This 0A069G: IBM SPSS Modeler Foundations v18.2 course provides the foundations of using IBM SPSS Modeler and introduces the participant to data science. The principles and practice of data science are illustrated using the CRISP-DM methodology. The course provides training in the basics of how to import, explore, and prepare data with IBM SPSS Modeler v18.2, and introduces the student to modeling.
-
This 0A079G: Introduction to Machine Learning Models Using IBM SPSS Modeler v18.2 course provides an introduction to supervised models, unsupervised models, and association models. This is an application-oriented course and examples include predicting whether customers cancel their subscription, predicting property values, segment customers based on usage, and market basket analysis.
-
Learn to explore, summarize and interpret data like a pro.
This 0G51BG: Statistical Analysis Using IBM SPSS Statistics v26 course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships.
Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results.
-
This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables.
-
The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
-
Bring trust and insight to a world shaped by artificial intelligence.
AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.
ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.
This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.
-
Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.
ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.
As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.
AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:
- Evaluate and secure AI-enabled systems across the enterprise
- Integrate AI into existing security operations and workflows
- Identify and respond to risks tied to AI technologies
- Reinforce governance, compliance and responsible innovation
-
Invest in your future with Nutanix University training: The Industry standard for Hyperconverged Infrastructure.
This AAPM: Advanced Administration & Performance Management course explains in detail how to use Acropolis services such as Volumes, Files and Objects. The course also explains how to define, manage, and secure workloads and applications using Calm and Flow, including automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.
This course also covers Data Protection solutions such as Metro Availability with Witness. Advanced management using the new features of Prism Central and the command line are also covered in detail. This includes how to take advantage of machine learning with entity management and resource optimization as well as how to plan for future growth using Scenario Management using Prism Pro.
-
In this course, learners will discover how to apply generative AI to streamline daily tasks, enhance decision-making, and drive meaningful business outcomes. Learners will understand how to use Microsoft 365 Copilot and its functionalities to improve their productivity. The course focuses on real-world use cases—no coding required—making it ideal for those who want to confidently integrate AI into their work.
-
In this course, learners will explore how to lead AI transformation across their organization. They’ll learn practical strategies to identify high-impact AI opportunities, align investments with business goals, and champion responsible AI practices.
The course emphasizes real-world applications and strategic decision-making—no technical expertise required—making it ideal for senior leaders who want to confidently drive AI adoption and innovation.
-
This course provides a comprehensive introduction to Microsoft 365, Copilot, and AI-powered agents. It introduces learners to the foundational concepts, core services, and administrative controls of Microsoft 365. It then builds upon this foundation by exploring how Copilot and agents can utilize AI to automate tasks, enhance collaboration, and personalize user experiences across the Microsoft 365 suite.
-
AC helps you understand Business Technology Strategy (BTS) and Iasa IT Architecture Body of Knowledge (ITABoK).
Find out how to apply skills from the five foundational pillars of ITABoK as well as distinguish key architecture concepts, scopes, principles, contexts and roles. Adopt industry frameworks and components alongside basic IT Architect skills and define values, as well as create IT’s business capabilities. Find out what it takes to set up an IT Architecture Office (ITAO) and how to run its day-to-day tasks as an IT Architect. Finally, learn how to select and priorities IT projects, assign resources for them, work hand in hand with the Project Management office and present technology values to stakeholders.
-
Administering Cisco Unified Communications Manager (ACUCM) is a 4-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.
The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involve routers, switches, or Cisco IOS software configuration.
This information technology course includes various lab exercises to apply what was learned in each preceding lesson. Labs begin with a newly installed publisher and subscriber. The only element that is pre-configured is two MGCP gateways, for the headquarters (HQ) and branch (BR), and an intercluster trunk pointing to the neighbor’s pod. Therefore, the student will become familiar with all the various concepts through configuration of the elements in the lab environment.
-
Python programming for beginners
Python is a popular programming language used by system administrators, data scientists, and developers to create web applications, custom Red Hat Ansible Automation modules, perform statistical analysis, and train AI/ML models.
This Red Hat course introduces the Python language and teaches fundamental concepts like control flow, loops, data structures, functions, file I/O, regular expressions, parsing JSON, and debugging.
