You searched for: ""

  • 1 Day ILT, VILT

    This course is designed to introduce you to the capabilities of BigSheets. BigSheets is a component of IBM BigInsights through the Analyst and the Data Scientist module. It provides the analyst the ability to be able to visualize and analyze data stored on the HDFS using a spreadsheet type interface without any programming.

  • 2 Days ILT, VILT

    This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment.

    In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.

  • Out of stock
    3 Days ILT, VILT

    This offering introduces business and professional authors to the basics of creating reports using relational data models. Techniques to improve, personalize and manage professional relationships will be explored. During this training, activities will illustrate and reinforce the concepts.

  • 5 Days ILT, VILT

    This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems.

  • 5 Days ILT, VILT

    This is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.

  • 4 Days ILT, VILT

    This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation to publishing of metadata to the web, enabling end-users to easily author reports and analyze data.

  • 2 Days ILT, VILT

    This course teaches you the skills that are needed to manage Liberty servers and collectives.

    The course is designed for application server administrators. You learn how to use the graphical Admin Center and the command line scripting to manage servers from a collective controller. The course also covers how to deploy a cluster of packaged servers for Liberty runtimes, view the deployment environment, and view basic performance metrics.

    You learn how to use the Dynamic Routing feature of Liberty to enable routing of HTTP requests to collective members. You also configure the auto-scaling and health management features for Liberty.

    Finally, you learn how to secure Liberty and enable SSL communication in Liberty.

  • B6098G: IBM Cognos Analytics – Author Active Reports v11.0

    Price range: RM1,470.00 through RM2,060.00
    1 Day ILT, VILT

    This course provides participants with an understanding of Active Report content and functionality within IBM Cognos Analytics – Reporting. Through lecture, demonstrations, and exercises, participants increase their IBM Cognos Analytics experience by building highly interactive reports using Active Report controls, which can then be distributed to and consumed by users in a disconnected environment, including on mobile devices.

  • 3 Days ILT, VILT

    Learn about the new features and enhancements of DB2 11 for z/OS, including the technical detail of the functional enhancements of this significant new version of DB2 for z/OS.

    Note: This course shall be made available a unit at a time. If you wish to receive training on this new version of DB2 11 for z/OS, contact your training provider to request a class containing the latest content.

  • F2920G: IBM Case Manager: Configure Security v5.3.2

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.

  • 3 Days ILT, VILT

    This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.

    The course consists of six units and 12 hands-on lab exercises.

  • F2800G: IBM FileNet P8 Platform Essentials v5.5.x

    Price range: RM1,890.00 through RM2,050.00
    1 Day ILT, VILT

    This course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.

  • 5 Days ILT, VILT

    The course is updated for DB2 10 for z/OS. This course is the classroom delivered version of the Instructor led Online course

    • DB2 10 for z/OS System Administration – ILO (3V851).

    Administrators of DB2 10 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 10 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:

    • Relate the z/OS IPL process to a DB2 subsystem
    • Explain effects of stopping and starting DB2
    • Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
    • The use of DSN command processor running in batch and foreground
    • Use views to minimize your ability to see into the DB2 catalog
    • See how the catalog (through grant activity) controls access to data
    • Search the catalog for problem situations
    • Use the catalog and DB2 utilities to determine data recovery requirements
    • Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
    • Implement DB2 and Resource Access Control Facility (RACF) security
    • Describe DB2 program flow for all environments
    • Display normal and problem threads and database status
    • See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
    • Interpret lock displays
    • Identify and cancel particular threads
    • Describe available DB2 utilities to manage system and user page sets
  • 5 Days ILT, VILT

    IBM Process Server supports a service-oriented architecture (SOA) by providing a platform for using diverse technologies to integrate business applications. In this course, you learn how IBM Process Server enables business integration applications to define business logic and processes based on Web Services Business Process Execution Language (WS-BPEL), and business rules. In the intensive hands-on lab exercises, you design, develop, and test a comprehensive business integration solution. You use the IBM Integration Designer tool to create business integration solutions by using the Service Component Architecture (SCA) programming model, the Service Data Objects (SDO) data model, and the mediation flow programming model.

  • 1 Day ILT, VILT

    This course is also available as self-paced virtual (e-learning) course Supporting REST and JOSE in IBM DataPower Gateway V7.5 (ZE752G). This option does not require any travel.

    This course teaches you the developer skills that are required to configure and implement services that support REST-based traffic and JOSE-based signatures and encryption on the IBM DataPower Gateways (IDG) with firmware version 7.5.1.

    The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its JSON, XML, web services, and REST deployments. For JSON payloads, DataPower supports digital signatures and encryption that conform to the JSON Object Signing and Encryption (JOSE) specification.

    Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to use the configuration options, processing actions, and GatewayScript to support REST-based message traffic. To protect JSON message payloads, you use JSON Web Signature (JWS) and JSON Web Encryption (JWE) actions in the processing policy of a service.

    Hands-on exercises give you experience working directly with a DataPower gateway. The exercises focus on skills such as selecting request and response types, using the HTTP method criteria in a matching rule, style sheet and GatewayScript transforms, GatewayScript CLI debugging, signing JSON payloads, and encrypting JSON payloads.

  • 4 Days ILT, VILT

    This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.

  • 3 Days ILT, VILT

    This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.

  • KM520G: IBM InfoSphere DataStage engine Administration for Information Server v11.5

    Price range: RM1,470.00 through RM2,060.00
    1 Day ILT, VILT

    This course teaches Information Server and/or DataStage administrators to configure, manage, and monitor the DataStage Engine which plays a crucial role in Information Server. It not only runs high performance parallel ETL jobs designed and built in DataStage. It also supports other Information Server products including Information Analyzer, QualityStage, and Data Click. After introducing DataStage parallel jobs and the Engine that runs them, the course describes DataStage project configuration, the Engine’s development and runtime environments, and the Engine’s data source connectivity. In addition the course explains how to import and export DataStage objects, how to run and monitor DataStage jobs through the command line and GUI, and how to use some important Engine utilities.

  • 1 Day ILT, VILT

    This course enables students to acquire the skills necessary to use the Information Governance Catalog to analyze metadata stored within the Information Server Repository. The emphasis is on how metadata gets captured within the repository and how to explore and analyze the metadata it contains.

  • 2 Days ILT, VILT

    This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.

    Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.

  • 5 Days ILT, VILT

    This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.

    Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.

    Hands-on labs 

    This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload

  • 5 Days ILT, VILT

    This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.

  • 3 Days ILT, VILT

    This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.

  • 3 Days ILT, VILT

    This TP370G: IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed.

  • 5 Days ILT, VILT

    This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.

    The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 1 Day ILT, VILT

    This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.

    A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.

    OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.

    OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.

     

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 3 Days ILT, VILT

    This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.

  • 3 Days ILT, VILT

    This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.

  • 3 Days ILT, VILT

    This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.

    This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.

  • 1 Day ILT, VILT

    Your company wants to automate records declaration for your IBM Enterprise Records system. In this course, you learn to configure automatic record declaration using two different methods: event subscriptions and workflow.

    You work with a fully functioning IBM Enterprise Records system to practice the skills required for automating record declaration.

  • F2940G: Customize the IBM Case Manager Client User Interface v5.3.2

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists.

  • WB402G: Developing Rule Solutions in IBM Operational Decision Manager v8.9.2

    Price range: RM5,250.00 through RM8,240.00
    5 Days ILT, VILT

    The WB402G: Developing Rule Solutions in IBM Operational Decision Manager course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.

    Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.

    The lab environment for this course uses Windows Server 2012 R2 Standard Edition.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

Go to Top