This ZZ930G: InfoSphere MDM Physical Domains course is designed for anyone who wants to get an understanding of the Data Domains for the InfoSphere Master Data Management Physical Module. This course takes a comprehensive look at the three core data domains of InfoSphere MDM: Party, Account, and Product. For each of the domains spanned by InfoSphere MDM, participants will be exposed to the data model, services, and rules associated with the main entities of that domain. Heavy emphasis is put on exercises and activities so that the participants can apply the knowledge that they learn after course conclusion.
-
This AMA-2605: Extraordinary Productivity: The 5 Choices That Drive Success productivity seminar combines current neuroscience research with proven productivity principles to help you better manage your decisions, attention, and energy.
You’ll learn how to apply a process—which incorporates the use of Microsoft Outlook®—to dramatically increase your ability to achieve life’s most important outcomes by consistently making choices that create extraordinary value for yourself and your organization. This solution not only produces a measurable increase in productivity but can also provide you with a renewed sense of engagement and accomplishment.
-
Learn how to identify and prevent major risks to your architecture from an AWS expert.
Don’t know how to identify and prevent major risks in your architecture? The Advanced AWS Well-Architected Best Practices course will help your team identify and solution for high risk issues with a live instructor.
This interactive AWS-AWABP: Advanced AWS Well-Architected Best Practices course provides a deep dive into Amazon Web Services (AWS) best practices to help you perform effective and efficient AWS Well-Architected Framework Reviews. The course covers the phases of a review, including how to prepare, run, and get guidance after a review has been performed. Attendees should have familiarity with the AWS concepts, terminology, services, and tools that are covered in the intermediate, 200-levelAWS Well-Architected Best Practices.
This course provides an AWS Well-Architected Framework Review simulation and instructor-led group exercises and discussions regarding prioritizing and solutioning risks. The content focuses on teaching learners how to prepare proposals on high and medium risk issues using the AWS Well-Architected Tool.
Through simulation, group exercises, discussions, and role playing activities this AWS Well-Architected course will help you identify and solution for high and medium risk issues with an expert AWS instructor with deep technical knowledge.
Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.
-
Learn how to use the Well-Architected Review process, and the AWS Well-Architected Tool to conduct reviews to identify high risk issues (HRIs).
The AWS Well-Architected Best Practices course will help you learn a consistent approach to evaluate architectures and implement designs from a live instructor. You’ll learn how to use the Well-Architected Review process and the AWS Well-Architected Tool to conduct reviews to identify high risk issues (HRIs).
In this 1-day AWS training course, you’ll learn to apply the five pillars of the AWS Well-Architected Framework—operational excellence, security, reliability, performance efficiency, and cost optimization—to understand the impact of design decisions. You’ll apply what you’ve learned during the course to each pillar of the Well-Architected Framework through tutorials, hands-on labs, discussions, demonstrations, presentations, and group exercises.
This course is designed to provide a deep dive into the AWS Well-Architected Framework and its 5 pillars. This course also covers the Well-Architected Review process, and using the AWS Well-Architected Tool to complete reviews.
Trainocate is an AWS Authorized Training Partner as well as the AWS Global Training Partner of the Year 2024 is trusted by AWS to offer, deliver, and/or incorporate official AWS Training, including classroom and digital offerings. Whether your team prefers to learn from live instructors, on-demand courses, or both, ATPs offer a breadth of AWS Training options for learners of all levels.
-
Teaches the essential skills required to design, implement, and manage a Red Hat OpenShift Data Foundation cluster and perform day-to-day Kubernetes storage management tasks.
Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This Red Hat OpenShift course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services.
-
Professional Scrum™ with User Experience (PSU) is a 2-day hands-on course where students who already have a fundamental understanding of Scrum and some experience using it will learn how to integrate modern UX practices, (UX is more than UI) into the way they are working in Scrum and how to work most effectively within Scrum Teams. Design work can sometimes feel slow, and not well suited to quick agile cadences and Scrum events, but that isn’t the case. Learn UX techniques that fit beautifully into Scrum, and practice these techniques with cross-functional teams in the class.
In this two day class* students will leverage an ongoing case study as a way of applying techniques learned throughout the class and preparing to take what they learn back to their workplace. This course is designed for Product Owners and Scrum Masters to enable them to better incorporate design, research and learning into their Scrum process.
Lean UX techniques focus the team toward customer-centric design and discovery. Scrum focuses the team toward rapid delivery and customer feedback. By bringing together Lean UX and Scrum, teams learn how to drive the design together with delivery in short, iterative cycles to assess what works best for the business and the user.
