This course offers hands-on experience with Spring and its major features, including configuration, data access, web and REST applications, Spring Boot, Spring Security and using Spring Cloud to build a small microservices application. On completion, participants will have a foundation for creating enterprise-ready applications.
-
The Jamf 200 Course offers a core understanding of Jamf Pro, as well as an enterprise-focused examination of the macOS and iOS platforms.
-
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
- Describe how QRadar SIEM collects data to detect suspicious activities
- Describe the QRadar SIEM component architecture and data flows
- Navigate the user interface
- Investigate suspected attacks and policy breaches
- Search, filter, group, and analyze security data
- Investigate the vulnerabilities and services of assets
- Use network hierarchies
- Locate custom rules and inspect actions and responses of rules
- Analyze offenses created by QRadar SIEM
- Use index management
- Navigate and customize the QRadar SIEM dashboard
- Use QRadar SIEM to create customized reports
- Use charts and filters
- Use AQL for advanced searches
- Analyze a real world scenario
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
- Using the QRadar SIEM user interface
- Investigating an Offense triggered by events
- Investigating the events of an offense
- Investigating an offense that is triggered by flows
- Using rules
- Using the Network Hierarchy
- Index and Aggregated Data Management
- Using the QRadar SIEM dashboard
- Creating QRadar SIEM reports
- Using AQL for advanced searches
- Analyze a real-world large-scale attack
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
-
This 2Z930G: InfoSphere MDM Physical Domains course is designed for anyone who wants to get an understanding of the Data Domains for the InfoSphere Master Data Management Physical Module. This course takes a comprehensive look at the three core data domains of InfoSphere MDM: Party, Account, and Product. For each of the domains spanned by InfoSphere MDM, participants will be exposed to the data model, services, and rules associated with the main entities of that domain. Heavy emphasis is put on exercises and activities so that the participants can apply the knowledge that they learn after course conclusion.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
IBM Security Verify Access helps you simplify your users’ access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization’s migration to identity as a service (IDaaS) at a comfortable pace.
Using the skills taught in this TW108G: IBM Security Verify Access Foundations course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned.
-
Learn about the new features and enhancements of DB2 11 for z/OS, including the technical detail of the functional enhancements of this significant new version of DB2 for z/OS.
Note: This course shall be made available a unit at a time. If you wish to receive training on this new version of DB2 11 for z/OS, contact your training provider to request a class containing the latest content.
-
In this MB-500T00: Microsoft Dynamics 365: Finance and Operations Apps Developer course we discuss the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps.
The Dynamics 365 Finance and Operations apps developer is a key technical resource that implements and extends the application to meet the requirements of the business.
-
Data Storytelling
Data storytelling is a critical skill for conveying data-driven insights in a compelling and meaningful way. This three-day course, designed for beginners, focuses on teaching the art and science of data storytelling. Participants will learn how to structure, visualize, and present data to engage and inform their audience effectively.
-
Big Data Hadoop
Hadoop is a foundational technology for processing and analyzing massive volumes of data. This three-day course, tailored for beginners, provides a comprehensive introduction to the core concepts of Big Data and Hadoop. Participants will gain an understanding of distributed storage and processing, Hadoop ecosystem components, and hands-on experience with Hadoop tools.
-
Machine Learning – Unsupervised Learning
Unsupervised learning is a fascinating field of machine learning that discovers patterns, structures, and relationships within data without the need for labeled examples. This three-day course, designed for beginners, offers a comprehensive introduction to unsupervised learning techniques. Participants will gain a solid understanding of clustering, dimensionality reduction, and anomaly detection.
-
A Dynamics 365 Business Central developer develops apps that extend Business Central. This can include creating new modules and modifying existing modules. The developer can add new business logic or change existing business logic by using events. A developer also makes it possible to integrate Business Central with other applications, including Microsoft Power Platform products. Business Central developers are responsible for troubleshooting and debugging issues in the system.
This may involve identifying the root cause of a problem, fixing bugs, and testing the solution to ensure it works as expected. Business Central developers may be required to optimize the performance of the system by identifying bottlenecks and improving code quality. Business Central developers are responsible for upgrading the system, migrating data, and maintaining the system to ensure it remains up to date and secure.
-
-25%
AI-102: Develop AI solutions in Azure is intended for software developers wanting to build AI infused applications that leverage Azure AI Foundry and other Azure AI services.
Topics in this course include developing generative AI apps, building AI agents, and solutions that implement computer vision and information extraction. The course will use C# or Python as the programming language.
As of 13th June, the AI-102T00: Develop AI Solutions in Azure course has been updated and restructured to provide learners with a more cohesive and in-depth journey through key AI concepts and applications. This update brings together five 1-day AI courses into a single, comprehensive learning experience: