|Linux Basics and Installation ||The objective of the course is to teach students enough about Linux to successfully install, configure, and run Linux on the student's personal workstation and be productive with it. || |
|Linux System Administration I – Implementation ||The purpose of this course is to teach experienced Linux users the techniques, methods, and policies used in Linux system administration.|
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
Learning Journeys or Training Paths that reference this course:
Linux System Administrators
The intended audience for this course is experienced Linux users who want to become administrators of one or more Linux servers.
|DB2 11.1 Administration Workshop for Linux ||This is an intermediate level course for students that will perform Database Administration tasks, who plan, implement, and maintain DB2 10.5 for Linux, UNIX, and Windows databases.|
This course teaches database administrators to perform basic database administrative tasks using DB2 11.1 for Linux, UNIX, and Windows. These tasks include creating database objects like tables, indexes and views, and loading data into the database with DB2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference DB2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements, adding indexes to improve SQL performance. We will cover the locking performed by DB2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing DB2 native encryption for a database.
|DB2 SQL Workshop ||his course provides an introduction to the SQL language.|
This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment.
|Directory Integrator Courses ||IBM Directory Integrator (IDI) is a generic data integration tool suitable for a wide range of scenarios that usually require custom coding and significantly more resources than traditional integration tools. || ||https://www.securitylearningacademy.com/local/navigator/index.php?level=iadi01 |
|IBM Security Directory Integrator Administration and Deployment ||This course focuses on the basic concepts of the IBM Security Directory Integrator application. Students learn about the components of IBM Security Directory Integrator and how the application integrates with different systems. Students also learn how to build IBM Security Directory Integrator solutions.|
This course is designed for solution developers, deployers, and system administrators who are responsible for the deployment and administration of IBM Security Directory Integrator solutions.
|WebSphere Application Server V8.5.5 Administration ||This course teaches you the skills that are needed to install and administer IBM WebSphere Application Server V8.5.5. This release offers users enhanced support for standards, emerging technology, and a choice of development frameworks.|
In this course, you learn how to install, configure, and maintain IBM WebSphere Application Server V8.5.5 base, Network Deployment (ND), and the Liberty profile. You learn how to deploy enterprise Java applications in a single computer or clustered configuration. In addition, you learn how to work with features of WebSphere Application Server V8.5.5, such as IBM Installation Manager, WebSphere Customization Toolbox, security enhancements, Intelligent Management, and centralized installation.
Throughout the course, hands-on exercises and demonstrations reinforce lecture content and give you practical experience with WebSphere Application Server V8.5.5. You complete tasks such as installing and assembling applications, applying problem determination techniques, configuring a clustered environment, and working with fine-grained administrative security.
|WebSphere Application Server V8.5.5 Problem Determination ||This course teaches you how to manage WebSphere Application Server problems more skillfully within your organization by using problem determination tools and techniques. The instructor and students explore common scenarios that you might face in your daily activities. You also learn methodologies and techniques for problem determination, including how to use online IBM support tools to resolve problems. In addition, you learn how to communicate more effectively with IBM support teams so they can identify a problem and find its solution.|
The course covers problems that are associated with Java virtual machine (JVM) tuning and memory management, database connectivity, connection pool configuration, security configuration, server start and stop failures, application deployment, web requests, and default messaging.
In hands-on lab exercises throughout the course, you gain practical experience with problem determination techniques by using your newly acquired skills within various scenarios. These scenarios include hung threads, OutOfMemory errors, crashes, data source configuration, security-related issues, server start and stop failures, web requests, and Java Message Service (JMS) message flow issues.
|What's new in IBM Connections 4.5 ||As there is no new offering for Connections 6.0:|
IBM Connections V4.5, social software for business, provides an exceptional social software solution that is designed to help enable users to access the right people and internal and external content in your professional networks and communities. IBM Connections is designed to help users engage with networks of expertise in the context of critical business processes in order to act with confidence and anticipate and respond to emerging opportunities.
