Electronics Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Electronics Engineering




Total 800 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Advanced z OS Performance: WLM, Sysplex, UNIX Services, zEnterprise

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Describe the advanced performance components of current complex z/OS environment and identify the major performance factors for these components
•Identify coupling facility (CF) technologies and how they function in a Parallel Sysplex, including CF links and CF structures
•Monitor and analyze the service times and other performance indicators of the CF and other Parallel Sysplex components, including cross-system coupling facility (XCF)
•Predict and monitor effects of system managed CF duplexing on system performance
•Identify WLM services and their use by z/OS applications, including enclave services, routing services, and application environments
•Evaluate RMF enclave reports and understand enclave resource accounting
•Implement and control WLM optional features such as Intelligent Resource Director (IRD) and WLM defined capacity, and monitor LPAR performance when optimized by these features
•Describe the new functionality introduced by zAAP and zIIP specialty processors on z/OS systems and use appropriate tools to control and monitor specialty CP workload performance
•Monitor and control the USS program env... [Read More]

Advanced Parallel Sysplex Operations and Recovery Workshop

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Use HMC classic or tree UI, create HMC groups, load profiles, and
•provide tips and recommendations for HMC use
•Initialize sysplex system images and identify problems reported via system consoles and the HMC
•Identify sysplex components, define resource and data sharing differences in relation to recovery options, discuss various configurations and system duplexing
•Perform related display commands to identify sysplex status and recovery actions for IPL problems during system activation
•Manage couple data sets, format CDS, define policies, and start and verify they are working as desired
•Implement configurations supporting GRS STAR, JES checkpoint, and ECS using structures in the CF
•Identify couple data set failures, CF and CF structure failures
•Identify policy change pending conditions and correct as necessary
•Remove a CF from the sysplex as in the case of required maintenance to a CF
•Identify and correct problems during structure rebuild process such as insufficient storage in the CF
•Add a new System z CF to the sysplex dynamically using a sysplex wide dynamic activation wit... [Read More]

IBM Spectrum Accelerate Implementation

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

By the end of the course you should be able to:

?Demonstrate an understanding of Software-defined storage from a technology standpoint
?Summarize IBM’s Spectrum range of products and their benefits
?Summarize the architecture of IBM Spectrum Accelerate
?Integrate and deploy IBM Spectrum Accelerate in an existing storage infrastructure
?Summarize the key administrative tasks that need to be performed after the installation of IBM Spectrum Accelerate
?Demonstrate an ability to access and interact with the graphical and command line interfaces of the product
?Summarize the various tasks that can be performed on block storage using IBM Spectrum Accelerate by understanding various use cases



Programme

Agenda

Unit 1: Introduction to IBM Spectrum Accelerate
Unit 2: Planning for Spectrum Accelerate
Unit 3: IBM Spectrum Accelerate Implementation
Unit 4: IBM Spectrum Accelerate Administration
Unit 5: IBM Spectrum Accelerate Trouble Shooting

Lab Exercises

Exercise 1: Not used in this course
Exercise 2: Navigation and User Management in IBM ... [Read More]

z/OS VSAM and Access Method Services

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Understand the structure and use of VSAM data sets or clusters
•Code IDCAMS commands to define and load VSAM clusters
•Code IDCAMS commands to define and load alternate indexes
•Code IDCAMS commands to list, alter, and delete catalog entries
•Code IDCAMS commands to print data sets
•Calculate the Direct Access Storage Device (DASD) space requirements for VSAM clusters
•Code the Job Control Language (JCL) for IDCAMS and programs which process VSAM clusters
•Use IDCAMS and JCL options to improve the performance of a VSAM job
•Reorganize, back up, and recover VSAM and non-VSAM data sets
•Interpret an IDCAMS listing of an Integrated Catalog Facility (ICF) catalog
•Select and use the appropriate documentation to utilize VSAM and IDCAMS

