-
Notifications
You must be signed in to change notification settings - Fork 0
IBM Course Catalog
burnt.exe edited this page Oct 3, 2023
·
3 revisions
Category | Course Name | Price per delegate (EUR) | Delivery | Description |
---|---|---|---|---|
IBM SPSS | Advanced Machine Learning Models Using IBM SPSS Modeler (V18.2) | 670 | ILT | This course presents advanced models in IBM SPSS Modeler. The course covers PCA/Factor for data reduction, and various supervised models like SVM, Random Trees, and XGBoost. The course also touches upon text analytics and how to combine models. |
IBM SPSS | IBM SPSS Modeler Foundations (V18.2) | 1330 | ILT | This foundational course uses the CRISP-DM methodology to introduce participants to the basics of IBM SPSS Modeler v18.2. The course covers how to import, explore, and prepare data. |
IBM SPSS | Introduction to Machine Learning Models Using IBM SPSS Modeler (V18.2) | 1330 | ILT | This course introduces supervised and unsupervised models including predictive analytics like customer churn prediction, property value prediction, and customer segmentation. |
IBM SPSS | Advanced Statistical Analysis Using IBM SPSS Statistics (V26) | 1330 | ILT | The course reviews advanced statistical methods for applications, including various techniques for prediction and clustering of variables. |
Data Reporting | Statistical Analysis Using IBM SPSS Statistics (V26) | 1330 | ILT | This course introduces statistical components using IBM SPSS Statistics, covering a wide range of techniques for data exploration, relationship testing, and summarization. |
IBM SPSS | IBM SPSS Statistics Essentials (V25) | 1330 | ILT | This course goes through the fundamentals of IBM SPSS Statistics, from reading and defining data to data analysis and result presentation. |
Data Reporting | IBM SPSS Statistics Essentials (V26) | 1330 | ILT | Similar to the V25 course but uses IBM SPSS Statistics Base and an add-on module, IBM SPSS Custom Tables. |
##########
<style> </style>Catagory# | Course Name | Price per delegate (EUR) | Delivery | Description |
---|---|---|---|---|
IBM SPSS | Advanced Machine Learning Models Using IBM SPSS Modeler (V18.2) | 670 | ILT | This course presents advanced models available in IBM SPSS Modeler. The participant is first introduced to a technique named PCA/Factor, to reduce the number of fields to a number of core factors, referred to as components or factors. The next topics focus on supervised models, including Support Vector Machines, Random Trees, and XGBoost. Methods are reviewed on how to analyze text data, combine individual models into a single model, and how to enhance the power of IBM SPSS Modeler by adding external models, developed in Python or R, to the Modeling palette. |
IBM SPSS | IBM SPSS Modeler Foundations (V18.2) | 1330 | ILT | This course provides the foundations of using IBM SPSS Modeler and introduces the participant to data science. The principles and practice of data science are illustrated using the CRISP-DM methodology. The course provides training in the basics of how to import, explore, and prepare data with IBM SPSS Modeler v18.2, and introduces the student to modeling. |
IBM SPSS | Introduction to Machine Learning Models Using IBM SPSS Modeler (V18.2) | 1330 | ILT | This course provides an introduction to supervised models, unsupervised models, and association models. This is an application-oriented course and examples include predicting whether customers cancel their subscription, predicting property values, segment customers based on usage, and market basket analysis. |
IBM SPSS | Advanced Statistical Analysis Using IBM SPSS Statistics (V26) | 1330 | ILT | This course provides an application-oriented introduction to advanced statistical methods available in IBM SPSS Statistics. Students will review a variety of advanced statistical techniques and discuss situations in which each technique would be used, the assumptions made by each method, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for predicting variables, as well as methods to cluster variables and cases. |
Data Reporting | Statistical Analysis Using IBM SPSS Statistics (V26) | 1330 | ILT | This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results. |
IBM SPSS | IBM SPSS Statistics Essentials (V25) | 1330 | ILT | This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis process. Students will learn the basics of reading data, data definition, data modification, and data analysis and presentation of analytical results. Students will also see how easy it is to get data into IBM SPSS Statistics so that they can focus on analyzing the information. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base features. |
Data Reporting | IBM SPSS Statistics Essentials (V26) | 1330 | ILT | This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. |
IBM Safer Payments | IBM Safer Payments Hands-On Technical Primer Training (V6.3) | 2660 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. In this course, technical resources that will be involved in any aspect of deploying, customizing, and implementing the IBM Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system for Analysts as well as basics on system administration. |
IBM Safer Payments | IBM Safer Payments Hands-On SysOps Training (V6.3) | 2000 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. In this course, System Administrator that will be involved in any aspect of deploying, customizing, and implementing the Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system as well as an overview about Cluster Management and Monitoring Safer Payments. This course focuses on topics for System Admins who manage Safer Payments. |
IBM Safer Payments | IBM Safer Payments Hands-On Modeling Training (V6.3) | 2000 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. IBM Safer Payments provides not only model capabilities based on inbuilt tools, but also the option to import externally built fraud models for real-time decisioning. In this course, all of the IBM Safer Payments model capabilities are presented in details. The following modelling concepts are covered: index, profiling techniques (with and without index sequence), model components comprised of rulesets, PMML, Python and Internal Random Forest, elements of the simulation environment including Rule Generation and Internal Random Forest, as well as the sampling techniques. All these concepts will be followed by the hands-on exercises that students are expected to execute. |
IBM Safer Payments | IBM Safer Payments: Hands-on Technical Primer (v6.4.x) | 2660 | ILT | IBM Safer Payments is an enterprise fraud detection solution. It is a designed and focused on real time payment transaction processing. Safer Payments provides complex and dynamic rules building, evaluation and execution. Built with real time performance, management, and redundancy in mind. In this course, technical resources that will be involved in any aspect of deploying, customizing, and implementing the Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system for Analysts as well as basics on system administration. |
IBM Safer Payments | IBM Safer Payments: SysOps Training (v6.4.x) | 2000 | ILT | IBM Safer Payments is an enterprise fraud detection solution. It is a designed and focused on real time payment transaction processing. Safer Payments provides complex and dynamic rules building, evaluation and execution. Built with real time performance, management, and redundancy in mind. In this course, System Admins that will be involved in any aspect of deploying, customizing, and implementing the Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system as well as an overview about Cluster Management and Monitoring Safer Payments. This course focuses on topics for System Admins who manage Safer Payments. |
IBM Safer Payments | IBM Safer Payments: Hands-on Modeling Training Primer (v6.4.x) | 2000 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. IBM Safer Payments provides not only model capabilities based on inbuilt tools, but also the option to import externally built fraud models for real-time decisioning. In this course, all of the IBM Safer Payments model capabilities are presented in detail. The following modelling concepts are covered: index, profiling techniques (with and without index sequence), model components comprised of rulesets, PMML, Python and Internal Random Forest, elements of the simulation environment including Rule Generation and Internal Random Forest, as well as the sampling techniques. All these concepts will be followed by the hands-on exercises. |
IBM Safer Payments | IBM Safer Payments: Hands-on Case Management Training (v6.4.x) | 1330 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. IBM Safer Payments provides not only model capabilities based on inbuilt tools, but also the option to import externally built fraud models for real-time decisioning. In this course, IBM Safer Payments' case management capabilities are presented in detail. Students will learn how to configure and customize the built-in case management, and the workflow and activities involved when investigating cases. |
IBM Safer Payments | IBM Safer Payments Hands-On Technical Primer Training (V6.5) | 2660 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. In this course, technical resources that will be involved in any aspect of deploying, customizing, and implementing the IBM Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system for Analysts as well as basics on system administration. |
IBM Safer Payments | IBM Safer Payments Hands-On SysOps Training (V6.5) | 2000 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. In this course, System Administrators that will be involved in any aspect of deploying, customizing, and implementing the Safer Payment solution will get a hands-on overview of the product. Students will get an understanding of how to install, configure, and setup the system as well as an overview about Cluster Management and Monitoring Safer Payments. This course focuses on topics for System Admins who manage Safer Payments. |
IBM Safer Payments | IBM Safer Payments Hands-On Modeling Training (V6.5) | 2000 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. IBM Safer Payments provides not only model capabilities based on inbuilt tools, but also the option to import externally built fraud models for real-time decisioning. In this course, all of the IBM Safer Payments model capabilities are presented in details. The following modelling concepts are covered: index, profiling techniques (with and without index sequence), model components comprised of rulesets, PMML, Python and Internal Random Forest, elements of the simulation environment including Rule Generation and Internal Random Forest, as well as the sampling techniques. All these concepts will be followed by the hands-on exercises that students are expected to complete. |
IBM Safer Payments | IBM Safer Payments Hands-On Case Management Training (V6.5) | 1330 | ILT | IBM Safer Payments is an innovative real-time payment fraud prevention and detection solution for all cashless payment types. IBM Safer Payments provides not only model capabilities based on inbuilt tools, but also the option to import externally built fraud models for real-time decision making. In this course, IBM Safer Payments' case management capabilities are presented in details. Students will learn how to configure and customize the built-in case management, and the workflow and activities involved when investigating cases. |
IBM Sterling | IBM Sterling Order Management (V10.0) Configuring Participant Modeling, Process Modeling, and User Security | 2000 | ILT | This course begins with an overview of Sterling Order Management and the business models it supports. The course then describes how to define participants and create organizations and users. Through a combination of procedural information and exercises, students will learn about topics such as how to assign attributes to the different roles defined in Sterling Order Management and configure user access policies. The course also covers Process Modeling features, including how to set up a business process workflow for an organization. Students are then introduced to statuses, conditions, transactions, and other components of a process type pipeline. The course then describes how to create a process type pipeline. |
Internet of Things | Inventory Management and Order Management Business Rules | 2000 | ILT | This 3-day instructor-led course provides students with an understanding of how to configure order management rules and administer the order fulfillment process using IBM Sterling Order Management. The course begins with an introduction of order and inventory management concepts and then covers Sales Order specific configurations. The course then proceeds to describe sourcing and scheduling of orders, rules related to order fulfillment, and payment, and covers configuration of service capacity. The course concludes with an explanation of Return Orders. |
IBM Sterling | Extending the IBM Sterling Order Management Application | 2660 | ILT | This course begins with an overview of the technical architecture of the Sterling Order Management system, including installation and deployment. Students are then introduced to APIs, Agent Framework, and Services Definition Framework. Procedures to create, extend, and customize agents, agent servers, APIs, and services provided in detail. The course also has deep-dives to explore database extensibility, object extensibility, presentation framework, and customization of the Sterling Order Management user interface. |
IBM Sterling | Configuring Item and Pricing in IBM Sterling Order Management | 1330 | ILT | This course teaches how to perform item, pricing, and other related configurations using the IBM® Sterling Business Center application. This course is primarily designed for developers and implementers. The course begins with an overview of the item and pricing concepts along with an introduction to the Sterling Business Center application. The course thereafter provides deep dives into each of these topics - catalog and item administration, customer management, resource pool management, pricing administration, and system configurations. Through a combination of procedural information and exercises, students can learn to create catalogs, items, pricing rules, and so on. Each unit has a checkpoint to reinforce the topics that were covered. |
IBM Sterling | IBM Sterling Secure Proxy Technical Fundamentals v3.4.2 | 2660 | ILT | This 4-day course trains students on deployment, usage, and maintenance of the Sterling Secure Proxy application. It also guides on troubleshooting any issues in Sterling Secure Proxy. |
IBM Cloud | Administration of IBM Cloud Pak for Data (V4.x) | 670 | ILT | This course guides you through the most important administration activities that are related to the Cloud Pak for Data environment. You will recall the infrastructure of a Red Hat OpenShift cluster where Cloud Pak for Data runs, and you will learn how to manage this cluster. You will learn about multitenancy, tethered projects, the Cloud Pak for Data installation procedure, and prerequisites for various Cloud Pak for Data installation scenarios. A significant part of this course refers to tasks that an administrator must complete, including setting up an LDAP connection for user and group management, defining resource quotas and limits, and scaling services. |
IBM Cloud | Enterprise catalog management and data protection with Watson Knowledge Catalog on IBM Cloud Pak for Data 4.0.x | 670 | ILT | This course provides Solution Architects an introduction to the basics of Watson Knowledge Catalog for IBM Cloud Pak for Data. You will learn to access the Watson Knowledge Catalog through the service, and gain skills in creating catalogs, populating them with assets, and then managing the assets in the catalog through a governance framework. |
IBM Cloud | IBM Cloud Pak for Data (V4.x) Foundations | 670 | ILT | This learning offering tells a holistic story of Cloud Pak for Data and how you can extend the functions with services and integrations. You will explore some of the services and see how they enable effective collaboration across an organization. In this course, you will use Watson Knowledge Catalog, Data Virtualization, and Watson Studio (including Data Refinery and AutoAI). You will also examine some of the external data sets and industry accelerators that are available on the platform. |
IBM Cloud | Installation of IBM Cloud Pak for Data (V4.x) | 670 | ILT | This course provides guidelines to prepare your environment for IBM Cloud Pak for Data and to successfully deploy the software. From the attached demonstrations you will learn step by step how to perform each task. You will verify the acquired knowledge by completing the designated hands-on exercises. |
IBM Cloud | Administration of IBM Cloud Pak for Data (v4.5) | 670 | ILT | This course guides you through the most important administration activities that are related to the Cloud Pak for Data environment. You will recall the infrastructure of a Red Hat OpenShift cluster where Cloud Pak for Data runs, and you will learn how to manage this cluster. You will learn about multitenancy, tethered projects, the Cloud Pak for Data installation procedure, and prerequisites for various Cloud Pak for Data installation scenarios. A significant part of this course refers to tasks that an administrator must complete, including setting up an LDAP connection for user and group management, defining resource quotas and limits, and scaling services. |
IBM Cloud | Troubleshooting IBM Cloud Pak for Data (V4.5) | 670 | ILT | In this course, you learn about common issues that can occur when working as a Cloud Pak for Data administrator. You learn how to troubleshoot them, and verify your acquired knowledge by completing the corresponding hands-on exercises. These scenarios are general recommendations that might differ depending on your environment, workload, and installed services. |
IBM Cloud | Installation of IBM Cloud Pak for Data (v4.5) | 670 | ILT | This course provides guidelines to prepare your environment for IBM Cloud Pak for Data and to successfully deploy the software. From the attached demonstrations, you will learn step by step how to perform each task. You will verify the acquired knowledge by completing the designated hands-on exercises. |
IBM Watson | Advanced Administration for IBM Watson Knowledge Catalog (V4.5) | 2000 | ILT | In this course, you wear the hat of an administrator to learn the value, capabilities, and features of Watson Knowledge Catalog along with experiencing how to work with Watson Knowledge Catalog in IBM Cloud Pak for Data. The course begins with an overview of Cloud Pak for Data foundations. Then, it explains how Watson Knowledge Catalog fits into the Cloud Pak for Data profile, outlines the value of Watson Knowledge Catalog through its capabilities and features, and provides several Watson Knowledge Catalog use cases. Next, the course goes in-depth on each of the primary administrative features of Watson Knowledge Catalog, including managing user roles, permissions, data connections, data discovery, metadata, catalogs, assets, and governance artifacts, and working with relevant APIs. This course also provides an opportunity to do a corresponding practical implementation of these primary features in a business scenario common to an administrator role. For the hands-on lab exercises, you are provided with a lab environment that has Watson Knowledge Catalog already installed, and do not review the installation procedure of Watson Knowledge Catalog in your lab. |
IBM Cloud | Managing IBM Cloud Pak for Data (V4.5) as a containerized application | 670 | ILT | This course introduces IT and platform administrators how to manage Cloud Pak for Data by using Red Hat OpenShift Container Platform. The course begins with an overview of the five layers of the infrastructure. Through instructor-led presentations and hands-on lab exercises, you learn about the core components of Red Hat OpenShift Container Platform, which is the primary environment for IBM Cloud Pak for Data. You learn how to manage, display resources, and query Red Hat OpenShift Container Platform components and the Web Console. You learn how to use Linux commands to manage, investigate, and troubleshoot the Kubernetes environment. The lab environment for this course uses the IBM Cloud. |
IBM Cloud | Enterprise Catalog Management and Data Protection with Watson Knowledge Catalog on IBM Cloud Pak for Data (V4.6) | 670 | ILT | This course provides Solution Architects an introduction to the basics of Watson Knowledge Catalog for IBM Cloud Pak for Data. You will learn to access the Watson Knowledge Catalog through the service, and gain skills in creating catalogs, populating them with assets, and then managing the assets in the catalog through a governance framework. |
IBM TRIRIGA | TRIRIGA System Administration | 1330 | ILT | This course is intended for System Administrators and other users responsible for maintaining the IBM TRIRIGA application. |
IBM TRIRIGA | IBM TRIRIGA Portfolio 4.x/11 | 1330 | ILT | The purpose of this course is to provide a basic understanding of TRIRIGA to better manage space, people, organizations, and assets necessary for optimal performance of the business operations. The course teaches how to use the IBM TRIRIGA Portfolio tools to track and manage the following areas: Properties, land (subdivisions, parcels, or both) and buildings, floors, and space People resources, including full-time employees, part-time employees, contractors, consultants, vendors, service providers, building owners, government agencies, and utilities. Assets, including infrastructure, technology, telephone, furniture, office and building (infrastructure). Equipment, including parts inventories, assemblies, and subassemblies. Organizations (internal or external), subsidiary businesses, and user-defined multiple-tiered organization structures (business unit, division, department, government agencies. |
IBM TRIRIGA | IBM TRIRIGA Operations & Maintenance | 3330 | ILT | This course explores the Operations Maintenance life cycle and how to enable using IBM TRIRIGA. Operations and maintenance are the decisions and actions regarding the control and upkeep of property and equipment/assets. Students will learn the tools for deploying a serivce management system both online and through Percpetive apps that can be utilized on mobile devices. The course addresses both corrective and preventive maintenance along with task and inventory management. Students will also understand how to complete facility assessments and targeted facility projects. |
IBM TRIRIGA | IBM TRIRIGA: Capital Projects | 3330 | ILT | The TRIRIGA Capital Projects course will train students on how to create and deploy new capital projects and manage the budgets attached to them. Users will be able to organize and review relevant documents affiliated with large projects (drawings, invoices, specifications...). They will be able to also manage procurement, put in place a bidding process and complete payments. Users will also be able to track and report on the progress of projects and big programs. |
