This 3 virtual day course is designed for administrators who are responsible for getting data into Splunk Indexers. The course provides the fundamental knowledge of Splunk forwarders and methods to get remote data into Splunk indexers. It covers installation, configuration, management, monitoring, and troubleshooting of Splunk forwarders and Splunk Deployment Server components.
-
This 18-hour course is designed for administrators who are responsible for getting data into Splunk Indexers. The course provides the fundamental knowledge of Splunk forwarders and methods to get remote data into Splunk indexers. It covers installation, configuration, management, monitoring, and troubleshooting of Splunk forwarders and Splunk Deployment Server components.
-
This 2 virtual day course is designed for system administrators who are responsible for managing the Splunk Enterprise environment. The course provides the fundamental knowledge of Splunk license manager, indexers and search heads. It covers configuration, management, and monitoring core Splunk Enterprise components.
-
This 12-hour course is designed for system administrators who are responsible for managing the Splunk Enterprise environment. The course provides the fundamental knowledge of Splunk license manager, indexers and search heads. It covers configuration, management, and monitoring core Splunk Enterprise components.
-
This 9-hour virtual course targeted towards DevOps, Observability and SRE teams is a follow-up to the course “Automation Using the REST and SignalFlow APIs”. Learn to use the Splunk IM Terraform provider to manage Splunk IM resources for visualization, alerting and teams. Create and manage detectors and muting rules. Learn to create and modify teams including team notification policies. All concepts are taught through discussions and hands-on lab exercises.
-
This course is designed for developers responsible for debugging their own applications, and for SREs responsible for troubleshooting performance issues. Splunk Log Observer is built primarily for DevOps teams working on applications built on modern tech stacks (containerized microservices). However, the course can be taken by anyone who wants to view recent log data in a no-code environment.
This 4.5-hour course describes how to use the tool to work with log data using the no-code user interface. Learn to create, save, and share search filters, and to investigate the shape of your log data. Learn to add log messages to dashboards. Analyze logs with aggregation functions and group by rules. Create rules to manipulate incoming data and generate synthetic metrics from log data.
All concepts are taught using lectures and scenario-based hands-on activities.
-
This three-hour SPLK-SO: Search Optimization course is for power users who want to improve search performance. Topics will cover how search modes affect performance, how to create an efficient basic search, how to accelerate reports and data models, and how to use the tstats command to quickly query data.
-
This course is targeted towards Splunk On-call admins responsible for setting up incident response with Splunk On-Call. This 4.5-hour virtual course describes the tasks required to set up on-call teams, including defining schedules, on-call rotations and shifts. Learn to set-up and configure alerts and integrations. Create post incident review reports, track response metrics and customize reports. Use advanced features such as the Rules engine for advanced customization and configure webhook integrations. All concepts are taught using lectures and scenario-based hands-on activities.
-
This three-hour course is for power users who want to improve search performance. Topics will cover how search modes affect performance, how to create an efficient basic search, how to accelerate reports and data models, and how to use the tstats command to quickly query data.
-
-30%
This three-hour course is for power users who want to identify and use transforming commands and eval functions to calculate statistics on their data. Topics will cover data series types, primary transforming commands, mathematical and statistical eval functions, using eval as a function, and the rename and sort commands.
Limited time offer: Splunk Core Certified Power User certification at 30% discount!
-
This eLearning course teaches students how to use scheduled reports and alerts to automate processes in their organization. Students will create, manage, and schedule reports and alerts, and use alert actions to further respond to incidents as they occur.
-
This 1-virtual day course is designed for the experienced Splunk system administrators. This hands-on class is designed to provide the essential knowledge for deploying and managing Splunk SmartStore.
It covers SmartStore deployment options, cache manager configurations, monitoring, and troubleshooting of SmartStore implementation.
-
This eLearning course gives students additional insight into how Splunk processes searches. Students will learn about Splunk architecture, how components of a search are broken down and distributed across the pipeline, and how to troubleshoot searches when results are not returning as expected.
-
This 9-hour virtual course highlights key differences between Splunk Enterprise deployed on-premises and Splunk Enterprise Cloud to allow Splunk Administrators to transition to Splunk Cloud.
This course provides the skills and knowledge for experienced on-prem administrators to migrate the collection and data ingest as well as manage their Splunk Cloud environment and maintain a productive Splunk SaaS deployment.
-
This 2-virtual day course is designed for Splunk administrators. It covers topics and techniques for troubleshooting a standard Splunk distributed deployment using the tools available on Splunk Enterprise
This lab-oriented class is designed to help you gain troubleshooting experience before attending more advanced courses. You will debug a distributed Splunk Enterprise environment using the live system.
This course does not cover the issues surrounding Splunk Cloud, Splunk Clusters, or Splunk premium apps.
