You searched for: ""

  • CCNA: Implementing and Administering Cisco Solutions

    Price range: RM8,000.00 through RM9,350.00
    5 Days ILT, VILT

    Unlock the Potential of Network Programmability and Automation: Discover the new Cisco CCNA v2.0 course.

    The Implementing and Administering Cisco Solutions (CCNA) v2.1 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

    The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking, and sets the foundation for you to upgrade your skillset with Cisco’s professional-level certifications.

    This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification.

    To gain a comprehensive understanding of CCNA, be sure to explore our blog on The CCNA: A Beginner’s Guide to Networking Certifications, take a read today!

  • 5 Days ILT, VILT

    Become a Chief Cybersecurity Officer by enrolling into the Rocheston Certified Cybersecurity Compliance Officer (RCCO) Course. This course will equip you with skills for the next generation of cyberspace activities that the world is gearing up for. The Chief Cybersecurity Officer is the most coveted position in every company, academic organization and government agency around the world, that is replacing all other courses in the cybersecurity domain.

    As the cyberspace keeps evolving, it is important that organizations conform and adhere to the standards, regulations and requirements; as cyber technology will slowly take over and cybersecurity will become an essential part of life itself. Join this course to better equip yourself. The future is now.

  • 5 Days ILT, VILT

    Gain technical ability to match your technical knowledge.

    ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.

    CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

    This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.

  • 5 Days ILT, VILT

    Attackers never rest, and along with all the traditional threats targeting internal networks and systems, an entirely new variety specifically targeting the cloud has emerged.

    As more organizations adopt cloud-based systems, new complexities and challenges surface and the risks increase. Organizations need cloud security professionals with the requisite knowledge, skills and abilities to be able to audit, assess and secure cloud infrastructures.

    To address this need, ISC2 and the Cloud Security Alliance (CSA) have developed the Certified Cloud Security Professional (CCSP) certification. This top cybersecurity credential reflects in-depth knowledge derived from hands-on information security and cloud computing experience. It validates practical know-how for professionals whose responsibilities involve cloud security architecture, design, operations and service orchestration.

    In this 5-day course you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this (ISC)² Certified Cloud Security Professional (CCSP) Exam Preparation course. This course covers the six domains of the Official (ISC)² CCSP Common Body of Knowledge (CBK®) and prepares you to take the CCSP exam to become a Certified Cloud Security Professional.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Certified Cybersecurity Technician

    This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

    EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

    To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

  • 2 Days ILT, VILT

    This CDEF: Continuous Delivery Ecosystem Foundation course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing, and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APIs and cultural considerations with Continuous Delivery.

    Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.

    Built upon the principles and practices highlighted in bestselling books such as “Continuous Delivery,” “Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations,” and more written by thought leaders in the DevOps movement. The Continuous Delivery Architecture course equips IT professionals with the broad-based competencies necessary in architecting and orchestrating effective and efficient automated deployment pipelines.

     

  • 4 Days ILT, VILT

    The CDPSE: Certified Data Privacy Solutions Engineer course is an intensive, four-day examination preparation program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the three domains covered in the CDPSE Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in the field of data privacy.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • CE031G: IBM DB2 Family Fundamentals

    Price range: RM504.00 through RM2,860.00
    2 Days ILT, VILT

    This course provides you with information about the functions of IBM’s DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms.

    DB2 runs under the z/OS, VM, Linux, UNIX, and Windows operating systems, to name a few.

    The course includes discussion of how the DB2 products provide services. The focus is on the services DB2 provides and how we work with DB2, not on its internal workings.

  • 2 Days ILT, VILT

    This CE121G: IBM DB2 SQL Workshop course provides an introduction to the SQL language.

    This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment.

  • 3 Days ILT, VILT

    The CE131G: IBM DB2 SQL Workshop for Experienced Users course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows.

  • -10%

    CEA-C01: Alibaba Cloud Engineer

    Original price was: RM4,000.00.Current price is: RM3,600.00.
    2 Days ILT, VILT

    A Cloud Engineer is responsible for understanding Alibaba Cloud services to create, configure, and manage cloud resources. This foundational role is essential for advancing to specialized positions and plays a key part in supporting cloud operations within an organization through effective resource management and collaboration.

    Limited time offer: 10% OFF All Alibaba Cloud Courses!

  • 5 Days ILT, VILT

    Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.

    The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

    This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.

Go to Top