This eLearning course teaches students how to use scheduled reports and alerts to automate processes in their organization. Students will create, manage, and schedule reports and alerts, and use alert actions to further respond to incidents as they occur.
-
This eLearning course gives students additional insight into how Splunk processes searches. Students will learn about Splunk architecture, how components of a search are broken down and distributed across the pipeline, and how to troubleshoot searches when results are not returning as expected.
-
This course is for experienced on-prem administrators and anyone needing to ramp-up on Splunk Cloud to get more knowledge and experience of managing Splunk Cloud instances.
The course discusses the differentiators between on-prem Splunk and the different Splunk Cloud offerings. Modules include topics on how to migrate data collection and ingest from on-prem Splunk to Splunk Cloud as well as highlighting Splunk Cloud specific differences and best practices to manage a productive Splunk SaaS deployment. For Splunk Administrators who have undertaken the System and Data Administration learning pathways, this course highlights key differences between Splunk Enterprise deployed on-premises and Splunk Enterprise Cloud to allow them to ramp up their data and system management skills to transition to Splunk Cloud. The hands-on lab provides access to and experience of managing a Splunk Cloud instance.
-
This 2-virtual day course is designed for Splunk administrators. It covers topics and techniques for troubleshooting a standard Splunk distributed deployment using the tools available on Splunk Enterprise
This lab-oriented class is designed to help you gain troubleshooting experience before attending more advanced courses. You will debug a distributed Splunk Enterprise environment using the live system.
This course does not cover the issues surrounding Splunk Cloud, Splunk Clusters, or Splunk premium apps.
-
This three-hour course is for power users who want to learn about fields and how to use fields in searches. Topics will focus on explaining the role of fields in searches, field discovery, using fields in searches, and the difference between persistent and temporary fields. The last topic will introduce how fields from other data sources can be used to enrich search results.
-
This one-day course is designed for analyst users who want to use Splunk IT Service Intelligence to manage, analyze, and optimize their IT services. Those who will implement Splunk IT Service Intelligence, please enroll in Implementing Splunk IT Service Intelligence instead
-
This course is for Devops/SREs and Developers.
This course enables you to use Splunk APM to analyze traces, troubleshoot and monitor your microservices-based applications. Through discussions and hands-on activities, deep dive into uses of distributed tracing, navigating the Splunk APM app to analyze traces and visualize and alert on APM metrics.
-
This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.
-
This blended course is for Devops/SREs and Developers.
The course describes ways to enhance dashboards and alerts to help with troubleshooting. You will also be able to
find insights using analytics in charts and detectors and to create detectors for common use cases. -
This eLearning course teaches students how to create visualizations in Splunk, using Splunk’s Search Processing Language as well as the Splunk Web interface. Students will learn commands that allow data to be displayed on charts and graphs, transform geographic data into maps, create single value visualizations, and use Splunk’s visual formatting options to change the look of statistical tables.
-
This three-hour course is for power users who want to become experts at using time in searches. Topics will focus on searching and formatting time in addition to using time commands and working with time zones.
Limited time offer: Splunk Core Certified Power User certification at 30% discount!
-
This is a Cisco High Touch Delivery Service Training – terms and conditions are subject to Cisco.
The Cisco Ultra M Deployment and Operations (SPMB301) v1.0 course teaches you about the hardware components of the Cisco® Ultra M virtual packet core solution, including Cisco Nexus® spine and leaf switches and Cisco Unified Computing System™ (Cisco UCS®) C240 M4S (Small Form Factor) servers. You will learn about the software components of the Ultra M solution, including the OpenStack Virtual Infrastructure Manager (VIM), the Ultra M Virtualized Network Function (VNF) architecture, and the Cisco Elastic Services Controller, and how the different components operate.
The course also covers the operation and administration of the Red Hat Enterprise Linux operating system in relation to the Ultra M Undercloud and Overcloud deployments.
-
The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.
This training prepares you for the 300-510 SPRI. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification.
-
Using Nexus to Scale Scrum Beyond a Single Scrum Team.
Over the 2 days, students will simulate a large software development project using the Nexus Framework. The workshop is delivered using an end-to-end case study where students work together to organize and simulate a scaled software development project. Throughout the workshop, students will be introduced to more than 50 practices that can be used to help reduce complexity and dependencies at scale.
This workshop will show you how to launch, structure, staff, and manage a large agile or Scrum project. During the two days you will organize and simulate a scaled software development project to learn the infrastructure, tools and practices needed for success. You will leave knowing how to scale Scrum in order to maximize the value of your software development initiative.
-
The Implementing Cisco Service Provider VPN Services (SPVI) v1.0 course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.
This course prepares you for the 300-515 Implementing Cisco Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the Cisco CCNP Service Provider certification. This course also earns you 40 Continuing Education (CE) credits towards recertification.
-
The SREF: Site Reliability Engineering Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms.
The course highlights the evolution of SRE and its future direction, and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO’s).
The course was developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption.
This course positions learners to successfully complete the SRE Foundation certification exam. The training and certification instills candidates with tangible takeaways, such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and learning effective incident responses using SRE practices.
-
SRE Practitioners deliver business value to customers through collaboration with DevOps teams and engineering of reliable, secure application environments and software systems.
The Site Reliability Engineering Practitioner course introduces ways to economically and reliably scale services in an organization. It explores strategies to improve agility, cross-functional collaboration, and transparency of health of services towards building resiliency by design, automation and closed loop remediation.
The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing SRE models that fit their organizational context, building advanced observability in distributed systems, building resiliency by design and effective incident responses using SRE practices.
The course is developed by leveraging key SRE sources, engaging with thought-leaders in the SRE space and working with organizations embracing SRE to extract real-life best practices and has been designed to teach the key principles & practices necessary for starting SRE adoption. This course positions learners to successfully complete the SRE Practitioner certification exam.
This course may be eligible for PMI’s PDUs.
-
This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.
To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.
Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.
Hands-On Labs
Eight labs are included to address:
- IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT
- tuning VSAM and the VSAM buffers
- alternate indexes
-
This IBM SS84G: DFSMS Implementation course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment.
-
This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installations storage management requirements.
Hands-on lab exercises enable you to perform a step-by-step implementation.
-
SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.
Attend SSCP certification course and get prepared to pass the exam and become a Systems Security Certified Practitioner. This course will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:
Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.
Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression
Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.
Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.
Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.
This course lecture offering is at the Storwize V7000 V7.6. level.
-
The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.
Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.
-
The Securing Cisco Networks with Snort Rule Writing Best Practices (SSF Rules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more.
The hands-on labs give you practice in creating and testing Snort rules.









