fbpx

Class + Exam

Date: 17-21 October 2022

AWS-ARC Class

Date: 4-6 October 2022

AWS-TE + ARC + CPE exam

Date: 3-6 October 2022

This course builds upon and extends the DevOps practice prevalent in software development to build, train, and deploy machine learning (ML) models. The course stresses the importance of data, model, and code to successful ML deployments. It will demonstrate the use of tools, automation, processes, and teamwork in addressing the challenges associated with handoffs between data engineers, data scientists, software developers, and operations. The course will also discuss the use of tools and processes to monitor and take action when the model prediction in production starts to drift from agreed-upon key performance indicators.

The instructor will encourage the participants in this course to build an MLOps action plan for their organization through daily reflection of lesson and lab content, and through conversations with peers and instructors

  • Course level: Intermediate
  • Duration: 3 days

Additional Info

  • Certification Course only
  • Price 5400
  • Exam Price Exclude
  • Duration 3
  • Principals Amazon Web Services (AWS)
  • Schedule

    29-31 Mar 2023

    21-23 Jun 2023

    4-6 Oct 2023

  • Audience

    This course is intended for any one of the following roles with responsibility for productionizing machine learning models in the AWS Cloud:

    • DevOps engineers
    • ML engineers
    • Developers/operations with responsibility for operationalizing ML models
  • Prerequisities

    Required

    • AWS Technical Essentials course (classroom or digital)
    • DevOps Engineering on AWS course, or equivalent experience
    • Practical Data Science with Amazon SageMaker course, or equivalent experience

    Recommended

    • The Elements of Data Science (digital course), or equivalent experience
    • Machine Learning Terminology and Process (digital course)
  • At Course Completion

    In this course, you will learn to:

    • Describe machine learning operations
    • Understand the key differences between DevOps and MLOps
    • Describe the machine learning workflow
    • Discuss the importance of communications in MLOps
    • Explain end-to-end options for automation of ML workflows
    • List key Amazon SageMaker features for MLOps automation
    • Build an automated ML process that builds, trains, tests, and deploys models
    • Build an automated ML process that retrains the model based on change(s) to the model code
    • Identify elements and important steps in the deployment process
    • Describe items that might be included in a model package, and their use in training or inference
    • Recognize Amazon SageMaker options for selecting models for deployment, including support for ML frameworks and built-in algorithms or bring-your-own-models
    • Differentiate scaling in machine learning from scaling in other applications
    • Determine when to use different approaches to inference
    • Discuss deployment strategies, benefits, challenges, and typical use cases
    • Describe the challenges when deploying machine learning to edge devices
    • Recognize important Amazon SageMaker features that are relevant to deployment and inference
    • Describe why monitoring is important
    • Detect data drifts in the underlying input data
    • Demonstrate how to monitor ML models for bias
    • Explain how to monitor model resource consumption and latency
    • Discuss how to integrate human-in-the-loop reviews of model results in production
  • Module 1 Title Welcome
  • Module 1 Content
    • Course introduction
  • Module 2 Title Introduction to MLOps
  • Module 2 Content
    • Machine learning operations
    • Goals of MLOps
    • Communication
    • From DevOps to MLOps
    • ML workflow
    • Scope
    • MLOps view of ML workflow
    • MLOps cases
  • Module 3 Title MLOps Development
  • Module 3 Content
    • Intro to build, train, and evaluate machine learning models
    • MLOps security
    • Automating
    • Apache Airflow
    • Kubernetes integration for MLOps
    • Amazon SageMaker for MLOps
    • Lab: Bring your own algorithm to an MLOps pipeline
    • Demonstration: Amazon SageMaker
    • Intro to build, train, and evaluate machine learning models
    • Lab: Code and serve your ML model with AWS CodeBuild
    • Activity: MLOps Action Plan Workbook
  • Module 4 Title MLOps Deployment
  • Module 4 Content
    • Introduction to deployment operations
    • Model packaging
    • Inference
    • Lab: Deploy your model to production
    • SageMaker production variants
    • Deployment strategies
    • Deploying to the edge
    • Lab: Conduct A/B testing
    • Activity: MLOps Action Plan Workbook
  • Module 5 Title Model Monitoring and Operations
  • Module 5 Content
    • Lab: Troubleshoot your pipeline
    • The importance of monitoring
    • Monitoring by design
    • Lab: Monitor your ML model
    • Human-in-the-loop
    • Amazon SageMaker Model Monitor
    • Demonstration: Amazon SageMaker Pipelines, Model Monitor, model registry, and Feature Store
    • Solving the Problem(s)
    • Activity: MLOps Action Plan Workbook
  • Module 6 Title Wrap-up
  • Module 6 Content
    • Course review
    • Activity: MLOps Action Plan Workbook
    • Wrap-up
RM5,400.00(+RM324.00 Tax)
* Training Dates:

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

 

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

 

In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

 

The C|EH v12 also equips aspiring cybersecurity professionals with the tactics, techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses in nearly any type of target system before cybercriminals do.

