IBM Spectrum Protect Plus 10.1.4 – Implementation and Administration – TSP11G CR

Short Summary


In this two-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.4.

 

Details


Course Code: TSP11G

Brand: Storage Software Technical Enablement

Category: Systems

Skill Level: Basic

Duration: 16.00H

Modality: CR

 

Audience


Anyone who would like to protect virtual, physical, application and cloud data.

 

Prerequisites


• Experience with protecting applications and virtual machines

• A basic understanding of IBM Spectrum Protect

• Familiarity with Windows and Linux operating systems

 

Overview


In this two-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.4. You begin with a review of the software capabilities, requirements, and architecture. Then, through lecture and hands-on labs, you learn how to perform the various tasks required to configure the environment on an installed virtual appliance. You customize SLA policy, and make use of available options to protect virtual machines and applications, as well as the IBM Spectrum Protect Plus catalog. You monitor and manage jobs, plan and prepare for disaster recovery, generate and view log files, and create custom reports.

 

Topic


• Class Opening – Course introduction

• Unit 1: IBM Spectrum Protect Plus introduction
> Exercises: Overview and Architecture

• Unit 2: Installation and configuration
> Exercises: Installation and configuration

• Unit 3: Data protection for virtual machines
> Exercises: Protecting virtual machines

• Unit 4: Data protection for applications
> Exercises: Protecting applications

• Unit 5: Replication and disaster recovery
> Exercises: Disaster Recovery

• Unit 6: Daily operations, reporting, and maintenance
> Exercises: Operations and troubleshooting

• Class closing & evaluations

 

Objectives


• Describe features and functions, and use the sizer tool
• Install and configure the server, vSnap, VADP proxy, and configure SLA Policy
• Protect and recover virtual machines and applications
• Configure replication for protecting data in vSnap storage
• Offload data for disaster recovery and long-term retention
• Maintain the environment, work with logs, and create custom reports

Share this

IBM Agent Builder 6.3.4 – TV384G CR,ILO

Short Summary


Create agents that monitor many different data sources. Learn to mix, match, and manipulate monitored data to create custom data points to monitor. Add custom components

 

Details


Course Code: TV384G

Brand: Management & Platform

Category: Cloud

Skill Level: Intermediate

Duration: 24.00H

Modality: CR,ILO

 

Audience


This intermediate course is for agent developers, system administrators, and application administrators who need to create agents to gather custom data and integrate that data into either an IBM Tivoli Monitoring 6.x, IBM Monitoring 8.x on-premises, or IBM Monitoring 8.x software-as-a-service environment.

 

Prerequisites


Before taking this course, you should have the following skills:

  • Basic understanding of Windows data sources, including WMI, Perfmon, Windows logs, Windows services, and Windows processes
  • Basic understanding of multiplatform data sources, such as SNMP, JMX, processes, scripts, commands, and log files
  • Administrator-level skills in either of the following monitoring environments:
    – IBM Monitoring 8.x on premises or IBM Monitoring 1.2.x software-as-a-service
    – IBM Tivoli Monitoring 6.x, including creating queries, situations, Navigators, and workspaces
  • Experience installing, configuring, starting, and stopping agents and application support in either of the following monitoring environments:
    – IBM Monitoring 8.x on premises or IBM Monitoring 1.2.x software-as-a-service
    – IBM Tivoli Monitoring 6.3
  • Administrator-level skills in Windows and Linux

 

Overview


This course teaches you how to use the IBM Agent Builder software to create, modify, debug, and package agents for use with IBM Performance Management and IBM Tivoli Monitoring products. You create agents that monitor many different data sources. You learn to mix, match, and manipulate monitored data to create custom data points to monitor. You also learn to add custom components specific to the different IBM monitoring environments. IBM Agent Builder can create custom agents for both the IBM Tivoli Monitoring 6.x and IBM Performance Management 8.x on-premises and SaaS environments. This course is applicable to students from either environment, and a single class might have students from each environment.