IBM TRIRIGA | IBM TRIRIGA Real Estate: Leased and Owned Property Contract Management | 2000 | ILT | Learn how to manage your real estate lease obligations with IBM TRIRIGA. With TRIRIGA you can store all contract documentation, conditions, clauses, options, and financial transactions in one comprehensive repository. Learn to set up automated notifications and alerts about upcoming critical dates including lease expirations, required actions, and contract options to avoid overpayment, late fees, and missed opportunities. You also learn to create up-to-date financial reports, maintain an accurate payment process, and satisfy regulatory requirements. To get the most from this course, plan how you will use TRIRIGA in your current environment before attending the course. |
IBM TRIRIGA | IBM TRIRIGA: Lease Accounting | 2000 | ILT | Students taking this class will understand the fundamentals of lease accounting wtihin IBM TRIRIGA. They will be able to calculate and manage FASB and IASB information. They will also be able to activate new leases, perform accounting modifications and terminate leases. Students will be able to prepare related reports for lease accounting details. |
IBM TRIRIGA | IBM TRIRIGA: Facilities and Space Management | 2000 | ILT | Students taking this class will understand the fundamentals of space management and why it is a strategic imperative to large enterprises. They will understand both the concepts and configuration in TRIRIGA for how space classifications are created in building portfolios across floors and various types of space. Students will learn the details of space data, assessments and space audits. Further, students will understand Perceptive Apps for stacking and move requests. They will learn how to import CAD drawings and BIM models to TIRIRGA. They will also be introduced to new features in TRIRIGA for Dynamic Space Planning. |
IBM TRIRIGA | IBM TRIRIGA Application Platform v3.7 | 3330 | ILT | The course provides an introduction to the TRIRIGA Application platform and how to modify the existing TRIRIGA applications and processes or create new ones. The course covers navigation and mechanics of the TRIRIGA Application Platform toolset that is used for creating and modifying objects. Students are also provided background on importing data to TRIRIGA, how to use the Form Builder and the Reporting Dashboard. |
IBM TRIRIGA | TRIRIGA Reservation Management | 1330 | ILT | The course is designed to teach students how to customize, operate, administer, and monitor IBM TRIRIGA Reservation Management process flow and Reservation roles. |
IBM Infosphere | IBM Security Guardium Data Protection Foundations | 2000 | ILT | IBM Security® Guardium® Data Protection (Guardium) supports a zero trust approach to security. It discovers and classifies sensitive data from across an enterprise, providing real time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. This course provides the foundational level processes, procedures, and practices necessary to configure Guardium to monitor and protect sensitive data. Hands-on exercises reinforce the skills learned. *Note: this course is based upon IBM Security® Guardium® Data Protection v11.4. |
IBM Power Systems | Power Systems for AIX I: LPAR Configuration and Planning | 2000 | ILT | Learn how to perform system administration in a Power Systems environment. Learn about the features of PowerVM Editions and how to configure and manage LPARs running AIX V7 or Linux using the Hardware Management Console (HMC). |
IBM Power Systems | Power Systems for AIX II AIX Implementation and Administration | 3330 | ILT | Learn to install, customize, and administer the AIX operating system in a multiuser Power Systems partitioned environment. The course is based on AIX 7.2 running on a Power Systems server managed by Hardware Management Console and provides practical discussions that are appropriate to earlier AIX releases. |
IBM AIX | AIX Jumpstart for UNIX Professionals | 3330 | ILT | Provide focused training for experienced UNIX administrators on how to install, customize, and administer the AIX operating system in a multiuser POWER (System p) partitioned environment. The course is based on AIX 7.1 running on a Power system managed by Hardware Management Console version 7 and provides practical discussions that are appropriate to earlier AIX releases. |
Linux Foundation | Power Systems for AIX III: Advanced Administration and Problem Determination | 3330 | ILT | This course provides advanced AIX system administrator skills with a focus on availability and problem determination. It provides detailed knowledge of the ODM database where AIX maintains so much configuration information. It shows how to monitor for and deal with AIX problems. There is special focus on dealing with Logical Volume Manager problems, including procedures for replacing disks. Several techniques for minimizing the system maintenance window are covered. While the course includes some AIX 7.2 enhancements, most of the material is applicable to prior releases of AIX. |
IBM AIX | Korn and Bash Shell Programming | 3330 | ILT | This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. |
IBM AIX | AIX Network Installation Management Concepts and Configuration | 1330 | ILT | The primary goal of this course is to provide you with a working knowledge of the fundamental capabilities of the Network Installation Management (NIM) facility of the AIX 7.1 operating system. This course uses a combination of instructor lecture and machine exercises to provide you with practical background knowledge of the topics covered. |
IBM Power Systems | IBM PowerVM: Implementing Virtualization | 3330 | ILT | As IBM Power continues to evolve, it is essential for IT professionals to stay up-to-date with the latest innovations. Our IBM PowerVM course is specifically designed to provide you with a comprehensive understanding of processor virtualization concepts, Virtual I/O Server configurations, and virtual devices such as virtual Ethernet, virtual SCSI, and virtual Fibre Channel adapters. Through a combination of lectures and hands-on labs, this course will equip you with the knowledge and skills necessary to become a successful IT technology professional. Whether you prefer face-to-face or online learning, our experienced instructors will guide you every step of the way as you explore basic and advanced configurations of the Virtual I/O Server and its clients, as well as various availability options. Expand your knowledge about PowerVM features that were introduced in Power Systems for AIX I: LPAR Configuration and Planning (AN11G). This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online). |
IBM Power Systems | IBM PowerVM II: Advanced Management and Performance | 3330 | ILT | Students in this course will learn how to implement advanced IBM PowerVM features, such as Active Memory Expansion, shared dedicated processors and multiple shared processor pools. Students will also be exposed to new availability and performance management features such as Simplified Remote Restart, Hybrid Network Virtualization and enhanced VIOS administration using the HMC. Additionally, students will learn skills to implement, measure, analyze and tune PowerVM virtualization features for optimal performance on IBM Power servers. This course focuses on two main areas. First, the features that relate to the performance of IBM Power servers, AIX, VIOS and the special monitoring, configuring, and tuning needs of logical partitions (LPARs). This course does not cover application monitoring and tuning. Second, the course will explore advanced features for availability and managing and monitoring virtualization and PowerVM virtualized workloads on IBM Power. Students will also learn AIX performance analysis and tuning tools that help an administrator take advantage of shared processors and other virtualization features of the IBM Power servers. Hands-on lab exercises reinforce each lecture and give the students practical experience. |
IBM Power Systems | Implementing PowerVM Live Partition Mobility | 2000 | ILT | This course describes the concepts and configuration details when implementing PowerVM Live Partition Mobility on POWER6 and POWER7 processor-based servers. Students will learn the requirements of Live Partition Mobility and will configure HMCs, Virtual I/O Servers, and partitions in preparation for performing active and inactive migrations. Live hands-on exercises will allow students to configure a lab environment and perform Live Partition Mobility operations. This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO - Instructor Led Online). |
IBM Power Systems | Power Systems for AIX IV: Performance Management | 3330 | ILT | Develop the skills to measure, analyze, and tune common performance issues on IBM Power Systems running AIX. Learn about performance management concepts and techniques and how to use the basic AIX tools to monitor, analyze, and tune an AIX system. The course covers how virtualization technologies such as the PowerVM environment and workload partitions affect AIX performance management. Monitoring and analyzing tools discussed in this course include vmstat, iostat, sar, tprof, svmon, netstat, lvmstat, and topas. Tuning tools include schedo, vmo, ioo, no, and nfso. The course also covers how to use Performance Problem Reporting (PerfPMR) to capture a variety of performance data for later analysis. Each lecture is reinforced with extensive hands-on lab exercises which provide practical experience. The materials include AIX 7.1 enhancements and the exercises are executed on a POWER8 lab environment. |
IBM AIX | Advanced Tools for AIX Performance Analysis | 2660 | ILT | Develop the skills to use kernel traces, trace based utilities, and svmon to measure and analyze CPU, memory, and I/O performance issues on IBM systems running AIX. Reinforce each lecture during extensive hands-on lab exercises and get practical experience applicable to their performance management requirements. |
IBM PowerHA | PowerHA SystemMirror 7 Planning, Implementation, Customization and Basic Administration | 3330 | ILT | This course is designed to prepare students to install and configure a highly available cluster using PowerHA SystemMirror. |
IBM PowerHA | PowerHA SystemMirror 7 Advanced Configurations | 3330 | ILT | This course is designed to teach experienced PowerHA SystemMirror for AIX professionals the latest features in PowerHA SystemMirror. It covers how to: Effectively administer and monitor an IBM PowerHA SystemMirror for AIX cluster Implement PowerHA SystemMirror for AIX's more complex options. |
IBM PowerHA | Implementing VM Recovery Manager - HA | 1330 | ILT | This 2 day course provides students with the skills needed to implement and manager the IBM VM Recovery Manager – HA (VMR-HA) product. Topics include introduction to High Availability (HA) and Disaster Recovery (DR), understanding the requirements and planning for implementing VMR-HA, installing and configuring VMR-HA, and testing the capabilities of VMR-HA at the VM and application level. Hands-on exercises reinforce the lecture material, allowing students to install, configure, test, and maintain VMR-HA environments. |
Other Programming Languages | RPG IV Programming Fundamentals Workshop for IBM i | 2660 | ILT | Course RPG IV Programming Fundamentals Workshop for IBM i (AS06G) teaches the basics of the IBM i RPG IV programming language. It is the first of two courses that should be attended in sequence. This course is a comprehensive exposure to the basic features and functions of RPG IV for Version 7. It does not introduce either information processing or programming in general. Students who are new to programming should attend other courses that are offered by local technical colleges or self-study methods. This course is designed to enable a trained programmer to develop and maintain simple RPG IV programs written using the latest features and techniques available in the Version 7 compiler. |
Other Programming Languages | RPG IV Programming Advanced Workshop for IBM i | 2660 | ILT | This course teaches additional skills and techniques to programmers who can already write comprehensive RPG IV programs. This class offers a comprehensive discussion of some of the advanced features and functions of RPG IV. This class is designed to enable an experienced RPG IV programmer to develop and maintain RPG IV programs of an advanced level using the latest features and techniques available in the IBM i RPG IV compiler. |
IBM i | System Operator for IBM i | 2660 | ILT | This introductory course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i. Focus is given to using the GUI (IBM i Access Client Solutions and IBM Navigator for i) as well as 5250 emulation sessions to perform tasks including job control, monitoring, sending messages, managing systems devices, and more. Hands-on exercises reinforce the lecture topics and prepare the student to successfully operate a Power System with IBM i. |
IBM i | Advanced System Operator Workshop for IBM i | 2000 | ILT | This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC. We will discuss the IBM i Access Family of products in general and Access Client Solutions, specifically. We will discuss the different types of security that you can implement in order to control who has access to your data and what they can do with that data if they are allowed to access. We will discuss security control via system values, user and group profiles, authorization lists, and adopted authority. This course will help you develop additional skills in the areas of work management and how to create a basic CL program. In the area of CL programming, we discuss concepts of programming, then how to create a basic CL program using the traditional application development tools PDM and SEU. Then, you will learn how to use the GUI tools in RDP (RSE and LPEX). You will also learn the steps to create a menu using SDA. You will learn some tips that you can use to help improve your IBM i operations. We will also discuss how you can use Management Central as a tool to manage a single system or a network of TCP/IP connected Power Systems with IBM i. |
IBM i | BRMS for IBM i, including Cloud Storage Solutions for i | 3330 | ILT | This course covers the features and functions supported by Backup Recovery and Media Services (BRMS). BRMS is an integrated and comprehensive tool for managing backup, recovery, archive, and retrieval operations for a single Power system with IBM i or multiple systems with IBM i at a site or across a BRMS Network. The lectures describe how to perform the supported functions when using a 5250 emulation session, when using System i Navigator, and when using IBM Navigator for i. Students will then have the opportunity to practice in lab exercises what they have learned in lecture. |
IBM i | Using Open Source tools on IBM i | 2000 | ILT | This course is designed to teach the installation and administration of open source packages on IBM i as well as teach how to use some of the open source packages that can be downloaded. Class activities include showing how to download and manage open source packages using Access Client Solutions, and how to use python, node.js, and PHP to access data in different ways on the IBM i. |
IBM i | PowerVM on IBM i - I: Implementing Virtualization and LPAR | 2000 | ILT | Learn the concepts of Logical Partitioning (LPAR) for Power Systems with IBM i. In this course you begin with an overview of LPAR on Power Systems, followed with more detailed information on configuration planning and implementation using hands-on exercises to create and implement logical partitions. Also, learn about partial processors, dynamic allocation and reallocation of memory, processors, interactive Commercial Processing Workloads (CPW), buses, Graphical User Interface (GUI), Virtual Local Area Network (VLAN), Host Ethernet Adapters (HEA) and System Planning Tool (SPT). In this course you will use IBM Power Systems including the Hardware Management Console (HMC). |
IBM Cognos | IBM Cognos Analytics: Architecture and Logging (v11.0) | 1330 | ILT | This course is designed to teach participants how to identify components and sub-components of the IBM Cognos Analytics architecture and how to use tools and techniques to provide a foundation to troubleshoot issues. Through lecture and interactive exercises participants will identify IBM Cognos Analytics components, examine how these components interact with Java, and will explore logging to assist when troubleshooting issues. |
IBM Cognos | IBM Cognos Analytics - Author Reports with Multidimensional Data (V11.0) | 1330 | ILT | This course is designed to guide report authors in building on their expertise with IBM Cognos Analytics by applying dimensional techniques to reports. Through interactive demonstrations and exercises, participants will learn how to author reports that navigate and manipulate dimensional data structures using the specific dimensional functions and features available in IBM Cognos Analytics. |
IBM Cognos | IBM Cognos Cube Designer - Design Dynamic Cubes (v11.0) | 1330 | ILT | This course provides participants with introductory to advanced knowledge of how to model metadata for predictable reporting and analysis results using IBM Cognos Cube Designer. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing a dynamic cube, and enabling end users to easily author reports and analyze data. |
IBM Cognos | IBM Cognos Analytics - Author Active Reports (v11.0) | 670 | ILT | This course provides participants with an understanding of Active Report content and functionality within IBM Cognos Analytics - Reporting. Through lecture, demonstrations, and exercises, participants increase their IBM Cognos Analytics experience by building highly interactive reports using Active Report controls, which can then be distributed to and consumed by users in a disconnected environment, including on mobile devices. |
IBM Cognos | IBM Cognos Framework Manager: Design Metadata Models (v11.1.x) | 2660 | ILT | This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. |
Data Reporting | IBM Cognos Analytics: Enterprise Administration (V11.1.x) | 1330 | ILT | This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. |
Data Reporting | IBM Cognos Analytics: Author Reports Fundamentals (V11.1.x) | 2000 | ILT | This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. |
Data Reporting | IBM Cognos Analytics: Author Reports Advanced (V11.1.x) | 1330 | ILT | This course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports. |
IBM Cognos | Overview of IBM Cognos Analytics (v11.2) | 670 | ILT | This course provides participants with a high-level overview of the IBM Cognos Analytics suite of products and their underlying architecture. They will examine each component as it relates to an Analytics solution. Participants will be shown a range of resources to provide additional information on each product. |
IBM Cognos | IBM Cognos Analytics: Author Reports Fundamentals (v11.2) | 2000 | ILT | Students will explore IBM Cognos Analytics report authoring and different report object types (list, crosstab, chart, visualization, etc.). They will also create and format reports using grouping, headers, footers, and other formatting options. Also covered is the ability to focus reports by filtering data and using prompts. Students will learn to add value to reports using calculations and additional report-building techniques as well as how to enhance reports with advanced formatting and exceptional data highlighting. |
Data Reporting | IBM Cognos Analytics: Author Reports Advanced (v11.2) | 1330 | ILT | This course teaches Professional Report Authors about advanced report building techniques using relational data models, and ways of enhancing, customizing, and managing professional reports. The course builds on topics presented in the Fundamentals course. Attendees will participate in interactive demonstrations and exercises that illustrate key concepts while learning how to use advanced features in the product builds on topics learned in the Fundamentals course. |
System Programmers | Effective RACF Administration | 3330 | ILT | This course prepares you to be a more effective security administrator as you gain experience and confidence in using the RACF component of the z/OS Security Server. To reinforce lectures, the course offers hands-on exercises where you use the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, and use several RACF utilities. |
Cyber Security | IBM QRadar SIEM Foundations | 2000 | ILT | IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned. In this 3-day instructor-led course, you learn how to perform the following tasks: Describe how QRadar collects data to detect suspicious activities Describe the QRadar architecture and data flows Navigate the user interface Define log sources, protocols, and event details Discover how QRadar collects and analyzes network flow information. Describe the QRadar Custom Rule Engine Utilize the Use Case Manager app Discover and manage asset information Learn about a variety of QRadar apps, content extensions, and the App Framework Analyze offenses by using the QRadar UI and the Analyst Workflow app Search, filter, group, and analyze security data Use AQL for advanced searches Use QRadar to create customized reports Explore aggregated data management Define sophisticated reporting using Pulse Dashboards Discover QRadar administrative tasks Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:Architecture exercises. UI – Overview exercises Log Sources exercises Flows and QRadar Network Insights exercises Custom Rule Engine (CRE) exercises. Use Case Manager app exercises Assets exercises App Framework exercises Working with Offenses exercises. Search, filtering, and AQL exercises Reporting and Dashboards exercises QRadar – Admin tasks exercises The lab environment for this course uses the IBM QRadar SIEM 7.4 platform. |
Cyber Security | IBM QRadar SIEM Advanced Topics | 1330 | ILT | QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. This 2-day course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts. The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned. The lab environment for this course uses the IBM QRadar SIEM 7.4 platform. |
IBM Db2 | IBM Db2 LUW Family Fundamentals | 1330 | ILT | This course provides you with information about the functions of IBM's Db2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms. Db2 runs under a number of operating systems, such as z/OS, VM, Linux, UNIX, and Windows operating systems. The course includes discussion of how the Db2 products provide services. The focus is on the services Db2 provides and how users work with Db2, not on its internal workings. This course does not include hands-on labs. |
Data Storage | DB2 SQL Workshop | 1330 | ILT | This course provides an introduction to the SQL language. This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment. |
Data Storage | DB2 SQL Workshop for Experienced Users | 2000 | ILT | This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. |
Data Storage | Db2 11.1 Administration Workshop for Linux | 2660 | ILT | This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database. |
IBM Db2 | DB2 11 BLU Acceleration Implementation and Use | 1330 | ILT | The course is intended for Data Administrators that need to prepare for using the DB2 BLU Acceleration facilities of DB2 11.1 for Linux, UNIX and Windows systems.The concepts and facilities of the BLU Acceleration feature of DB2 11 are presented including loading data into column-organized tables and monitoring the processing of SQL statements that access the tables.The DB2 10.5 Fix Pack 4, referred to as Cancun, added support for Shadow tables, a new type of Materialized Query Table, and also Column-organized User Maintained MQT tables. One lecture unit describes these features. A demonstration allows students to implement and experiment with these functions.With DB2 11.1, BLU Acceleration can be used in a clustered multiple database partition DB2 environment. This course includes a lecture and demonstration that allows students to create a set of column-organized tables from an existing set of row-organized tables and execute and analyze the performance of BLU Acceleration in a MPP database.The lab demonstrations are performed using DB2 LUW 11.1 for Linux. |
Application Developers | Db2 11.1 Advanced Database Administration | 1330 | ILT | This course is designed to teach you how to:• Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.• Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.• Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.• Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.• Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.• Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.• Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.• Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.• Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.• Implement Db2 Self Tuning Memory management for specific database memory areas. |
Application Developers | Db2 11.1 Quickstart for Experienced Relational DBAs | 2660 | ILT | This course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed. We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager. |
IBM Db2 | Db2 11.5 Quickstart for Relational DBAs | 2660 | ILT | This course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.5. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed. We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBAs). The lab demonstrations are performed using Db2 11.5.6 for Linux. For some lab tasks, students will have the option to complete the task using a Db2 command line processor, or using the graphical interface provided by IBM Data Server Manager. |
IBM Db2 | Db2 11.5 HADR Workshop | 670 | ILT | This course teaches database administrators how to plan, implement and manage Db2 11.5 databases using the High Availability Disaster Recovery HADR) feature. The lectures cover the processing performed for a Db2 Primary and Standby Db2 database. The Db2 database configuration options that define and control the HADR function are covered. The option to define and operate multiple HADR standby databases will be explained. The course also covers the special considerations for allowing read-only access by applications to a HADR Standby database. Students will learn the Db2 commands like TAKEOVER, START HADR, and STOP HADR that are used to control HADR primary and standby database activity. The monitoring for HADR status of the primary and standby databases using the db2pd commands will be presented. The course also presents the usage of HADR with Db2 pureScale databases. |
Application Developers | IMS Fundamentals | 2000 | ILT | Learn about the basic Information Management System (IMS) facilities: the IMS Database System and the IMS Transaction Manager (IMS/TM). Explore how these facilities work together and how application programs interact with them in today's complex enterprise systems.This course has 30 hours of instruction. |
Application Developers | IMS Installation Workshop | 2000 | ILT | Learn how to successfully install and successfully maintain an Information Management System (IMS) system, with insights on common problems, how to avoid them and how to correct them should they occur. In the hands-on lab, select an IBM-supported Version of IMS to actually install, then install that IMS and run the IMS Installation Verification Program (IVP) process in the environment of your choice: Database Control (DBCTL), Database Coordinator Controller (DCCTL),Database/Data Communications (DB/DC), DB/DC with Extended Recovery Facility (XRF) |
Application Developers | IMS System Programming - Database and Transaction Management | 2000 | ILT | This course of 3 sessions, 8 hours each day, is designed to present a description of the activities required to install, tailor, maintain, and support an IMS DB/TM system. This course describes aspects of the IMS architecture and internal structure that support database and transaction management. |
Application Developers | IMS DBCTL Systems Programming | 2000 | ILT | Database Control (DBCTL) is an Information Management System (IMS) facility that provides CICS access to an IMS database subsystem. DBCTL provides access for CICS transactions to IMS managed databases. Get a detailed description of the activities required to install, tailor, maintain, and support an IMS DBCTL system. Additionally, learn about aspects of the IMS architecture that apply to database management and attaching to CICS systems and transactions. |
Application Developers | IMS Database Application Programming | 2000 | ILT | Learn how to write application programs that use Data Language One (DL/I) to process Information Management System (IMS) databases. |
IBM IMS | IMS Transaction Manager Application Programming | 1330 | ILT | Learn how to write application programs that use Data Language One (DL/I) to process terminal input and output messages in an Information Management System / Data Communications (IMS/DC) system. |
Application Developers | IMS Database Recovery Control (DBRC) | 3330 | ILT | Learn all aspects, including installation, implementation, and management of the Database Recovery Control (DBRC) feature of Information Management System (IMS). DBRC is an IMS facility that provides database recovery, and facilitates database sharing, between IMS systems in all IMS environments including DB/TM, Data Base Control (DBCTL), and Batch. Reinforce the concepts and skills you have learned with machine labs. |
Application Developers | IMS Physical Organization of Databases Workshop | 2660 | ILT | Learn how to design, implement, reorganize, and recover Information Management System (IMS) databases. Practice these skills in intensive machine labs. |
Application Developers | IMS Logical Relationships | 2660 | ILT | Learn how to successfully implement and tune Information Management System (IMS) databases with IMS logical relationships. Examine in detail the various pointer options. Practice these skills in intensive machine-lab exercises. |
Application Developers | IMS Database Performance and Tuning | 3330 | ILT | Learn how to tune Information Management System (IMS) databases for use in IMS/Batch, IMS/Data Communications (DC), CICS-Local-Data Language One (DL/I), and Data Base Control (DBCTL) environments. Explore the IMS database features that affect performance such as data set considerations and buffers for VSAM and OSAM. You will also practice a method for estimating performance before implementation. Plus, you will reinforce the skills you have learned with seven machine labs. IACET Continuing Education Units: 4.0 |
Application Developers | IMS Security | 2660 | ILT | Learn implementation for Information Management System (IMS) using Resource Access Control Facility (RACF) as the external security manager, and the installation provided security exit routines. Apply classroom lectures with security paper lab exercises in which you setup the security definitions. |
Application Developers | IMS High Availability Large Database (HALDB) | 670 | ILT | Learn about the Information Management System (IMS) High Availability Large Database (HALDB). Examine how databases may be migrated to HALDB and the advantages of using HALDB. |
Application Developers | IMS Data Sharing | 2000 | ILT | Learn about Information Management System (IMS) data sharing capabilities. Examine how multiple IMS systems on different processors can access and update the same databases with complete integrity. |
Application Developers | IMS Shared Queues | 2000 | ILT | This course is designed to teach students about a key availability and capacity enhancement to Information Management System (IMS) - the Shared Queues facility, which offers the ability to share full function message queues within a parallel sysplex environment. Also, learn about sharing Fast Path Expedited Message Handler (EMH) queues within a parallel sysplex environment. |
Application Developers | IMS Fast Path | 3330 | ILT | This course is designed to describe the features and functions of Fast Path both from a capability and an implementation perspective. |
Application Developers | IMS Fundamentals | 2000 | ILT | Learn about the basic Information Management System (IMS): IMS facilities, the IMS database system, and the IMS Transaction Manager (IMS/TM). Explore how these facilities work together and how application programs interact with them in today's complex enterprise systems. This course has 30 hours of instruction. This course uses a Web conference medium with live instructor audio and Internet Web conferenced material. You have chat-type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12:00 noon and 1:00 p.m. to 4:00 p.m. Central time for six work days over a two-week period. Since the course is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information. |
Application Developers | IMS Database Recovery Control (DBRC) | 3330 | ILT | Learn all aspects, including installation, implementation, and management of the Database Recovery Control (DBRC) system of Information Management System (IMS). DBRC is an IMS facility that provides database recovery, and facilitates database sharing, between IMS systems in all IMS environments including DB/TM Data Base Control (DBCTL) and Batch. Reinforce the concepts and skills you have learned with machine labs. This course is taught in a Web conference medium with live instructor audio, and Internet Web conferenced materials. You have chat type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12 noon and 1:00 p.m. to 3:00 p.m. Central time for eight work days over a two week period. Since the class is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. Course materials will be provided in softcopy format and possibly hardcopy format also. You will receive connection software and usage information. |
Application Developers | IMS TM Performance and Tuning | 2000 | ILT | Learn a methodology to improve the performance of a large-scale z/OS IMS/TM data communication system. This course explains the impact of user-specified options on IMS performance, how to determine performance bottlenecks by interpreting information from certain performance reports, and how to use the information gained to implement a plan to improve the performance of an IMS system. |
Application Developers | IMS Physical Organization of Databases | 2660 | ILT | Learn how to design, implement, reorganize, and recover Information Management System (IMS) databases. Practice these skills in intensive machine labs. This course uses a Web conference medium with live instructor audio and Internet Web conferenced material. You have chat-type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12:00 noon and 1:00 p.m. to 3:00 p.m. Central time for eight work days over a two-week period. Since the course is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information. You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information. |
Application Developers | IMS Database Performance and Tuning | 3330 | ILT | Learn how to tune Information Management System (IMS) databases. Explore the IMS database features that affect performance, such as data set considerations and buffers for Virtual Storage Access Method (VSAM) and Overflow Sequential Access Method (OSAM). Also, practice a method for estimating performance before implementation. Plus, reinforce the skills you have learned with seven machine labs. This course is taught in a Web conference medium with live instructor audio, and Internet Web conferenced materials. You have chat type Questions and Answers (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12 noon and 1:00 p.m. to 3:00 p.m. Central time for ten work days over a two-week period. Since the class is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted prior to class start to receive connection information, hardcopy materials, and other relevant information. |
Application Developers | Implementing IMS Security | 2660 | ILT | Learn implementation for Information Management System (IMS) using Resource Access Control Facility (RACF) as the external security manager, and the installation provided security exit routines. Apply classroom lectures with security workshop exercises in which you setup the security definitions. This course is taught in a Web conference medium with live instructor audio, and Internet Web conferenced materials. You have chat type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12 noon and 1:00 p.m. to 3:00 p.m. Central time for eight work days over a two week period. Since the class is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. |
Application Developers | IMS Data Sharing | 4000 | ILT | This is an online course. please do not make travel arrangements for this course. After you receive confirmation that you are enrolled, you will be sent further instructions to enroll in this clas. Learn about Information Management System (IMS) data sharing capabilities. Examine how multiple IMS systems on different processors can access and update the same databases with complete integrity. |
Application Developers | IMS Shared Queues | 2000 | ILT | This is an online courses. Please do not make travel arrangements for this course. After you receive confirmation that you are enrolled, you will be sent further instructions to access audio and video. This course of 5 sessions, 4 hours each day, is designed to teach you about a key availability and capacity enhancement to Information Management System (IMS) - the Shared Queues facility, which offers the ability to share full function message queues within a parallel sysplex environment. Also, learn about sharing Fast Path Expedited Message Handler (EMH) queues within a parallel sysplex environment. |
Application Developers | IMS Fast Path | 3330 | ILT | Learn the features and functions of Information Management System (IMS) Fast Path from both a capability perspective and an implementation perspective. There is something in this course for all Information Technology (IT) professionals, including applications, systems, and database practitioners. The instructor assumes that you already have an understanding of IMS Database / Transaction Manager (DB/TM) fundamentals and that the information presented here builds upon that knowledge. This course is taught in a Web conference medium with live instructor audio and Internet Web conferenced materials. You have chat type Questions and Answers (Q&A) ability, plus live audio. The course is taught 10 a.m. to 12 noon and 1 p.m. to 3 p.m. Central Time for nine work days. Since the class is taught live using Web conferencing methods, you can attend from your home or workplace. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted the week prior to class start to receive connection information, hardcopy student materials, and any other relevant information. |
Application Developers | IMS Diagnostic Approaches | 2000 | ILT | This class will teach you to understand the IMS software diagnostic process and to know what documentation is required to solve IMS software problems. IMS address space and Task Control Block (TCB) structures along with associated IMS control block structures will be examined to provide you with a roadmap to manuever through the diagnostic maze. Focus will be given to using Interactive Problem Control System (IPCS) and the IMS Interactive Dump Formatter to become familiar with IMS dumps. |
IBM Db2 | Introduction to DB2 for zOS for Systems and Operations Personnel | 2000 | ILT | DB2 11 for z/OS beginning DBAs can develop fundamental skills or recognition through lectures and hands-on exercises of: DB2 Objects, Structured Query Language, DB2 Commands, DB2 Utilities, DB2 Logging, DB2 Program Preparation. The course materials cover DB2 11 for z/OS. |
Data Storage | Db2 12 for z/OS: Intermediate Database Administration | 3330 | ILT | DB2 12 for z/OS DBAs can develop intermediate skills or recognition through lectures and hands-on exercises covering the following topics: TSO/E and ISPF, Data sets, Db2 Objects, Structured Query Language, Db2 Commands, JCL and SDSF, Db2 Utilities, Db2 Logging, and Db2 Program Preparation. The course materials focus on Db2 12 for z/OS. |
Application Developers | New Functions and Features in Db2 for z/OS (v13) | 2000 | ILT | Explore the exciting new features and improvements of Db2 for z/OS (v13), which encompass both technical details and functional enhancements, making this version a significant upgrade. |
Application Developers | DB2 11 for z/OS Application Programming Workshop | 2000 | ILT | This course allows you to learn the skills needed for creating application programs that work with DB2 databases. The focus is on incorporating Structured Query Language (SQL) statements and preparing programs for execution. |
IBM Db2 | Db2 12 for z/OS Basic Database Administration | 2000 | ILT | This course aims to introduce novice z/OS DBAs (Database Administrators) to the fundamental principles of Database Administration for a Db2 12 for z/OS. It will instruct students on the physical implementation of a logical database design through DDL and provide insights into referentially related tables. Additionally, the course covers the utilization of basic utilities, program preparation, serialization, and fundamental database security. Notably, distributed data processing and data sharing are not included in this course's curriculum. |
IBM Db2 | Db2 12 for z/OS Intermediate System Administration | 2000 | ILT | This course offers students an introduction to the skills and knowledge required for administering a Db2 12 system for z/OS. |
IBM Db2 | Db2 12 for z/OS Advanced Database Administration | 1330 | ILT | This course introduces the student to advanced database administration skills, including program preparation and the use of packages, online schema changes, partition management, and stored procedures; as well as performance and availability features of utilities (including LOAD, REBUILD INDEX, REORG, and UNLOAD). This course does not cover distributed data processing, nor does it cover data sharing. |
IBM Db2 | Db2 12 for z/OS SQL Performance and Tuning | 2000 | ILT | This course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL. |
System Operators | z/OS JCL and Utilities | 3330 | ILT | This course is designed to teach you how to use z/OS job control language (JCL) and selected z/OS utility programs in an online batch environment. Both Storage Management Subsystem (SMS) and non-SMS JCL are discussed. Machine lab exercises complement the lecture material. |
System Operators | Fundamental System Skills in z/OS | 3330 | ILT | This course is designed to teach you the fundamental practical skills to navigate and work in a z/OS environment.This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. |
System Programmers | z/OS Facilities | 3330 | ILT | This classroom course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). It teaches the students the functions of major software base elements in the management of jobs, tasks, storage, data, and problems. It also addresses how these functions can be affected by the system programmer.Students are introduced to the services provided by the servers which execute in the z/OS environments, such as the Communications Server and the Security Server. Installation packaging options and steps to install the z/OS environments also are introduced. |
System Programmers | Basics of z/OS RACF Administration | 3330 | ILT | This course begins with an introduction to the z/OS environment, TSO and ISPF/PDF, batch processing, and z/OS data sets. Hands-on labs allow you to gain experience with viewing and allocating data sets, submitting a batch job, and viewing job output. After the introduction to z/OS, you will then learn, through lecture and exercises, how to use basic RACF command parameters and panels to define users and groups, protect general resources, z/OS data sets, and choose a basic set of RACF options. |
System Programmers | z/OS System Services Structure | 3330 | ILT | This course presents the structure and control blocks of the z/OS BCP and system services. It prepares the new z/OS system programmer to identify potential bottlenecks and performance problems, perform initial error symptom gathering, and identify opportunities and requirements for tailoring a z/OS system. This course also provides prerequisite information needed for further training in specialized areas such as system measurement and tuning and system problem determination. |
IBM z/OS | IBM System z Hardware Management Console (HMC) Operations | 1330 | ILT | This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain in-depth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers. |
System Programmers | SMP/E for z/OS Workshop | 3330 | ILT | This course is designed to provide the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. You are taught to define the SMP/E database and invoke SMP/E to add, modify, or replace system elements. The course includes extensive hands-on labs using a current level of SMP/E.You will get practical experience in the SMP/E tasks involved in installing a z/OS product. Emphasis is on interpreting results of SMP/E processing. SMP/E concepts examined in this course include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.You will also learn how to perform automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet. |
