This course provides participants with an understanding of Active Report content and functionality within IBM Cognos Analytics – Reporting. Through lecture, demonstrations, and exercises, participants increase their IBM Cognos Analytics experience by building highly interactive reports using Active Report controls, which can then be distributed to and consumed by users in a disconnected environment, including on mobile devices.
-
This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation to publishing of metadata to the web, enabling end-users to easily author reports and analyze data.
-
This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.
-
Out of stock
This offering introduces business and professional authors to the basics of creating reports using relational data models. Techniques to improve, personalize and manage professional relationships will be explored. During this training, activities will illustrate and reinforce the concepts.
-
This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.
-
This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course.
Activities will illustrate and reinforce key concepts during this learning activity.
-
This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity.
-
This B6252G: IBM Cognos Framework Manager: Design Metadata Models v11.x offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager.
Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data.
-
This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment.
In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.
-
This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.
-
This B6259G: IBM Cognos Analytics: Author Reports Advanced v11.x course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports.
-
This B6289G: IBM Cognos Analytics: Dashboard Essentials v11.1.x course teaches authors how to create dashboards in IBM Cognos Analytics so users can explore and interact with their data and gain insight into their business. You will learn how to add data sources, create and interact with dashboards, and customize content for presentation. You will also learn how to create effective narratives by using stories, and how to use explorations to perform a deeper analysis on your data.
-
This training teaches data modelers how to model data using data modules in IBM Cognos Analytics. Users will learn how to create data modules from different sources, such as uploaded files. They will also identify how to customize their data modules by adding joins, calculations, and filters. In addition, they will examine how to group their data (for example, by using navigation paths), how to share their data modules with others, and how to make use of some advanced modeling techniques, such as relative date analysis.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
Business architecture is an essential aspect of any organisation that aims to improve its operational efficiency, customer satisfaction, and profitability. It involves developing a comprehensive understanding of the organisation’s processes, capabilities, and people to identify and implement strategic improvements.
This course is designed to provide students with the knowledge and skills necessary to develop a robust business architecture that aligns with the organisation’s objectives.
-
The Configuring BGP on Cisco Routers training provides knowledge of BGP, the routing protocol and foundation for the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares you to design and implement efficient, optimal BGP networks covering the theory and configuration of BGP on Cisco IOS routers, detailed troubleshooting, and hands-on exercises.
-
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
- Describe how QRadar SIEM collects data to detect suspicious activities
- Describe the QRadar SIEM component architecture and data flows
- Navigate the user interface
- Investigate suspected attacks and policy breaches
- Search, filter, group, and analyze security data
- Investigate the vulnerabilities and services of assets
- Use network hierarchies
- Locate custom rules and inspect actions and responses of rules
- Analyze offenses created by QRadar SIEM
- Use index management
- Navigate and customize the QRadar SIEM dashboard
- Use QRadar SIEM to create customized reports
- Use charts and filters
- Use AQL for advanced searches
- Analyze a real world scenario
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
- Using the QRadar SIEM user interface
- Investigating an Offense triggered by events
- Investigating the events of an offense
- Investigating an offense that is triggered by flows
- Using rules
- Using the Network Hierarchy
- Index and Aggregated Data Management
- Using the QRadar SIEM dashboard
- Creating QRadar SIEM reports
- Using AQL for advanced searches
- Analyze a real-world large-scale attack
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
-
IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.
This 2-days BQ203G: IBM QRadar SIEM Advanced Topics course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts.
The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.
-
This intensive 5-day training program is designed to equip supply chain professionals, executives, and C-level staff with the knowledge and skills needed to leverage blockchain and AI technologies to optimize their supply chain operations. Through a combination of lectures, interactive discussions, and hands-on exercises, participants will gain a deep understanding of how these technologies can enhance efficiency, reduce costs, and improve decision-making.
-
This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms.
-
This dynamic Blockchain Security course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.
-
This 3-days instructor-led course is designed for programmers and developers who want to take a comprehensive deep dive in writing smart contracts and building applications that interact with them. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity.
The student will be exposed to Ethereum’s adaptable feature set which allows the developer to design decentralized applications for countless applications. Students will also participate in hands-on programming lab sessions to learn, develop, and advance their skills in Ethereum development.
The Ethereum Development Training Course is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. Students will participate in approximately 50% programming lab time providing practical experience, enhancing their knowledge and existing skill set. Due to the technical programming lab content covered in this course, it is not recommended for those without programming knowledge and experience.
-
-10%
A Business User is an individual who is performing their duties in an environment that has adopted or is planning to adopt a cloud-based business strategy. This role requires the individual to have a basic understanding of cloud computing concepts and basic Alibaba Cloud services. Understanding the cloud as a Business User is a key step for any enterprise planning to adopt cloud strategies and ensuring a cloud-savvy workforce.
Limited time offer: 10% OFF All Alibaba Cloud Courses!
-
Configuring Cisco Catalyst 9800 and Intro to Wi-Fi 6 (C98WF6) is a course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits.
This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to Wi-Fi 6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
-
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.