In this workshop you will learn about the new features in IBM Connections 4.5, the capabilities provided by IBM Connections Content Manager and how to leverage the social Business toolkit SDK to socialize existing applications.
This advanced course is designed for Solution architects and social networking administrators.
|LDAP Essentials ||This course consists of a set of videos related to basic LDAP topics. The course is focused on IBM Security Directory Server, but the concepts are applicable to any LDAP v3 compliant directory. You learn about LDAP suffixes, directory information tree, object classes and attributes. The videos demonstrate basic LDAP commands: search, add, modify and delete. The video also explains concept of LDIF flies. || |
| ||IBM Directory Server Administrator ||As a Directory Server Administrator, you learn how to install and configure Directory Server Suite, and how to use local management interface (LMI) and command line interface (CLI) to administer the appliance, how to manage directory entries and configure the replication. You also learn how to configure Federated Directory Server (FDS) and how to configure Pass-through authentication (PTA). || |
|IBM Connections 5.0 Administration ||BM connections installations configuration and troubleshooting. Learning different components of connections and also other product which can interact with the IBM connections for social collaboration.|
This intermediate course is for IBM Connections administrators who need to deploy, manage and support IBM Connections 5.0 in an enterprise environment.
| ||Changing IBM Connections behavior with IBM Connections Customizer ||Using extensions to support new business processes || |
| ||Docker: A boon for the modern developer ||The role of Docker as a sort of Swiss Army knife for DevOps is well documented. But Docker-managed application containers are useful for more than deploying servers in the cloud. Docker containers can also aid in development and increase productivity dramatically in many common development scenarios. This tutorial focuses on how Docker can be useful from a developer's perspective. I introduce Docker, explain basic concepts and terminology, and present a series of hands-on development examples. || ||https://www.ibm.com/developerworks/web/library/wa-docker-polyglot-programmers/index.html?ca=drs- |
| ||ZooKeeper fundamentals, deployment, and applications ||Let's start with why you would want to use ZooKeeper. ZooKeeper is a building block for distributed systems. When designing a distributed system, there is typically a need for designing and developing some coordination services || ||https://www.ibm.com/developerworks/analytics/library/bd-zookeeper/index.html?ca=drs- |
| ||Get started with MongoDB on IBM Power Systems running Linux ||IBM® POWER8 processor-based systems were designed for various big data and analytics workloads by providing 4X more threads per core, memory bandwidth, and cache than other platform options. These benefits translate into superior performance gains for NoSQL solutions like MongoDB making it an ideal solution for managing your big data workloads on Power Systems running Linux. This article describes how to get started. || ||https://www.ibm.com/developerworks/linux/library/l-mongodb-getstart-trs/index.html?ca=drs- |
| ||Build highly scalable applications with Node.js and Redis ||I will show how to build a chat application that allows users to send messages in real time to other users, scaling the application across multiple instances to handle the load. || ||https://www.ibm.com/developerworks/cloud/library/cl-bluemix-node-redis-app/index.html?ca=drs- |
| ||Next-generation search and analytics with Apache Lucene and Solr 4 ||I began writing about Solr and Lucene for developerWorks six years ago (see Related topics). Over those years, Lucene and Solr established themselves as rock-solid technologies (Lucene as a foundation for Java™ APIs, and Solr as a search service). For instance, they power search-based applications for Apple iTunes, Netflix, Wikipedia, and a host of others, and they help to enable the IBM Watson question-answering system. || ||https://www.ibm.com/developerworks/java/library/j-solr-lucene/index.html?ca=drs-#artrelatedtopics |
| ||Learning Path: Kubernetes ||If you're new to Kubernetes and container orchestration and want to begin learning about it, this learning path covers everything from basic prerequisites to more advanced skills needed for containerization. || |
| ||Kubernetes Helm 101 ||Everything you need to know about Kubernetes Helm || |
| ||Learning Path: The Road to Elasticsearch ||Learn all you need to know about Elasticsearch and get started with the new Elastic Stack. || |