Programme

Introduction to VSAM data sets
•describe the structure, organization, and use of VSAM clusters
•explain the function of Control Intervals (CI) and Control Areas (CA)
•describe the purpose of CI splits and CA splits and how they are accomplished
•estimate DASD space requirements for various cluster types

ICF cata... [Read More]

Storage Area Networking Fundamentals

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

After completing this course, you should be able to:
?Classify the components of a SAN infrastructure
?Appraise the Fibre Channel architecture and terms
?Classify the three major components of a SAN
?Differentiate the features of the IBM Storage System b-type switch offerings
?Differentiate the features of the IBM offered Cisco SAN switches and directors
?Evaluate the implementations of iSCSI and FCoE



Programme

Day 1

Welcome
?Unit 1 - SAN Concepts
?Unit 2 - Fibre Channel
?Unit 3 - SAN design and topology (1 of 2)

Day 2

?Unit 3 - SAN design and topology (2 of 2) (continued)
?Unit 4 - IBM Fibre Channel b-type switches and directors

Day 3

?Exercise 0 - Lab setup and preliminary instructions
?Exercise 1 - Switch management overview
?Exercise 2 - Management software installation
?Exercise 3 - Zoning configuration
?Exercise 4 - Configuring the IBM Storwize V3700 storage system
?Exercise 5 - V3700 storage provisioning using iSCSI
?Exercise 6 - Brocade VDX fabric merging
?Unit 5 - Cisco MD... [Read More]

SAN Volume Controller (SVC) Planning and Implementation Workshop

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

This course is designed to leverage SAN storage connectivity by integrating a layer of intelligence or virtualization, the SAN Volume Controller (SVC) to facilitate storage application data access independence from storage management functions and requirements. The focus is on planning and implementation tasks associated with integrating the SVC into the storage area network. It also explains how to:
•Centralize storage provisioning to host servers from common storage pools.
•Facilitate the coexistence and migration of data from non-virtualized to the virtualized environment.
•Improve storage utilization effectiveness using Thin Provisioning and Real-time Compression.
•Implement storage tiering and optimize solid state drives (SSDs) or flash systems usage with Easy Tier.
•Utilize network-level storage subsystem-independent data replication services to satisfy backup and disaster recovery requirements.

Day 1
•Welcome
•Unit 1: Introduction to IBM SAN Volume Controller
•Unit 2: SVC hardware architecture
•Unit 3: SVC planning and zoning requirements
•Unit 4: SVC cluster initialization and user authentication Exercis... [Read More]

Data Storage Subsystems

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Understand the issues with magnetic media recording
•Understand basic disk and tape physical record architecture
•Correlate data set formats and organization with supported access methods and media
•Understand the elements that impact I/O
•Understand the function and benefit of intelligent controllers
•Explain some of the performance related solutions
•Understand I/O connectivity solutions on z/OS
•Discuss some of the availability features of z/OS
•Identify the role of tape and virtual tape libraries in the storage hierarchy

Programme

Day 1
•Unit 1: Direct access storage device hardware overview
•Unit 2: Direct access storage device response time
•Unit 3: System z I/O connectivity
•Unit 4: Cache and other enhancements



Day 2
•Unit 5: Introduction to array direct access storage devices
•Unit 6: IBM enterprises storage:
•Unit 7: Availability features
•Unit 8: Tape storage
•Unit 9: Virtual tape and Virualization Engine
•Unit 10: TS7680 and ProtecTIER overview

IBM Tape Encryption Implementation

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Describe IBM tape encryption and the benefits of using it.
•Define the IBM tape encryption key manager (EKM).
•Illustrate system managed using the AIX device driver.
•Characterize application managed tape encryption using the Tivoli Storage Manager (TSM).
•Discover what is new in EKM Release 2
•Understandhow to use new EKM Release 2 with TS1120 tape drives
•Know the differences between TS1120 encryption and LTO4
•State system managed tape encryption system managed on System z using z/OS and DFSMS
•Explain the purpose of IBM tape encryption z/OS keys and how they are used.
•Specify the steps involved in configuring IBM tape encryption.