 

Topic


Introduction to IBM Agent Builder

  • Introduction to Agent Builder
  • Installing Agent Builder
  • Introduction to the Agent Builder application

Agent creation basics

  • Creating an agent in Agent Builder
  • Monitoring Windows services
  • Troubleshooting in Agent Builder

Creating agents for IBM Performance Management

  • Creating agents for IBM Performance Management
  • Filtering data sources
  • Installing an agent with installation scripts
  • Troubleshooting IBM Performance Management agents

Creating agents for IBM Tivoli Monitoring

  • Installing an agent in an IBM Tivoli Monitoring environment
  • Troubleshooting IBM Tivoli Monitoring agents
  • Creating and importing ITM application support

Monitoring Windows resources

  • Monitoring Windows Management Instrumentation (WMI)
  • Monitoring Windows Performance Monitor
  • Monitoring Windows log events
  • Common agent modifications
  • Testing an attribute group

Monitoring processes and command return codes

  • Monitoring processes
  • Monitoring command return codes

 

Monitoring custom data sources

  • Monitoring script output
  • Monitoring through a socket connection
  • Defining attributes
  • Creating derived attributes
  • Generating agent output from the command line
  • Monitoring log files
  • Custom runtime configuration
  • Java API

Monitoring remote and optional resources

  • Data source-provided runtime configuration
  • Subnodes
  • Monitoring remote systems
  • Monitoring Simple Network Management Protocol
  • Monitoring HTTP URLs and objects
  • Monitoring Java Management Extension
  • Monitoring databases with JDBC

 

Objectives


After you complete this course, you should be able to perform the following tasks:

  • Describe the IBM Agent Builder application and the kinds of agents you can create.
  • Describe the basic process of creating a custom agent with Agent Builder.
  • Troubleshoot an Agent Builder agent during the development process and after installation.
  • Create agents for both the IBM Tivoli Monitoring and IPM Performance Management environments.
  • Create and test agents that monitor the availability of resources, such as processes, Windows services, command return codes, and network devices.
  • Create and test agents that monitor events from log systems, log files, and SNMP.
  • Create and test agents that monitor data from server technologies.
  • Create and test agents that monitor data from custom technologies, such as scripts, log files, Java applications, and socket connections.
  • Create and test agents that include remote monitoring, custom attributes, derived attributes, Navigator groups, user-entered configuration information, and TEP components, such as queries, situations, and workspaces.
  • Create and test agents that use subnodes to optionally monitor local or remote data sources.
Share this

IBM Directory Server 6.4 Fundamentals – TW085G CR,ILO

Short Summary


Learn the processes, procedures, and practices necessary to configure and administer IBM Directory Server using hands-on labs, including troubleshooting some common issues.

 

Details


Course Code: TW085G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 16.00H

Modality: CR,ILO

 

Audience


LDAP Administrators

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Working knowledge of Linux
  • Working knowledge of general security concepts, including SSL, authentication, and authorization

 

Overview


This course describes the processes, procedures, and practices necessary to configure and administer IBM Directory Server. During the hand-on exercises, students will perform basic Directory Server configuration, setup replication, use logs and problem determination tools to troubleshoot directory server.

Students will not only learn about the components, functions, and features that are part of the directory server, but will learn about typical deployment scenarios of the directory server, as well.

 

Topic


  • Unit 1: IBM Directory Server overview
  • Unit 2: Managing directory data
  • Unit 3: Directory Server features
  • Unit 4: Distributed Directories
  • Unit 5: Performance
  • Unit 6: Problem determination

 

Objectives


  • Define LDAP and discuss concepts regarding LDAP standards
  • Manage directory entries and search the directory; explain the purpose of the directory schema
  • Define the security features of IBM Directory Server
  • Define the replication features of IBM Directory Server
  • Define the performance features of IBM Directory Server
  • Define problem determination facilities
Share this

IBM Access Manager Platform Foundations – TW107G CR,ILO

Short Summary


IBM Access Manager simplifies access management across web, mobile, and cloud. In this course, you will learn to configure authentication, authorization, and policy access control.

 

Details


Course Code: TW107G

Brand: Identity and Access Management

Category: Security

Skill Level: Intermediate

Duration: 24.00H

Modality: CR,ILO

 

Audience


This course is designed for system administrators and implementors interested in learning IBM Access Manager.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP, TCP/IP and HTTP
  • Familiarity with the Linux command-line
  • Basic knowledge of JavaScript
  • Working knowledge of security concepts, including SSL, authentication, and authorization

 

 

Overview


IBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi-factor authentication and risk-based access.†You can use IBM Access Manager to adopt secure web, mobile, and cloud technologies and simplify access management for your employees and consumers. Using the skill taught in this course, you will be able to configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests.

 

Topic


Unit 1: Introduction to IBM Access Manager
Unit 2: Architecture and installation
Unit 3: Managing users, groups, and domains
Unit 4: Reverse proxy concepts
Unit 5: Policy based access control
Unit 6: Configuring junctions for back-end resources
Unit 7: Authentication framework and methods
Unit 8: Logging, auditing, and tracing

 

Objectives


  • Describe IBM Access Manager product and its key features
  • Discuss the architecture and deployment process
  • Configure Access Manager users, groups and domains
  • Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure
  • Describe protected object space and the policy access control model
  • Explain how to set up reverse proxy junctions to handle web requests
  • Discuss and configure authentication mechanisms supported by Access Manager
  • Explain and set up logging, auditing, and tracing for Access Manager components
Share this

IBM Access Manager Platform Foundations – Self-Paced Virtual Class (SPVC) – TW107XG SPVC

Short Summary


IBM Access Manager simplifies access management across web, mobile, and cloud. In this course, you will learn to configure authentication, authorization, and policy access control.

