This 2M204G: IBM InfoSphere DataStage Essentials v11.5 course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
-
In this 3-days TOD67G: Network Performance Insight 1.3.1 – Implementation and Configuration course, you learn how to install IBM Network Performance Insight and integrate it with IBM Netcool Operations Insight. This course is lab-intensive, with an emphasis on hands-on exercises.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. /terms
-
IBM Network Performance Insight is a network performance monitoring system. It offers real-time and historical trends in network performance and interactive views of network data that help reduce network downtime and optimize network performance. Network Performance Insight provides IBM Netcool Operations Insight with comprehensive IP network device performance monitoring and traffic analysis. In this 3-day course, you learn how to install IBM Network Performance Insight and integrate it with IBM Netcool Operations Insight. This course is lab-intensive, with an emphasis on hands-on exercises.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
In this 1-day FT-FDD: FortiDDoS Training class, candidates will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.
In interactive labs, candidates will deploy FortiDDoS to learn about normal network traffic patterns. Then you will simulate attacks, observe the defense, and adjust the automatically estimated behavior.
With a focus on core feature skills, topics also include network behavior analysis and ASIC chips.
-
This intensive 5-day training program is designed to equip supply chain professionals, executives, and C-level staff with the knowledge and skills needed to leverage blockchain and AI technologies to optimize their supply chain operations. Through a combination of lectures, interactive discussions, and hands-on exercises, participants will gain a deep understanding of how these technologies can enhance efficiency, reduce costs, and improve decision-making.
-
Over the duration of this course, you’ll:
- Learn about computer vision foundations
- Learn about Artificial Intelligence vs Machine Learning
- Learn about the Computer Vision process
- Dive deep into real-world examples
- Understand how to build a model
- Know how to improve model performance
- Learn the Tapway labeling tools
- Understand how to choose between project types
- Become familiar with the Tapway deployment options
- Get insight into our best practices and tips
-
Stay Ahead in a Digital World: Understand and Implement IT Governance & Risk Management.
This hugely popular ITGRM: IT Governance and Risk Management provides a comprehensive review of the knowledge required for understanding IT Governance & Risk Management strategies. Students can use this crash course to review what they already know about IT Governance & Risk Management, pinpoint any gaps in their understanding and provide high level mitigation to address IT Governance & Risk Management gaps.
The establishment of efficient IT governance is of the utmost importance with regard to the problem-free operation of IT businesses. The organization’s business goals can more easily be accomplished with the assistance of this concept when applied to its information systems. If you do not put into practice IT governance, it will become ineffective and may even be detrimental to the company.
It is no longer necessary to argue that effective governance of information technology is essential because society and various markets are continuously undergoing change. It is a requirement for every business. In today’s world, where information occupies such an important role in our society, having strong governance in place for our information technology systems is absolutely necessary to ensure their smooth operation. By producing value, it ensures that the money your company invests in information technology will be put to good use.
-
Using Nexus to Scale Scrum Beyond a Single Scrum Team.
Over the 2 days, students will simulate a large software development project using the Nexus Framework. The workshop is delivered using an end-to-end case study where students work together to organize and simulate a scaled software development project. Throughout the workshop, students will be introduced to more than 50 practices that can be used to help reduce complexity and dependencies at scale.
This workshop will show you how to launch, structure, staff, and manage a large agile or Scrum project. During the two days you will organize and simulate a scaled software development project to learn the infrastructure, tools and practices needed for success. You will leave knowing how to scale Scrum in order to maximize the value of your software development initiative.
-
After successfully completing the EXIN Lean IT Foundation exam, a candidate will be familiar with the principles of the Lean philosophy and in particular with the application of this philosophy within an IT environment. Specifically, the candidate should understand:
- The principles underlying the Lean philosophy
- The importance of understanding and delivering customer value
- The way Lean looks at processes and the waste within them
- How to measure performance and the key determinants of performance
- What the organizational requirements are when implementing Lean, including the use of visual management tools
- Which behavior and attitude is necessary for Lean to be successful within an IT organization
- The DMAIC problem-solving model
- How these Lean principles can be applied within an IT organization
EXIN Lean IT Foundation helps IT organizations to ensure that they provide their customers with the best possible services. Through understanding customer value, the processes that deliver this value, the way to manage performance, the way to organize and the required attitude and behavior, IT organizations are helped to develop a continuous improvement mindset. Lean IT is complementary to all other best practice methods. The purpose of EXIN Lean IT Foundation is to confirm that a candidate has sufficient knowledge and understanding of Lean IT to support a Lean initiative within an IT organization.
-
Service Integration and Management (SIAM) is a methodology used to manage and seamlessy integrate multiple service providers to ensure a single business-facing IT organization.
The EXIN SIAM™ Professional certification tests a candidate’s knowledge and skills of the activities in the four stages of the SIAM roadmap. A candidate who successfully completes the EXIN SIAM™ Professional can analyze, plan, build and inspect a multi-service provider environment.
-
EXIN Privacy & Data Protection Professional is a certification that validates a professional’s knowledge and understanding of the European privacy and data protection legislation and its international relevance, as well as the professional’s ability to apply this knowledge and understanding to everyday professional practice.
With the ever increasing explosion of information flooding the internet, every company needs to plan how to manage and protect privacy of persons and their data. Not without a reason, many new laws within the EU, as well as in the USA and many other regions, are formed in order to regulate both privacy and data protection.
The European Commission has published the EU General Data Protection Regulation (GDPR), meaning that from the 25th of May 2018 on, all organizations concerned must comply with specific rules. This Practitioner certification builds on the subjects covered by the Foundation exam by focusing on the development and implementation of policies and procedures in order to comply with existing and new legislation, application of privacy and data protection guidelines and best practices, and by establishing a data protection management system (DPMS).
The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.
Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context
-
EXIN Privacy & Data Protection Foundation (PDPF) is a certification that validates a professional’s knowledge and understanding of the protection of personal data, the EU rules and regulations regarding data protection.
Wherever personal data is collected, stored, used, and finally deleted or destroyed, privacy concerns arise. With the EU General Data Protection Regulation (GDPR) the Council of the European Union aims to strengthen and unify data protection for all individuals within the European Union (EU). This regulation affects every organization that processes personal data of EU citizens. The EXIN Privacy & Data Protection Foundation certification covers the main subjects related to the GDPR.
The new standard in the ISO/IEC 27000 series: ISO/IEC 27701:2019 Security Techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirements and Guidelines is useful for organizations that want to show compliance with the GDPR. The content of the new ISO standard helps fulfill the GDPR obligations to organizations regarding the processing of personal data.
Neither the GDPR nor the ISO standard are exam literature. However, the literature matrix in Chapter 4 is designed to show the link between the exam requirements, the literature, the GDPR and the ISO/IEC 27701:2019 standard to give the certification a broader context.