This NFSAD: ONTAP NFS Administration course extends the NFS information that is found in the ONTAP Cluster Administration course. This course reviews NFS and explores in more detail different NFS versions and the features of ONTAP 9 software that support the NFS protocol. The exercises are accomplished using ONTAP 9 software.
-
This Integrating Hybrid Clouds Foundation course describes the features and benefits of the NetApp® Cloud Volumes ONTAP® system. The course helps enable you to explain the architecture and functionality of cloud based ONTAP storage.
Also, the course introduces basic administration, configuration, and management of the Cloud Volumes ONTAP system that uses NetApp BlueXP™ (formerly NetApp Cloud Manager).
-
Identify the features and benefits of NetApp® ONTAP® 9 data management software. Understand the architecture and functionality of an ONTAP cluster. Learn the basics of how to configure and manage an ONTAP cluster by using the CLI, NetApp ONTAP System Manager, and NetApp BlueXP.
-
This course is also available as classroom course Development and Administration of Applications with IBM Business Monitor V8.5.7(WB896G).
IBM Business Monitor is a business activity monitoring (BAM) product that supports BPM by measuring business performance, monitoring, and reporting on business transactions. This course includes topics of interest for students who want to use the IBM Business Monitor environment to develop applications.
In this course, you learn how to develop, implement, and test IBM Business Monitor applications so that you can generate real-time business views of enterprise data. The course begins with an overview of BAM and BPM, and the capabilities that IBM Business Monitor provides. In subsequent units, you learn how to build monitor models, establish performance metrics, monitor events, manage action services, and build a business space dashboard. You also learn how to enable events from various sources, including using BPEL and BPMN processes from IBM Business Process Manager Advanced and IBM Integration Bus. Finally, you learn how to monitor events from JMS emitter and REST emitter sources. You also learn some basic administration and maintenance capabilities of IBM Business Monitor.
From the hands-on exercises that are provided throughout the course, you develop and implement a monitoring solution. The exercises include how to use the various components of IBM Business Monitor, such as the IBM Cognos Business Intelligence and the Monitor development toolkit, for reporting and dimensional analysis along with WebSphere Application Server. You use the Monitor development toolkit to develop a monitor model, and then use the IBM Integration Designer to test the model. You also build customized business space dashboards that can be used to analyze and troubleshoot process performance.
-
In this two-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.2. You begin with a review of the software capabilities, requirements, and architecture. Then, through lecture and hands-on labs, you learn how to perform the various tasks required to configure the environment on an installed virtual appliance. You customize SLA policy, and make use of available options to protect virtual machines and applications, as well as the IBM Spectrum Protect Plus catalog. You monitor and manage jobs, plan and prepare for disaster recovery, generate and view log files, and create custom reports.
-
This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity.
-
This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity.
-
This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration.
-
This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis process. Students will learn the basics of reading data, data definition, data modification, and data analysis and presentation of analytical results. Students will also see how easy it is to get data into IBM SPSS Statistics so that they can focus on analyzing the information. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base features.
-
This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course.
Activities will illustrate and reinforce key concepts during this learning activity.
-
This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.
Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.
-
No involved lab condition for the Training On Demand course format This Oracle Database Cloud for Oracle DBAs training shows you how to regulate the Oracle Database Cloud Service. It’s optimal for existing DBAs who need to figure out how to manage Oracle Database in the cloud.
-
Reduce your organization’s operating and ownership costs by implementing LDAP standard directory solutions that easily integrate with the Oracle Fusion Middleware platform.
This OAD-LDAPDS-E: LDAP and Directory Services: Essentials course teaches you to implement the solution using Oracle Unified Directory or Oracle Internet Directory. They store user identities in the form of entries, and provide a highly flexible and scalable replication environment to back up data.
-
Unsure how to manage anger or frustration? Do you swallow your feelings until you can’t hold back, then say too much? Are you in charge of your emotions, or are they in charge of you?
If difficulties in managing your emotions are eroding your job performance, this powerful 2-day workshop will give you the tools and techniques to turn the situation around. You’ll learn you have choices in how you view and manage stress. Grasp how to keep your emotions in perspective. Discover how to express yourself openly and honestly, and use emotional intelligence to establish better relationships.
-
This two-day, hands-on EDU-VSANPD7: VMware vSAN: Plan and Deploy [V7] training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster.
In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster.
-
This two-day, hands-on course gives you the skills to deploy and use VMware Aria Operations™ for Networks to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of VMware Aria Operations for Networks and how to use it to simplify daily operation and troubleshooting tasks.
-
This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite LifecycleTM, which manages products such as VMware Aria OperationsTM and VMware Aria OperationsTM for Logs.
This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle.
-
This course will introduce the student to advanced database administration skills, including program preparation and the use of packages, online schema changes, partition management, and stored procedures; as well as performance and availability features of utilities (including LOAD, REBUILD INDEX, REORG, and UNLOAD). This course does not cover distributed data processing, nor does it cover data sharing.
-
This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain in-depth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers.
-
This course is designed to provide an understanding of today’s complex system mainframe environment on the zEnterprise System and System z servers. It is mainly targeted for operators technical support, system programmers, and any others who need to keep current in this mainframe environment. Through lecture and hands-on exercises, you learn how the hardware and operating systems interact.
This course addresses the following topics:
- Mainframes and distributed server comparisons: Why so many servers?
- Mainframe directions: Past, current, and future
- Mainframes: System z introduction and relative performance comparisons
- IBM System z hardware design: Frames, CEC cage, books, models, and MSUs
- I/O infrastructure and processor usage: zEC12 to z10 comparisons
- System z Capacity on Demand
- Physical/Logical partitioning, server initialization, and CHPIDs
- I/O configuration and HCD overview
- MVS to z/OS software overview
- z/OS Parallel Sysplex
- z/OS enhancements on the zPlatform
- z/Architecture overview and virtual addressing concepts
- System concepts: The big picture
- HMC introduction, groups, and activation profiles
- Determining object status and error conditions
- Activation and operating system interface
-
Machine Learning – Unsupervised Learning
Unsupervised learning is a fascinating field of machine learning that discovers patterns, structures, and relationships within data without the need for labeled examples. This three-day course, designed for beginners, offers a comprehensive introduction to unsupervised learning techniques. Participants will gain a solid understanding of clustering, dimensionality reduction, and anomaly detection.
-
Big Data Hadoop
Hadoop is a foundational technology for processing and analyzing massive volumes of data. This three-day course, tailored for beginners, provides a comprehensive introduction to the core concepts of Big Data and Hadoop. Participants will gain an understanding of distributed storage and processing, Hadoop ecosystem components, and hands-on experience with Hadoop tools.
-
Data Storytelling
Data storytelling is a critical skill for conveying data-driven insights in a compelling and meaningful way. This three-day course, designed for beginners, focuses on teaching the art and science of data storytelling. Participants will learn how to structure, visualize, and present data to engage and inform their audience effectively.
-
Learn about the new features and enhancements of DB2 11 for z/OS, including the technical detail of the functional enhancements of this significant new version of DB2 for z/OS.
Note: This course shall be made available a unit at a time. If you wish to receive training on this new version of DB2 11 for z/OS, contact your training provider to request a class containing the latest content.
-
IBM Security Verify Access helps you simplify your users’ access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization’s migration to identity as a service (IDaaS) at a comfortable pace.
Using the skills taught in this TW108G: IBM Security Verify Access Foundations course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned.
-
This 2Z930G: InfoSphere MDM Physical Domains course is designed for anyone who wants to get an understanding of the Data Domains for the InfoSphere Master Data Management Physical Module. This course takes a comprehensive look at the three core data domains of InfoSphere MDM: Party, Account, and Product. For each of the domains spanned by InfoSphere MDM, participants will be exposed to the data model, services, and rules associated with the main entities of that domain. Heavy emphasis is put on exercises and activities so that the participants can apply the knowledge that they learn after course conclusion.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
- Describe how QRadar SIEM collects data to detect suspicious activities
- Describe the QRadar SIEM component architecture and data flows
- Navigate the user interface
- Investigate suspected attacks and policy breaches
- Search, filter, group, and analyze security data
- Investigate the vulnerabilities and services of assets
- Use network hierarchies
- Locate custom rules and inspect actions and responses of rules
- Analyze offenses created by QRadar SIEM
- Use index management
- Navigate and customize the QRadar SIEM dashboard
- Use QRadar SIEM to create customized reports
- Use charts and filters
- Use AQL for advanced searches
- Analyze a real world scenario
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
- Using the QRadar SIEM user interface
- Investigating an Offense triggered by events
- Investigating the events of an offense
- Investigating an offense that is triggered by flows
- Using rules
- Using the Network Hierarchy
- Index and Aggregated Data Management
- Using the QRadar SIEM dashboard
- Creating QRadar SIEM reports
- Using AQL for advanced searches
- Analyze a real-world large-scale attack
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
-
This ZZ930G: InfoSphere MDM Physical Domains course is designed for anyone who wants to get an understanding of the Data Domains for the InfoSphere Master Data Management Physical Module. This course takes a comprehensive look at the three core data domains of InfoSphere MDM: Party, Account, and Product. For each of the domains spanned by InfoSphere MDM, participants will be exposed to the data model, services, and rules associated with the main entities of that domain. Heavy emphasis is put on exercises and activities so that the participants can apply the knowledge that they learn after course conclusion.
-
The Jamf 200 Course offers a core understanding of Jamf Pro, as well as an enterprise-focused examination of the macOS and iOS platforms.
-
This course offers hands-on experience with Spring and its major features, including configuration, data access, web and REST applications, Spring Boot, Spring Security and using Spring Cloud to build a small microservices application. On completion, participants will have a foundation for creating enterprise-ready applications.
-
Develop browser based web/enterprise applications, write the business logic and deploy it in application server container and understand how javascript take cares system level services like concurrency, transaction, security, naming…etc You’ll go from beginner to extremely high-level with hands on projects customized to your need and become a proficient Java EE developer. Understand and use resource and dependency injections.
-
Systems Administrators and DevOp Engineers have always been charged to do more with less. Defining infrastructure in code and automating its deployment helps improve operational efficiency and lower administrative overhead. In this course, Terraform – Getting Started, you’ll learn foundational knowledge of Hashicorp’s Terraform software, a toolset for infrastructure automation. First, you’ll discover how to create and update a basic configuration. Next, you’ll explore how to use provisioners, functions, and providers to expand your deployment.
Finally, you’ll learn how to leverage abstraction and improve code reuse with variables, state files, and modules. When you’re finished with this course, you’ll have the skills and knowledge of Terraform needed to write, plan, and create automated infrastructure deployments.
-
The Introduction to MySQL course covers the basics of the SQL language as implemented by MySQL. The course is designed to give delegates practical experience in writing SQL statements using the MySQL client program and MySQL Workbench. The basic SQL statements, including the use of SQL functions and the basic table and view handling statements are introduced.
-
IOT brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all. The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions.
-
This course exposes the experienced Integration Architect to Best Practice Architectural Principles for the webMethods Suite. The class starts with describing key Architectural framework principles to execution of the webMethods platform. Participants will learn and understand the webMethods Reference Architecture. The participant will also explore many key features and aspects of the webMethods ESB, BPMS, and Cache Management to deliver a highly-available and performant enterprise architecture.
-
Fintech Foundations course is designed to introduce you to the fundamental building blocks of financial technologies and real-world applications through case studies. This course is a beginner level course and you don’t need any background in finance or technology.