You searched for: ""

  • 5 Days ILT, VILT

    This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.

    The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 1 Day ILT, VILT

    This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.

    A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.

    OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.

    OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.

     

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 3 Days ILT, VILT

    This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.

  • 3 Days ILT, VILT

    This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.

  • 3 Days ILT, VILT

    This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.

    This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.

  • 1 Day ILT, VILT

    Your company wants to automate records declaration for your IBM Enterprise Records system. In this course, you learn to configure automatic record declaration using two different methods: event subscriptions and workflow.

    You work with a fully functioning IBM Enterprise Records system to practice the skills required for automating record declaration.

  • F2940G: Customize the IBM Case Manager Client User Interface v5.3.2

    Price range: RM1,890.00 through RM2,170.00
    1 Day ILT, VILT

    In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists.

  • WB402G: Developing Rule Solutions in IBM Operational Decision Manager v8.9.2

    Price range: RM5,250.00 through RM8,240.00
    5 Days ILT, VILT

    The WB402G: Developing Rule Solutions in IBM Operational Decision Manager course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.

    Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.

    The lab environment for this course uses Windows Server 2012 R2 Standard Edition.

  • 4 Days ILT, VILT

    Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

    The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

    This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.

    Content in this course is:

    • Aligned with the CISM job practice
    • Adapted from the CISM Review Manual 16th Edition
    • Reviewed by subject matter experts that hold the CISM certification

    The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 5 Days ILT, VILT

    Validate your expertise and get the leverage you need to move up in your career.

    In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.

    Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

Go to Top