 

The C|EH® v12 is a specialized and one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and global hacking competition. Stay on top of the game with the most in-demand skills required to succeed in the field of cybersecurity.

 

  1. LEARN
  • 5 days of training
  • 20 modules
  • 3000+ pages of student manual
  • 1900+ pages of lab manual
  • Over 200 hands-on labs with competition flags
  • Over 3,500 hacking tools - Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
  • MITRE Attack Framework
  • Diamond model of intrusion analysis
  • Techniques for establishing persistence
  • Evading NAC and endpoint security
  • Understand Fog, Edge, and Grid Computing Model

 

  1. CERTIFY

C|EH® ANSI

  • 125 Multiple-Choice Questions
  • 4 hours

C|EH® Practical

  • 6-hour Practical Exam
  • 20 Scenario-Based Questions

 

  1. ENGAGE
  • Conduct a real-world ethical hacking assignment
  • Apply the 5 phases
    • Reconnaissance
    • Scanning
    • Gaining Access
    • Maintaining Access
    • Covering Your Tracks

 

  1. COMPETE
  • New challenges every month
  • 4-hour competition
  • Compete with your peers all over the world
  • Hack your way to the top of the leaderboard
  • Gain recognition
  • Challenges include:
    • OWASP Top 10 Web Application Threat Vectors
    • Ransomware/ Malware Analysis
    • Outdated/Unpatched Software
    • System Hacking and Privilege Escalation
    • Web Application Hacking and Pen Testing
    • Cloud Attack/Hacking
    • and many more...

 

Content Included

  • eCourseware
  • Exam Voucher*
  • Next version of eCourseware
  • 6 months of official labs
  • C|EH Engage
  • Global C|EH Challenges
  • Exam Preparation
  • C|EH Practical Exam
  • 10 Ethical Hacking Video Library
  • 4 Exam Retakes**

*Exam retakes are included with every courseware package. Candidates may activate this benefit through the EC-Council student portal (ASPEN)

** Proctor administration fees will be applicable for each attempt of the retake examination

 

Additional Info

  • Certification Course & Certificate
  • Course Code CEH
  • Price 7800
  • Exam Price Include
  • Exam Code C|EH® ANSI & C|EH® Practical
  • Duration 5.5
  • Principals EC-Council
  • Audience
    • Mid-Level Information Security Auditor
    • Cybersecurity Auditor
    • Security Administrator
    • IT Security Administrator
    • Cyber Defense Analyst
    • Vulnerability Assessment Analyst
    • Warning Analyst
    • Information Security Analyst 1
    • Security Analyst L1
    • Infosec Security Administrator
    • Cybersecurity Analyst level 1, level 2, & level 3
    • Network Security Engineer
    • SOC Security Analyst
    • Security Analyst
    • Network Engineer
    • Senior Security Consultant
    • Information Security Manager
    • Senior SOC Analyst
    • Solution Architect
    • Cybersecurity Consultant
  • Prerequisities

    There are no specific prerequisites for the C|EH program, however we strongly recommend candidates possess a minimum of 2 years’ experience in IT security before joining a C|EH training program. C|EH training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those IT systems before attempting to hack them. (Example: C|EH will teach the process of host evaluation leading to enumeration, in this process trainees will scan downrange targets using common scanning techniques such as Nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The C|EH program will not teach you what a port is, that is essential knowledge you must have to be successful in the class.) If you do not possess the foundational skills in IT and Networking, we recommend starting with our free cybersecurity Essentials Series found here: https://www.eccouncil.org/academia/essentials

  • At Course Completion

    C|EH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.

     

    Ethical Hacking Labs

    With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.

  • Module 1 Title Introduction to Ethical Hacking
  • Module 2 Title Foot Printing and Reconnaissance
  • Module 3 Title Scanning Networks
  • Module 4 Title Enumeration
  • Module 5 Title Vulnerability Analysis
  • Module 6 Title System Hacking
  • Module 7 Title Malware Threats
  • Module 8 Title Sniffing
  • Module 9 Title Social Engineering
  • Module 10 Title Denial-of-Service
  • Module 11 Title Session Hijacking
  • Module 12 Title Evading IDS, Firewalls, and Honeypots
  • Module 13 Title Hacking Web Servers
  • Module 14 Title Hacking Web Applications
  • Module 15 Title SQL Injection
  • Module 16 Title Hacking Wireless Networks
  • Module 17 Title Hacking Mobile Platforms
  • Module 18 Title IoT and OT Hacking
  • Module 19 Title Cloud Computing
  • Module 20 Title Cryptography
RM7,800.00(+RM468.00 Tax)
* Training Dates:

Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

 

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. It is the most trusted ethical hacking certification that employers worldwide value, and for good reasons. The comprehensive curriculum covers the fundamentals of ethical hacking, foot printing and reconnaissance, scanning, enumeration, vulnerability threats, social engineering, SQL injection, and much more.

