The Securing WAN and SD-WAN 1-day workshop provides what is available from Cisco’s portfolio of solution to secure the Branch office and Software Defined WAN. Attendees will have the opportunity to go through preliminary design and implementation guidance for organizations looking to deploy an enterprise network that delivers an uncompromised secured user experience over any WAN connection. There is a plethora of security solutions that Cisco offers to have a secure WAN connectivity like DMVPN, Zone-based Firewall, Stealth watch, Cisco Umbrella, Snort IPS, FirePOWER and Introduction to Software Defined WAN. The course is focused on real world use cases which attendees can easily understand and relate.
-
IBM FlashSystem 9100 system is an all-flash, powerful end-to-end Non-Volatile Memory Express (NVMe) enterprise storage solution that combines the performance of IBM FlashCore technology.
FlashSystem 9100 is built on the efficiency of IBM Spectrum Virtualize, and delivered on a proven IBM software solution with extremely low latencies for your multi cloud deployments.This course introduces the FlashSystem 9100 NVMe Control Enclosure models: IBM 9846/9848 FlashSystem 9110, Model AF7 and IBM 9846/9848 FlashSystem 9150, Model AF8.
It also focuses on the integration of FlashSystem 9100 SAS-Attached expansion enclosures; scalability performance with NVMe; and the intuitive sight of IBM Storage Insights which helps optimize the storage infrastructure using predictive analytics.If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
-
A Solutions Architect is an expert in many categories. They should have hands-on experience in multiple industries and across several disciplines. They can master a variety of hardware platforms including mainframes, distributed platforms, desktops, and mobile devices. Akin to that, they should also possess skill and understanding of a variety of Operating Systems. A broad and deep understanding of Databases is also required.
The IASA Solutions Architect course develops an architect’s skills to effectively function as a project delivery architect for midsize to large projects using common techniques and procedures.
-
The Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 course shows you how to implement Cisco® cloud security solutions to secure access to the cloud, workloads in the cloud, and Software as a Service (SaaS) user accounts, applications, and data. Through expert instruction and hands-on labs, you’ll learn a comprehensive set of skills and technologies including: how to use key Cisco cloud security solutions; detect suspicious traffic flows, policy violations, and compromised devices; implement security controls for cloud environments; and implement cloud security management. This course covers usage of Cisco Cloudlock, Cisco Umbrella™, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch® Cloud and Enterprise, Cisco Firepower® NGFW (next-generation firewall), and more.
-
Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.
-
The Software Architect has mastered the value, use, development and delivery of intensive systems.
They have developed skills in software development lifecycles, software engineer in and software design. Software architect are responsible for the value generated from a particular software system or system of systems.
The course builds on the key skills and capabilities developed during the associate foundation courses. During the course you will explore the software engineering and application development practices that distinguish you as a software architect. The program builds on the IT environment skills and design skills learned in the foundation associate courses.
-
This course covers the steps to follow to update a Red Hat OpenShift Container Platform 4.3.18 environment on Power Systems to 4.3.23. Lessons learned, and hints and tips will be provided to help you perform the update successfully.
-
This course broadens the skills of the student who are required to implement and manage a Kubernetes-based Platform as a Service (PaaS) environment based on Red Hat OpenShift Container Platform on Power Systems. The course covers basic administration and configuration of Red Hat OpenShift Container Platform within a POWER processor-based server configured with IBM PowerVC. Hands-on exercises reinforce the lecture material, and allow students to use the Red Hat OpenShift Container Platform to work with images, applications, and manage a cluster.
-
This course covers the concepts and implementation details of the software-defined networking and storage features of PowerVC on IBM Power Systems servers, known as IBM Cloud PowerVC Manager Software Defined Infrastructure (SDI). Students learn to implement a PowerVM infrastructure with software-defined storage based on IBM Spectrum Scale using NovaLink in SDE-mode, and software-defined networking based on Open vSwitch (OVS). Methods for capturing, deploying, and managing virtual machines in a software defined infrastructure are also explored.
-
This digital workshop is essential for any business who seeks to optimize your digital presence and gain maximum online revenue opportunities. The workshop will introduce you to fundamental key digital marketing specialisms such as Paid Per Click (PPC) marketing and Search Engine Optimization(SEO) and social media marketing
The program is developed in collaboration with the industry and consultation from digital industry experts(Global Industry Advisory Council) to design and develop standards that define the digital e-commerce skills and capabilities required of today’s professionals. The program deliver best current practice, theory and applied skills in digital, and are recognized and respected across all industry sectors.
Attending the workshop, will ensure you have the essential skills and knowledge needed to excel as a digital e-commerce specialist. Through a series of comprehensive, structured modules you will know how to integrate key digital e-commerce tactics and practices into your digital marketing techniques and measure and iterate the success of your overall digital marketing plans.
This course is provided in partnership with Sapience Consulting Pte. Ltd
-
This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.
-
This course is intended for Developers, Database Administrators, and System Programmers who require further insight into the SQL language.
Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This offering teaches cloud database support staff how to manage access of users and privileges to a dashDB for Analytics or dashDB for Transactions database.
Note: Guided eLearning is a self-paced offering which includes web-based content for self study and videos (including audio) that demonstrate the hands-on activity.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
-
This course teaches developers, database administrators, and system programmers various features of SQL, including column functions, grouping, unions, subqueries, and maintaining data.
Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
The course also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The course also includes case studies that are useful for deployment scenarios and remote labs.
-
The Infrastructure Architect provides strategic uses of infrastructure, network and operations as an asset.
They create and deliver technology strategies to optimise as an asset. They create and deliver technology strategies to optimise the use of technology resources related to hardware and physical systems.
lasa Infrastructure Architecture Training provides a platform from which professional infrastructure architects develop a mastery of network, computing platform and operations to guide the organization to valuable investments in hardware and platform. By the end of this course, students will be equipped with necessary skills, framework and tools required to facilitate successful management and development of infrastructure architecture.
-
The Information Architect has mastered the management of information across and within their industry.
They work to ensure that information is used to the best advantage of their organisation or customer, and that expected information quality attribute levels are achieved.
Information architects develop deep skills in information as one of an organisation’s key assets. They work in areas ofpresentation and information usage such as devices and interfaces as well as Storage and retrieval. In addition, information architects are key to partner and be part of the internal integration. This course provides deep coverage of each of these areas.
-
This course is designed to introduce students to IBM Data Science Experience. The course covers how to create and set up a project and to be familiar with how to create, code, collaborate, and share notebooks while working with a variety of data sources to analyze data.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This three-day FDTBF: Fintech and Digital Transformation in Banking and Finance course aims to provide finance professionals with a solid foundation in the rapidly changing world of fintech and digital banking. FinTech, short for financial technology, refers to an emerging financial services sector that is fast becoming indispensable to financial institutions and is constantly impacting the way we view and execute financial transactions.
This course will be pivotal in helping participants grasp the basics of fintech, navigate the mechanisms that facilitate it and comprehend the inevitably complex issues and intricacies that it brings.
Benefits of the workshop are:
- Understand the technologies that are impacting the economy, especially banking
- Theoretical understanding of artificial intelligence (AI), the blockchain and Internet of Things (IoT) within FinTech
- Broad applications grasp of technical/process solution to existing pain points
- Develop business use case to develop/improve a new/existing product
- Develop a competitive corporate strategy through innovative thinking
- Significantly reduce business costs and improve efficiencies
-
Organizations are compelled to find effective and cost-efficient data security solutions.
Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.
IBM z14 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organizations IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z14 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.
z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z14 platform. These new capabilities include:
- Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.
- New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.
- Pervasive encryption for IBM Z is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.
- In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.
- In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS file systems.
- These exercises reinforce the concepts and technologies being covered in the lectures.
-
System z continues to extend the value of the mainframe by leveraging robust security solutions to help meet the needs of today’s on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and life cycle management, improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z/OS Intrusion Detection Services. This advanced z/OS security course presents the evolution of the current z/OS security architecture and explores in detail the various technologies involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF), and z/OS Integrated Security Services.
In the hands-on exercises, you begin with your own z/OS HTTP Server in a TCP/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication by using RACF, SSL and the use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services and RACF auto registration. You will also implement different scenarios to implement ssl security for a typical tcpip application; FTP: SSL, TLS, server authentication, client certificates and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures.
-
To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console.
-
This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.
You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.
You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.