You searched for: ""

  • 4 Days ILT, VILT

    Learn to write easy to use and efficient control language (CL) programs which may be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input).

    You will learn to write Control Language (CL) programs which may be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input).

  • CL207G: Db2 11.1 Administration Workshop for Linux

    Price range: RM3,360.00 through RM6,240.00
    4 Days ILT, VILT

    This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs.

    The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database.

  • 4 Days ILT, VILT

    This introductory course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i. Focus is given to using the GUI (IBM i Access Client Solutions and IBM Navigator for i) as well as 5250 emulation sessions to perform tasks including job control, monitoring, sending messages, managing systems devices, and more. Hands-on exercises reinforce the lecture topics and prepare the student to successfully operate a Power System with IBM i.

  • 5 Days ILT, VILT

    Install, configure, and manage Red Hat JBoss Enterprise Application Platform

    Red Hat JBoss Application Administration I with exam teaches you the best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform 7. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively manage applications on JBoss Enterprise Application Platform.

    This course is a combination of AD248: Red Hat JBoss Application Administration I and includes the Red Hat Certified Specialist in Enterprise Application Server Administration exam (EX248).

    This course will cover best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7. This hands-on class covers the real-world tasks that a system administrator needs to know to deploy and manage applications on JBoss EAP. The topics in this course cover all of the exam objectives of the Red Hat Certified Specialist in Enterprise Application Server Administration exam.

  • 4 Days ILT, VILT

    Build, expand and maintain cloud-scale, clustered storage for your applications with Red Hat Ceph Storage

    Cloud Storage with Red Hat Ceph Storage (CL260) is designed for storage administrators and cloud operators who deploy Red Hat Ceph Storage in a production data center environment or as a component of a Red Hat OpenStack Platform or OpenShift Container Platform infrastructure. Learn how to deploy, manage, and scale a Ceph storage cluster to provide hybrid storage resources, including Amazon S3 and OpenStack Swift-compatible object storage, Ceph-native and iSCSI-based block storage, and shared file storage. This course is based on Red Hat Ceph Storage 5.0.

    Following course completion, hands-on lab access will remain available for up to 45 days for any live course that includes a virtual environment.

  • 5 Days ILT, VILT

    Gain Cybersecurity Mastery for Real-world Success with Certified Ethical Hacker v13.

    The C|EH v13 is a specialized, one-of-a-kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

    This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands on lab and practice range experience.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • Out of stock
    4 Days ILT, VILT

    Manage and provision large-scale deployments of JBoss Enterprise Application Platform

    The Red Hat JBoss Application Administration II (AD348) prepares students to provision and manage Red Hat JBoss Enterprise Application Platform (JBoss EAP) in large-scale production environments. Intended for experienced administrators, this course provides a deeper understanding of how to work with JBoss EAP by taking a closer look at installation, clustering, deployments, scripting, management, messaging, and security with a view towards building on the skills established in AD248: Red Hat JBoss Application Administration I.

    While focusing on automating tasks using the new command line interface (CLI) features of EAP 7, this course takes a deeper dive into provisioning JBoss EAP instances, live patching, clustering, and domain management through CLI scripting, custom coding, JBoss migrations, and a deeper dive into the security systems of JBoss EAP, including the management interface, securing resources such as JMS queues, implementing SSL for the web interface, RBAC, and network considerations. JBoss Application Administration II (AD348) also covers management, clustering, and tuning of of the ActiveMQ Artemis.

    This course is based on JBoss EAP 7.

  • 5 Days ILT, VILT

    The CHFI: Computer Hacking Forensic Investigator certification includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

    CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

    Level up your skills and stand out with a globally recognized cybersecurity certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.

  • 4 Days ILT, VILT

    Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

    This course is based on Red Hat Enterprise Linux 7.1.

    Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You’ll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.

  • 4 Days ILT, VILT

    Performance tuning and capacity planning for Red Hat Enterprise Linux.

    Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH422) teaches senior Linux® system administrators the methodology of performance tuning. This course discusses system architecture with an emphasis on understanding its implications on system performance, performance adjustments, open source benchmarking utilities, networking performance, and tuning configurations for specific server use cases and workloads.

    This course is based on Red Hat® Enterprise Linux 8.

  • 4 Days ILT, VILT

    Deploy, configure, manage, and migrate virtual environments

    Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat® Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.

    This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux® 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.

  • 4 Days ILT, VILT

    Configure and manage Red Hat Identity Management (IdM).

    Red Hat Security: Identity Management and Active Directory Integration (RH362) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux.

    This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Go to Top