 

Details


Course Code: TW107XG

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 24.00H

Modality: SPVC

 

Audience


This course is designed for system administrators and implementors interested in learning IBM Access Manager.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP, TCP/IP and HTTP
  • Familiarity with the Linux command-line
  • Basic knowledge of JavaScript
  • Working knowledge of security concepts, including SSL, authentication, and authorization

 

Overview


IBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi-factor authentication and risk-based access. You can use IBM Access Manager to adopt secure web, mobile, and cloud technologies and simplify access management for your employees and consumers. Using the skill taught in this course, you will be able to configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests.

Please note: This is a self-paced virtual class containing course manuals and an online lab environment only. No audio or video is included with this course.

 

Topic


Unit 1: Introduction to IBM Access Manager
Unit 2: Architecture and installation
Unit 3: Managing users, groups, and domains
Unit 4: Reverse proxy concepts
Unit 5: Policy based access control
Unit 6: Configuring junctions for back-end resources
Unit 7: Authentication framework and methods
Unit 8: Logging, auditing, and tracing

 

Objectives


  • Describe IBM Access Manager product and its key features
  • Discuss the architecture and deployment process
  • Configure Access Manager users, groups and domains
  • Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure
  • Describe protected object space and the policy access control model
  • Explain how to set up reverse proxy junctions to handle web requests
  • Discuss and configure authentication mechanisms supported by Access Manager
  • Explain and set up logging, auditing, and tracing for Access Manager components
Share this

IBM Security Identity Manager Foundations – TW255G CR,ILO

Short Summary


This course provides the foundational skills necessary to configure, administer, and accomplish the major business functions provided by IBM Identity Manager.

 

Details


Course Code: TW255G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 32.00H

Modality: CR,ILO

 

Audience


This course is designed for system administrators and implementers who deploy and manage IBM Security Identity Manager in an organization.

 

Prerequisites


Before taking this course, make sure that you have the following skills:

  • Familiarity with LDAP and TCP/IP fundamentals
  • Familiarity with JavaScript
  • Familiarity with Linux

 

Overview


This is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the following formats software stack and virtual appliance. This course applies to both formats.

The course also includes many hands-on exercises to supplement the lecture. The hands-on labs are conducted using Identity Manager v.7.0.1.10.

 

Topic


Unit 1: Introduction to IBM Security Identity Manager
Unit 2: Architecture and installation
Unit 3: Managing organization, users, and roles
Unit 4: Loading user data
Unit 5: Configuring managed resources in IBM Security Identity Manager
Unit 6: Provisioning resources
Unit 7: Managing workflows and lifecycle operations
Unit 8: Using the reporting feature
Unit 9: Managing access to IBM Security Identity Manager consoles
Unit 10. Configuring selective password synchronization
Unit 11. Managing logging properties

 

Objectives


  • Describe the value proposition of the IBM Security Identity Manager
  • Discuss the architecture and deployment process
  • Manage organizational structure, users, and roles
  • Describe how to upload users to Identity Manager using the  identity feed process
  • Configure services and policies for Identity Manager endpoints
  • Configure and automate resource provisioning
  • Customize workflows and lifecycle operations
  • Implement reporting using default and custom reports
  • Manage access to the Identity Manager consoles
  • Configure selective password synchronization
  • Manage logging properties
Share this

IBM Identity Governance and Intelligence Foundations – TW401G CR,ILO

Short Summary


This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by IBM Identity Governance and Intelligence.

 

Details


Course Code: TW401G

Brand: Identity and Access Management

Category: Security

Skill Level: Basic

Duration: 24.00H

Modality: CR,ILO

 

Audience


This course is designed for security professionals who administer IBM Identity Governance and Intelligence.

 

Prerequisites


  • Basic knowledge of information security concepts
  • Basic knowledge of identity management and governance concepts and strategy

 

Overview


IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.