System Operators | z/OS System Operators | 2000 | ILT | To provide an overview of the z Operating System (OS), look at the systems from both a hardware and software prospective, and develop a basic understanding of System z partitioning capabilities, Processor Resource/Systems Manager (PR/SM), z/OS, Job Entry Subsystem 2 (JES2), Job Entry Subsystem 3 (JES3), Time Sharing Option (TSO), TSO Extended (TSO/E), System Display and Search Facility (SDSF), z/OS Communications Server, and System z channel subsystem usage for various channels, such as Enterprise System Connection (ESCON), Fiber Connector (FICON), and the Open Systems Adapter (OSA). It will also describe the Initial Program Loader (IPL) process and enable you to become comfortable issuing z/OS commands from a Multi Console Support (MCS) system console or extended MCS console. |
System Operators | z/OS JES2 Operator Training | 2000 | ILT | This course is designed to give the z/OS Operator personnel as well as entry systems programmers an overview about JES2. The students should be able to use JES2 commands at the z/OS Console and use SDSF. |
Application Developers | Assembler Language Coding Workshop | 3330 | ILT | This classroom hands-on lab course provides an introduction to the mainframe Assembler language. The course is designed to develop the skills appropriate to write and/or maintain programs and routines written in S/370 or S/390 Assembler Language. Emphasis is placed on enhancing skills in problem resolution through program check interruption analysis and dump reading. |
Application Developers | Advanced Assembler Language Coding Workshop | 2660 | ILT | This course provides instruction and practice in the use of the more complex S/390 Assembler Language facilities for the experienced assembler language programmer. The course includes a discussion of standard linkage conventions, use of BSAM/QSAM and selected system macros, the macro definition language, and reentrant coding considerations.Emphasis is placed on enhancing skills in problem resolution through analysis of more complex system-provided dumps. |
System Programmers | z/OS System Programmer Fundamentals | 2660 | ILT | This course is designed to describe the basic components that apply to all z/OS systems. It includes high level concepts that apply to the z/OS hardware platform and the z/OS software. It then provides a more detailed analysis, description and lab activities that can be applied to the system programmer role to maintain z/OS systems.Discussion activities include: The POR, IPL process, JES implementation and operating environment, VTAM environment for TSO, ISPF, SNA and TCP/IP networking, RACF, ISPF/PDF and UNIX System Services. It defines the classic approach to data management in a z/OS system. It identifies various software products and utilities used to define, maintain, and manage catalogs and data sets in the z/OS environment. It also discusses Parmlib usage and requirements for system initialization and operation that include: System symbolics, WLM, SFM, RMF and system logger. Both single system and multi-system sysplex usage is identified. z/OS install, upgrade options, maintenance using SMP/E and I/O configuration requirements using HCD is listed and described. |
System Programmers | Parallel Sysplex Implementation Workshop | 3330 | ILT | This course is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side. |
Application Developers | z/OS REXX Programming Workshop | 3330 | ILT | This course is designed to teach you the basic skills required to write programs using the REXX language in z/OS. The course covers the TSO extensions to REXX and interaction with other environments such as the MVS console, running REXX in batch jobs, and compiling REXX. |
System Programmers | Basic z/OS Tuning Using the Workload Manager | 3330 | ILT | Do you need to know how to establish a practical performance management program for your z/OS system? This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.Hands-on labsThis course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload. |
Application Developers | Advanced z/OS Security: Crypto, Network, RACF, and Your Enterprise | 2660 | ILT | System z continues to extend the value of the mainframe by leveraging robust security solutions, to help meet the needs of today's on demand, service-oriented infrastructures. System z servers have implemented leading-edge technologies, such as high-performance cryptography, multi-level security, large-scale digital certificate authority and lifecycle management; as well as improved Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) function, and z/OS Intrusion Detection Services. This advanced z/OS security course presents the evolution of the current z/OS security architecture. It explores in detail, the various technologies that are involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF), and z/OS Integrated Security Services.In the hands-on exercises, you begin with your own z/OS HTTP Server in a TCP/IP environment. Throughout the exercises, you make changes to the configuration to implement authentication by using RACF, SSL and the use of digital certificates. Use is made of facilities such as RACDCERT to manage digital certificates, PKI Services and RACF auto registration. You will also implement different scenarios to implement ssl security for a typical tcpip application; FTP: SSL, TLS, server authentication, client certificates and AT-TLS. These exercises reinforce the concepts and technologies being covered in the lectures. |
System Programmers | IBM System z Parallel Sysplex Operations | 2000 | ILT | This course is designed so that students can learn how z/OS systems operate in a Parallel Sysplex environment through discussion topics and hands-on lab exercises. Students learn problem determination skills, practice enhanced sysplex operations, including management of the coupling facility (CF), and use recovery capabilities provided by the System z servers.The course consists of six units and 12 hands-on lab exercises. |
System Programmers | Advanced Parallel Sysplex Operations and Recovery Workshop | 3330 | ILT | This course describes advanced operator actions to implement new policies, coupling facilities, structures and sysplex related operational enhancements. It diagnoses problems and demonstrates recovery techniques in these areas. These include:
|
IBM z/OS | Hardware Configuration and Definition (HCD) for z/OS | 2660 | ILT | Learn to work with the Hardware Configuration Definition (HCD) function for z/OS, and to plan and initiate dynamic reconfiguration of your zSeries hardware environment. Learn to use the HCD dialogs of z/OS to create an Input/Output (I/O) configuration and dynamically alter the I/O configuration. Learn about the creation of an I/O Configuration Dataset (IOCDS) and various reports that HCD can build. Use a z/OS system to reinforce lecture topics and to practice working with the HCD dialogs. Hands-on lab projects may be done in teams depending on the number of attendees and location. |
IBM z/OS | z/OS Management Facility Implementation and Use | 2000 | ILT | This course is designed to provide you with the skills required to install and customize IBM z/OS Management Facility (z/OSMF) 2.3, and use the functions and features provided by z/OSMF.IBM z/OS Management Facility (z/OSMF) is a product for z/OS that will simplify, optimize, and modernize the z/OS system programmer experience.z/OSMF delivers solutions in a task-oriented, web browser-based user interface with integrated user assistance.In this course, we introduce z/OS Management Facility and its architecture; and describe the components that are necessary to run z/OSMF on z/OS.In this course, you will also learn the installation and customization of z/OS Management Facility, and will customize several system components to exploit the following z/OSMF functions:z/OSMF Software Management ManagerCapacity ProvisioningClassic (ISPF) InterfaceIncident LogConfiguration Assistant for the z/OS Communications ServerWorkload ManagementSystem Status, Resource MonitoringWorkflow. |
IBM z/OS | IBM z/OS 2.4 Update | 2000 | ILT | This course is designed to teach students the new features and enhanced functions provided in z/OS Version 2 Release 4. The software updates and enhancements for z/OS V2R4 are presented in groups based on closely associated z/OS components. The groups include enhancements to the base control program, sysplex features, UNIX System Services, the data storage subsystem, Communications Server, and security components, such as RACF.Finally, the installation and migration issues relating to installation of z/OS V2.4 are discussed. |
Application Developers | Pervasive Encryption on z/OS | 2000 | ILT | Organizations are compelled to find effective and cost-efficient data security solutions.Encryption is one of the technologies that enables organizations to reduce the cost, impact and even likelihood of a breach. Encrypting data can help companies meet the stringent mandates of the GDPR, HIPAA and other mandates.IBM z15 has been designed for pervasive encryption, enabling organizations to encrypt 100% of an organization’s IBM Z critical business data in-flight and at-rest, with no application changes and no impact to SLAs. Encrypting only the data required to meet compliance mandates should be considered a minimum threshold, not a best practice. IBM z15 makes pervasive encryption the new standard in data protection and the foundation of a larger data security and protection strategy.z/OS is designed to provide new policy-based encryption options that take full advantage of the improvements in the z15 platform. These new capabilities include:Data set encryption, which is one aspect of pervasive encryption, provides enhanced data protection for many z/OS data sets gives users the ability to encrypt data without needing to make changes to applications to embed encryption APIs within applications.New z/OS policy controls which make it possible to use pervasive encryption to protect user data and simplify the task of compliance for many z/OS data sets, zFS file systems, and Coupling Facility structures.Pervasive encryption for IBM Z® is a consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify encryption and reduce costs associated with protecting data.In this course you will learn how to implement Pervasive Encryption in your z/OS installation. The course explores in detail, the various technologies that are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS access method Services.In the hands-on exercises, you begin with the setup of your hardware crypto environment (CCA crypto express and CPACF), then you will load and activate your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then define your data encryption keys, activate your data set encryption policy, and encrypt your data sets and zFS filesystems.These exercises reinforce the concepts and technologies being covered in the lectures. |
Application Developers | IBM z/OS Container Extensions zCX | 1330 | ILT | • z/OS Container Extensions (zCX), a new entitled capability of z/OS 2.4, ushers in a new era ofhybrid computing supporting running Linux applications directly on z/OS. • IBM® z/OS® Container Extensions (IBM zCX) makes it possible to run Linux on IBM Z®applications that are packaged as Docker container images on z/OS. Application developers candevelop and data centers can operate popular open source packages, Linux applications, IBMsoftware, and third-party software together with z/OS applications and data. |
System Operators | IBM z/OS Bootcamp | 6660 | ILT | This course is designed to give new hire IT professionals an introduction into the IBM Z environment. The IBM mainframe servers, operating systems and software products will be discussed. Through lecture and hands-on labs, this course will provide the basic skill set to jump start productivity for technical professionals who are new to the mainframe environment. The skills taught in this course can be applied across multiple mainframe job roles. This course consists of 16 lecture units and 11 lab exercises. |
IBM Enterprise Records | IBM Enterprise Records 5.1 - Records Management | 1330 | ILT | This course is for those whose job includes responsibility for designing the file plan for an IBM Enterprise Records system and making decisions regarding record retention, disposition, and security. You use the IBM Enterprise Records web application to learn core skills, such as declaring and managing records. Then, you learn to design and create a file plan that meets specific records management goals. You work with a records administrator, an installer, a database administrator, and a programmer. You must be able to organize and communicate records management system requirements to the other roles.You work with a fully functioning IBM Enterprise Records system to practice the skills required for managing records and designing file plans for records management. |
IBM Case Foundation | IBM Case Foundation 5.2.1: External Communication | 670 | ILT | If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms |
IBM FileNet | IBM FileNet P8 Platform Essentials (V5.5.x) | 670 | ILT | This course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas. |
IBM FileNet | IBM FileNet P8 Platform Administration (V5.5.x) | 3330 | ILT | This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches. |
IBM Case Manager | IBM Case Manager Essentials (V5.3.2) | 670 | ILT | This course is an introduction to IBM Case Manager, concepts, functions, and architecture. Participants use an IBM Case Manager system to practice the skills that are required by case workers to process cases and create runtime tasks. |
IBM Case Manager | Build an IBM Case Manager Solution (V5.3.2) | 670 | ILT | In this course you will create basic case management solutions with IBM Case Manager Builder and Process Designer. Using an iterative solution development process, you will create, deploy, test, and revise your solutions, adding complexity and functionality to your solutions as you gain skills. You will create properties and document classes, configure roles and in-baskets, and define case stages. You will work with case types, tasks, and workflows. This course includes some guidelines on solution design principles. After completing this course, you can build on these skills by taking more advanced or specialized courses in security, user-interface customization, and solution deployment. |
IBM Case Manager | IBM Case Manager: Configure Security (v5.3.2) | 670 | ILT | In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes. |
IBM Case Manager | IBM Case Manager: Solution Deployment from Design to Production (V5.3.2) | 670 | ILT | This course is designed to show you how to migrate and deploy Case Manager solutions from development to preproduction and production. Participants use a system with two instances of IBM Case Manager to practice the skills that are required by solution builders and administrators to migrate and deploy solutions from one environment to another. |
IBM Case Manager | Customize the IBM Case Manager Client User Interface (V5.3.2) | 670 | ILT | In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists. |
IBM Spectrum | IBM Spectrum Scale Basic Administration for Linux and AIX | 2000 | ILT | This course is intended for IT professionals tasked with administering an IBM Spectrum Scale storage cluster in environments running Linux and AIX nodes. The course includes information on installing, configuring, and monitoring an IBM Spectrum Scale cluster. Many Spectrum Scale features are described in lecture materials and then implemented in lab exercises. These features include: Storage management, high availability options, cluster management, and information lifecycle management (ILM) tools.Note: Although the lab environment is running the Linux operating system, the differences in Spectrum Scale compared with an AIX environment are minor. Therefore, the skills acquired during the course can be applied in both Linux and AIX environments. |
IBM Spectrum | IBM Spectrum Scale Advanced Administration for Linux | 2000 | ILT | The course includes information on the Spectrum Scale installer toolkit, installer GUI, cluster upgrade scenarios, cluster health monitoring, cluster performance data collection and monitoring, management GUI, file system encryption, cluster security, and call home features. Many of the features are described in lecture materials and implemented in lab exercises. |
IBM Spectrum | IBM Spectrum Scale - Remote Data Access | 2000 | ILT | Enterprises and organizations are creating, analyzing and keeping more data than ever before. An organization’s underlying storage must support new-era big data and artificial intelligence workloads along with traditional applications while ensuring security, reliability and high performance. IBM Spectrum Scale meets these challenges as a high-performance solution for managing data at scale. This new course covers IBM Spectrum Scale features that enable data-anywhere access that spans storage and locations to accelerate applications across the data center or around the world. Attendees should already know the basics of installing, configuring and managing a Spectrum Scale clustered file system and how to use the installer toolkit.This course is intended for IT professionals tasked with administering a Spectrum Scale storage cluster consisting of Linux nodes. The course includes information on various Spectrum Scale features that enable remote access to the data that is stored in a cluster file system. This includes: multi-cluster support, clustered NFS, cluster export services (CES) and protocol support (NFS, SMB, Object, and block), Active File Management (AFM), and AFM-based Asynchronous Disaster Recovery (AFM DR). The features are described in lecture materials and implemented in lab exercises. |
IBM Spectrum | IBM Spectrum LSF Basic Configuration and Administration for Linux | 2000 | ILT | This course teaches IBM Spectrum LSF 10.1 version.The course is designed to give system administrators the knowledge required to implement and maintain LSF in their working environment. They will gain a solid understanding of workload resource management, cluster configuration and administration. The workshops provide valuable experience with the installation of LSF, cluster configuration and administration. The system administrator will also learn helpful hints and tips and develop fundamental troubleshooting skills. |
IBM Infosphere | IBM InfoSphere Data Replication - InfoSphere Change Data Capture Essentials | 2000 | ILT | This course will teach about the InfoSphere Change Data Capture (CDC) component of the IBM InfoSphere Data Replication family of solutions. This course will examine the architecture, components and capabilities of CDC, and discuss various ways to setup and implement the software. This course will explore how to operate and troubleshoot CDC and discuss 'Best Practices' in maintaining the Environment. Lastly, use cases will be provided to help student understand how replication is used using InfoSphere Change Data Capture to a Business Environment. |
IBM Infosphere | IBM InfoSphere DataStage Essentials (v11.5) | 2660 | ILT | This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components. |
IBM Infosphere | IBM InfoSphere Advanced DataStage - Parallel Framework v11.5 | 2000 | ILT | This course is designed to introduce advanced parallel job development techniques in DataStage v11.5. In this course you will develop a deeper understanding of the DataStage architecture, including a deeper understanding of the DataStage development and runtime environments. This will enable you to design parallel jobs that are robust, less subject to errors, reusable, and optimized for better performance. |
IBM Infosphere | IBM InfoSphere Advanced QualityStage V11.5 | 2000 | ILT | This course will step you through the QualityStage data cleansing process. You will transform an unstructured data source into a format suitable for loading into an existing data target. You will cleanse the source data by building a customer rule set that you create and use that rule set to standardize the data. You will next build a reference match to relate the cleansed source data to the existing target data. |
IBM Infosphere | IBM InfoSphere Information Server Administrative Tasks V11.5 | 670 | ILT | This course gets those charged with administering Information Server v11.5 and its suite of many products and components started with the basic administrative tasks necessary to support Information Server users and developers.The course begins with a functional overview of Information Server and the products and components that support these functions. Then it focuses on the basic administrative tasks an Information Server administrator will need to perform including user management, session management, and reporting management tasks. The course covers both the use of Information Server administrative clients such as the Administration Console and Metadata Asset Manager and the use of command line tools such as istool and encrypt. |
IBM Infosphere | IBM InfoSphere DataStage engine Administration for Information Server v11.5 | 670 | ILT | This course teaches Information Server and/or DataStage administrators to configure, manage, and monitor the DataStage Engine which plays a crucial role in Information Server. It not only runs high performance parallel ETL jobs designed and built in DataStage. It also supports other Information Server products including Information Analyzer, QualityStage, and Data Click. After introducing DataStage parallel jobs and the Engine that runs them, the course describes DataStage project configuration, the Engine’s development and runtime environments, and the Engine’s data source connectivity. In addition the course explains how to import and export DataStage objects, how to run and monitor DataStage jobs through the command line and GUI, and how to use some important Engine utilities. |
IBM Infosphere | IBM BigIntegrate for Data Engineers v11.5.0.2 | 670 | ILT | Teaches data engineers how to run DataStage jobs in a Hadoop environment. You will run jobs in traditional and YARN mode, access HDFS files and Hive tables using different file formats and connector stages. |
Linux | Linux Basics | 2000 | ILT | This course is designed to teach the basics of the Linux environment. Class activities include accessing a system, navigating the directory hierarchy, using the vi editor, using common commands, tools, and scripting concepts. |
IBM Power Systems | Preparing for Red Hat OpenShift: Implementing Containers on IBM Power Systems | 1330 | ILT | This 2 day course is designed to provide skills enablement for system administrators and product support specialists in the area of operating system based virtualization provided by Linux containers. Topics include introduction to Podman, Buildah, Docker, Kubernetes and CRI-O. Hands-on exercises reinforce the lecture material, allowing students to install and configure Linux containers. |
Linux | Power Systems Running Linux: Server Administration | 2000 | ILT | This course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery. |
IBM Maximo | Maximo Application Suite - Manage: Work Management | 670 | ILT | This 1-day instructor led course provides students with an understanding of how work is managed in IBM Maximo Application Suite – Manage, including the overall Work Order process and lifecycle, creation of Job Plans as well as Work Orders. It also looks at how Failure data can be entered, Work assigned and Labour and material reported against work. After learning about these concepts you can practice what you have learned by doing the hands-on lab exercises. Through a combination of procedural information, demonstrations, and exercises, students will learn about topics such as dynamic and conditional job plans. This course also has hands-on lab exercises using a Red Hat OpenShift Maximo Manage environment for you to try out. |
IBM Maximo | Maximo Application Suite - Manage: Asset Management | 670 | ILT | This 1-day instructor led course provides students with an understanding of asset management within the Maximo Application Suite Manage solution. This course covers topics such as Asset creation, Asset Application, Meters and its association with the assets, various aspects of Asset movement swap and modification, along with Locations from the perspective of Assets. It also teaches about Asset Classification, Linear Assets, creating asset relationships, Item assembly structures, various aspects of asset depreciation and Asset maintenance cost roll up. Additionally, you learn how Maximo Health and Predict play a role with asset. |
IBM Maximo | Maximo Application Suite - Manage: Preventive Maintenance and Condition Monitoring | 1330 | ILT | This 2-day instructor led course provides students with an understanding of how Preventive Maintenance is configured in Maximo Application Suite - Manage including the creation of time and meter based Preventive Maintenance schedules, Master PMs, PM Hierarchies and PM Forecasting. Students will learn about topics such as Repair Facilities and Job Plan Sequencing. This course also has hands-on lab exercises using a Red Hat OpenShift Maximo Manage environment. |
IBM Maximo | Maximo Application Suite - Manage: Purchasing and Contracts | 670 | ILT | This course provides students with an understanding of how purchasing and contracts are managed in MAS Manage including the overall Procurement process and lifecycle, creation of Purchase Orders, Purchase Requests, Invoices, RFQs and contracts. Students will learn about Purchasing and Contracts Applications that enable items to be ordered from vendors, and Purchase Order creation and Invoice Reversal. There is also hands-on lab exercises using a Red Hat OpenShift MAS Manage environment. |
IBM Maximo | Maximo Application Suite - Manage: Core Data Setup | 1330 | ILT | This 2-day instructor led course provides students with an understanding of how to create a new Organization and Site in Maximo Manage and discuss the core options available in the Organizations application. They will also be able to create classifications and Location records. Students will learn about topics such as Multi-Organization strategy, GL Account setup and Organization Options. This course also has hands-on lab exercises using a Red Hat OpenShift Maximo Manage environment. |
IBM Maximo | Maximo Application Suite - Manage: Users and Security | 670 | ILT | This course provides students with an understanding of how to create new users in Maximo Manage and manage labor, crafts, and calendar records through specialized applications. We will also use conditional expressions and control properties to implement conditional security. There is also hands-on lab exercises using a Red Hat OpenShift MAS Manage environment. |
IBM Maximo | Maximo Application Suite - Manage: Inventory Management | 670 | ILT | This 1-day instructor led course provides an understanding of the basic Inventory Applications that enable you to create items that will be ordered through various vendors. You also learn how to setup units of measure that determine quantities that are ordered and issued. Through a combination of procedural information, demonstrations, and exercises, you learn about topics such as what rotating and non-rotating items are and their differences and setting up condition enabled items. |
IBM Maximo | Maximo Application Suite - Manage: Workflow Development | 1330 | ILT | In this course, we will look at how workflow processes can be developed to support custom business requirements. We'll see how various nodes can be used to design business logic and route records to individuals and groups of individuals for approval or action. |
IBM Maximo | IBM Maximo Asset Management 7.6 Implementation Bootcamp | 5990 | ILT | This 9-day hands-on technical boot camp provides students with the ability to make informed decisions for the design, planning, and execution of a Maximo Implementation. This in-depth workshop covers Supply Chain, Maximo features and functions, and materials management and implementation best practice. It also includes business process configurations, customizations, systems integrations, and post-Implementation considerations and activities. |
IBM Watson | Watson Explorer Foundational Components (v11) | 2660 | ILT | In this course, you will learn the core features and functionality of Watson Explorer Foundational Components. This core functionality is found in all editions of Watson Explorer (Enterprise and Advanced edition).This course is designed to introduce the technical student to using the enterprise search functionality in creating applications using the Search Engine and Application Builder capabilities. In this course will look at configuring search collection and engine components for ingesting, converting, indexing, and querying. This course will also introduce you to the design process of creating an Application Builder 360-degree application.This course offers hands-on labs giving students exposure to the various aspects of configuring components that will be used in solutions that will involve Watson Explorer Foundational Components functionality. |
IBM Watson | Watson Explorer Analytical Components (v11) | 2660 | ILT | In this course, you will learn the core features and functionality of Watson Explorer Analytical Components. This functionality is found in Watson Explorer Advanced Edition. The Advanced Edition also includes the Foundational Components functionality which is covered in a separate 4 day course (O3100).This course is designed to introduce the technical student to using the content analytics, annotator, and content mining functionality. This primary functionality is found in an Analytics collections crawling, parsing, indexing, annotating, and searching components. In this course we will look at the results of analytic collections thru the products Content Miner application. This course will also look at creating and deploying a custom annotator using Content Analytics Studio.This course offers hands-on labs giving students exposure to the various aspects of configuring analytics collections and creating custom annotators that can be used in solutions that will involve Watson Explorer Analytical Components functionality. |
IBM Watson | Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) | 1330 | ILT | This course is designed to teach students core concepts of IBM Watson Explorer Deep Analytics Edition oneWEX. Students will learn to identify the oneWEX platforms as well as the process flow and data flow of oneWEX projects. Students will explore oneWEX tools, such as Content Miner and the Admin Console, while gaining hands-on experience in data acquisition and enrichment. Finally, students will be exposed to more advanced topics, such as Application Builder, Content Analytics Studio, and API usage. |
IBM Sterling | Managing IBM Sterling File Gateway | 1330 | ILT | This 2-day course introduces the student to the Sterling File Gateway functionality and provides the specific technical skills needed to deploy and support it. The course provides an overview of the features and provides hands-on exercises for creating routing templates, transforming file names, searching for files within a route, and reporting on file transfers. |
IBM Sterling | IBM Sterling B2B Integrator Fundamentals | 3330 | ILT | This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. |
IBM Engineering Lifecycle Management | Essentials for IBM Engineering Requirements Management DOORS Next | 670 | ILT | This course teaches analysts and engineers how to define, elaborate, organize, and manage textual and graphical requirements and requirements-related information in IBM DOORS Next v7. DOORS Next is a key component of the IBM Engineering Lifecycle Management solution. The product provides requirements definition and management capabilities in a fully-integrated environment that can also include IBM Engineering Workflow Management for change and configuration management, and IBM Engineering Test Management for quality management. |
IBM Engineering Lifecycle Management | IBM Engineering Test Management Tool-focused User Training | 1330 | ILT | This course introduces test managers to the basics of using IBM Engineering Test Management to manage a test effort within a software development project. The course teaches how to plan the test effort, develop test artifacts, align with requirements and development, manage the test team's work, monitor progress, submit and track defects, and report test results and status. Through hands-on lab exercises that reinforce learning, you will experience the benefits of test management that is integrated with requirements and development through Engineering Lifecycle Management (ELM). IBM Engineering Test Management is a key component of Engineering Lifecycle Management (ELM), providing quality management capabilities in a fully-integrated environment that can also include Engineering Workflow Management for change and configuration management. |
IBM Engineering Lifecycle Management | Developing Software with IBM Engineering Workflow Management | 670 | ILT | Developing Software with IBM Engineering Workflow Management is a one day, instructor-led course designed as an introduction to IBM Engineering Workflow Management for software developers. You will learn to utilize IBM Engineering Workflow Management to effectively manage work items, collaborate and share work with teams using Jazz source control, request and analyze software builds, and monitor the status of Eclipse-based development projects using reports and web-based dashboards. |
IBM Engineering Lifecycle Management | IBM Engineering Workflow Management for Agile | 670 | ILT | The Engineering Workflow Management (EWM) for Agile course is designed to provide students with the knowledge to configure EWM project areas so that the core IBM practices for agile development and change and release management can be effectively adopted by the project team. Topics include planning projects, teams, and iterations to support agile projects; release and iteration planning; managing work items; and customizing EWM queries and reports to provide project status and measure progress. |
IBM Engineering Lifecycle Management | IBM Engineering Workflow Management for Configuration Managers | 670 | ILT | The Engineering Workflow Management Administration for Configuration Managers course is designed to provide students with the knowledge to configure Engineering Workflow Management version control and build areas so that change and release management can be effectively adopted by the project team. Topics include ELM, EWM Source Control, Managing the Build Component, and Managing Reports. |
IBM Engineering Lifecycle Management | IBM Engineering Workflow Management Administration for Process Administrator | 670 | ILT | This course is designed to provide students with the knowledge needed to configure Engineering Workflow Management project areas and process templates so that change and release management can be effectively adopted by the project team. Topics include Understanding ELM, Managing Project Areas, Managing Reports, and Creating and Managing Process Templates. |
IBM i | Introduction to IBM i for New Users | 670 | ILT | In this classroom course, you will learn basic concepts and skills you need to be productive users on Power Systems with IBM i. With plenty of hands-on lab exercises, we show everything from signing onto the available user interfaces; green screen environment and IBM Navigator for i. You will learn how objects are managed on the system and how you display these objects. You will learn to use control language (CL) commands (fast path) and how to work with and manage messages on the system. Students will also learn how to the system manages work and how you manage your printouts. Lastly, students will also get a basic overview of security. |
IBM i | IBM i System Administration | 3330 | ILT | Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, get an introduction to the architecture and terminology of the IBM i. |
IBM i | Control Language Programming Workshop for IBM i | 2660 | ILT | Learn to write easy to use and efficient control language (CL) programs which may be used to perform a variety of system and application control functions. You are taught to write basic and intermediate level, interactive, and batch CL programs, user commands, and CL programs that function as user tools (programs that use the output of display commands as input).You will learn to write Control Language (CL) programs which may be used to perform a variety of system and application control functions. You will be taught to write basic and intermediate level interactive and batch CL programs as well as programs that function as user tools (programs that use the output of display commands as input). |
IBM i | IBM i Performance Tuning - I: IBM i Structure, Tailoring and Basic Tuning | 1330 | ILT | This classroom course of two days explains how to balance the workload on the IBM i system to ensure optimum performance. Specifically, this course explains how to manage workloads, measure system performance, and tune the operating system to meet processing requirements. Hands-on exercises give you the opportunity to use the system functions that are available for controlling workload and tuning system performance. Evaluation criteria presented in this course are based on the latest information available from IBM development labs. |
IBM i | IBM i Performance Tuning - II: Advanced Analysis and Capacity Tuning | 2660 | ILT | This course will help you to better understand the techniques of performance analysis and capacity planning on systems and partitions running IBM i and develop an appreciation of how IBM i operates and interfaces with applications. This course is expected to build skills to better manage performance and capacity on systems and partitions running IBM i.The course explains IBM i concepts, including the Technology Independent Machine Interface (TIMI), main storage pools, auxiliary storage pools, management of jobs, threads, and tasks, job run-time structure, performance monitoring, data collection, and analysis of performance data.This course includes hands-on activities using performance data from IBM i systems to help the student appreciate the concepts discussed. This course is designed for those running Power Systems on IBM i. While it includes i 7.2 content, it is suitable for those currently using prior versions of IBM i.The first part of this course (units 1-6) focus on teaching the performance management process, the performance considerations of key hardware components and virtualization options, and tuning options to help optimize performance. During these lectures, students should gain an appreciation of the unique storage management and work management components in the IBM i architecture and how these components need to be managed for optimal performance.The second part of this course focuses on the tools and techniques to monitor, analyze, and plan for performance of Power Systems with IBM i and Logical partitions (LPARs).The primary analysis tool that will be used is the Performance Data Investigator (PDI) which is included with IBM Navigator for i. PDI is also used with IBM Systems Workload Estimator (WLE) for capacity planning activities. |
IBM z/OS | Introducing z/OS UNIX System Services | 2000 | ILT | This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course. |
IBM z/OS | z/OS UNIX System Services Implementation | 3330 | ILT | This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment. |
IBM Cognos | IBM Cognos Controller: Develop Applications (v10.2/v10.3) | 3330 | ILT | This course teaches application developers how to set up a Controller application and effectively use Controller in their organization’s consolidation process. Students will also design and generate financial reports using Controller. Through a series of lectures and hands-on exercises, students will set up a Controller application by creating the necessary structures (such as accounts and companies), and then test the application to ensure that it works properly. Students will also learn how to work with currency translation, allocations, intercompany transactions, investments in subsidiaries, advanced formula calculations, and user-defined business rules, as well as define configuration settings and user access to the application. |
IBM Cognos | IBM Cognos Controller: Author Reports (v10.2/v10.3) | 670 | ILT | This course teaches authors, with basic knowledge of group accounting and Microsoft Excel, how to design and generate financial reports using IBM Cognos Controller. Students will learn how to create ad hoc and standard reports to analyze data. They will also develop custom reports using the Report Generator utility and the Excel Link. In addition, students will learn how to run multiple reports at the same time with report books.If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms |
IBM Planning Analytics | IBM Planning Analytics: Analyze Data and Create Reports (V2.0.x) | 1330 | ILT | This course is designed to teach analysts how to use IBM Planning Analytics to analyze data to discover trends and exceptions, create and customize reports and templates, and contribute data to plans. Through a series of lectures and hands-on activities, you will learn how use Planning Analytics Workspace and Planning Analytics for Microsoft Excel to create analyses, enter data, create custom views and dashboards, and build formatted reports and forms. |
IBM Planning Analytics | IBM Planning Analytics: Design and Develop Models in Planning Analytics Workspace (V2.0.x) | 3330 | ILT | This course is designed to teach modelers how to build a complete model in IBM Planning Analytics using Planning Analytics Workspace. Through a series of lectures and hands-on exercises, students will learn how to set up dimensions and cubes, manually enter data into these structures, and define the data that users can see. Students will also learn how to transfer data into the IBM Planning Analytics model, including the use of TurboIntegrator scripts to perform data transfer. In addition, the course outlines how to customize drill paths, convert currencies, and model for different fiscal requirements. |
IBM Engineering Lifecycle Management | IBM Engineering Requirements Management DOORS V9.6 - Foundation | 670 | ILT | This course is for new IBM Engineering Requirements Management DOORS (DOORS) users. It introduces basic DOORS concepts and functionality. It includes hands-on exercises that teach users to create, edit, manipulate, and analyze requirements data in DOORS. |
IBM Engineering Lifecycle Management | IBM Engineering Requirements Management DOORS V9.6 - Practitioner | 670 | ILT | This course builds on the content learned in the “IBM Engineering Requirements Management DOORS V9.6 - Foundation” course. It is designed for those who will be in the role of team lead or project manager, or who want to learn more about advanced DOORS end-user functionality. It discusses creating and structuring DOORS projects, defining linking relationships and attributes, setting access permissions, and managing change. It also discusses external linking, working with spreadsheets, and applying configuration management strategies to DOORS data. |
IBM Engineering Lifecycle Management | IBM Engineering Requirements Management DOORS V9.6 - DXL | 1330 | ILT | This course teaches experienced IBM Engineering Requirements Management DOORS users the basic principles of writing and applying DXL extension language to customize DOORS. |
IBM Power Systems | IBM PowerVC 2.0 Workshop | 2660 | ILT | IBM PowerVC for Private Cloud, an infrastructure-as-a-service (IaaS) offering, provides a self-service cloud portal for IBM Power Systems and is built on OpenStack. OpenStack is a collection of open source software projects that enterprises or service providers can use to setup and run their cloud compute and storage infrastructure. IBM PowerVC for Private Cloud provides an easy way to provision and manage virtual machines on IBM PowerVM based systems in a private or hybrid cloud setting. It comes in two versions, a standard edition and a cloud edition.This course aims to provide an overall understanding of how to install and configure IBM PowerVC Standard Edition and IBM PowerVC for Private Cloud, in an environment with HMC and IBM PowerVM NovaLink. The hands-on lab covers exercises from the basics of installing IBM PowerVC to performing advanced administrative tasks. The course also clarifies concepts in planning, deploying, and implementing IBM PowerVC for Private Cloud and IBM PowerVM NovaLink based on technology standpoints, product architectures, and their benefits. |
IBM Power Systems | DevOps with Private Cloud on IBM Power Systems: Learn Ansible, Chef, and Puppet | 2000 | ILT | DevOps is an IT trend that rose out of the benefits of integrating development and operations. The main characteristic of DevOps is to use automation and monitoring at several stages of the IT delivery lifecycle. DevOps aims to reduce administrator workload and scale IT resources efficiently to attain business objectives. The course addresses the concepts involved in planning, deploying and implementing Ansible, Chef and Puppet, and shows how to integrate these tools with IBM Cloud PowerVC Manager. You perform basic installation to advanced administrative tasks with these DevOps tools. In addition, the product architectures of these tools, and their benefits are covered while showing how to implement these tools to fit your needs. |
Brocade | Storage Area Networking Fundamentals | 2660 | ILT | IBM offers a comprehensive portfolio of SAN switches, storage, software, services and solutions to reliably bring information to people in a cost effective way. IBM provides flexible, scalable and open standards-based business-class and global enterprise-class storage networking solutions for the on demand world.This course provides an overview of storage network and data center networking technology. It reviews SAN concepts, Fibre Channel architecture, SAN topologies, IBM b-type offerings, IBM offerings from Cisco, and SAN over Ethernet architectures, such as iSCSI and FCoE. |
IBM Storage | SAN Volume Controller (SVC) Planning and Implementation Workshop | 2660 | ILT | Plan and implement IBM SAN Volume Controller in your data center! After completing this course, you should be able to:• Distinguish the concepts of IBM Spectrum virtualization• Recall the history for IBM SAN Volume Controller• Classify the characteristics and components of the IBM SAN Volume Controller system and SAS attached expansion enclosures• Outline setups required to integrate an SVC system solution• Summarize the SVC systems’ ability to scale for capacity and performance• Summarize the virtualization process converting physical storage space into virtual resources• Recall the process to create host access storage on an SVC system• Differentiate the advanced software features designed to simplify data management, reclaim storage space, and preserve storage investments• Differentiate methods in which to migrate data to and from the virtualized system environment• Summarize the methods of remote data replications to improve availability and support for disaster recovery• Employ administrative operations to manage, monitor, and troubleshoot the system environment• Summarize the characteristics of IBM Storage Insights’ ability to identify, troubleshoot and minimize potential system downtime• Summarize 3-Site Replication and Safeguarded Copy Agenda: Day 1:Unit 1: Introduction to IBM SAN Volume ControllerUnit 2: IBM SAN Volume Controller Hardware ArchitectureUnit 3: IBM SVC SAS-Attached StorageUnit 4: IBM SVC System ScalingUnit 5: IBM SVC System Installation and Management AccessExercise 0: Lab environment overviewExercise 1: System user authentication. Day 2:Unit 6: IBM Spectrum Virtualize: Storage ProvisioningUnit 7: IBM Spectrum Virtualize Volume AllocationUnit 8: IBM Spectrum Virtualize Host IntegrationUnit 9: IBM Spectrum Virtualize Data Reduction TechnologiesExercise 2: Manage external storage resourcesExercise 3: Provision external storage resourcesExercise 4: Windows host definitions and volume allocationsExercise 5: AIX host definitions and volume allocationsExercise 6: iSCSI host definitions and volume allocationsExercise 7: Thin Provisioning and Volume Mirroring. Day 3:Unit 10: IBM Spectrum Virtualize Easy TierUnit 11: IBM Spectrum Virtualize Data MigrationUnit 12: IBM Spectrum Virtualize FlashCopy and Consistency GroupsUnit 13: IBM Spectrum Virtualize Remote Data MirroringExercise 8: Data pool migrationExercise 9: Migrate existing data with Import WizardExercise 10: Migrate existing data with Migration WizardExercise 11: Migrate existing data with Import Wizard CLIExercise 12: System scripting. Day 4:Unit 14: IBM Spectrum Virtualize Administration ManagementUnit 15: IBM Storage InsightsUnit 16: IBM Spectrum Virtualize 3-Site ReplicationUnit 17: IBM Spectrum Virtualize Safeguarded CopyExercise 13: IBM Real-time Compression and IBM ComprestimatorExercise 14: FlashCopy and consistency groupsExercise 15: Volume expansionExercise 16: Monitoring user roles and access. |
IBM Disk Systems | Introduction to Storage | 2000 | ILT | This course covers basic data storage concepts and IBM solutions in this space. You will learn RAID, SAN connectivity, high availability, business continuity planning for disaster recovery, storage virtualization, cloud storage and more. You will learn all about IBM Storage products (disks, flash, tape, SAN switches and directors) and the IBM Spectrum suite of software for accessing and managing on and off premises data storage. |
IBM z/OS | z/OS VSAM and Access Method Services | 2660 | ILT | This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT.Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT. Hands-On LabsEight labs are included to address:
|
IBM Tivoli | DFSMS Implementation | 2660 | ILT | This course provides the skills required to plan and implement Data Facility Storage Management Subsystem (DFSMS). A step-by-step implementation strategy, emphasizing coexistence considerations, is reinforced by hands-on labs. In the hands-on labs, students will be creating constructs as well as coding ACS routines. This milestone approach includes managing temporary and permanent data sets. The course also discusses exploitation of functions provided by DFSMS as the installation evolves to the DFSMS environment. |
IBM Tivoli | DFSMShsm Implementation | 3330 | ILT | This course prepares you to implement and manage DFSMShsm (DFSMS hierarchical storage manager). You will learn how to automate the storage management tasks, which optimize DASD space utilization and provide data availability. You will be taught basic DFSMShsm terminology and concepts, and you will examine the functions and interfaces used to tailor DFSMShsm processing to meet your installation's storage management requirements.Hands-on lab exercises enable you to perform a step-by-step implementation. |
IBM PureData Systems | IBM Storwize V7000 Implementation Workshop | 2660 | ILT | This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence of virtualization, the IBM Storwize V7000 to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the Storwize V7000 into the storage area network. It also explains how to:• Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.• Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression• Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.• Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.• Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.• This course lecture offering is at the Storwize V7000 V7.6. level. |
IBM Disk Systems | IBM DS8000 Implementation Workshop for Open Systems | 2660 | ILT | This course is designed to help you understand, install, and monitor the DS8000 for the Open Systems environment. The exercises enable you to perform a step-by-step implementation. |
IBM Disk Systems | IBM DS8000 Implementation Workshop for z Systems | 2000 | ILT | To learn the DS8000 storage subsystem and its hardware components and logical structure. You configure the DS8000 storage subsystem using a DS8000 Storage Manager GUI and review the DS CLI interface for scripting configuration functions. You will also perform dynamic data relocation using Easy Tier function. In addition we have a unit on the recently announced product called the DS8900F. |
IBM Flash | IBM FlashSystem Fundamentals | 670 | ILT | Enterprise data is growing exponentially. This data explosion is making commonly accepted practices of data management inadequate. Social, mobile, cloud, big data, and analytics are driving an explosion in data volumes and causing new challenges for data protection, disaster recovery, regulatory requirements, and standards for compliance. Data management has become one of the highest priorities of organizations today. The IBM FlashSystem products are designed to help companies improve performance and reduce server sprawl, power consumption, cooling, and floor space requirements. All of this in turn can help clients save money, improve performance, and invest more in innovation. The IBM FlashSystem family can help you take control of your storage, harness existing data, and manage your IT infrastructure in a much more cloud-like fashion. This course will aim to provide the basics of flash storage systems, specifically IBM’s portfolio in this area. |
IBM Flash | IBM FlashSystem V9000 Storage Implementation | 2660 | ILT | IBM FlashSystem V9000 is a comprehensive all-flash enterprise storage solution that delivers the full capabilities of IBM FlashCore technology. FlashSystem V9000 offers a rich set of storage virtualization features designed to improve efficiency, management, scalability and flexibility for any storage environments. FlashSystem V9000 delivers industry-leading value to enterprises along three dimensions: Scalable Performance, Enduring Economics, and Agile Integration.This course focuses on the planning and implementation tasks associated with integrating the FlashSystem V9000 into the storage area network, and facilitate storage application data access independence from storage management functions and requirements.It also explains how to:• Centralize storage provisioning to host servers from common storage pools using internal storage and SAN attached external heterogeneous storage.• Improve storage utilization effectiveness using Thin Provisioning and Real-Time Compression• Implement storage tiering and optimization of flash, enterprise or nealine systems usage with Easy Tier.• Facilitate the coexistence and migration of data from non-virtualization to the virtualized environment.• Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements. |
IBM Tivoli | IBM Monitoring 8.1.3 Implementation and Administration | 1330 | ILT | This course teaches you how to install and use the IBM Monitoring v8.1.3 software to manage your environment. You install and configure the product, install various agents, create applications, manage users, detect problems and integrate with NetCool/OMNIbus, IBM Tivoli Monitoring, and Dashboard Application Services Hub. |
IBM Tivoli | IBM Tivoli Netcool Impact 7.1 Administration and Implementation | 2660 | ILT | This course teaches students how to deploy and administer IBM Tivoli Netcool/Impact through practice exercises. This course is designed specifically for anyone who might be technically responsible for the design and implementation of Netcool/Impact, a highly scalable analytics engine that adds event and service enrichment and business impact analysis for event data. You should expect exposure to all fundamental elements of Netcool/Impact with a focus on developing policies within the Netcool/Impact product and exploring the features that enhance the visualization, usability, and integration functions. The visualization enhancements are facilitated by the integration of the IBM Dashboard Application Services Hub, which is part of Jazz™ for Service Management, and Netcool/Impact features such as the UI data provider. |
IBM Instana APM | Administering Environments with IBM Instana Observability | 1330 | ILT | In this course, you learn how to perform observability and application performance monitoring functions using IBM Instana Observability. You learn the architecture of Instana and how the data flows from the sensors and tracers, through the agents, and to the big data backend. You learn essential user interface techniques and how to create application perspectives and to use their dashboards to monitor the services. In addition, this course describes distributed tracing and how IBM Instana AutoTrace works and how to quickly trace issues down to the root cause. You also learn how the differences between changes, issues, and incidents and how to create alerts to notify team members when certain criteria is met. You experiment with establishing roles for users with group permissions. And you learn how to create custom dashboards to help you keep track of the things for which you are responsible. |
IBM Instana APM | Advanced Administering Environments with IBM Instana Observability | 1330 | ILT | In this course, you learn more about the basic architecture of IBM Instana and how to install various kinds of host agents in different modes. In addition, you learn how to optionally pin an agent to a specific version in case that is ever needed. You learn how to install agents on various platforms, such as a Docker, directly to the host, YAML, Operator, and Helm chart. This course also describes how to configure and instrument a website for End User Monitoring (EUM) along with a discussion about how to review website monitoring page metrics. You learn how to use the Web REST API to perform IBM Instana functions programmatically. And, since Instana is only capable of producing dashboards for a single Instana instance at a time, this course shows you how to integrate Grafana with one or more Instana instances to produce federated dashboards. |
IBM Tivoli | IBM Tivoli Network Manager IP Edition 4.2 Operations and Administration | 3330 | ILT | This course covers the installation, configuration, use, customization, integration of Tivoli Network Manager 4.2 with Network Operations Insight, and network monitoring using the Network Manager pollers. The workshop includes approximately 40% lecture and 60% hands-on exercises. The workshop begins with a basic overview of product components and their associated functions. You configure Tivoli Network Manager and perform a full discovery of simulated networks. To further understand the intricacies of the discovery cycle, you customize discovery by changing the behavior of finders and agents. You also learn to create real-time MIB graphs, control polling behavior, connect isolated networks through manual map editing, and use the reporting functions of IBM Tivoli Network Manager. You also learn to use the Network Health Dashboard and create custom dashboards. |
Data Mining | IBM Cloud Pak for Watson AIOps Installation | 670 | ILT | IBM Cloud Pak for Watson AIOps deploys advanced, explainable AI across the IT Operations (ITOps) toolchain so that you can confidently assess, diagnose, and resolve incidents across mission-critical workloads. IBM Cloud Pak for Watson AIOps brings the depth and breadth of IBM’s enterprise expertise to managing complex, mission-critical IT environments. IBM Cloud Pak for Watson AIOps helps you apply AI to IT operations to maximize efficiency, reduce costs, and maintain the resiliency and security you need to drive meaningful innovation. This course is designed to teach you how to install the IBM Cloud Pak for Watson AIOps. You also learn how to prepare your environment for installation and to perform some post-installation tasks. |
IBM Cloud | IBM Cloud Pak for Watson AIOps Administration | 670 | ILT | IBM Cloud Pak for Watson AIOps deploys advanced, explainable AI across the IT Operations (ITOps) toolchain so that you can confidently assess, diagnose, and resolve incidents across mission-critical workloads. IBM Cloud Pak for Watson AIOps brings the depth and breadth of IBM’s enterprise expertise to managing complex, mission-critical IT environments. IBM Cloud Pak for Watson AIOps helps you apply AI to IT operations to maximize efficiency, reduce costs, and maintain the resiliency and security you need to drive meaningful innovation. This course is designed to teach you how to perform important administration tasks for the IBM Cloud Pak for Watson AIOps platform, such as user management, troubleshooting, and self-monitoring. |
IBM Watson | IBM Event Manager Operations to reduce MTTR | 1330 | ILT | This course teaches you how to use the Event Manager component of IBM Cloud Pak for AIOps to view, categorize, understand, and resolve alarm conditions in your IT event to reduce the mean time to resolve (MTTR) those issues. |
IBM Cloud | Configuring IBM Cloud Pak for Watson AIOps Event Manager | 1330 | ILT | The Event Manager component of IBM Cloud Pak for Watson AIOps is a carrier-class service assurance system. It collects and consolidates events and alarms from a wide variety of IT environments in real time. These include servers, mainframes, Windows systems, applications, circuit switches, voice switches, IP routers, SNMP devices, network management applications, existing management systems and frameworks, among many others. IBM Cloud Pak for Watson AIOps Event Manager also adds intelligence to your events, allowing you to cast a wide net to ingest relevant data from any source, process it in an intelligent, automated way, analyze the data, see which applications or parts of the infrastructure are impacted, share it and even suggest guided steps to mitigate or resolve issues automatically.One key benefit of Event Manager's machine learning features is a reduction in the number of events. By detecting, correlating, grouping, and suppressing the 'noise' that IT systems generate, your operators can focus their attention on key events that represent actual problems. This 2-day course teaches you how to configure IBM Cloud Pak for Watson AIOps Event Manager for productive use. Through hands-on lab activities, you learn how to configure a new installation of Event Manager to:Connect to event sources and enrich incoming events. Apply machine learning to find relationships among eventsAdd topology data to identify groups of connected resources and calculate root causeCreate automated fixes for known problems and match them to incoming problem events .You also get hands-on practice with other common configuration tasks, such as user management and database customization. This course focuses on IBM Cloud Pak for Watson AIOps Event Manager running on the Red Hat OpenShift Container Platform. |
IBM Tivoli | IBM Netcool Operations Insight 1.6 - Implementation and Configuration | 2660 | ILT | In this course, you install and configure Netcool Operations Insight v1.6 base and Networks for Operations Insight. Features that you configure include event search, event analytics, and topology search. |
Miscellaneous | IBM Network Performance Insight 1.3.1 Installation and Configuration | 2660 | ILT | IBM Network Performance Insight is a network performance monitoring system. It offers real-time and historical trends in network performance and interactive views of network data that help reduce network downtime and optimize network performance. Network Performance Insight provides IBM Netcool Operations Insight with comprehensive IP network device performance monitoring and traffic analysis. In this 3-day course, you learn how to install IBM Network Performance Insight and integrate it with IBM Netcool Operations Insight. This course is lab-intensive, with an emphasis on hands-on exercises. If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms |
IBM Turbonomic | IBM Turbonomic ARM Foundations | 2660 | ILT | IBM Turbonomic ARM Foundations training is intended to help you better understand the Turbonomic approach and features of Turbonomic 8 to manage your full application stack. In this course, you learn how to assure application performance by using Turbonomic, navigate the user interface, and configure Turbonomic for the needs of your environment. You simulate 'what if'' scenarios using the Turbonomic platform, and learn how to maintain your instance of Turbonomic. Class scheduleFor a list of all Turbonomic upcoming course sessions and contact information, see: href='https://github.com/turbonomic/training/wiki'>https://github.com/turbonomic/training/wiki Contact informationInternal: [email protected]: [email protected] |
IBM Turbonomic | IBM Turbonomic Cloud ARM Master | 2660 | ILT | IBM Turbonomic Cloud ARM training takes you in-depth into how the Turbonomic ARM platform interacts with the worlds most broadly accepted public cloud technologies, such as AWS, Azure, and GCP. In this course, you learn how to reap the benefits of state-of-the-art automation of cloud datacenter performance and efficiency management via the Turbonomic platform. The course teaches you about the performance, location, and deployment details of your cloud workloads. You get single pane visibility of your entire cloud estate including scoped views to an account/subscription, a billing family, or a resource group. You learn about Turbonomic support for AWS and Azure Gov Clouds.You analyze your total cloud spend, cost of cloud services, as well as per account/subscription spending. You configure Turbonomic to honor scaling constraints for a unified catalog of cloud instances and consistent vertical resizing for Autoscaling Groups (in AWS) as well as Scale Sets (in Azure). You create policies for compliance, thereby making it safe to automate the scaling actions. You reduce cloud bill by deleting unattached volumes and scaling volumes to use the correct storage tier for your workloads, and configure Turbonomic to choose from the selected cloud storage tiers when scaling. You also learn about the cost and feasibility of migrating core applications to the cloud for flexibility and scale, and how to identify the right size of AWS database servers and Azure databases instances in your cloud environment.Class scheduleFor a list of all Turbonomic upcoming course sessions and contact information, see: href='https://github.com/turbonomic/training/wiki'>https://github.com/turbonomic/training/wiki Contact informationInternal: [email protected]: [email protected] |
IBM Turbonomic | IBM Turbonomic ARM PROfessional | 3330 | ILT | IBM Turbonomic ARM PROfessional training develops a deeper understanding of such advanced features as Kubernetes App Management, ServiceNow integration, Webhooks, Horizon VDI, using the Turbonomic API, and Advanced Reporting.Class scheduleFor a list of all Turbonomic upcoming course sessions and contact information, see: href='https://github.com/turbonomic/training/wiki'>https://github.com/turbonomic/training/wiki Contact informationInternal: [email protected]: [email protected] |
IBM APM Application Performance | IBM Control Desk 7.6 Foundations | 1330 | ILT | This course introduces you to the fundamental concepts of managing IT assets, service requests, and changes in your IT environment using IBM Control Desk. You learn how managing these processes with a unified solution provides significant advantages to your organization. Through instructor-led discussion, demonstrations, and hands-on labs, you learn how to plan a deployment, perform basic configuration, and navigate IBM Control Desk. |
IBM APM Application Performance | IBM Control Desk 7.6.0.2 Fundamentals | 1330 | ILT | This course introduces you to the fundamental concepts of managing IT assets, service requests, and changes in your IT environment using IBM Control Desk. You learn how managing these processes with a unified solution provides significant advantages to your organization. Through instructor-led discussion, demonstrations, and hands-on labs, you learn how to plan a deployment, perform basic configuration, and navigate IBM Control Desk. |
IBM APM Application Performance | IBM Control Desk 7.6 Service Request Management Fundamentals | 2000 | ILT | This course introduces you to the fundamental concepts of managing a Service Desk using IBM Control Desk. Through instructor-led discussion, demonstrations and hands-on labs, you learn how to create and resolve service requests, incidents and problems. You also learn to manage a service catalog, obtain user feedback through surveys, and generate reports. |
IBM APM Application Performance | IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management | 2000 | ILT | This course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed. |
IBM Spectrum | IBM Spectrum Protect version 8.1.12 Implementation and Administration | 3330 | ILT | IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention. This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. |