-
This three-hour course is for power users who want to learn about fields and how to use fields in searches. Topics will focus on explaining the role of fields in searches, field discovery, using fields in searches, and the difference between persistent and temporary fields. The last topic will introduce how fields from other data sources can be used to enrich search results.
-
This one-day course is designed for analyst users who want to use Splunk IT Service Intelligence to manage, analyze, and optimize their IT services. Those who will implement Splunk IT Service Intelligence, please enroll in Implementing Splunk IT Service Intelligence instead
-
This 1-virtual day course targeted to developers and DevOps enables you to use Splunk APM to analyze traces, troubleshoot and monitor your microservices-based applications. Through in-person discussions and hands-on activities, deep dive into uses of distributed tracing, navigating the Splunk APM app to analyze traces, visualize and alert on APM metrics.
All concepts and taught through discussions and hands-on activities. -
This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.
-
This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.
-
This blended course is for Devops/SREs and Developers.
The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
find insights using analytics in charts and detectors and to create detectors for common use cases. -
This eLearning course teaches students how to create visualizations in Splunk, using Splunk’s Search Processing Language as well as the Splunk Web interface. Students will learn commands that allow data to be displayed on charts and graphs, transform geographic data into maps, create single value visualizations, and use Splunk’s visual formatting options to change the look of statistical tables.
-
This course provides Splunk users in-depth information about metrics, ingesting and searching metrics data, and how to use the Metrics Workspace to analyze and create visualizations.
-
-30%
This three-hour course is for power users who want to become experts at using time in searches. Topics will focus on searching and formatting time in addition to using time commands and working with time zones.
Limited time offer: Splunk Core Certified Power User certification at 30% discount!
-
This is a Cisco High Touch Delivery Service Training – terms and conditions are subject to Cisco.
The Cisco Ultra M Deployment and Operations (SPMB301) v1.0 course teaches you about the hardware components of the Cisco® Ultra M virtual packet core solution, including Cisco Nexus® spine and leaf switches and Cisco Unified Computing System™ (Cisco UCS®) C240 M4S (Small Form Factor) servers. You will learn about the software components of the Ultra M solution, including the OpenStack Virtual Infrastructure Manager (VIM), the Ultra M Virtualized Network Function (VNF) architecture, and the Cisco Elastic Services Controller, and how the different components operate.
The course also covers the operation and administration of the Red Hat Enterprise Linux operating system in relation to the Ultra M Undercloud and Overcloud deployments.
-
The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.
This course prepares you for the 300-510 Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) exam. This course also earns you 40 Continuing Education (CE) credits towards recertification.
-
Using Nexus to Scale Scrum Beyond a Single Scrum Team.
Over the 2 days, students will simulate a large software development project using the Nexus Framework. The workshop is delivered using an end-to-end case study where students work together to organize and simulate a scaled software development project. Throughout the workshop, students will be introduced to more than 50 practices that can be used to help reduce complexity and dependencies at scale.
This workshop will show you how to launch, structure, staff, and manage a large agile or Scrum project. During the two days you will organize and simulate a scaled software development project to learn the infrastructure, tools and practices needed for success. You will leave knowing how to scale Scrum in order to maximize the value of your software development initiative.
-
The Implementing Cisco Service Provider VPN Services (SPVI) v1.0 course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.
This course prepares you for the 300-515 Implementing Cisco Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the Cisco CCNP Service Provider certification. This course also earns you 40 Continuing Education (CE) credits towards recertification.
-
The SREF: Site Reliability Engineering Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms.
The course highlights the evolution of SRE and its future direction, and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).
The course was developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption.
This course positions learners to successfully complete the SRE Foundation certification exam. The training and certification instills candidates with tangible takeaways, such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and learning effective incident responses using SRE practices.
-
SRE Practitioners deliver business value to customers through collaboration with DevOps teams and engineering of reliable, secure application environments and software systems.
The Site Reliability Engineering Practitioner course introduces ways to economically and reliably scale services in an organization. It explores strategies to improve agility, cross-functional collaboration, and transparency of health of services towards building resiliency by design, automation and closed loop remediation.
The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and effective incident responses using SRE practices.
The course is developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption. This course positions learners to successfully complete the SRE Practitioner certification exam.
This course may be eligible for PMI’s PDUs.
-
This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.
To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.
Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.
Hands-On Labs
Eight labs are included to address:
- IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
- tuning VSAM and the VSAM buffers
- alternate indexes
-
This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.
-
This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installations storage management requirements.
Hands-on lab exercises enable you to perform a step-by-step implementation.
-
SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.
Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:
Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.
Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression
Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.
Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.
Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.
This course lecture offering is at the Storwize V7000 V7.6. level.
-
The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.
Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.