This course is an intermediate course designed to teach Collaboration and Deployment users object and asset management, security, shared resource usage, automation, and interaction with IBM SPSS Modeler Gold. Students focus on the makeup of the content repository and its objects. They will learn how to manage repository objects, the logical hierarchy structure, and how to import, export, and promote objects for use in multi-repository environments. Students will become familiar with the components of jobs and the mechanisms to set up, order, and relate job steps. Scheduling, parameters, job monitoring, job history, and event notification are discussed. Finally, the role of Collaboration and Deployment Services in Modeler Gold is discussed, addressing Real Time Scoring, Analytic Data View, and Model Management.
-
This course provides participants with introductory to advanced knowledge of how to model metadata for predictable reporting and analysis results using IBM Cognos Cube Designer. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing a dynamic cube, and enabling end users to easily author reports and analyze data.
-
This course introduces you to the fundamental concepts of managing IT assets, service requests, and changes in your IT environment using IBM Control Desk. You learn how managing these processes with a unified solution provides significant advantages to your organization. Through instructor-led discussion, demonstrations, and hands-on labs, you learn how to plan a deployment, perform basic configuration, and navigate IBM Control Desk.
-
The InfoSphere MDM Application Toolkit course introduces students to the Business Process Manager (BPM) and the Process Designer to create processes that will use MDM data and services.
This course has a heavy emphasis on exercises and takes a participant through creating a process to search and update a customers address. The search, get and update services are performed against the InfoSphere MDM.
If you are looking to get an introduction to how BPM and MDM can work together using the MDM Application Toolkit, then this course is for you.
-
Do you want to find match member records, link member records, and perfect a search algorithm for your InfoSphere MDM Virtual implementation?
Then this course is designed for you. The InfoSphere MDM Virtual Module Algorithms V.11 course prepares students to work with and customize the algorithm configurations deployed to the InfoSphere MDM Probabilistic Matching Engine (PME) for Virtual MDM implementations. The PME is the heart of all Matching, Linking, and Searching for entities (Person, Organization, etc) that exist in InfoSphere MDM. This course has a heavy emphasis on the exercises, where the students will implement the customization discussed in the course to perform matching, linking, and searching on fields not provided by the default implementation.
At the end of this course, it is expected that students will feel comfortable customizing an algorithm for the PME for Virtual implementations.
-
This course is designed to teach participants how to identify components and sub-components of the IBM Cognos Analytics architecture and how to use tools and techniques to provide a foundation to troubleshoot issues. Through lecture and interactive exercises participants will identify IBM Cognos Analytics components, examine how these components interact with Java, and will explore logging to assist when troubleshooting issues.
-
This course is designed to guide report authors in building on their expertise with IBM Cognos Analytics by applying dimensional techniques to reports. Through interactive demonstrations and exercises, participants will learn how to author reports that navigate and manipulate dimensional data structures using the specific dimensional functions and features available in IBM Cognos Analytics.
-
This course is also available as self-paced virtual (e-learning) course IBM Cloud Pak for Automation, Installation and Administration (ZB318G). This option does not require any travel.
This course is designed to teach the skills that are needed to work with IBM Cloud Pak for Automation. Through a presentation and three hands-on lab exercises, you learn to deploy the IBM Operational Decision Manager (ODM) and IBM FileNet P8 Content Platform Engine products in containerized environments by using IBM Cloud Pak for Automation. You use Network File System (NFS), Db2, and Lightweight Directory Access Protocol (LDAP) as required by ODM and Content running in docker containers. You also learn some basic skills to manage, troubleshoot, and administer the installed containerized products that are deployed on the Red Hat OpenShift environment. In the lab exercises, you interact with the OpenShift cluster by using both the OpenShift Command-line interface (CLI) and the web console.
For information about other related courses, see the IBM Training website:
ibm.com/training -
Discover the Microsoft Certified: Identity and Access Administrator Associate certification.
This SC-300T00: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.
Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects.
The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.
This SC-300T00: Microsoft Identity and Access Administrator training serves as a prerequisite for cybersecurity architects who wish to earn the Microsoft Certified Cybersecurity Architect Expert certification.
Explore more about cybersecurity certifications with our guide to top cybersecurity training and certifications in 2025.
-
In this CompTIA certification course, students will identify PC components, work with files and folders, and conduct basic software installations. As one of the top IT certifications for beginners globally, this course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.
In addition, it covers the essential skills and information needed to set up, configure, maintain, troubleshoot, and perform preventative maintenance of the hardware and software components of a basic personal computer workstation and basic wireless devices. Students will also implement basic security measures and implement basic computer and user support practices.
-
The CompTIA Cloud Essentials+ is intended for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.
The dynamic business environment today may increase IT demands tremendously. And, you need to meet the demands to ensure the survival of your organization in the market. Needless to say, you must make plans to meet the demands within limited resources of finance, people, and technology. This is exactly what cloud computing can provide to your business.
In this CT-CLOUDESSENTIAL: CompTIA Cloud Essentials+ course, you will weigh the pros and cons of cloud computing to make effective decisions in meeting the IT challenges.
With IT woven into the effective functioning of every business, there is a greater dependency on the ready availability and deployability of IT infrastructure. Cloud computing offers solutions that enable businesses optimize their IT usage. Therefore, it is critical that every IT and business specialist gains insight into the advantages and disadvantages offered by this business computing model.
-
Out of stock
This course teaches database administrators how to plan, implement and manage Db2 11.1 databases using the High Availability Disaster Recovery HADR) feature. The lectures cover the processing performed for a Db2 Primary and Standby Db2 database. The Db2 database configuration options that define and control the HADR function are covered. The option to define and operate multiple HADR standby databases will be explained. The course also covers the special considerations for allowing read only access by applications to a HADR Standby database. Students will learn the Db2 commands like TAKEOVER, START HADR and STOP HADR that are used to control HADR primary and standby database activity. The monitoring for HADR status of the primary and standby databases using the db2pd commands will be presented. The course also presents usage of HADR with Db2 pureScale databases.