This course is based on Python 3 and RHEL 9.0.
-
Helping Java SE developers write Java EE applications.
Red Hat Application Development I: Programming in Java EE (AD183) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE).
This course is based on Red Hat® Enterprise Application Platform 7.0.
In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.
-
This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).
In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.
-
Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.
Camel development is organized around:
- Routes that define a sequence or flow of processing.
- Processors that transform, interpret, and modify messages within a Camel route.
- Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.
The Cloud-native Integration with Red Hat Fuse (AD221) course emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.
This Red Hat course is based on Red Hat Fuse 7.10 and OpenShift 4.
-
Red Hat Fuse, based on the Apache Camel project, is a lightweight, flexible integration platform that enables rapid integration of cloud-native applications, both on-premise and in the cloud.
Camel development is organized around:
- Routes that define a sequence or flow of processing.
- Processors that transform, interpret, and modify messages within a Camel route.
- Components that enable the creation of endpoints that interact with the outside world for acquiring and transmitting data.
Cloud-native Integration with Red Hat Fuse (AD221) emphasizes learning architectural patterns and implementing integration services based on Apache Camel and OpenShift. Camel and Red Hat Fuse enable developers to create complex integrations in a simple and maintainable format. You will learn how to use the most common integration components in Camel and develop, test, and deploy integration focused applications on OpenShift.
This course is based on Red Hat Fuse 7.10 and OpenShift 4. The Red Hat Certified Specialist in Cloud-native Integration exam (EX221) is included in this offering.
-
Install, configure, and manage Red Hat JBoss Enterprise Application Platform.
Red Hat JBoss Application Administration I teaches you the best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively deploy and manage applications on JBoss EAP.
After completing this course, you should be prepared to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam.
-
Install, configure, and manage Red Hat JBoss Enterprise Application Platform
Red Hat JBoss Application Administration I with exam teaches you the best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform 7. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively manage applications on JBoss Enterprise Application Platform.
This course is a combination of AD248: Red Hat JBoss Application Administration I and includes the Red Hat Certified Specialist in Enterprise Application Server Administration exam (EX248).
This course will cover best practices for installing and configuring Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7. This hands-on class covers the real-world tasks that a system administrator needs to know to deploy and manage applications on JBoss EAP. The topics in this course cover all of the exam objectives of the Red Hat Certified Specialist in Enterprise Application Server Administration exam.
-
Develop, scale, and troubleshoot event-driven microservice applications.
Learn to use Kafka and AMQ Streams to design, develop, and test event-driven applications. Event-driven microservices scale globally, store and stream process data, and provide low-latency feedback to customers. This course is for application developers and is based on Red Hat AMQ Streams 1.8 and Red Hat OpenShift Container Platform 4.6.
-
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella works and what are the features is the key focus of this 3-day Cisco online IT class. Students who enter the course with a basic understanding of Cisco products and IT solutions will be able to describe the Cisco Umbrella, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, and use Cisco Roaming Client.
-
This Session will uncover how to use Spatial Analysis technology responsibly and how our AI technology works, and the choices system owners can make that influence system performance and behavior. How to focus on the importance of thinking about the whole system including the technology, people, and environment.
-
AI-102: Develop AI solutions in Azure is intended for software developers wanting to build AI infused applications that leverage Azure AI Foundry and other Azure AI services.
Topics in this course include developing generative AI apps, building AI agents, and solutions that implement computer vision and information extraction. The course will use C# or Python as the programming language.
As of 13th June, the AI-102T00: Develop AI Solutions in Azure course has been updated and restructured to provide learners with a more cohesive and in-depth journey through key AI concepts and applications. This update brings together five 1-day AI courses into a single, comprehensive learning experience:
- AI-3016: Develop generative AI apps in Azure
- AI-3026: Develop AI Agents on Azure
- AI-3002: Develop AI information extraction solutions in Azure
- AI-3003: Build a natural language processing solution with Azure AI Services
- AI-3004: Build an Azure AI Vision solution with Azure AI services
Data and Artificial intelligence (AI) has become integral to technology strategies for organizations of all sizes, industries, and maturity levels. Take your AI Engineering skills to the next level in 2026 and prepare to build production-ready Azure AI solutions.