Cyber Security | IBM Spectrum Protect 8.1.13 Advanced Administration, Tuning, and Troubleshooting | 3330 | ILT | IBM Spectrum Protect is an enterprise data protection solution designed to help you streamline your data protection processing, reduce the cost of storage, and provide the flexibility and security to meet any service level agreement. IBM Spectrum Protect optimizes storage utilization by using incremental forever as well as block-level backup and replication, policy-based data management, and an intuitive interface, the Operations Center. In this course, you learn how the use of two or more Spectrum Protect servers provides more options for data movement in the environment, like replication to multiple targets. You also use IBM Cloud Object Storage to create a storage pool for backups and long-term retention. The bulk of the administrative tasks are performed using the Operations Center and Command Builder which provides a command line interface for all servers configured in the Operations Center. This course also includes scripting, performance tuning, protecting, and recovering the database and storage pools, and an introduction to IBM Spectrum Protect Plus. The hands-on exercises are performed on three different IBM Spectrum Protect servers, two on Windows, and one on Linux, with additional systems added to provide the IBM Cloud Object Storage environment. This course is the second in a two-course series. It is for Spectrum Protect administrators who are familiar with the daily management tasks on a single server, and focuses on incorporating more advanced features, including replication and use of cloud object storage. Basic concepts and installation are not covered in this course. TS619G, the first course in the series, IBM Spectrum Protect 8.1.12 Implementation and Administration, covers installation and basic administration of a single server. |
Cyber Security | IBM Spectrum Protect Plus 10.1.6 - Implementation and Administration | 2000 | ILT | In this three-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.6. You begin with a review of the software capabilities, requirements, and architecture. Then, through lecture and hands-on labs, you learn how to perform the various tasks required to configure the environment on an installed virtual appliance. You customize SLA policies and make use of available options to protect virtual machines and applications, as well as the IBM Spectrum Protect Plus catalog. You monitor and manage jobs, plan and prepare for disaster recovery, view log files, and create custom reports. |
Cyber Security | IBM Spectrum Protect Plus 10.1.8 Implementation and Administration | 2660 | ILT | In this four-day course, you learn about installation, configuration and administration of IBM Spectrum Protect Plus v10.1.8. This begins with a review of the software features and functions, and the basic requirements, including architecture and data movement, and upgrade of the various components. Then, through lecture and hands-on labs, you learn how to deploy an environment as a virtual appliance or as a set of containers. You add providers and create customized SLA policies with options. You associate providers with policy to protect data in file systems and virtual machines, a variety of applications and databases, and Kubernetes and OpenShift containers. You configure and manage user access to the system and to the providers you protect. You manage jobs, plan and prepare for disaster recovery, view log files for monitoring and troubleshooting, and create custom reports. |
IBM Tivoli | IBM Directory Server 6.4 Fundamentals | 1330 | ILT | This course describes the processes, procedures, and practices necessary to configure and administer IBM Directory Server. During the hand-on exercises, students will perform basic Directory Server configuration, setup replication, use logs and problem determination tools to troubleshoot directory server.Students will not only learn about the components, functions, and features that are part of the directory server, but will learn about typical deployment scenarios of the directory server, as well. |
Cyber Security | IBM Security Verify Access Foundations | 2000 | ILT | IBM Security Verify Access* helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. *Note: this course is based upon IBM Security Verify Access v10.x. |
IBM Tivoli | IBM Workload Scheduler 9.4 Administration | 1330 | ILT | This course teaches the administrative functions necessary to plan, install, configure, maintain, and troubleshoot an IBM Workload Scheduler 9.4 network. This course includes an in-depth look at designing an IBM Workload Scheduler network architecture, background processes in Workload Scheduler, workstation and network configuration options, workload production cycle and processing, effective use of Workload Scheduler security, and techniques for Identifying and resolving common problems. Hands-on lab exercises include planning a network, defining workstations and domains, and installing and configuring Workload Scheduler components. |
IBM Tivoli | IBM Workload Scheduler 9.4 Operations and Scheduling | 2000 | ILT | This course introduces IBM Workload Scheduler features, environment, and terminology. You learn about distributed environments and how to use both the Dynamic Workload Console and command-line interfaces with Workload Scheduler. You monitor production workflow and create a production day plan. Production workflow consists of job and job stream instances, designed with plan objects. You manage changes to objects, the plan, jobs, events, and job streams. You optimize production workflow and troubleshoot plan problems. You also learn to use Workload Scheduler with classic batch scheduling and dynamic and event-driven workloads. |
IBM Watson | Basics of Intelligent Document Processing with IBM Watson Discovery | 670 | ILT | This course introduces you to common NLP tasks, Smart Document Understanding, customization of the query results, teach the domain language to Watson Discovery to improve the relevancy and accuracy of the results. Watson Discovery is a cognitive search and content analytics engine that you can add to applications to identify patterns, trends, and actionable insights to drive better decision-making. |
Internet of Things | Creating, Testing, and Deploying Machine Learning Models with IBM Watson Studio | 670 | ILT | This course takes the data scientist (or business analyst) on a journey from the creation of several machine learning models to its deployment and testing. Various tools and services as well as programming and graphical user interfaces are used in the process. The course ends with the sharing of assets on GitHub and a brief discussion on governance and stewardship. |
Internet of Things | Advanced Intelligent Document Processing with IBM Watson Discovery | 670 | ILT | Advanced Document Search with IBM Watson Discovery explores intelligent document processing at a deeper level. You learn how to create regular expressions, import rule-based models, customize query results, conduct web crawling, and teach the domain language to Watson Discovery to enhance the relevance and accuracy of your results. |
Internet of Things | Quickly Build and Train Machine Learning Models with IBM AutoAI | 670 | ILT | Quickly build and train machine learning models with Watson AutoAI aims to familiarize data science and analytics professionals with the fundamentals of theWatson Studio’s AutoAI tool. The course walks users through the process of creatingIBM Cloud projects, and building and evaluating AutoAI experiments for various supervised machine learning use cases. The lab environment for this course uses IBM Cloud. |
Internet of Things | Learn the Basics of Machine Learning with IBM Watson Studio | 670 | ILT | This course introduces a case study, data set, machine learning concepts, and developing a machine learning model with Watson Studio.Initially, you will be introduced to the case study and the challenges company facing, and the company data set. Next, you will be introduced to supervised, unsupervised learning, deep and reinforcement learning algorithms. Finally, you will develop a supervised machine learning model IBM Watson Studio with the dataset provided using Python. |
Internet of Things | Creating Voice Interfaces with Watson Speech to Text and Text to Speech | 670 | ILT | An emerging trend in AI is the availability of technologies that add speech capabilities by enabling fast and accurate speech transcription in multiple languages for various use cases, including but not limited to customer self-service, agent assistance and speech analytics. This course takes the learners through applying IBM Watson Speech to Text and Text to Speech technology for their unique use case. The course starts by explaining at a high level some common business use cases for Watson Speech Services and the underlying science behind the technology of Watson Speech to Text and Text to Speech as developed by IBM, leverage the API methods for calling Speech services, customize, and deploy speech prototypes to suit your unique domain language and finally the course will end by integrating voice capabilities to an existing agent Watson Assistant using Watson Speech to Text and Text to Speech. |
Internet of Things | Preparation and Transformation of Data with IBM Data Refinery | 670 | ILT | Preparation and transformation of data with IBM Data Refinery is the third course in the learning path for professional data scientists that are working with the IBM Cloud Pak for Data platform. The course aims to familiarize data scientists with the data cleansing, and data shaping capabilities of the Data Refinery tool. Data Refinery saves preparation time by quickly transforming large amounts of raw data into consumable, high-quality information that's ready for analytics.Learners follow the story of Sara (the data scientist), Muneiza (the data engineer), Liam (the data steward), and Tim (the data quality analyst) working in the Data Analytics department of a large health products company. The company plans a marketing campaign around coupons that are issued to customers and wants to better understand customer behavior. But they first need to access and prepare the relevant data for analytics. The team will mainly use IBM Data Refinery for this task.Follow along with Sara, Muneiza, Liam, and Timâs story as learners create a suitable data set ready for analytics. Learners verify their acquired knowledge by completing several hands-on lab exercises in a remote classroom environment (provided to each learner during the course introduction). |
Internet of Things | Building Intelligent Virtual Agents with IBM Watson Assistant | 670 | ILT | Building Intelligent Virtual Agents with IBM Watson Assistant aims to equip nontechnical business users with the skills and experience to build and launch their own intelligent virtual agent with IBM Watson Assistant. The course walks users through the process of planning, and then building, a virtual agent. You learn to create basic and advanced conversational flows that fulfill users’ requests, leverage out of the box artificial intelligence features, and tie into analytics dashboards for monitoring and troubleshooting. The lab environment for this course uses IBM Cloud. |
IBM WebSphere | Administering WebSphere Application Server Liberty Profile V9 | 1330 | ILT | This course teaches you the skills that are needed to manage Liberty servers and collectives.The course is designed for application server administrators. You learn how to use the graphical Admin Center and the command line scripting to manage servers from a collective controller. The course also covers how to deploy a cluster of packaged servers for Liberty runtimes, view the deployment environment, and view basic performance metrics.You learn how to use the Dynamic Routing feature of Liberty to enable routing of HTTP requests to collective members. You also configure the auto-scaling and health management features for Liberty.Finally, you learn how to secure Liberty and enable SSL communication in Liberty. |
IBM WebSphere | WebSphere Application Server V9 Administration | 2000 | ILT | This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 in a single-server environment. You learn how to deploy enterprise Java applications in a single computer configuration. In addition, you learn how to work with features of WebSphere Application Server V9, such as the wsadmin scripting interface, security, and performance monitoring.Hands-on exercises throughout the course give you practical experience with the skills you develop in the lectures. |
IBM WebSphere | WebSphere Application Server V9 Administration in a Federated Environment | 1330 | ILT | This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practical experience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. |
IBM WebSphere | Transforming Applications with IBM WebSphere Hybrid Edition | 1330 | ILT | This course teaches students how to transform traditional (monolithic) WebSphere applications to run in a containerized environment–Red Hat OpenShift–by using WebSphere Hybrid Edition. It covers two key reference implementations: Operational Modernization: Repackage the application to deploy in a container while maintaining the monolithic architecture. This solution does not require changes to the application or runtime. It uses Transformation Advisor (part of WebSphere Hybrid Edition) to assess the application, and the Runtime Operator to manage the containerized application on Red Hat OpenShift. Runtime Modernization: Update the application to run on Open Liberty, a modern cloud-native runtime. Modernize some aspects of the application by taking advantage of MicroProfile specifications. This solution uses Transformation Advisor (part of WebSphere Hybrid Edition), and the Open Liberty Operator to deploy and manage the modernized application on Red Hat OpenShift. |
IBM WebSphere | WebSphere Application Server V8.5.5 Administration | 3330 | ILT | An updated version of this course is available. For more information, click WebSphere Application Server V9 Administration (WA590G).This course is also available as self-paced virtual (e-learning) course WebSphere Application Server V8.5.5 Administration (ZA855G). Please note that this option does not require any travel.This course teaches you the skills that are needed to install and administer IBM WebSphere Application Server V8.5.5. This release offers users enhanced support for standards, emerging technology, and a choice of development frameworks.In this course, you learn how to install, configure, and maintain IBM WebSphere Application Server V8.5.5 base, Network Deployment (ND), and the Liberty profile. You learn how to deploy enterprise Java applications in a single computer or clustered configuration. In addition, you learn how to work with features of WebSphere Application Server V8.5.5, such as IBM Installation Manager, WebSphere Customization Toolbox, security enhancements, Intelligent Management, and centralized installation.Throughout the course, hands-on exercises and demonstrations reinforce lecture content and give you practical experience with WebSphere Application Server V8.5.5. You complete tasks such as installing and assembling applications, applying problem determination techniques, configuring a clustered environment, and working with fine-grained administrative security. |
IBM Operational Decision Manager | Managing Decisions in IBM Operational Decision Manager V8.9 | 3330 | ILT | This course is also available as self-paced virtual (e-learning) course Managing Decisions in IBM Operational Decision Manager V8.9 (ZB401G). This option does not require any travel.This course introduces business analysts to IBM Operational Decision Manager V8.9. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager.IBM Operational Decision Manager provides a complete platform for managing business rules by helping to automate and govern decisions across processes and applications. This course focuses on the iterative nature of working collaboratively with business policy experts and development teams on rule projects. Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Operational Decision Manager. You also receive intensive training in modeling business rule vocabulary, rule discovery, rule authoring, and rule governance and management. The course uses realistic scenarios and a case study to illustrate the principles and good practices for discovering, analyzing, and authoring business rules.The lab environment for this course uses Windows 2012 Server R2 Standard.For information about other related courses, see the IBM Training website:ibm.com/training |
IBM Operational Decision Manager | Developing Rule Solutions in IBM Operational Decision Manager V8.10.5 | 3330 | ILT | This course introduces developers to IBM Operational Decision Manager V8.10.5. It teaches you how to design, develop, and integrate a business rule solution with Operational Decision Manager.The course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server Rules, which is the primary working environment for developers. You learn how to support your business users by setting up the rule authoring environment and object models that are required to execute rule artifacts. You also work with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You learn how to manage ruleset deployment and execution, and work extensively with Rule Execution Server. And, you learn how Operational Decision Manager features support decision governance so that it can be implemented in your organization. |
IBM Operational Decision Manager | Developing Decision Services in IBM Operational Decision Manager–I | 1330 | ILT | This course teaches developers to how to design and develop decision services with IBM Operational Decision Manager 8.11.1.The course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.Through hands-on exercises, you learn how to design decision services and implement object models in Rule Designer. You learn how to support business users by setting up the rule authoring environment. And you enable rule testing and simulation so business users can ensure that their rulesets produce the correct outcome.The lab environment for this course uses Windows Server 2019 Standard. |
IBM Operational Decision Manager | Fundamentals of IBM Operational Decision Manager | 670 | ILT | This course introduces solution architects to IBM Operational Decision Manager 8.10.5. Through presentations and hands-on labs, you learn about the core features of the ODM environments for developers and business users. You learn how to capture decision service requirements through models and how decision services can be integrated in a production environment. This course is a subset of the 5 day course: href='https://www.ibm.com/training/course/WB404G'>Developing Rule Solutions in IBM Operational Decision Manager 8.10.5 (Course code: WB404/ZB404). Developers who need in-depth training with Operational Decision Manager should take WB404/ZB404. |
IBM Cloud | IBM Cloud Pak for Business Automation - Installation and Administration | 2000 | ILT | This course provides technical professionals with the needed skills to install IBM Cloud Pak for Business Automation capabilities. It also teaches the IBM Cloud Pak for Business Automation administration and troubleshooting tasks.The course begins with an introduction to IBM Cloud Pak for Business Automation (CP4BA). You learn about different CP4BA installation methods.You configure the custom resource (CR) file for Business Automation Navigator (BAN), deploy, and verify that all the prerequisites are configured correctly. You learn how to deploy the CP4BA capabilities such as FileNet Content Manager, Business Automation Studio, Business Automation Workflow, Business Automation Insights, and Operational Decision Manager. For each of the CP4BA capabilities, you verify the associated end points.You manage dashboard security for CP4BA. You explore the Red Hat OpenShift Container Platform (RHOCP) web console for container management such as Cluster Inventory, Events, CPU, and Memory. You examine the available open-source monitoring options such as Metrics, Alerts, and Dashboards. You also scale the application deployment.To troubleshoot common Cloud Pak cluster problems, you get information and logs for nodes, cluster, and pods. You view the logs for pods by running commands and also examine the logs in the RHOCP console. You learn how to troubleshoot the Container Engine and the pods that fail to start. You learn how to collect MustGather files for submitting it to IBM Support team for troubleshooting. |
IBM Business Automation Workflow | Developing Workflow Solutions using IBM Business Automation Workflow V20.0.0.1 | 3330 | ILT | This course integrates training in business process management (BPM) methods and implementation with IBM Business Automation Workflow V20. You learn core process modeling and implementation skills, the project development approach, process model implementation fundamentals, and delivery patterns. These skills improve the speed and quality of implementing an executable process. The course uses an interactive learning environment, with class review questions to reinforce concepts and check understanding. Lab exercises throughout the course provide hands-on experience with IBM tools. This course is intended to be collaborative, and you can work in teams to complete class activities. IBM Business Automation Workflow is a comprehensive environment that provides the visibility and insight that is required to effectively manage the business processes of an organization. The course begins with an overview of the product and then covers business process management, emphasizing the concepts of reuse, ease of maintenance, and high-quality development strategies. You create a structured process using IBM Process Designer from business requirements that are identified during process analysis. You learn how to make team collaboration more efficient by using standard Business Process Model and Notation (BPMN) elements. The course provides an overview of the architecture of IBM Business Automation Workflow and describes the use of process applications and toolkits within the tool. You create business objects and variables, implement gateways, and demonstrate process flow on your diagrams. You build customized user interfaces (coaches) to enable business and process data flows throughout the process model. |
IBM Business Automation Workflow | Developing Case Management Solutions using IBM Business Automation Workflow V20.0.0.2 | 3330 | ILT | This course provides technical professionals with the needed skills to develop Case Management solutions in IBM Business Automation Workflow. The course begins with an introduction to IBM Business Automation Workflow (BAW). You learn about BAW capabilities, case management concepts, architecture, and the benefits of using IBM Business Automation Workflow on Cloud. You manage cases in the BAW Case Client. You learn about the case solution design and build and deploy your first case solution. You export and import case solutions. You define various case objects such as properties, choice lists, roles, business objects, and case types. You create To-do Tasks and Container activities, and implement preconditions and Sets to manage activities. You create custom property views for case pages. You model BPM processes for case activities and create client-side human services. You create case stages and manage the stages manually and automatically with process JavaScript API. This course teaches how to create custom pages and implement Free Form page layout and utility widgets. You configure the Calendar widget, subscribe to external calendars, and create and view quick tasks in the Calendar widget. You customize the toolbar and menu for a case page, wire two widgets together, and implement Script Adapter widgets to transform data. This course teaches how to promote an existing case solution to a workflow project and to integrate an existing BPM process in a case solution. You create, apply, and export a security configuration for a case solution. Through instructor-led presentations and hands-on lab exercises, you learn about the core features of IBM Business Automation Workflow case management. |