Programme

•Overview
•Encryption Key Manager (EKM)
•System-Managed Encryption: AIX Device Driver
•Application-Managed Encryption: Tivoli Storage Manager (TSM)
•TS3500 Tape Encryption
?592 E05 Encryption
•EKM Release 2
•LTO4 Encryption
•System Managed Encryption: z/OS DFSMS
•z/OS Key Management
•Tape Encryption Configuration

IBM Storwize V7000 Implementation Workshop

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Day 1
•Welcome
•Unit 1: Introduction to IBM Storwize V7000
•Unit 2: Enclosures and RAID arrays
•Lab 1: Storwize V7000 System initial configuration through Service Assistant
•Lab 2: Storwize V7000 System and GUI/CLI access setup
•Lab 3: Physical storage: Internal
•Lab 4: Physical storage: External
•Lab 5: Storage pools: External
•Lab 6: Create host objects and volumes

Day 2
•Unit 3: Fabric zoning, iSCSI, and clustered Storwize V7000
•Unit 4: Thin provisioning, volume mirroring, and Real-time Compression
•Lab 7: Access storage from Windows and AIX
•Lab 8: Hybrid pools and Easy Tier
•Lab 9: Access Storwize V7000 through iSCSI host
•Lab 10: Volume dependencies and tier migration

Day 3
•Unit 5: Data migration facilities
•Unit 6: Copy services: FlashCopy and Remote Copy
•Lab 11: Internal storage: RAID options
•Lab 12: Thin provisioning and volume mirroring
•Lab 13: Real-time Compression

Day 4
•Unit 7: Easy Tier
•Unit 8: Managing the IBM Storwize V7000
•Lab 14: Data migration Import Wizard
•Lab 15: FlashCopy and consistency grou... [Read More]

IBM DS8000 Implementation Workshop for Open Systems

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Day 1
•Welcome and introduction
•Unit 1: IBM DS family, DS8000 overview
•Unit 2: Architecture and hardware overview
•Unit 3: Virtualization concepts

Day 2
•Unit 4: DS command-line interface (DS CLI)
•Unit 5: DS8000 Storage Manager GUI
•Unit 6: Host system attachment
•Exercise 0: Lab setup and preliminary instructions
•Exercise 1: DS8000 DS CLI: Installation and configuration
•Exercise 2: DS8000 DS CLI: DDMs, array sites, arrays, ranks, and extent pools
•Exercise 3: Windows Server preparation

Day 3
•Exercise 4: Windows Server attachment to the DS8000
•Exercise 5: AIX Server attachment to the DS8000
•Exercise 6: DS8000 Storage Manager: Arrays, ranks, and extent pools
•Exercise 7: DS8000 Storage Manager: FB volumes, volume groups, and hosts
•Exercise 8: DS8000 Storage Manager: Other functions
•Exercise 9: DS8000 Easy Tier: Dynamic Volume Relocation
•Exercise 10: DS8000 Easy Tier: Dynamic Extent Pool Merge

Day 4
•Unit 7: Performance, tuning, and monitoring
•Unit 8: Business Continuity: Copy Services
•Unit 9: Summary
•Exercise 11: DS800... [Read More]

Building an open source environment with KVM for IBM z Systems Workshop

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

This one-day session will cover the main aspects of the z Systems platform and KVM for IBM z, ranging from the key capabilities to the virtualization used to support the infrastructure. Clients will experience all that is needed to provision, operate, and manage KVM for IBM z.

Objectives

The objective of the workshop is to provide a clear understanding of the components that make up KVM for IBM z.

Programme

- z architectural overview of the z Systems platform
- Virtualization concepts
- Introduction to KVM for IBM z
- Configuration planning
- Installing KVM for IBM z
- Installing Linux on z Systems
- Managing the environment

IBM i2 iBase

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

This 2-day instructor-led course focuses on a basic introduction of iBase functionality. The student will gain an understanding of how to use i2 iBase to add data, perform basic analysis and create charts in conjunction with i2 Analyst’s Notebook.

