6 Courses:

  • IBM Access Manager Platform Foundations

    IBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures user experiences with single sign-on across applications and protects critical assets using strong multi-factor authentication and risk-based access. Use IBM Access Manager to adopt secure...

    Delivery Method: Live Virtual

    Details

  • IBM BigInsights Foundation

    This training course is for those who want a foundation of IBM BigInsights and consists of two separate modules. The first module is an IBM BigInsights overview and gives participants an overview of IBM's big data strategy as well as a why it is important to understand and use big data. It will...

    Delivery Method: Live Virtual

    Details

  • IBM Cloud Fundamentals

    This course will prepare participants for the Foundations of IBM Cloud V1 examination. Participants learn how to demonstrate their basic skills on the infrastructure, network, compute, development, deployment, and the operational capabilities of IBM Cloud. Participants will learn concepts essential...

    Delivery Method: Live Virtual

    Details

  • IBM Cognos Report Studio Fundamentals

    IBM Cognos Report Studio Fundamentals is designed for professional report authors using IBM Cognos versions 10.2 and 10.2.2. In this course, participants will learn report building techniques using relational data models and methods of enhancing, customizing, and managing professional reports. The...

    Delivery Method: Live Virtual

    Details

  • IBM i System Administration

    In this course, participants learn how to plan for, implement, and manage the ongoing operations of an IBM i. Emphasis is on security, system availability, backup and recovery, system software management, and problem determination. Also, participants get an introduction to the architecture and...

    Delivery Method: Live Virtual

    Details

  • IBM QRadar SIEM Foundations

    IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses. In this...

    Delivery Method: Live Virtual

    Details