 

Topic


Unit 1: Introduction to IBM Identity Governance and Intelligence
Unit 2: Deployment planning considerations
Unit 3: Managing the exchange of data
Unit 4: Role lifecycle management
Unit 5: Access risk control modeling
Unit 6: Certification campaigns
Unit 7: Workflow processes
Unit 8: Reporting

 

Objectives


  • Describe the components of Identity Governance and Intelligence (IGI) and manage IGI using Access Governance Core (AGC)
  • Describe the key players, resources, and considerations that must be accounted for when planning an IGI deployment
  • Describe how data is loaded using the Bulk Data Load process, Identity Brokerage Adapters, and Enterprise Connectors
  • Create readable high-level business roles from lower-level permissions and IT roles using both a top-down role definition approach and a bottom-up approach using the advanced role mining tools in IGI, then putting the new roles into production
  • Create and manage Segregation of Duties (SoD) and Sensitive Access (SA) violations and risk mitigations
  • Describe each type of certification campaign in IGI; configure and run certification campaigns
  • Describe how the Process Designer module helps you design and define authorization processes
  • Create, schedule, and run standard and custom reports and demonstrate how to assign report entitlements
Share this

IBM Spectrum Protect Plus 10.1.6 – Implementation and Administration – TSP12G CR

Short Summary


In this three-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.6

 

Details


Course Code: TSP12G

Brand: Storage Software Technical Enablement

Category: Systems

Skill Level: Basic

Duration: 24.00H

Modality: CR

 

Audience


Implementers and administrators who are protecting virtual environments and applications

 

Prerequisites


  • Windows and Linux system administration
  • Storage concepts

 

Overview


In this three-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus v10.1.6. You begin with a review of the software capabilities, requirements, and architecture. Then, through lecture and hands-on labs, you learn how to perform the various tasks required to configure the environment on an installed virtual appliance. You customize SLA policies and make use of available options to protect virtual machines and applications, as well as the IBM Spectrum Protect Plus catalog. You monitor and manage jobs, plan and prepare for disaster recovery, view log files, and create custom reports.

 

Topic


  • Unit 1: IBM Spectrum Protect Plus introduction
  • Unit 2: Installation and configuration
  • Unit 3: Data protection for virtual machines
  • Unit 4: Application protection
  • Unit 5: Container protection and EC2 snapshots
  • Unit 6: Disaster recovery and long-term retention
  • Unit 7: Operations and troubleshooting

 

Objectives


  • Describe features and functions, and use the sizer tool
  • Install and configure the server, vSnap, VADP proxy, and configure SLA Policies
  • Protect hypervisors and their virtual machines
  • Protect applications and databases
  • Protect data in containers and on physical systems
  • Copy data for long-term retention and disaster recovery
  • Manage daily operations and troubleshooting
Share this

IBM Workload Scheduler 9.4 Administration – TX318G CR,ILO

Short Summary


Learn to designing an IBM Workload Scheduler network architecture, background processes in Workload Scheduler, workstation and network configuration options, workload production cycle and more.

 

Details


Course Code: TX318G

Brand: Management & Platform

Category: Cloud

Skill Level: Intermediate

Duration: 16.00H

Modality: CR,ILO

 

 

Audience


New IBM Workload Scheduler administrators who seek proficiency in Workload Scheduler 9.4. Existing administrators, installers, and support personnel who are converting software from previous versions to Workload Scheduler 9.4. Anyone needing detailed guidance on designing Workload Scheduler networks, managing background process, security, configuration, and backups.

 

Prerequisites


Before taking this course, make sure that you can use a web browser and the UNIX or Linux shell to run basic commands and browse the file system.

 

Overview


This course teaches the administrative functions necessary to plan, install, configure, maintain, and troubleshoot an IBM Workload Scheduler 9.4 network. This course includes an in-depth look at designing an IBM Workload Scheduler network architecture, background processes in Workload Scheduler, workstation and network configuration options, workload production cycle and processing, effective use of Workload Scheduler security, and techniques for Identifying and resolving common problems. Hands-on lab exercises include planning a network, defining workstations and domains, and installing and configuring Workload Scheduler components.

 

Topic


Introducing IBM Workload Scheduler 9.2 Administration

  • Using dynamic batch computing
  • IBM Workload Automation configurations
  • Workload Scheduler architecture
  • Workload Scheduler agents and workstations
  • Using the Dynamic Workload Console
  • Getting started with the command-line interfaces

Planning the Workload Scheduler implementation

  • Planning the Workload Scheduler architecture
  • Creating workstation and domain definitions
  • Workload Scheduler networks
  • Preparing a database
  • Checking hardware and software prerequisites
  • IBM Workload Automation users

Installing and configuring Workload Scheduler

  • Preparing for the installation
  • Choosing an installation method
  • Configuring Workload Scheduler