IBM Automation | Fundamentals of IBM Business Automation Workflow: Developing Workflow Solutions | 670 | ILT | This course introduces solution architects to the workflow capabilities in IBM Business Automation Workflow. In this course you learn how to model processes and decompose activities into nested processes. You learn the core notation elements of Business Process Model and Notation (BPMN) and examine a set of detailed process requirements and identify the activities and roles involved. You translate process discovery analysis into a workflow. You model the workflow in Process Designer and create a linked process. You implement the workflow model by building business objects, variables, services, and user interfaces (coaches). This course is a subset of the 5 day course: href='https://www.ibm.com/training/course/WB835G'>Developing workflow solutions using IBM Business Automation Workflow 20.0.0.1(Course code: WB835). Developers who need in-depth training with Business Automation workflow should take WB835. |
IBM Automation | Fundamentals of IBM Business Automation Workflow: Developing Case Management Solutions | 670 | ILT | This course introduces solution architects to the case management solutions in IBM Business Automation Workflow. The course begins with an introduction to IBM Business Automation Workflow (BAW). You learn about BAW capabilities, case management concepts, architecture, and the benefits of using IBM Business Automation Workflow on Cloud. You manage cases in the BAW Case Client for an existing case solution.You learn about the case solution design. You build, deploy, export, and import a simple case solution. The course introduces you to the Case Management key features such as objects, activities, stages, and security configuration for a case solution. It also introduces you to customizing case pages and integrating BPM processes in case solutions.Through instructor-led presentations and hands-on lab exercises, you learn about the basics of IBM Business Automation Workflow case management. This course is a subset of the 5 day course: href='https://www.ibm.com/training/course/WB836G'>Developing Case Management Solutions using IBM Business Automation Workflow 20.0.0.1(Course code: WB836 / ZB836). Developers who need in-depth training with Business Automation workflow should take WB836. |
Data Mining | Fundamentals of IBM Process Mining | 670 | ILT | This course introduces you to IBM Process Mining and how to use it to perform process and data analysis. You learn the differences between process mining and task mining, the different types of process mining, use cases, and how process mining is performed. You learn how to use IBM Process Mining to import a data source, map data, and visualize a process. You learn how to plan a process mining project. You learn how to evaluate a process for potential candidates for Robotic Process Automation. You learn advanced data preparation and transformation concepts and how to evaluate a multi-level process for maverick buying patterns. You also leverage the simulation capabilities of the product to simulate a Blueworks Live BPMN process. The lab environment for this course uses a trial environment. Access to the trial environment is strictly limited to 30 days with no possibility of an extension. Before you enroll, make sure that you can complete the lab within the 30-day period. |
IBM Business Process Manager | Developing with Integration Designer in IBM Business Process Manager V8.6 - I | 3330 | ILT | This course is also available as self-paced virtual (e-learning) course Developing with Integration Designer in IBM Business Process Manager V8.6 - I (ZB872G). This option does not require any travel.IBM Process Server supports a service-oriented architecture (SOA) by providing a platform for using diverse technologies to integrate business applications. In this course, you learn how IBM Process Server enables business integration applications to define business logic and processes based on Web Services Business Process Execution Language (WS-BPEL), and business rules. In the intensive hands-on lab exercises, you design, develop, and test a comprehensive business integration solution. You use the IBM Integration Designer tool to create business integration solutions by using the Service Component Architecture (SCA) programming model, the Service Data Objects (SDO) data model, and the mediation flow programming model. |
IBM WebSphere | Development and Administration of Applications with IBM Business Monitor V8.5.7 | 2660 | ILT | This course is also available as self-paced virtual (e-learning) course Development and Administration of Applications with IBM Business Monitor V8.5.7 (ZB896G). This option does not require any travel.IBM Business Monitor is a business activity monitoring (BAM) product that supports BPM by measuring business performance, monitoring, and reporting on business transactions. This course includes topics of interest for students who want to use the IBM Business Monitor environment to develop applications.In this course, you learn how to develop, implement, and test IBM Business Monitor applications so that you can generate real-time business views of enterprise data. The course begins with an overview of BAM and BPM, and the capabilities that IBM Business Monitor provides. In subsequent units, you learn how to build monitor models, establish performance metrics, monitor events, manage action services, and build a business space dashboard. You also learn how to enable events from various sources, including using BPEL and BPMN processes from IBM Business Process Manager Advanced and IBM Integration Bus. Finally, you learn how to monitor events from JMS emitter and REST emitter sources. You also learn some basic administration and maintenance capabilities of IBM Business Monitor.From the hands-on exercises that are provided throughout the course, you develop and implement a monitoring solution. The exercises include how to use the various components of IBM Business Monitor, such as the IBM Cognos Business Intelligence and the Monitor development toolkit, for reporting and dimensional analysis along with WebSphere Application Server. You use the Monitor development toolkit to develop a monitor model, and then use the IBM Integration Designer to test the model. You also build customized business space dashboards that can be used to analyze and troubleshoot process performance. |
IBM API Connect | Create, Secure, and Publish APIs with IBM API Connect 10 | 3330 | ILT | This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. |
IBM DataPower | Essentials of Service Development for IBM DataPower Gateway V7.5 | 2000 | ILT | This course is also available as self-paced virtual (e-learning) course Essentials of Service Development for IBM DataPower Gateway V7.5 (ZE751G). This course teaches you the essential skills that are required to configure, implement, and troubleshoot services that are developed on the IBM DataPower Gateways (IDG) with firmware version 7.5.0, regardless of use case.The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its XML and web services deployments, and extend the capabilities of its service-oriented architecture (SOA) infrastructure. The gateways also extend these capabilities into the JSON, REST, and Mobile application areas.Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to develop and debug services that are implemented on the DataPower gateways. These skills include WebGUI and Blueprint Console navigation, service type selection, basic multi-protocol gateway configuration, creating and using cryptographic objects, and configuring SSL connections. You also learn how to use various problem determination tools such as logs, monitors, and probes, and techniques for testing DataPower services and handling errors.Hands-on exercises give you experience working directly with a DataPower Gateway. The exercises focus on skills such as creating multi-protocol gateways, working with cryptographic and SSL objects, configuring service level monitoring, troubleshooting services, handling errors in a service policy, and deploying a service from a pattern. |
IBM DataPower | Supporting REST and JOSE in IBM DataPower Gateway V7.5 | 670 | ILT | This course teaches you the developer skills that are required to configure and implement services that support REST-based traffic and JOSE-based signatures and encryption on the IBM DataPower Gateways (IDG) with firmware version 7.5.1.The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its JSON, XML, web services, and REST deployments. For JSON payloads, DataPower supports digital signatures and encryption that conform to the JSON Object Signing and Encryption (JOSE) specification.Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to use the configuration options, processing actions, and GatewayScript to support REST-based message traffic. To protect JSON message payloads, you use JSON Web Signature (JWS) and JSON Web Encryption (JWE) actions in the processing policy of a service.Hands-on exercises give you experience working directly with a DataPower gateway. The exercises focus on skills such as selecting request and response types, using the HTTP method criteria in a matching rule, style sheet and GatewayScript transforms, GatewayScript CLI debugging, signing JSON payloads, and encrypting JSON payloads. |
IBM DataPower | AAA, OAuth, and OIDC in IBM DataPower V7.5 | 670 | ILT | This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols, and can provide an OAuth web token service.OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.In this course, you learn how to use the configuration options and processing actions to add the AAA support to a service, implement an OAuth 2.0 scenario, and add OIDC support.Hands-on exercises give you experience working directly with an IBM DataPower gateway. The exercises focus on skills such as configuring a AAA action, configuring a web token service, and creating an OIDC client. |
IBM DataPower | Web Services Support in IBM DataPower V7.5 | 670 | ILT | This course teaches you the developer skills that are required to configure WS-Security features and use WSDLs to generate web service proxy services on IBM DataPower Gateway V7.5.The initial focus of DataPower was on XML and web services workloads, and it continues that support today. As part of that support, DataPower provides the ability to digitally sign and encrypt a message, validate a messages signature, and decrypt an encrypted message. These functions are delivered as processing actions within the service policy. In this course, you learn about these message integrity and confidentiality capabilities, and practice using them in a lab exercise.Web service operations typically work with WSDL files. DataPower generates a web service proxy directly from a WSDL, bypassing much of the basic configuration of a service to support that WSDL. This course also covers this service type of web service proxy, and gives you an opportunity to work with one in a lab exercise. |
IBM FileNet | IBM FileNet P8 Platform 5.5.x Building and Configuring an Object Store | 1330 | ILT | This course provides technical professionals with the needed skills to build and configure an object store. It teaches you how to work with an IBM FileNet Content Manager repository.The course begins with an introduction to IBM Cloud Pak for Business Automation. You learn about IBM FileNet Content Manager container environment, features, and architecture. You create an object store in Administration Console for Content Platform Engine and configure it in the IBM Navigator administration desktop to make the repository accessible to business users.You learn how to create storage areas and storage policies to store the repository content. You define choice lists and property templates to use it for the object classes metadata. You define custom Document classes and Folder classes to organize the documents. This course introduces security concepts for the IBM FileNet P8 assets. You create events and subscriptions to initiate your custom code or actions that are invoked when you create or modify the repository objects.You use Content Services GraphQL to retrieve, create, and edit the Content Platform Engine objects. |
Data Storage | IBM Datacap 9.0.1: Configuration and Administration | 2660 | ILT | This course is also available as self-paced virtual (e-learning) course IBM Datacap 9.0.1: Configuration and Administration (ZF262G). This option does not require any travel. This course shows you how to configure IBM Datacap and its components on a multi-system setup. You also learn about IBM Datacap Navigator configuration, system administration, and maintenance. |
IBM Content Navigator | IBM Content Navigator Administration V3.0.6 | 2660 | ILT | This course is also available as self-paced virtual (e-learning) course IBM Content Navigator Administration V3.0.6 (ZF270G). This option does not require any travel. This course provides technical professionals with the skills that are needed to configure, customize, and administer the IBM Content Navigator web client for IBM FileNet Content Manager. The course begins with an introduction to IBM Content Navigator. You learn how to view, add, modify, and search for content in the web client. You learn how to connect to repositories, create new desktops, define cross-repository searches, create teamspace, configure IBM Content Navigator Sync services and Edit services client, define role-based redactions, and build entry templates. You also configure external share to securely share documents with users outside of your organization. You learn how to customize the desktop appearance, modify menus, icons, and labels, create a viewer map, and register a plug-in. IBM Content Navigator can be used to manage content from different types of repositories such as IBM FileNet Content Manager, IBM Content Manager, IBM Content Manager OnDemand, CMIS, and Box. This course focuses on IBM FileNet Content Manager. Through instructor-led presentations and hands-on lab exercises, you learn about the core features of IBM Content Navigator. The lab environment for this course uses Windows Server 2016 Standard Edition. |
IBM Datacap | Developing Applications in IBM Datacap V9.1.7 | 2660 | ILT | This course provides technical professionals with the skills that are needed to build Datacap applications. The course begins with an introduction to IBM Datacap. You learn about capture concepts, Datacap process, page identification methods, and architecture. You process batches for Datacap applications in the Datacap clients.You learn about the design and components of a Datacap application. You build a Datacap application by using Forms Template in Datacap Studio and configure it. You learn how to troubleshoot a Datacap application. You configure a Datacap application to process documents of multiple page types in a single batch. You implement OCR and OMR to extract data from data fields and from multiple choice check boxes. You export data to a text file and also to an IBM FileNet Content Manager repository.You build page layouts, create virtual page blocks, and extract data from tables and label-value pairs.Through instructor-led presentations and hands-on lab exercises, you learn about the core features of IBM Datacap. |
IBM WebSphere | Technical Introduction to IBM MQ | 670 | ILT | In this course, you learn about IBM MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options.For information about other related courses, see the IBM Training website:ibm.com/training |
IBM WebSphere | IBM MQ V9 System Administration (using Windows for labs) | 2660 | ILT | This course provides technical professionals with the skills that are needed to administer IBM MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content. The lab exercises use IBM MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination.Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. |
IBM WebSphere | IBM MQ V9 System Administration (using Linux for labs) | 2660 | ILT | This course provides technical professionals with the skills that are needed to administer IBM MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content. The lab exercises use IBM MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination.Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. |
IBM WebSphere | IBM MQ V9.1 System Administration (using Windows for labs) | 3330 | ILT | This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel. This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. |
Application Developers | Fundamentals of IBM MQ | 670 | ILT | This course begins with a review of IBM MQ features and components. Installation options and methods are discussed. You learn the role of the administrator and the tools provided to perform administrative techniques. You learn how queues and queue managers work, the types of queues, and how they are used in the MQ environment. You are introduced to the communication between queue managers and an application and a queue manager.MQ has many features, functions, and options. In this introduction to solution architects, a few of these are discussed. Among the select key features architects are introduced to include distributed queuing, handling undeliverable messages, how publishing and subscriptions work in MQ, and development options for creating custom application that connect to IBM MQ.Through hands-on exercises, you become familiar with IBM MQ. You learn to install IBM MQ, create a queue manager and queue, and test messaging. You are introduced to the IBM MQ administration tools to create and manage queue managers, queues, and work with messages. You learn to work with MQ script commands and command files.This course is a subset of the 5-day course: IBM MQ V9.1 System Administration (ZM156). Developers who need in-depth training with IBM MQ should take ZM156. Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. For information about other related courses, see the IBM Training website:ibm.com/training |
IBM WebSphere | IBM MQ V9 Advanced System Administration (Distributed) | 2660 | ILT | This course is also available as self-paced virtual (e-learning) course IBM MQ V9 Advanced System Administration (Distributed) (ZM213G). This option does not require any travel.This course expands the basic skill sets that are developed in courses WM103/ZM103, Technical Introduction to IBM MQ, and WM153/ZM153, IBM MQ V9 System Administration (using Windows for labs) or WM154, IBM MQ V9 System Administration (using Linux for labs).The course focuses on advanced features of IBM MQ, such as implementing workload management by using a queue manager cluster, and authenticating connections, channels, and users. It also covers securing channels with Transport Layer Security (TLS), advanced client connection features, event and message monitoring, and publish/subscribe administration.In addition to the instructor-led lectures, you participate in hands-on lab exercises that reinforce lecture content. The lab exercises give you practical experience with tasks such as implementing security, configuring workload management for a queue manager cluster, and advanced troubleshooting techniques.Completing this course can also help you prepare for the appropriate IBM MQ Administrator certifications. |
IBM WebSphere | Designing, Implementing, and Managing IBM MQ V9 Clusters | 2000 | ILT | This course prepares you to plan, design, configure, and administer IBM MQ clusters.After a review of IBM MQ, the course explains the similarities and differences between administration of a cluster and administration of a distributed message IBM MQ environment. You learn cluster specific commands and procedures, and explore the role of a cluster in a highly available IBM MQ infrastructure. You learn how to do a detailed verification of a new cluster configuration, review and identify all resulting components, and troubleshoot problems.You also learn about cluster administration, workload balancing, security, and use of publish/subscribe clusters. You learn how to recognize when a problem is due to connection authentication, channel authentication, or object authorizations. You also learn about design options such as overlapping clusters and use of clusters with z/OS queue sharing groups. Many of the considerations in this course are based on actual engagement experiences. |
IBM WebSphere | IBM MQ V8 System Administration for z/OS | 2660 | ILT | This course provides the skills that are necessary to configure and manage an IBM MQ V8 queue manager on z/OS.Through lectures and hands-on lab exercises, you learn how to install, customize, operate, and administer IBM MQ V8. The course covers configuring a z/OS queue manager, setting up distributed queuing, IBM MQ clustering, IBM MQ on z/OS recovery and restart, security, and performance considerations. It also covers day-to-day administration and problem recovery. The hands-on lab exercises give you direct experience with IBM MQ V8 tasks such as defining and monitoring channels, configuring IBM MQ clusters, and problem determination activities. |
Application Developers | IBM MQ V8 Advanced System Administration for z/OS | 2660 | ILT | This course focuses on advanced IBM MQ for z/OS skills. After a baseline of IBM MQ topics, the course continues with channel security, the need to use TLS ciphers in response to current security threats, and channel authorization rules. The course also covers queue-sharing groups, queue-sharing group updates, and distributed and intra-group queuing with queue-sharing groups. Other topics include the 8-byte relative byte address and buffers above the 2-GB bar features of IBM MQ V8, the use of IBM MQ accounting and statistics, how to capture and review information to resolve or mitigate performance and capacity problems, and how to create application profiles. Hands-on lab exercises throughout the course reinforce the lectures and provide familiarity with advanced tasks and updated capabilities. |
Skunkworks (Pty) Ltd, Johannesburg, South Africa
📞: +27 (12) 883 3663 | 📧: [email protected]
© 2023 Skunkworks (Pty) Ltd. All rights reserved.