Objectives

•Learn how to search and browse the database.
?The ability to populate an iBase database manually (add, edit and delete records).
?How to create queries.
?Learn how to use Search 360
?Visualize data and produce charts in Analyst’s Notebook through iBase.
?Export data out of iBase

Programme

?Adding Entities and Links.
?Finding records and storing results.

Fundamentals of the Curam Enterprise Framework for Business Analysts 6.0

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Describe the main components of the CBAS
•Identify Curam Enterprise and Solution Modules
•Identify and navigate the various components of the CEF
•Use the Documentation Center
•Navigate the Curam Impact and Relationship Analyzer CIARA
•Participate in mapping legacy data requirements to the Curam database

Programme

•The main functional components of the Curam Business Application Suite (CBAS) and the respective purposes of each component
•The distinction between Curam Enterprise and Solution Modules and their respective functionalities
•The key components of the CEF
•Documentation Center and CIARA and how they facilitate Curam-related business analysis activities
•Mapping legacy data requirements to the Curam database

IBM Curam SPM Platform V6.0.4

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Identify the main components of the IBM Curam SPM Platform, IBM Curam Enterprise Modules, and IBM Curam Solutions.
•Describe some of the common processes associated with the IBM Curam SPM Platform, including: IBM Curam Participant Management
IBM Curam Case Management
IBM Curam Financial Management
IBM Curam Administration
IBM Curam Intelligent Evidence Gathering (IEG)
IBM Curam Service Planning
IBM Curam Decision Assist
IBM Curam Supervisor Workspace

•Outline IBM Curam services, such as IBM Curam Workflow and the IBM Cúram rules infrastructure.
•Recognize the important features of the following Curam Enterprise Modules: IBM Curam Verification
IBM Curam Evidence Broker
IBM Curam BI and Analytics
IBM Curam Provider Management
IBM Curam Appeals
IBM Curam Universal Access
IBM Curam Social Enterprise Collaboration
IBM Curam Outcome Management

Programme

•The main components of the IBM Curam SPM Platform, IBM Curam Enterprise Modules, and IBM Curam Solutions
•The key processes associated with the IBM Curam SPM Platform and how they operate<... [Read More]

IBM BigFix Platform

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

IBM BigFix (formerly IBM Endpoint Manager) combines endpoint and security management into a single solution that enables your team to see and manage physical and virtual endpoints. Rapidly remediate, protect, and report on endpoints in real-time by automating time-intensive tasks across complex networks, controlling costs, reducing risk, and supporting compliance. This course presents basic and intermediate level knowledge to help users in administrator and operator roles of the product to develop the knowledge they need to successfully leverage this product in their managed environments.

Programme

Unit 1: Product overview
Unit 2: Architecture
Unit 3: Operations
Unit 4: Platform Configuration
Unit 5: Site Management
Unit 6: Patch
Unit 7: Operator Administration
Unit 8: Troubleshooting

Web Application Security

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Discuss common web application security issues and the organizations and testing techniques that can help prevent them
•Describe basic web application components
•Discuss the OWASP web application security attack classifications: Injection
Broken authentication and session management
Cross-site scripting
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Missing function level access control
Cross-site request forgery
Using components with known vulnerabilities
Unvalidated redirects and forwards

•Use vulnerability testing and threat modeling to implement web application security throughout the software development life cycle

Programme

•Unit 1: Introduction to web application security problems
•Unit 2: Web application security basics
•Unit 3: Injection flaws
•Unit 4: Broken authentication and session management
•Unit 5: Cross-site scripting
•Unit 6: Insecure direct object references
•Unit 7: Security misconfiguration
•Unit 8: Sensitive data exposure
•Unit 9: Missing function-level access cont... [Read More]

IBM Security zSecure UNIX System Services (USS) Security

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Objectives

•Explain the authorization checking process to access a UNIX file or directory
•Create the appropriate RACF definitions to define a z/OS UNIX System Services user ID
•Describe the audit options for z/OS UNIX System Services
•Set up permissions to control access to a file or directory
•List and maintain extended access control list (ACL) entries
•List and maintain the audit settings for a file or directory

