You searched for: ""

  • 4 Days ILT, VILT

    Many city landmarks offer panoramic views from their observation decks. From a high viewpoint, the distances between some buildings might be closer and others further apart, than at first glance. Perspective is key and necessary component for the successful delivery of mature technology-enabled services.

    In service management, two vital elements for success are perspective and flexibility:

    • Perspective: understanding the overall picture of what a service does and how it is delivered. This involves a wide variety of skills, processes, knowledge, tools, and technologies to deliver business and customer value.
    • Flexibility: involves using the portfolio of tools and artefacts appropriately within complex environments. Service management is not a one-size-fits-all approach. The expectations around the customer experience and business value cannot be met with a single and isolated view.

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution.

    The ITIL 4 Specialist: Create, Deliver and Support (CDS) course helps ITSM practitioners assimilate further into the emerging practices of ITIL4 – specifically in the areas of the Service Value Stream and the use of the Value Stream with a specific focus on the creation, delivery and support of new services, and the provisioning of user support.

    Relevant supporting ITIL Practices to these value streams are examined. Team collaboration, integration and organizational cultural aspects critical to the success of the adoption of the value streams are discussed. The course also covers the management and prioritization of work through several techniques and scrutinizes the contribution of continual improvement.

    This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business.

  • 4 Days ILT, VILT

    Digital and information technologies have changed the world. Every aspect of life has been impacted in some way by technology that did not exist just 50 years ago. Digital and information technologies have disrupted the business world, but they have also provided the keys to success. Each wave of innovation brings opportunities and capabilities to those organizations that are willing to change how they think and work.

    The disruptive nature of innovations like artificial intelligence, machine learning, virtual working, and internet of things is compounded by the frequency of the innovations. Organizations must adapt quickly and repeatedly; continually adjusting their strategies.

    The IITL 4 Leader: Digital and IT Strategy course adds a new perspective to the ITIL 4 guidance and elevates the discussion to an organizational strategy level.

    The course enables IT and digital leaders to influence and drive strategic business decisions through creating an appropriate digital strategy aligned to the wider business goals, understanding how business and IT leaders respond to digital disruption and exploiting the ITIL 4 framework to support organizations on their challenging digital transformation journey.

    The course will cover how ITIL 4 can be integrated with emerging practices and new technologies to meet new internal and external challenges in the age of volatility, uncertainty, complexity and ambiguity (VUCA).

    In this course, there is a mandatory case study assessment for student to pass prior to taking up the actual exam. This assessment is an open-book assessment with the passing score of 75% (30 correct out of 40).

  • 4 Days ILT, VILT

    Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Strategist: Direct, Plan and Improve (DPI) course helps ITSM practitioners acquire further insight into ITIL 4 – specifically in the areas that contribute to creating and sustaining an IT organization steeped in the growth mindset.

    The ITIL4-DPI: ITIL 4 Strategist Direct Plan and Improve certification course covers both practical and strategic elements related to improvement. Lean and Agile methodologies and techniques, a feature of ITIL 4, is embedded into directing, planning and improving services in support of business objectives. This interactive course is indispensable to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking to innovate and improve IT services delivered to the business.

    Level up your skills and stand out with a globally recognized ITIL 4 certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 4 Days ILT, VILT

    This ITIL4-DSV: ITIL 4 Specialist Drive Stakeholder Value certification module provides the candidate with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers, and partners, including key customer/user experience and journey mapping concepts. Take what was established as THE best practice guidance of IT Service Management – then make it better.

    ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Specialist: Drive Stakeholder Value (DSV) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding stakeholders, whether they are customers or service providers, through the principles and practices of co-creating value through services.

    This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 Drive Stakeholder Value qualification is one of the prerequisites for the designation of ITIL 4 Managing Professional which assesses the candidates practical and technical knowledge about how to run successful, modern, IT-enabled services, teams, and workflows.

  • 4 Days ILT, VILT

    This ITIL4-HVIT: ITIL 4 Specialist High Velocity IT certification module provides the candidate with an understanding of the ways in which digital organizations and digital operating models function in high velocity environments, focusing on rapid delivery of products and services to obtain maximum business value. Take what was established as THE best practice guidance of IT Service Management – then make it better.

    ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL 4 Specialist: High Velocity IT (HVIT) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding practitioners who work in organizations that are becoming more digitally enabled. It will help those who are familiar with traditional IT and service management concepts to discuss ‘digital’ confidently, develop practical competencies, and integrate new concepts, techniques, and technologies into their ways of working. It also covers Agile and Lean, and technical practices and technologies such as the Cloud, Automation, and Automatic Testing.

    This interactive course is essential to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 High Velocity IT qualification is one of the pre-requisites for the designation of ITIL4 Managing Professional.

  • 3 Days ILT, VILT

    COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance.  In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.

    COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.

    COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.

  • 4 Days ILT, VILT

    IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.

    The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 4 Days ILT, VILT

    The only globally accepted IT risk management certification for professionals with three or more years of experience.

    This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.

    In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • WB402G: Developing Rule Solutions in IBM Operational Decision Manager v8.9.2

    Price range: RM5,250.00 through RM8,240.00
    5 Days ILT, VILT

    The WB402G: Developing Rule Solutions in IBM Operational Decision Manager course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.

    Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.

    The lab environment for this course uses Windows Server 2012 R2 Standard Edition.

  • F2940G: Customize the IBM Case Manager Client User Interface v5.3.2

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists.

  • 1 Day ILT, VILT

    Your company wants to automate records declaration for your IBM Enterprise Records system. In this course, you learn to configure automatic record declaration using two different methods: event subscriptions and workflow.

