In this 6 hour W7068G: IBM Watson Discovery for Developers web-based training (WBT), you will learn how Watson Discovery lets business analysts and developers rapidly build cognitive, cloud-based exploration applications that unlock actionable insights hidden in unstructured data — including your own proprietary data, as well as public and third-party data.
-
This W7070G: IBM Watson Assistant Methodology course covers the methods of preparing for, training, and implementing an IBM Watson Assistant chatbot. It provides instruction on every step of the Assistant development process, including common use case review, user scenario development, vocabulary comprehension, data collection, tooling use, and deployment.
-
In this W7069G: IBM Watson OpenScale Methodology training course, uou will learn how Watson OpenScale lets business analysts, data scientists, and developers build monitors for artificial intelligence (AI) models to manage risks. You will understand how to use Watson OpenScale to build monitors for quality, fairness, and drift, and how monitors impact business KPIs. You will also learn how monitoring for unwanted biases and viewing explanations of predictions helps provide business stakeholders confidence in the AI being launched into production.
Note: This course contains the same topics as 6X240G IBM Watson OpenScale on IBM Cloud Pak for Data WBT.
-
This official web-based IBM DB2 Analytics Accelerator course provides training in the basics of the IBM DB2 Analytics Accelerator. The course introduces the student to the product layout and functionality and describes the various ways of storing DB2 data in IBM DB2 Analytics Accelerator. In addition to IBM DB2 Analytics Accelerator, it will also teach the student how to set up and work with the IBM Data Studio Accelerator Suite. The demonstrations will explore how tables can be loaded into IBM DB2 Analytics Accelerator, how to predict if tables could run on the accelerator using special register settings, why queries may not be candidates for the accelerator, how to disable or remove tables from the Accelerator, and finally, demonstrate the monitoring feature that is built-into the accelerator studio view.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This 6X235G: IBM Cloud Pak for Data v2.5.x Data Virtualization learning offering will focus on the Data Virtualization add-on to IBM Cloud Pak for Data. Students will learn about the Data Virtualization technology and be able to create connections to remote data sources.
The offering will also cover how to create and manage virtual assets, such as database tables or views, from the remote data sources. Finally, the students will use those assets within IBM Cloud Pak for Data without needing to move any data.
-
IBM SPSS Modeler is a premium service for IBM Cloud Pak for Data V3.0.x This 6X334G: IBM SPSS Modeler for IBM Cloud Pak for Data v3.x WBT course reviews the basics of how to import, explore, and prepare data, and introduces the student to machine learning models with SPSS Modeler for Cloud Pak for Data.
-
This B6289G: IBM Cognos Analytics: Dashboard Essentials v11.1.x course teaches authors how to create dashboards in IBM Cognos Analytics so users can explore and interact with their data and gain insight into their business. You will learn how to add data sources, create and interact with dashboards, and customize content for presentation. You will also learn how to create effective narratives by using stories, and how to use explorations to perform a deeper analysis on your data.
-
The IBM Cognos Analytics: Introduction to Authoring (v11.0) course presents you with ways to create, enhance, customize, and manage reports and charts using IBM Cognos Analytics – Reporting. Participants will view demonstrations and work through scenarios that illustrate key introductory concepts while exploring the basics of the Reporting tool.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This offering teaches cloud database support staff how to use a Command Line Processor (CLP) to load data into a dashDB for Analytics or dashDB for Transactions database.
Note: Guided eLearning is a self-paced offering which includes web-based content for self study and videos (including audio) that demonstrate hands-on activities.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
IBM Spectrum Virtualize software, part of the IBM Spectrum Storage family of software and the IBM SAN Volume Controller (SVC) is an enterprise-class storage system that helps organizations improve data economics by supporting the new large scale workloads that are critical to success. SVC systems can handle massive volumes of data from mobile and social applications, enable rapid and flexible cloud services deployments, and deliver the performance and scalability needed to gain insights from the latest analytics technologies.
This one day digital course introduces the IBM Spectrum Storage Software Family with emphasis on the IBM Spectrum Virtualize software. It also introduces the latest IBM SAN Volume Controller, 2145-SV1 storage engine, and the supported IBM SAS expansion enclosures.
-
Defending Digital Frontiers: An Intensive Security Awareness workshop.
This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.
Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.
This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.
Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.
An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
This course provides you with information about the functions of IBM’s DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms.
DB2 runs under the z/OS, VM, Linux, UNIX, and Windows operating systems, to name a few.
The course includes discussion of how the DB2 products provide services. The focus is on the services DB2 provides and how we work with DB2, not on its internal workings.