IBM

НАПРАВЛЕНИЕ

9L130 - i2 iBase Essentials

Длительность: 2 дня (16 часов)
Код курса: 9L130

Стоимость обучения.
Очный формат: 326 000 ₸
Онлайн формат: 310 000 ₸

Записаться

Course Description

This basic hands-on 5-day workshop focuses on creating association and temporal charts using i2 Analyst’s Notebook from data within i2 iBase.

Emphasis is placed on learning the user side of iBase and how it works with Analyst’s Notebook as one complementary suite. A combination of lecture, hands-on work and exercises teaches the functionality of iBase and the basic functions of i2 Analyst’s Notebook necessary for working with both of these tools to maximize analytical results and impact.

This workshop does not teach how to import files into Analyst’s Notebook. It does teach basic importing into the iBase database.

Objectives

Acquire the knowledge and skills necessary to use i2 Analyst’s Notebook and i2 iBase together as a seamless, synergistic unit to power more effective and timely analysis while sharing that information within an organization
The ability to populate an iBase database both manually and via the import feature
The ability to query an i2 iBase database and use its other analysis functions to produce actionable leads
The ability to visualize data from i2 iBase in i2 Analyst’s Notebook to produce charts for association and temporal analysis as well as for presentation
The ability to use the analysis features unique to i2 Analyst’s Notebook such as list items, visual search and social network analysis on data sent to it from an i2 iBase database

Audience

This basic course is for:

Analysts or Database Designers/Administrators whose organization is implementing an i2 Analyst’s Workstation or i2 iBase solution
Analysts or Database Designers/Administrators newly joining an organization that has implemented an i2 Analyst’s Workstation or i2 iBase solution
If you have already taken i2 Analyst’s Notebook Level 1, you should take i2 iBase User rather than Charting with i2 iBase Databases.

Prerequisites

You should have:

Familiarity with using WindowsÂ
Basic understanding of analysis techniques

Curriculum

The fundamentals of link analysis and how they are the basis of both i2 Analyst’s Notebook and i2 iBase
How to create a chart manually in i2 Analyst’s Notebook and the different parts of entities and links
Using i2 Analyst’s Notebook’s fundamental analysis features of list item, text search and visual search
How iBase is different than other databases and how it works to visualize data in i2 Analyst’s Notebook for associative or temporal analysis
How to add, edit and delete records in iBase
How to create queries in iBase and visualize their results
How to use Sets and Scored Matching in i2 iBase to identity targets
Perform basic imports or data sets into an i2 iBase database
Use Search 360 in an iBase database
Creating reports from your iBase database

WM666GUA - Bus V10 Application Development I

Длительность: 5 дней (40 часов)
Код курса: WM666GUA

Стоимость обучения.
Очный формат: 482 000 ₸
Онлайн формат: 458 000 ₸

Записаться

Course Description
This course is also available as self-paced virtual (e-learning) course, IBM Integration Bus V9 Application Development I (ZM665G). This option does not require any travel.

An updated version of this course is available. For more information, click IBM Integration Bus V10 Application Development I (WM666G).

In this course, you learn how to use IBM Integration Bus to develop, deploy, and support platform-independent message flow applications. These applications use various messaging topologies to transport messages between service requesters and service providers, and also allow the messages to be routed, transformed, and enriched during processing.

The course explores message flow problem determination, with an emphasis on identifying and recovering from errors in message flows. You learn how to construct message flows that use extended Structured Query Language (ESQL), Java, and the IBM Graphical Data Mapping editor to transform messages. The course also explores how to control the flow of messages by using various message processing nodes, and how to use databases and maps to transform and enrich messages during processing. You review various messaging transports at a high level and gain a basic understanding of how message flows can use web services, Java Message Service (JMS), and other transport mechanisms. Finally, you explore how to extend IBM Integration Bus by using adapters and other IBM products.

Throughout the course, hands-on lab exercises allow you to practice the skills and concepts that are presented in the lectures. The hands-on labs cover topics such as creating and testing message flows, message modeling, problem determination, and error handling.

Objectives
Describe the features and uses of the IBM Integration Bus
Develop, deploy, and test message flows
Generate message flows from predefined patterns
Use IBM Integration Bus problem determination aids to diagnose and solve development and runtime errors
Describe the function and appropriate use of various message processing nodes
Write basic ESQL and Java methods to transform messages
Use the IBM Graphical Data Mapping editor to transform messages
Define, use, and test simple XML and Data Format Description Language (DFDL) message models
Describe supported transport protocols and how to call them in message flows
Describe IBM Integration Bus integration with other IBM products such as IBM Business Process Manager, WebSphere Enterprise Service Bus, WebSphere DataPower, and WebSphere Transformation Extender
Extend IBM Integration Bus functions by using WebSphere Adapters and plug-ins
Describe the packaged application support for SAP, Siebel, and PeopleSoft

Audience
This course is designed for experienced integration specialists and senior-level developers with experience in application development and WebSphere MQ.

Prerequisites
You should have:

Basic experience with WebSphere MQ administration
A basic understanding of current IT technologies such as Structured Query Language (SQL), Extensible Markup Language (XML), Java, and XML Path language (XPath)
An understanding of the business needs of your organization

Curriculum
Course introduction
Introduction to IBM Integration Bus
Application development fundamentals
Exercise: Importing and testing a message flow
Developing message flows
Exercise: Implementing a message flow pattern
Using problem determination tools and help resources
Exercise: Analyzing runtime error scenarios
Exercise: Using problem determination tools
Using compute nodes to transform messages
Exercise: Implementing a message flow
Controlling the flow of messages
Exercise: Adding flow control to a message flow
Exercise: Implementing explicit error handling
Modeling messages
Exercise: Implementing a message model
Mapping messages with the Graphical Data Mapping editor
Referencing databases in a message flow
Exercise: Referencing a database in a map
More message processing nodes
Message transports overview
Preparing for production
Exercise: Creating a runtime-aware message flow
Extending IBM Integration Bus
Course summary

AN14 - AIX Jumpstart for UNIX Professionals

Длительность: 5 дней (40 часов)
Код курса: AN14

Стоимость обучения.
Очный формат: 531 000 ₸
Онлайн формат: 505 000 ₸

Записаться

Overview
Provide focused training for experienced UNIX administrators on how to install, customize, and administer the AIX operating system in a multiuser POWER (System p) partitioned environment. The course is based on AIX 7.1 running on a Power system managed by Hardware Management Console version 7 and provides practical discussions that are appropriate to earlier AIX releases.
Learning Journeys or Training Paths that reference this course:
Cloud Foundation: Power
AIX Users and System Administration
Cloud Foundation: Power

Audience
This intermediate course is intended for experienced UNIX system administrators who need training to support their transition to supporting AIX running on POWER processor based systems in a multiuser POWER (System p) partitioned environment.

Prerequisites
You should be able to use basic UNIX commands to:
Execute basic AIX commands
Manage files and directories
Use the vi editor
Use redirection, pipes, and tees
Use the utilities find and grep
Use command and variable substitution
Set and change Korn shell variables
Write simple shell scripts
The above skills can be acquired by attending AIX Basics (AU130) or (AN100) or through equivalent AIX/UNIX knowledge.

In addition, you are expected to have hands-on experience administering a UNIX operating system (such as Solaris, HP/UX, and others) including:

User management and system security
Storage
Networking
System shutdown and restart
Backup and recovery
System task scheduling

Objectives
Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages
Perform system startup and shutdown
Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM Systems Director console for AIX
Manage physical and logical devices
Discuss the purpose of the logical volume manager
Perform logical volume and file system management
Perform and restore system backups
Use the AIX error log as a tool in problem determination
Configure Transmission Control Protocol/Internet Protocol (TCP/IP) networking

Key topics
Day 1
Welcome
Unit 1: Introduction to AIX and IBM Power systems
Exercise 1: Introduction to AIX and IBM Power systems
Unit 2: AIX system management tools
Exercise 2: Using system management tools in AIX
Unit 3: AIX software installation and maintenance
Exercise 3: AIX software installation and maintenance
Unit 4: System configuration and devices
Exercise 4: System configuration and devices

Day 2
Unit 5: TCP/IP networking
Exercise 5: TCP/IP implementation
Unit 6: System startup and shutdown
Exercise 6: System startup and shutdown
Unit 7: Basics of configuring logical partitions
Exercise 7: Configuring logical partitions
Unit 8: AIX installation
Exercise 8: AIX installation
Unit 9: Working with the Logical Volume Manager

Day 3
Exercise 9Working with LVM
Unit 10: File systems administration
Exercise 10: File systems administration
Unit 11: The Object Data Manager
Exercise 11: The Object Data Manager
Unit 12: LVM metadata
Exercise 12: LVM metadata issues
Unit 13: Disk management procedures
Exercise 13: Disk management procedures

