Wednesday, March 31, 2010

Oracle Databased for RM 1800 only



Duration : 3 days

Time : 8.30 am – 5.00 pm

Course Synopsis

Introduction (Database Architecture)

Describe course objectives Explore the Oracle 10g database architecture

Installing the Oracle Database Software

Explain core DBA tasks and tools Plan an Oracle installation Use optimal flexible architecture Install software with the Oracle Universal Installer (OUI)

Creating an Oracle Database

Create a database with the Database Configuration Assistant (DBCA) Create a database design template with the DBCA Generate database creation scripts with the DBCA

Managing the Oracle Instance

Start and stop the Oracle database and components Use Enterprise Manager (EM) Access a database with SQL*Plus and iSQL*Plus Modify database initialization parameters Understand the stages of database startup View the Alert log Use the Data Dictionary

Administering User Security

Create and manage database user accounts Authenticate users Assign default storage areas (tablespaces) Grant and revoke privileges Create and manage roles Create and manage profiles Implement standard password security features Control resource usage by users

Managing Schema Objects

Define schema objects and data types Create and modify tables Define constraints View the columns and contents of a table Create indexes, views and sequences Explain the use of temporary tables Use the Data Dictionary

Administering User Security

Create and manage database user accounts Authenticate users Assign default storage areas (tablespaces) Grant and revoke privileges Create and manage roles Create and manage profiles Implement standard password security features Control resource usage by users

Managing Schema Objects

Define schema objects and data types Create and modify tables Define constraints View the columns and contents of a table Create indexes, views and sequences Explain the use of temporary tables Use the Data Dictionary

Backup and Recovery Concepts

Identify the types of failure that may occur in an Oracle Database Describe ways to tune instance recovery Identify the importance of checkpoints, redo log files, and archived log files Configure ARCHIVELOG mode

Performing Database Backups

Create consistent database backups Back your database up without shutting it down Create incremental backups Automate database backups Monitor the flash recovery area

Performing Database Recovery

Recover from loss of a control file Recover from loss of a redo log file Perform complete recovery following the loss of a data file

Performing Flashback

Describe Flashback database Restore the table content to a specific point in the past with Flashback Table Recover from a dropped table View the contents of the database as of any single point in time with Flashback Query See versions of a row over time with Flashback Versions Query View the transaction history of a row with Flashback Transaction Query

Writing SQL SELECT Statements

Define projection, selection, and join terminology Review the basic SQL SELECT statement syntax Select all columns using a wildcard notation from a table State simple rules and guidelines for writing SQL statements Write a query containing the arithmetic operators Create a character expression with the concatenation operator Using the iSQL*Plus Environment SQL statements versus iSQL*Plus commands

Restricting and Sorting Data

Limit rows using a selection Using the WHERE clause to retrieve specific rows Using the comparison conditions in the WHERE clause Use the LIKE condition to compare literal values List the logical conditions AND, OR, NOT Describe the rules of precedence for the conditions Sort rows with the ORDER BY clause Use ampersand substitution in iSQL*Plus to restrict and sort output at run time

Using Single-Row Functions to Customize Output

Show the differences between single row and multiple row SQL functions Categorize the character functions into case manipulation and character manipulation types Use the character manipulation functions in the SELECT and WHERE clauses Explain and use the DATE and numeric functions Use the SYSDATE function to retrieve the current date in the default format Introduce the DUAL table as a means to view function results List the rules for applying the arithmetic operators on dates Use the arithmetic operators with dates in the SELECT clause

Reporting Aggregated Data Using the Group Functions

Describe and categorize the group functions Use the group functions Utilize the DISTINCT keyword with the group functions Describe how nulls are handled with the group functions Create groups of data with the GROUP BY clause Group data by more than one column Avoid illegal queries with the group functions Exclude groups of data with the HAVING clause

Displaying Data from Multiple Tables

Identify Types of Joins Retrieve Records with Natural Joins Use Table Aliases to write shorter code and explicitly identify columns from multiple tables Create a Join with the USING clause to identify specific columns between tables Use the ON clause to specify arbitrary conditions or specify columns to Join Create a Three-way join with the ON clause to retrieve information from 3 tables List the Types of Outer Joins LEFT, RIGHT, and FULL Generating a Cartesian Product

Using Sub queries to Solve Queries

List the syntax for sub queries in a SELECT statements WHERE clause List the guidelines for using sub queries

Describe the types of sub queries Execute single row sub queries and use the group functions in a sub query Identify illegal statements with sub queries Execute multiple row sub queries Analyze how the ANY and ALL operators work in multiple row sub queries

Using the SET Operators

Use the UNION operator to return all rows from multiple tables and eliminate any duplicate rows Use the UNION ALL operator to return all rows from multiple tables Describe the INTERSECT operator Use the INTERSECT operator Explain the MINUS operator Use the MINUS operator List the SET operator guidelines Order results when using the UNION operator

Manipulating Data

Write INSERT statements to add rows to a table Copy rows from another table Create UPDATE statements to change data in a table Generate DELETE statements to remove rows from a table Use a script to manipulate data Save and discard changes to a table through transaction processing Show how read consistency works Describe the TRUNCATE statement

Sunday, March 7, 2010

Crazy Promotion

RM 1, 100 - 3 Days - min 5 person per pax
(normal price RM 1, 800 )

Courses are:

PC Maintenance
Windows Server 2008
Network +

** Including Refreshment and Lunch

Mirosoft Office 2007

RM 380 - 2 Days

(normal price RM 500)

Courses are:

Microsoft Office Word

Microsoft Office Excel

Microsoft Office Power Point

Microsoft Office Access

** Include Refreshment and Lunch

Wednesday, February 24, 2010

Learning Chinese

RM 600 - 2 Days

(normal price RM 1, 200)

Course outline:

1. Introduction of Chinese language

How many people speak and learning it nowdays, how many years’ history it has, how many words, and most importantly logic in Chinese language. This ranges from Chinese counting system to find relevance of certain word by looking at it.

2. How to read Chinese

Chinese use special transcript called PinYin to teach how to read. This is invented by English Missioner around 1790. It uses 26 English letters and some German letters.

For example, Bao, Gao, Chen, Le, Shanghai, Beijing…

Also teach how to remember them. For Malay speakers, it is good to imitate sounds of Chinese to some Malay words. For example, Bang zhu = help, and Bang is like “A bang”, a brother in Malay. Mother is Mama in Chinese. Kawan is Friend in Malay, Wan means End in Chinese.

3. Chinese Numbering system

It is most logical in the world. If you know how to count from 1-10, then you will know how count up to Million very easily.

4. Chinese stroke order

There are steps to write every Chinese words, we call it stoke order. If you follow this order, you can write pretty Chinese words.

5. Teach some simple conversational words like

You, me, he, she, go, sit, speak, name, greetings, I have something, I want this and that (food or drink)

Interconnecting Cisco Network Devices

RM 1, 500 - 3 Days
(normal price RM 2, 100)

Course Description

- An instructor-led course presented by Cisco Systems, Inc., training partners to their end-user customers.
- Using Cisco Catalyst switches and Cisco routers con-nected in local-area networks (LANs) and wide-area networks (WANs) typically found at small to medium network sites.
- Upon completion of this training course, you will be able to select, connect, configure, and troubleshoot the vari-ous Cisco networking devices.

• INTRO Class or knowledge
• Basic computer literacy
• Basic knowledge of PC hardware configura-tions Basic understanding of networking business drivers

Course Objectives
After completing this course the you should be able to:
• Build a functional configuration to support the specified network operational requirements, given a network design
• Use the appropriate show commands to display net-work operational parameters so that anomalies are detected
• Use the appropriate debug commands to monitor net-work operational parameters so that anomalies are detected
• Explain how bridging and switching operates Explain the purpose and operations of the Span-ning- Tree Protocol Build a functional router configuration to support the specified network operational requirements, given a network design Describe the features and operation of static routing

Course Content
• Configuring Catalyst Switch Operations
• Extending Switched Networks with Virtual LANs
• Determining IP Routes
• Managing IP Traffic with Access Control Lists
• Establishing Serial Point-to-Point Connections
• Establishing Frame Relay Connections
• Completing ISDN Calls

Tuesday, February 23, 2010


Title : Technology Update on Computer Care and Maintenance
- PC Care
- PC Maintenance
- Security
- Virus

Speaker : Encik Abdul Latiff Esa
(Chief Executive Officer)

Who should attend this one hour talk :
Students, director, manager, head of department, engineer, and technical support from the department of:
- Information technology (it)
- IT & cyber security
- Network
- Operation
Not only limited to it-related organization, but also all organization from various background and industry

Key benefits of attending this one hour talk :
- To identify concepts of personal computer and notebooks
o Care
o Health status
o Preventive Maintenance
- Identify virus threats and preventive steps
- Best practices
- Identify the major cause of computer breakdowns today
- To identify how to fully protect your computer from viruses base on case study and project consultancy.
- Understanding general concept of Wireless and Networking.

Our Competitive Advantage

Why choose STC?? What is our Competitive Advantage??

• Emphasis on Hands on Training

• A pool of Certified, Qualified, Experienced & Dedicated Trainers

• Customization on training and courseware to tailor customer needs and Requirement

• Strategic Location - 2 minutes walk from Ampang Park Putra LRT

• Registered under Ministry of Finance as a Training Provider, Supplier for Computers and Computer Consultancy

• 5 Stars Hotel-concept design & well-equipped training labs and Exclusive facilities

The collaboration at STC, include the followings:

- Microsoft Certified Partner

- Authorised Training Centre: Training & Certification Microsoft Press

- Authorised VUE Testing Centre

- Exam Provider for IT Certification

Majlis Pembangunan Sumber Manusia

-Prolus & SBL Scheme

STC Profile

- Sepakat Training Centre (STC) is the training and education arm of SEPAKAT, a 100%

Bumiputra-owned IT company, established in 1982.

- The main business activities include the design, delivery, installation, development, commissioning, training, support & maintenance of computer systems, as well as, consultancy, research & development.

- Sepakat is registered with the Ministry of Finance as a consultant in Information System and Computer.

Our house facilities are:

Presentable and clean facilities with:

- Well- equipped training labs.

- LCD Projectors, TVs and PA system

- One PC (Pentium 4) to one pax facilities

- Complimentary Internet Access

- Customer Lounge Area for dining/relaxation

- Complimentary tea-coffee and refreshments

- Muslim wudhu and prayer rooms (men and women)

- Complimentary personal items storage facilities

Specializations by Sepakat Computer Consultant are:

- PC Maintenance/A+

- Network+

- Cisco System Specialist

- Linux Certification Programs

- Java Programming

- Macromedia

- Adobe

- Microsoft Certified Professional Programs

- Microsoft SQL Programming

- AutoCAD 2007

- Microsoft Server 2003

- Microsoft Office 2003 & 2007

- Microsoft Windows Vista

- TCIP & Wireless Training