 

When you successfully achieve the C|EH certification, you will be equipped with every skill you need to uncover vulnerabilities and secure the systems, networks, applications, databases, and critical data from malicious hackers.

 

LEARN

  • 5 days of training
  • 20 modules
  • 3000+ pages of student manual
  • 1900+ pages of lab manual
  • Over 200 hands-on labs with competition flags
  • Over 3,500 hacking tools - Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
  • MITRE Attack Framework
  • Diamond model of intrusion analysis
  • Techniques for establishing persistence
  • Evading NAC and endpoint security
  • Understand Fog, Edge, and Grid Computing Model

Additional Info

  • Certification Course & Certificate
  • Course Code CEH
  • Price RM6200
  • Exam Price Include
  • Exam Code C|EH® ANSI
  • Duration 5 Days
  • Principals EC-Council
  • Schedule

    17-21 Oct 2022

    5-9 Dec 2022 (Penang)

    19-23 Dec 2022

  • Audience
    • Mid-Level Information Security Auditor
    • Cybersecurity Auditor
    • Security Administrator
    • IT Security Administrator
    • Cyber Defense Analyst
    • Vulnerability Assessment Analyst
    • Warning Analyst
    • Information Security Analyst 1
    • Security Analyst L1
    • Infosec Security Administrator
    • Cybersecurity Analyst level 1, level 2, & level 3
    • Network Security Engineer
    • SOC Security Analyst
    • Security Analyst
    • Network Engineer
    • Senior Security Consultant
    • Information Security Manager
    • Senior SOC Analyst
    • Solution Architect
    • Cybersecurity Consultant
  • Prerequisities

    There are no specific prerequisites for the C|EH program, however we strongly recommend candidates possess a minimum of 2 years’ experience in IT security before joining a C|EH training program. C|EH training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those IT systems before attempting to hack them. (Example: C|EH will teach the process of host evaluation leading to enumeration, in this process trainees will scan downrange targets using common scanning techniques such as Nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The C|EH program will not teach you what a port is, that is essential knowledge you must have to be successful in the class.) If you do not possess the foundational skills in IT and Networking, we recommend starting with our free cybersecurity Essentials Series found here: https://www.eccouncil.org/academia/essentials

  • At Course Completion

    C|EH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.

     

    Ethical Hacking Labs

    With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.

  • Module 1 Title Introduction to Ethical Hacking
  • Module 2 Title Foot Printing and Reconnaissance
  • Module 3 Title Scanning Networks
  • Module 4 Title Enumeration
  • Module 5 Title Vulnerability Analysis
  • Module 6 Title System Hacking
  • Module 7 Title Malware Threats
  • Module 8 Title Sniffing
  • Module 9 Title Social Engineering
  • Module 10 Title Denial-of-Service
  • Module 11 Title Session Hijacking
  • Module 12 Title Evading IDS, Firewalls, and Honeypots
  • Module 13 Title Hacking Web Servers
  • Module 14 Title Hacking Web Applications
  • Module 15 Title SQL Injection
  • Module 16 Title Hacking Wireless Networks
  • Module 17 Title Hacking Mobile Platforms
  • Module 18 Title IoT and OT Hacking
  • Module 19 Title Cloud Computing
  • Module 20 Title Cryptography
RM6,200.00(+RM372.00 Tax)
* Training Dates:

EX200 Lab exam

Date: 23rd September 2022

CySA+: CompTIA Cybersecurity Analyst

Date: 26th - 30th September

Thank You for signing up The Journey to Cloud Native webinar. A reminder will be emailed to you 2 days before the webinar. Stay tuned!

 

Follow us on Social Media:

 

Facebook: @Iverson Associates

Instagram: @iverson_associates

Linkedin: @Iverson Associates Sdn Bhd

Monthly e-Newsletter: Subscribe

 

Training Dates: 29 – 30 Aug, 1 Sep 2022 (PH on 31 Aug)

Duration: 3 Days

*Price inclusive of exam

 

Audience: 

This course is ideal for developers who are looking to gain skills in Kubernetes application development. Students should be familiar with the Linux command line, programming languages like Python, Node.js or Go, and have a basic understanding of cloud native application concepts and architectures.

Course Completion:

This course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster. Starting with a simple Python script, you will define application resources and use core primitives to build, monitor and troubleshoot scalable applications in Kubernetes. Working with network plugins, security and cloud storage, you will be exposed to many of the features needed to deploy an application in a production environment.

Course Outlines:

Module 1: Course Introduction

Module 2: Kubernetes Architecture

Module 3: Build

Module 4: Design

Module 5: Deployment Configuration

Module 6: Understanding Security

Module 7: Exposing Applications

Module 8: Application Troubleshooting

 

Download Course Outlines here .

 

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline