Category: AI Technology Malaysia

  • Change Management Training Course

    Overview Audience: This course is designed for all staff requiring a wider view of the Change Process to get the best results for their part of the business Format of the course A combination of: At the end of this course, attendees will be able to: Course Outline Basic Change Strategies The 9 Change Principles […]

    Read More

  • Chief Technology Officer (CTO) Fundamentals Training Course

    Overview A Chief Technology Officer (CTO) is the person in charge of all technology-related issues in a company. This instructor-led, live training (online or onsite) is aimed at current CTOs and upcoming CTOs such as technical directors or technical managers who wish to acquire the technical and managerial perspective needed to be an effective CTO. […]

    Read More

  • Basics of Bioinformatics Training Course

    Overview This is a practical workshop, which will introduce basics of bioinformatics. It is aimed at people with basic biological background and knowledge in molecular biology, who want to learn how to process and work with biological data using computational tools. It has been designed especially for: The course is divided into two parts: theoretical […]

    Read More

  • Installation and Configuration of DaDesktop on-premise Training Course

    Overview This courses teaches you how to install, configure and administer DaDesktop On-premise solution. Requirements Basic understanding of Linux command line. Virtualization technologies familiarity higly recommended but not required. Course Outline

    Read More

  • DaDesktop for Trainers and Coordinators Training Course

    Overview This instructor-led, live training (online or onsite) is aimed at people using DaDestkop to prepare courses or use it for software development, data science, anlayticts, etc… DaDesktop is a Desktop as a Service (DaaS) solution provided by NobleProg Tech. This course is deditated for users of the software, for installation and administration, please refert to ddonpremise course. By […]

    Read More

  • ISO 28000 Lead Implementer Training Course

    Overview ISO 28000 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Supply Chain Security Management System (SCSMS) based on ISO 28000. During this training course, you will also gain a thorough understanding of the best practices of Supply Chain Security Management Systems and […]

    Read More

  • ISO 28000 Foundation Training Course

    Overview ISO 28000 Foundation training enables you to learn the basic elements to implement and manage a Supply Chain Security Management System (SCSMS) as specified in ISO 28000. During this training course, you will be able to understand the different modules of a SCSMS, including SCSMS policy, procedures, performance measurements, management commitment, internal audit, management review […]

    Read More

  • ISO/IEC 27701 Lead Auditor Training Course

    Overview The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques. Why should you attend? During this training course, you will obtain the knowledge and skills to plan and carry out audits in […]

    Read More

  • ISO/IEC 27035 Lead Incident Manager Training Course

    Overview ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of […]

    Read More

  • ISO 27799 Foundation Training Course

    Overview ISO 27799 Foundation training enables you to learn the basic elements of Information security management and Information Security Controls in healthcare organizations as specified in ISO 27799 and ISO/IEC 27002. During this training course, you will be able to understand how ISO 27799 is related to ISO/IEC 27001 and ISO/IEC 27002. After completing this course, you can […]

    Read More