Duration 2 Days 12 CPD hours This course is intended for Application consultants, Business Analysts, Executives, Technology Consultants, Users Overview By the end of this course, students will be able to:Explain SAP LumiraCreate documents and acquire dataPrepare datasetsVisualize dataShare stories In this course, students will learn how to create stunning and interactive visualizations by choosing a rich library of visualization types, ranging from scatter plots, heat and geo maps to tag clouds, box plots and network charts. Course Outline Positioning and Overview of SAP Lumira Discovery Navigating the BI Launchpad Acquiring Data Enrich the Dataset Create Visualizations Create a Story Sharing Options Using the Lumira Discovery Formula Editor Additional Data Sources Data Mashups
Duration 3 Days 18 CPD hours This course is intended for This advanced course is for IT professionals tasked with administering a Spectrum Scale system. Overview Please see Overview This course is intended for IT professionals tasked with administering a Spectrum Scale system. It includes information on installing, configuring and monitoring a Spectrum Scale cluster. Migrating to IBM Spectrum Scale 4.2Spectrum Scale 4.2 GUIMulti-clusterClustered NFSCluster Export Services for multi-protocol supportSMB Protocol SupportNFS Support in CES; Ganesha overview/performanceActive File ManagementAFM-Based Disaster Recovery (DR) and Asynchronous DRPlanning LTFS and GPFS environment for data archivingFile Placement OptimizerIBM© GPFS-FPO and integration with GPFS Hadoop connectorIBM© Spectrum Scale Call HomeMonitoring and performance tuningFlash Cache metadata migration
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for all computer professionals who will use z/OS UNIX. Overview Discuss the role of z/OS in an open systems environmentIdentify the basic terms used in z/OS UNIXDefine the components of z/OS UNIXExplain major functions provided in z/OS UNIXDiscuss opportunities for applications in a z/OS UNIX environmentIdentify z/OS base elements and optional features that make up z/OS UNIXUse the two interactive interfaces available to access the services This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. Day 1 Welcome and introduction Unit 1. z/OS UNIX overview Unit 2. Introduction to z/OS UNIX Unit 3. Hierarchical file system Exercises Day 2 Unit 4. z/OS UNIX shell and utilities Unit 5. z/OS UNIX shell commands Unit 6. Working with the shell Unit 7. Functions in z/OS UNIX Exercises Day 3 Unit 8. Working with the z/OS UNIX environment Exercises
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL Server administrators who work in a Windows network environment. At least one year of experience administering SQL Servers and using PowerShell is recommended. Overview After completing this course, students will be able to: •Install and Configure SQL Server and all its components using PowerShell •Manage day-to-day SQL Server Administration with PowerShell •Maintain the SQL Server environment using PowerShell scripting and programming options This course provides candidates with the knowledge and skills needed to use PowerShell for SQL Server administration. Students will learn how to manage day-to-day and scheduled maintenance tasks. Install and Configure SQL Server with PowerShell Install SQL Server Configure Database Settings Configure SQL Server Settings Configure SQL Server Policy-Based Management Lab 1: Configuring SQL Server with PowerShell Administering SQL Servers with PowerShell Managing Users and Roles Managing Database Performance Managing Database Availability Managing SQL Server Features Lab 1: Administering SQL Servers with PowerShell Maintaining SQL Server with PowerShell Managing Backups and Restores Maintaining Database Integrity and Performance Monitoring and Auditing Task Automation Generating Reports Lab 1: Maintaining SQL Servers with PowerShell
Duration 1 Days 6 CPD hours This course is intended for This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services Overview At the end of this whiteboard design session, you will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as they are transitioned and modernized. Topics covered will include how to get an inventory of a 2008 server environment, how to categorize 2008 workloads and evaluate the best option for each category, migration and upgrade tools available, TCO analysis tools, offers available from Microsoft to leverage existing licenses and innovations of recent product updates, licensing and technologies. This course will look at the process of migrating workloads to Azure. You will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as your customers transition and modernize their application, data, and infrastructure environment. Whiteboard Design Session - Windows Server 2008 and SQL Server 2008 end of support planning Review the customer case study Design a proof of concept solution Present the solution
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM
Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.
Duration 4 Days 24 CPD hours This course is intended for Project administrators and ETL developers responsible for data extraction and transformation using DataStage. Overview Describe the uses of DataStage and the DataStage workflowDescribe the Information Server architecture and how DataStage fits within itDescribe the Information Server and DataStage deployment optionsUse the Information Server Web Console and the DataStage Administrator client to create DataStage users and to configure the DataStage environmentImport and export DataStage objects to a fileImport table definitions for sequential files and relational tablesDesign, compile, run, and monitor DataStage parallel jobsDesign jobs that read and write to sequential filesDescribe the DataStage parallel processing architectureDesign jobs that combine data using joins and lookupsDesign jobs that sort and aggregate dataImplement complex business logic using the DataStage Transformer stageDebug DataStage jobs using the DataStage PX Debugger This course enables the project administrators & developers to acquire the skills necessary to develop parallel jobs in DataStage. Students will learn to create parallel jobs that access sequential & relational data, and combine and transform the data. Course Outline Introduction to DataStage Deployment DataStage Administration Work with Metadata Create Parallel Jobs Access Sequential Data Partitioning and Collecting Algorithms Combine Data Group Processing Stages Transformer Stage Repository Functions Work with Relational Data Control Jobs
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps
Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures