This 13.5-hour course is for users who want to attain operational intelligence level 4, (business insights) and covers implementing analytics and data science projects using Splunk’s statistics, machine learning, built-in and custom visualization capabilities.
-
This 13.5 hour course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES). It covers ES event processing and normalization, deployment requirements, technology add-ons, dashboard dependencies, data models, managing risk, and customizing threat intelligence.
-
This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.
-
This 12-hour course is designed for system administrators who are responsible for managing the Splunk Enterprise environment. The course provides the fundamental knowledge of Splunk license manager, indexers and search heads. It covers configuration, management, and monitoring core Splunk Enterprise components.
-
This 13.5 hour Advanced SOAR Implementation course is intended for experienced SOAR consultants who will be responsible for complex SOAR solution development, and will prepare the attendee to integrate SOAR with Splunk as well as develop playbooks requiring custom coding and REST API usage.
Potential attendees have received a passing grade in all prerequisite courses, and must ensure they can devote all of their attention to the class, as the course work is very challenging. Students will develop a custom solution with SOAR, Splunk and custom Python code. The labs provide requirements for the solution; the student must plan and execute the development. This will require thoughtful focus, experimentation and problem-solving skills.
-
This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.
To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.
Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.
Hands-On Labs
Eight labs are included to address:
- IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
- tuning VSAM and the VSAM buffers
- alternate indexes
-
This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.
-
In today’s digital age, the use of Artificial Intelligence (AI) has proliferated across various industries, from healthcare and finance to transportation and e-commerce. However, with the increased adoption of AI, there has also been a rise in AI-targeted attacks. According to a report by Gartner, by 2025, 50% of organizations will have suffered from at least one AI-related security incident. These attacks can range from data poisoning and model inversion to adversarial examples and model extraction. It’s crucial to understand these exploits to help companies secure their AI assets effectively.
The sophistication of AI-driven threats is escalating at an alarming rate, posing a significant risk of substantial damage. Consider this: a nefarious attacker could exploit an AI model to craft adversarial exploits, cunningly designed to slip past a company’s AI-fortified security defenses. In a similar vein, an attacker could deploy a model extraction attack, effectively pilfering a company’s proprietary AI models to use them for malevolent purposes.
The repercussions of failing to safeguard AI from such exploitation or attacks are grave. Companies stand to incur hefty financial losses, suffer damage to their reputation, and potentially face legal liabilities. Furthermore, incidents related to AI security can undermine public trust in AI technologies, thereby impeding their adoption and advancement.
The Certified DefenAI Professional course is designed to equip professionals with the knowledge and skills to identify and mitigate the risks associated with AI exploitation and adversarial AI attacks. This course will delve into the world of AI exploitation, exploring the techniques and tools used to compromise AI systems, as well as the strategies and best practices for protecting AI modules from attacks by other AI modules.
-
Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.
ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.
As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.
AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:
- Evaluate and secure AI-enabled systems across the enterprise
- Integrate AI into existing security operations and workflows
- Identify and respond to risks tied to AI technologies
- Reinforce governance, compliance and responsible innovation
-
Bring trust and insight to a world shaped by artificial intelligence.
AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.
ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.
This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.
-
The Cisco SD-WAN Operation and Deployment (SDWFND) course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.
You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.
The course will allow you to earn 12 Continuing Education (CE) credits toward recertification
-
Master relationship-building with ITIL 4 Specialist: Business Relationship Management—designed for IT pros who manage and grow trusted partnerships between service providers and consumers.
The ITIL 4 Specialist: Business Relationship Management module is for IT professionals who are involved in establishing and nurturing the relationships between service providers and consumer organizations, and their stakeholders.
Based on the ITIL 4 framework, this ITIL 4 certification provides both strategic and practical best practice guidance to help organizations understand the value of Business Relationship Management as well as its key concepts and challenges. Professionals should be able to use these concepts to deliver return on investment in digital technology, develop and apply service relationship models and integrate Business Relationship Management in the organisation’s service value streams for a holistic and end-to-end approach.