Leveraging Lean UX techniques, the course takes core design and research activities, illustrating how they come together with development and delivery. Attendees explore how these activities fit into a dual-track agile process (Design and Development) where cross-functional teams can work together to explore, experiment and deliver value-based outcomes.
-
After successfully completing the EXIN Lean IT Foundation exam, a candidate will be familiar with the principles of the Lean philosophy and in particular with the application of this philosophy within an IT environment. Specifically, the candidate should understand:
- The principles underlying the Lean philosophy
- The importance of understanding and delivering customer value
- The way Lean looks at processes and the waste within them
- How to measure performance and the key determinants of performance
- What the organizational requirements are when implementing Lean, including the use of visual management tools
- Which behavior and attitude is necessary for Lean to be successful within an IT organization
- The DMAIC problem-solving model
- How these Lean principles can be applied within an IT organization
EXIN Lean IT Foundation helps IT organizations to ensure that they provide their customers with the best possible services. Through understanding customer value, the processes that deliver this value, the way to manage performance, the way to organize and the required attitude and behavior, IT organizations are helped to develop a continuous improvement mindset. Lean IT is complementary to all other best practice methods. The purpose of EXIN Lean IT Foundation is to confirm that a candidate has sufficient knowledge and understanding of Lean IT to support a Lean initiative within an IT organization.
-
The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner.
Today’s technology is moving fast and changing the way we do business. Companies digitize all information by default, store their data in the cloud and use open source software. This raises information security issues related to network and system infrastructure.
The EEHF: EXIN Ethical Hacking Foundation module covers the basic steps of ethical hacking: intelligence gathering, scanning computer network/systems, and penetrating systems. Candidates are expected to be very aware of the difference between legal and illegal hacking, and the consequences of misuse.
In more detail the candidate will develop an understanding of the following topics:
- Network sniffing (gathering information from network traffic)
- Cracking a WEP and WPA(2) key from a wireless network
- Network vulnerability scanning
- Basic penetration of computer systems
- Password cracking
- Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)
The EXIN Ethical Hacking Foundation exam tests the knowledge of the candidate on:
- the basics of Ethical Hacking, and
- the practice of Ethical Hacking.
-
Security in IT is not only becoming more important but also more sophisticated. In light of this, organizations are dedicating roles to the safeguarding of their data and systems. The EXIN Cyber & IT Security program is geared towards providing candidates with the required knowledge to understand the technical side of information security.
It covers the theoretical background, detailed information about security infrastructure and goes into the vulnerabilities, risks, and required measures.
-
Service Integration and Management (SIAM) is a methodology used to manage and seamlessy integrate multiple service providers to ensure a single business-facing IT organization.
The EXIN SIAM™ Professional certification tests a candidate’s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.
-
The EXIN SIAM™ Foundation credential validates a professional’s knowledge about bringing together multiple service providers to strive for a common goal in order to support the client organization’s agreed objectives for service delivery.
This certification includes the following topics:
- introduction to SIAM
- SIAM implementation roadmap
- SIAM roles and responsibilities
- SIAM practices
- processes to support SIAM
- SIAM challenges and risks
- SIAM and other practices.
SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization. A synonym for Service Integration and Management (SIAM™) is multi-sourcing integration (MSI). In this certification, the term SIAM is used. The EXIN SIAM™ Foundation certification tests a candidate’s knowledge and understanding of the terminology and the core principles. The certification covers themes such as: potential benefits as well as the challenges and risks of implementing SIAM. It also includes examples of implementation structures, governance, tooling and data considerations and the common processes used in a SIAM ecosystem. A candidate who successfully completes this certification knows how SIAM delivers business value and is able to contribute to the implementation and use of SIAM in an organization.
-
EXIN Privacy & Data Protection Professional is a certification that validates a professional’s knowledge and understanding of the European privacy and data protection legislation and its international relevance, as well as the professional’s ability to apply this knowledge and understanding to everyday professional practice.
With the ever increasing explosion of information flooding the internet, every company needs to plan how to manage and protect privacy of persons and their data. Not without a reason, many new laws within the EU, as well as in the USA and many other regions, are formed in order to regulate both privacy and data protection.
The European Commission has published the EU General Data Protection Regulation (GDPR), meaning that from the 25th of May 2018 on, all organizations concerned must comply with specific rules. This Practitioner certification builds on the subjects covered by the Foundation exam by focusing on the development and implementation of policies and procedures in order to comply with existing and new legislation, application of privacy and data protection guidelines and best practices, and by establishing a data protection management system (DPMS).
The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.
Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context