Upgrading Workload Scheduler

  • Planning and preparing the upgrade
  • Performing an upgrade
  • Performing ongoing maintenance

Managing the production cycle

  • Production and preproduction plans

Running agent processes

  • Workload Scheduler agent processes
  • Using the console manager
  • Configuring the job environment

Securing Workload Scheduler

  • Providing specific access
  • Configuring authentication
  • Configuring Dynamic Workload Console roles
  • Configuring user authorization

Finding and repairing problems

  • Built-in troubleshooting features
  • Checking workstation status
  • Finding log files

 

Objectives


  • Describe the workstations
  • Describe the components and their interactions
  • Plan a Workload Scheduler network for your organization
  • Install and configure the components
  • Upgrade a workstation to the latest version
  • Customize how jobs run
  • Manage how users are authenticated and authorized to use Workload Scheduler
  • Demonstrate the daily planning functions
  • Diagnose and troubleshoot problems with Workload Scheduler
Share this

IBM Workload Scheduler 9.4 Operations and Scheduling – TX319G CR,ILO

Short Summary


Learn the features in IBM Workload Scheduler for distributed environments and how to use both the Dynamic Workload Console and command-line interfaces to manage Workload Scheduler.

 

Details


Course Code: TX319G

Brand: Management & Platform

Category: Cloud

Skill Level: Basic

Duration: 24.00H

Modality: CR,ILO

 

Audience


This course is designed for operators and schedulers who perform duties that are related to batch workload automation. This basic course is for the following audiences:

  • New IBM Workload Scheduler users who are seeking proficiency in IBM Workload Schedulerversion 9.4 job scheduling and operations
  • Existing operators, schedulers, supervisors, and managers who are converting from previousversions to version 9.4
  • Anyone needing guidance in managing plans, monitoring workloads, or submitting jobs and jobstreams
  • Anyone needing a refresher course and introduction to the Dynamic Workload Consolegraphical user interface

 

Prerequisites


Before taking this course, make sure that you can use an Internet browser such as Mozilla Firefox and perform basic shell commands in a terminal emulator such as PuTTY or xterm.

 

Overview


This course introduces IBM Workload Scheduler features, environment, and terminology. You learn about distributed environments and how to use both the Dynamic Workload Console and command-line interfaces with Workload Scheduler. You monitor production workflow and create a production day plan. Production workflow consists of job and job stream instances, designed with plan objects. You manage changes to objects, the plan, jobs, events, and job streams. You optimize production workflow and troubleshoot plan problems. You also learn to use Workload Scheduler with classic batch scheduling and dynamic and event-driven workloads.

 

Topic


IBM Workload Scheduler Introduction

  • About Workload Automation
  • IBM workload automation offerings
  • IBM Workload Scheduler terminology
  • Workload Scheduler user interfaces
  • Getting started with Application Lab
  • Getting started with the Dynamic Workload Console
  • Connecting the console to Workload Scheduler
  • Getting started with the command-line interfaces

Using the Application Lab interface

  • Using the processes status overview page
  • Managing processes
  • Using other Application Lab functions

Monitoring Workload Scheduler production

  • Monitoring Workload Scheduler production by using queries
  • Using the Workload Dashboard
  • Monitoring system status and health
  • Monitoring plan objects
  • Using the What-if Analysis interface
  • Monitoring the plan graphically

Managing Workload Scheduler production

  • Managing the scheduling environment
  • Managing scheduling objects in the plan

Creating scheduling objects

  • Using the Workload Designer
  • Creating scheduling objects
  • Creating variables and variable tables
  • Creating prompts and resources
  • Creating calendars
  • Defining jobs

Scheduling, forecasting and migrating workloads

  • Creating job streams
  • Applying jobs to job streams
  • Setting time and date restrictions
  • Using advanced scheduling options
  • Creating job stream definitions by using composer
  • Creating and using event rules
  • Forecasting and previewing future dates
  • Exporting and importing scheduling definitions
  • Using Workload Application Templates

Reporting with Workload Scheduler

  • Using reporting features
  • Using Common Reporting with Workload Scheduler
  • Using the batch reporting utility
  • Using the preformatted text-based report utilities

 

Objectives


In this course, you learn how to perform the following tasks:
• Explain the production terminology used with IBM Workload Scheduler and its production planning process
• Monitor production batch workload processes
• Manage production batch workload
• Create and modify scheduling objects
• Schedule new workloads
• Forecast future workloads
• Migrate workload definitions from test to production environments
• Create and maintain reports about production workloads

Share this

© 2021 Predictive Analytical Resources Limited. All rights reserved.

Click Me
×

Welcome to PARL Support

×