    You work with a fully functioning IBM Enterprise Records system to practice the skills required for automating record declaration.

  • 3 Days ILT, VILT

    This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.

    This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.

  • 3 Days ILT, VILT

    This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.

  • 3 Days ILT, VILT

    This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 1 Day ILT, VILT

    This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.

    A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.

    OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.

    OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.

     

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 5 Days ILT, VILT

    This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.

    The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.

  • 4 Days ILT, VILT

    This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.

    The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.

    We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.

  • 3 Days ILT, VILT

    This TP370G: IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed.

  • 3 Days ILT, VILT

    This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.

  • 5 Days ILT, VILT

    This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.

  • 5 Days ILT, VILT

    This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.

    Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.

    Hands-on labs 

    This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload

  • 2 Days ILT, VILT

    This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.

    Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.

  • 1 Day ILT, VILT

    This course enables students to acquire the skills necessary to use the Information Governance Catalog to analyze metadata stored within the Information Server Repository. The emphasis is on how metadata gets captured within the repository and how to explore and analyze the metadata it contains.

  • KM520G: IBM InfoSphere DataStage engine Administration for Information Server v11.5

    Price range: RM1,470.00 through RM2,060.00
    1 Day ILT, VILT

    This course teaches Information Server and/or DataStage administrators to configure, manage, and monitor the DataStage Engine which plays a crucial role in Information Server. It not only runs high performance parallel ETL jobs designed and built in DataStage. It also supports other Information Server products including Information Analyzer, QualityStage, and Data Click. After introducing DataStage parallel jobs and the Engine that runs them, the course describes DataStage project configuration, the Engine’s development and runtime environments, and the Engine’s data source connectivity. In addition the course explains how to import and export DataStage objects, how to run and monitor DataStage jobs through the command line and GUI, and how to use some important Engine utilities.

  • 3 Days ILT, VILT

    This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.

  • 4 Days ILT, VILT

    This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.

  • 1 Day ILT, VILT

    This course is also available as self-paced virtual (e-learning) course Supporting REST and JOSE in IBM DataPower Gateway V7.5 (ZE752G). This option does not require any travel.

    This course teaches you the developer skills that are required to configure and implement services that support REST-based traffic and JOSE-based signatures and encryption on the IBM DataPower Gateways (IDG) with firmware version 7.5.1.

    The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its JSON, XML, web services, and REST deployments. For JSON payloads, DataPower supports digital signatures and encryption that conform to the JSON Object Signing and Encryption (JOSE) specification.

    Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to use the configuration options, processing actions, and GatewayScript to support REST-based message traffic. To protect JSON message payloads, you use JSON Web Signature (JWS) and JSON Web Encryption (JWE) actions in the processing policy of a service.

    Hands-on exercises give you experience working directly with a DataPower gateway. The exercises focus on skills such as selecting request and response types, using the HTTP method criteria in a matching rule, style sheet and GatewayScript transforms, GatewayScript CLI debugging, signing JSON payloads, and encrypting JSON payloads.

  • 5 Days ILT, VILT

    IBM Process Server supports a service-oriented architecture (SOA) by providing a platform for using diverse technologies to integrate business applications. In this course, you learn how IBM Process Server enables business integration applications to define business logic and processes based on Web Services Business Process Execution Language (WS-BPEL), and business rules. In the intensive hands-on lab exercises, you design, develop, and test a comprehensive business integration solution. You use the IBM Integration Designer tool to create business integration solutions by using the Service Component Architecture (SCA) programming model, the Service Data Objects (SDO) data model, and the mediation flow programming model.

  • 5 Days ILT, VILT

    The course is updated for DB2 10 for z/OS. This course is the classroom delivered version of the Instructor led Online course

    • DB2 10 for z/OS System Administration – ILO (3V851).

    Administrators of DB2 10 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 10 for z/OS subsystem. Engage in lectures and hands-on labs to gain experience to:

    • Relate the z/OS IPL process to a DB2 subsystem
    • Explain effects of stopping and starting DB2
    • Explain how DB2 sets and use Integrated Catalog Facility (ICF) catalog names
    • The use of DSN command processor running in batch and foreground
    • Use views to minimize your ability to see into the DB2 catalog
    • See how the catalog (through grant activity) controls access to data
    • Search the catalog for problem situations
    • Use the catalog and DB2 utilities to determine data recovery requirements
    • Describe Internal Resource Lock Manager (IRLM) in a DB2 environment
    • Implement DB2 and Resource Access Control Facility (RACF) security
    • Describe DB2 program flow for all environments
    • Display normal and problem threads and database status
    • See how the SQL Processor Using File Input (SPUFI) AUTOCOMMIT option defers the COMMIT/ROLLBACK decision
    • Interpret lock displays
    • Identify and cancel particular threads
    • Describe available DB2 utilities to manage system and user page sets
  • F2800G: IBM FileNet P8 Platform Essentials v5.5.x

    Price range: RM1,890.00 through RM2,050.00
    1 Day ILT, VILT

    This course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.

  • 3 Days ILT, VILT

    This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.

    The course consists of six units and 12 hands-on lab exercises.

  • F2920G: IBM Case Manager: Configure Security v5.3.2

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.

  • 3 Days ILT, VILT

    Learn about the new features and enhancements of DB2 11 for z/OS, including the technical detail of the functional enhancements of this significant new version of DB2 for z/OS.

    Note: This course shall be made available a unit at a time. If you wish to receive training on this new version of DB2 11 for z/OS, contact your training provider to request a class containing the latest content.

Go to Top