and System Programmers who require further insight into the SQL language.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 1 Day WBT

    This course is designed to introduce students to IBM Data Science Experience. The course covers how to create and set up a project and to be familiar with how to create, code, collaborate, and share notebooks while working with a variety of data sources to analyze data.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 1 Day WBT

    This offering teaches cloud database support staff how to manage access of users and privileges to a dashDB for Analytics or dashDB for Transactions database.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self study and videos (including audio) that demonstrate the hands-on activity.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 1 Day ILT, VILT

    IBM FlashSystem 9100 system is an all-flash, powerful end-to-end Non-Volatile Memory Express (NVMe) enterprise storage solution that combines the performance of IBM FlashCore technology.
    FlashSystem 9100 is built on the efficiency of IBM Spectrum Virtualize, and delivered on a proven IBM software solution with extremely low latencies for your multi cloud deployments.

    This course introduces the FlashSystem 9100 NVMe Control Enclosure models: IBM 9846/9848 FlashSystem 9110, Model AF7 and IBM 9846/9848 FlashSystem 9150, Model AF8.
    It also focuses on the integration of FlashSystem 9100 SAS-Attached expansion enclosures; scalability performance with NVMe; and the intuitive sight of IBM Storage Insights which helps optimize the storage infrastructure using predictive analytics.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 1 Day ILT, VILT

    Generative Artificial Intelligence (AI) is becoming more accessible through comprehensive development platforms like Azure AI Foundry. Learn how to build generative AI applications that use language models to chat with your users.

    As of 13th June, the AI-102 Develop AI Solutions in Azure course has been updated and restructured by combining together these five 1-day AI courses into a single, comprehensive learning experience:

    This update provides learners with a more cohesive and in-depth journey through key AI concepts and applications.

  • 1 Day ILT, VILT

    Learn how to harness the power of Apache Spark and powerful clusters running on the Azure Databricks platform to run large data engineering workloads in the cloud.

  • 1 Day ILT, VILT

    This course covers generative AI engineering on Azure Databricks, using Spark to explore, fine-tune, evaluate, and integrate advanced language models. It teaches how to implement techniques like retrieval-augmented generation (RAG) and multi-stage reasoning, as well as how to fine-tune large language models for specific tasks and evaluate their performance.

    Students will also learn about responsible AI practices for deploying AI solutions and how to manage models in production using LLMOps (Large Language Model Operations) on Azure Databricks.

  • 2 Days ILT, VILT

    Certified Scrum Master(CSM) certification training from Scrum Alliance is a widely recognized Scrum certificate in the world. Designed to help the team coaches learn how to maximize the potential of the product development teams. Our 2-day CSM Training and classroom workshop delivered by an expert and Certified Scrum Trainer (CST) provides tested and practical techniques for data-based iterative product management within Scrum using videos, activities and exercises, that are conducted by expert trainers.

    The Certified Scrum Master certification builds on your foundational scrum knowledge with enhanced implementation skills and helps distinguish yourself in the global marketplace and stand out as a member of the Scrum Alliance community.

  • 2 Days ILT, VILT

    Product owners have a unique and demanding role on agile teams. A product owner decides what the team will create next in order to deliver more value to the customer. In a Certified Scrum Product Owner (CSPO) class, you’ll learn the framework, principles, and values that make scrum work, plus key skills and tools you need to be effective.

    You will discover how to juggle multiple stakeholders’ needs, get hands-on practice creating a product vision, and learn new ways to get to know your customers so that you can choose the right next piece of value to bring to market for them.

    Participants in a CSPO offering should expect that each Learning Objective identified in this document will be covered. Students should also expect that the Scrum Foundations Learning Objectives are covered either before or during the offering.

  • CT-SECAI: CompTIA SecAI+

    Price range: RM4,500.00 through RM5,710.00
    5 Days ILT, VILT

    CompTIA SecAI+ enables a safer digital future by empowering IT and cybersecurity talent worldwide to meet the emerging challenges and opportunities at the intersection of AI and security.

    This cybersecurity credential from CompTIA is the global IT industry’s first comprehensive “expansion” certification focused on the security of artificial intelligence systems and the secure application of AI in cybersecurity operations.

    This certification equips professionals with critical, vendor-neutral skills to understand, defend, and ethically deploy AI technologies within any organization.

  • 3 Days ILT, VILT

    This three-day FDTBF: Fintech and Digital Transformation in Banking and Finance course aims to provide finance professionals with a solid foundation in the rapidly changing world of fintech and digital banking. FinTech, short for financial technology, refers to an emerging financial services sector that is fast becoming indispensable to financial institutions and is constantly impacting the way we view and execute financial transactions.

    This course will be pivotal in helping participants grasp the basics of fintech, navigate the mechanisms that facilitate it and comprehend the inevitably complex issues and intricacies that it brings.

    Benefits of the workshop are:

    • Understand the technologies that are impacting the economy, especially banking
    • Theoretical understanding of artificial intelligence (AI), the blockchain and Internet of Things (IoT) within FinTech
    • Broad applications grasp of technical/process solution to existing pain points
    • Develop business use case to develop/improve a new/existing product
    • Develop a competitive corporate strategy through innovative thinking
    • Significantly reduce business costs and improve efficiencies
  • 5 Days ILT, VILT

    The course also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The course also includes case studies that are useful for deployment scenarios and remote labs.

  • 4 Days VILT

    AC helps you understand Business Technology Strategy (BTS) and Iasa IT Architecture Body of Knowledge (ITABoK).

    Find out how to apply skills from the five foundational pillars of ITABoK as well as distinguish key architecture concepts, scopes, principles, contexts and roles. Adopt industry frameworks and components alongside basic IT Architect skills and define values, as well as create IT’s business capabilities. Find out what it takes to set up an IT Architecture Office (ITAO) and how to run its day-to-day tasks as an IT Architect. Finally, learn how to select and priorities IT projects, assign resources for them, work hand in hand with the Project Management office and present technology values to stakeholders.

  • 5 Days ILT, VILT

    The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

    The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

    It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

    This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

Go to Top