Programme

Chapter 1: z/OS UNIX System Services (USS) security concepts
•Explain z/OS USS identification and authentication
•Use the hierarchical file system (HFS) and z/OS file system (zFS)
•Secure USS daemons and servers

Chapter 2: Protect files and directories
•List the fields in the file security packet (FSP)
•Interpret and modify file access rights and extended attributes
•Secure USS files with extended access control lists (ACLs)

Chapter 3: Reporting and auditing in a USS environment
•Generate extended program attributes reports
•Explain HFS and zFS auditing concepts
•Use the USS-related RACF profiles
•Avoid common HFS and zFS ... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Unit 1: Introduction to RACF auditing
•List the RACF resources that need to be audited
•Generate and interpret an audit concerns report
•Identify all the profiles owned by a particular user
•Identify the users authorized to maintain RACF application segments

Unit 2: Audit users and passwords
•Generate and interpret user reports
•Identify last logon and password aging
•Identify users with system-wide authorities
•Identify users with group specific authorities
•Generate a report of trusted users

Unit 3: Audit resources
•Identify sensitive profiles and the users who can modify them
•Identify users who can create profiles of various types
•Audit started tasks and programs

Unit 4: Audit subsystems
•Generate audit reports about CICS regions, transactions, and programs
•Generate audit reports about IMS regions, transactions, and program specification blocks
•Generate audit report about DB2 region

Unit 5: Generate SMF audit reports
•Explain the concepts of SMF auditing
•Report which events are logged in SMF
•Select events logged in SMF using ISPF i... [Read More]

IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

This course introduces the zSecure Audit rule-based compliance evaluation framework. The course explains rule-based compliance evaluation concepts and includes an overview and demonstration of the supported compliance evaluation functions and reports. With the standard built-in compliance evaluation interface, you report the compliance of your systems against one or more of the supported external standards: STIG, STIGplus, GSD, or PCI-DSS. The course also teaches you how to customize compliance evaluations for the supported standards to fit your company&,#146,s requirements. Finally, you learn how to create a company-defined compliance standard. Hands-on exercises are included to enforce the skills that are taught in this course so that you can experiment with the rule-based compliance evaluation interface.

Objectives

•Explain the concept of rule-based compliance evaluation with zSecure Audit
•Run compliance evaluations against the supported standards GSD331, STIG, and PCI-DSS
•Use the compliance evaluation results to apply the applicable changes to comply with the applicable (external) standard
•Customize compliance evaluations to ... [Read More]

IBM Security QRadar SIEM Administration

Course Format: Classroom
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Learning objectives
•Install and manage automatic updates to QRadar SIEM assets
•Configure QRadar backup and restore policies
•Leverage QRadar administration tools to aggregate, review, and interpret metrics
•Use network hierarchy objects to manage QRadar SIEM objects and groups
•Manage QRadar hosts and licenses and deploy assets
•Monitor the health of assets in a QRadar deployment
•Configure system settings and asset profiles
•Configure reasons that QRadar administrators use to close offenses
•Create and manage reference sets
•Create the credentials used to perform authenticated scans
•Manage, route, and store event and flow data
•Use domains in QRadar SIEM to act as a filter for events, flows, scanners, assets, rules, offenses, and retention policies
•Configure user accounts including user profiles, authentication, and authorizations
•Manage custom properties for assets, events, and flows
•Manage QRadar log sources
•Manage QRadar flow sources
•Integrate Vulnerability Assessment Scanner results in QRadar SIEM
•Manage groups that monitor Internet networks and services

Prog... [Read More]

Pages: 1 2 3 4 5 6 7 8 9 ...


Find Electronics training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
Our combined search function does not only provide you with the training courses and students, but also talent resumes and jobs, or shared apartments nearby for rent.



- Other Topics -
- Online/E-learning -
Electronics
Ask for Training
Add Courses