Learn. Earn. Succeed with IBM Education.

IBM Training and certifications by Trainocate Malaysia offers you the ability to earn credentials to demonstrate your expertise. It is designed to validate your skills and capability to perform role-related tasks and activities at a specified level of competence.

The IBM Professional Certification Program offers you the ability to earn credentials to demonstrate your expertise. The achievement of an IBM Professional Certification demonstrates to your colleagues and employers your expertise in the related IBM technologies and solutions.

Whether its to gain greater insights and innovate faster with IBM Analytics, or build the foundation for cognitive business with IBM Systems Infrastructure courses or innovating with IBM cloud, we’ve got you covered.

Whether you need to gain new skills, earn credentials, or change careers, building skills is an investment in your future. Get started today.

Learn. Earn. Succeed with IBM Education.

IBM Training and certifications by Trainocate Malaysia offers you the ability to earn credentials to demonstrate your expertise. It is designed to validate your skills and capability to perform role-related tasks and activities at a specified level of competence.

The IBM Professional Certification Program offers you the ability to earn credentials to demonstrate your expertise. The achievement of an IBM Professional Certification demonstrates to your colleagues and employers your expertise in the related IBM technologies and solutions.

Whether its to gain greater insights and innovate faster with IBM Analytics, or build the foundation for cognitive business with IBM Systems Infrastructure courses or innovating with IBM cloud, we’ve got you covered.

Whether you need to gain new skills, earn credentials, or change careers, building skills is an investment in your future. Get started today.

  • 3 Days ILT, VILT

    This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.

  • 3 Days ILT, VILT

    This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.

  • 3 Days ILT, VILT

    IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

    In this 3-day instructor-led course, you learn how to perform the following tasks:

    • Describe how QRadar SIEM collects data to detect suspicious activities
    • Describe the QRadar SIEM component architecture and data flows
    • Navigate the user interface
    • Investigate suspected attacks and policy breaches
    • Search, filter, group, and analyze security data
    • Investigate the vulnerabilities and services of assets
    • Use network hierarchies
    • Locate custom rules and inspect actions and responses of rules
    • Analyze offenses created by QRadar SIEM
    • Use index management
    • Navigate and customize the QRadar SIEM dashboard
    • Use QRadar SIEM to create customized reports
    • Use charts and filters
    • Use AQL for advanced searches
    • Analyze a real world scenario

    Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

    • Using the QRadar SIEM user interface
    • Investigating an Offense triggered by events
    • Investigating the events of an offense
    • Investigating an offense that is triggered by flows
    • Using rules
    • Using the Network Hierarchy
    • Index and Aggregated Data Management
    • Using the QRadar SIEM dashboard
    • Creating QRadar SIEM reports
    • Using AQL for advanced searches
    • Analyze a real-world large-scale attack

    The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

  • 1 Day ILT, VILT

    This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.

    A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.

    OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.

    OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.

     

  • 5 Days ILT, VILT

    This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.

  • 5 Days ILT, VILT

    This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.

    The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.

  • 4 Days ILT, VILT

    This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.

    The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.

    We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).

    The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.

  • 3 Days ILT, VILT

    This TP370G: IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed.

  • 3 Days ILT, VILT

    This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.

  • 5 Days ILT, VILT

    This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.

  • 5 Days ILT, VILT

    This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.

    Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.

    Hands-on labs 

    This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload

  • 2 Days ILT, VILT

    This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.

    Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.

Go to Top