Day 4
Unit 14: Backup and restore
Exercise 14: Backup and restore
Unit 15: Error monitoring
Exercise 15: Error monitoring
Unit 16: System initialization – I
Exercise 16: System initialization – I (Parts 1-3)

Day 5
Exercise 16: System initialization – I (Part 4)
Unit 17: System initialization – II
Exercise 17: System initialization – II
Unit 18: The AIX system dump facility
Exercise 18: System dump
Unit 19, Topic 1: Alternate disk installation
Exercise 19,Topic 1: Alternate Disk
Unit 19, Topic 2: Using multibos
Exercise 19: Topic 2: multibos
Optional Appendix A: Survey of additional AIX facilities
Optional Appendix B: Printers and queues

BQ104G - IBM QRadar SIEM Foundations

Длительность: 3 дня (24 часа)
Код курса: BQ104G

Стоимость обучения.
Онлайн формат: 643 000 ₸

Записаться

Course Description:
IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses.

In this 3-day instructor-led course, you learn how to perform the following tasks:

Describe how QRadar SIEM collects data to detect suspicious activities
Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy breaches
Search, filter, group, and analyze security data
Investigate the vulnerabilities and services of assets
Use network hierarchies
Locate custom rules and inspect actions and responses of rules
Analyze offenses created by QRadar SIEM
Use index management
Navigate and customize the QRadar SIEM dashboard
Use QRadar SIEM to create customized reports
Use charts and filters
Use AQL for advanced searches
Analyze a real world scenario

Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

Using the QRadar SIEM user interface
Investigating an Offense triggered by events
Investigating the events of an offense
Investigating an offense that is triggered by flows
Using rules
Using the Network Hierarchy
Index and Aggregated Data Management
Using the QRadar SIEM dashboard
Creating QRadar SIEM reports
Using AQL for advanced searches
Analyze a real-world large-scale attack

The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

Objectives:
After completing this course, you should be able to perform the following tasks:

Describe how QRadar SIEM collects data to detect suspicious activities
Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy violations
Search, filter, group, and analyze security data
Investigate events and flows
Investigate asset profiles
Describe the purpose of the network hierarchy
Determine how rules test incoming data and create offenses
Use index and aggregated data management
Navigate and customize dashboards and dashboard items
Create customized reports
Use filters
Use AQL for advanced searches
Analyze a real world scenario

Audience:
This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.

Prerequisites:
Before taking this course, make sure that you have the following skills:

IT infrastructure
IT security fundamentals
Linux
Windows
TCP/IP networking
Syslog

Topics:
Unit 1: Introduction to IBM QRadar
Unit 2: IBM QRadar SIEM component architecture and data flows
Unit 3: Using the QRadar SIEM User Interface
Unit 4: Investigating an Offense Triggered by Events
Unit 5: Investigating the Events of an Offense
Unit 6: Using Asset Profiles to Investigate Offenses
Unit 7: Investigating an Offense Triggered by Flows
Unit 8: Using Rules
Unit 9: Using the Network Hierarchy
Unit 10: Index and Aggregated Data Management
Unit 11: Using the QRadar SIEM Dashboard
Unit 12: Creating Reports
Unit 13: Using Filters
Unit 14: Using the Ariel Query Language (AQL) for Advanced Searches
Unit 15: Analyzing a Real-World Large-Scale Attack
Appendix A: A real-world scenario introduction to IBM QRadar SIEM
Appendix B: IBM QRadar architecture

BQ204G - IBM Security QRadar SIEM Advanced Topicsons

Длительность: 2 дня (16 часов)
Код курса: BQ204G

Стоимость обучения.
Онлайн формат: 460 000 ₸

Записаться

Course Description:
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules.

The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.

Objectives:
Create custom log sources to utilize events from uncommon sources
Create, maintain, and use reference data collections
Develop and manage custom rules to detect unusual activity in your network
Develop and manage custom action scripts to for automated rule reponse
Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur

Audience:
Security administrators
Security technical architects
Offense managers
Professional services using QRadar SIEM
QRadar SIEM administrators

Prerequisites:
IT infrastructure
IT security fundamentals
Linux
Microsoft Windows
TCP/IP networking
Log files and events
Network flows

You should also have completed the IBM Security QRadar SIEM Foundations course.

Topics:
Module 1: Creating log source types

Module 2: Leveraging reference data collections

Module 3: Developing custom rules

Module 4: Creating Custom Action Scripts

Module 5: Developing Anomaly Detection Rules

Записаться на курс






    Контактная информация: