This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
-
This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.
-
This course teaches Information Server and/or DataStage administrators to configure, manage, and monitor the DataStage Engine which plays a crucial role in Information Server. It not only runs high performance parallel ETL jobs designed and built in DataStage. It also supports other Information Server products including Information Analyzer, QualityStage, and Data Click. After introducing DataStage parallel jobs and the Engine that runs them, the course describes DataStage project configuration, the Engine’s development and runtime environments, and the Engine’s data source connectivity. In addition the course explains how to import and export DataStage objects, how to run and monitor DataStage jobs through the command line and GUI, and how to use some important Engine utilities.
-
This course enables students to acquire the skills necessary to use the Information Governance Catalog to analyze metadata stored within the Information Server Repository. The emphasis is on how metadata gets captured within the repository and how to explore and analyze the metadata it contains.
-
This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.
Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.
-
This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.
Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.
Hands-on labs
This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload
-
This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.
-
This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.
-
This TP370G: IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed.
-
This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.
The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.
We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).
The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.
-
This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.
The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.
-
This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.
-
This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.
A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.
OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.
OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.
-
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
- Describe how QRadar SIEM collects data to detect suspicious activities
- Describe the QRadar SIEM component architecture and data flows
- Navigate the user interface
- Investigate suspected attacks and policy breaches
- Search, filter, group, and analyze security data
- Investigate the vulnerabilities and services of assets
- Use network hierarchies
- Locate custom rules and inspect actions and responses of rules
- Analyze offenses created by QRadar SIEM
- Use index management
- Navigate and customize the QRadar SIEM dashboard
- Use QRadar SIEM to create customized reports
- Use charts and filters
- Use AQL for advanced searches
- Analyze a real world scenario
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
- Using the QRadar SIEM user interface
- Investigating an Offense triggered by events
- Investigating the events of an offense
- Investigating an offense that is triggered by flows
- Using rules
- Using the Network Hierarchy
- Index and Aggregated Data Management
- Using the QRadar SIEM dashboard
- Creating QRadar SIEM reports
- Using AQL for advanced searches
- Analyze a real-world large-scale attack
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
-
This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.
-
This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.
-
This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.
-
Your company wants to automate records declaration for your IBM Enterprise Records system. In this course, you learn to configure automatic record declaration using two different methods: event subscriptions and workflow.
You work with a fully functioning IBM Enterprise Records system to practice the skills required for automating record declaration.
-
In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists.
-
The WB402G: Developing Rule Solutions in IBM Operational Decision Manager course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.
Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.
The lab environment for this course uses Windows Server 2012 R2 Standard Edition.
-
Validate your expertise and get the leverage you need to move up in your career.
In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.
Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The only globally accepted IT risk management certification for professionals with three or more years of experience.
This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.
In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.
The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance. In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.
COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.
COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.