Middle East & Africa University Program. PROGRAM OVERVIEW April 2015 Oriette Mohamed Nayel MSc, PMP, Manager, Cairo Lab services IBM Egypt
|
|
|
- Sylvia King
- 10 years ago
- Views:
Transcription
1 Middle East & Africa University Program PROGRAM OVERVIEW April 2015 Oriette Mohamed Nayel MSc, PMP, Manager, Cairo Lab services IBM Egypt
2 IBM Academic Roadmaps Fast track into your dream job Available 2H 2015 Cyber Security Business Analytics Computing Application Developer Application Security Business Intelligence Big Data Application Developer System Administrator Security Intelligence Analyst Predictive Analytics Data Warehouse System Administrator 2 CROSS SKILLS The cross-skills section provides an overview of the relationship between technology trends
3 IBM Academic Tracks Components Structure of the MEA University Program Academic Tracks IT Job Role Market demand based Job Description: Potential positions, activities, responsibilities and career paths Average Salary: Trends based on global and regional salary indexes SEMESTER 1 SEMESTER 2 (~3hs) instructor-led (~10-20hs) self-paced 1st Concentration (~40hs) instructor-led 2nd Concentration (~40hs) instructor-led (3hrs) course (instructor-led) (10-20hs) Pre-requisite online courses (self-paced) (40hs) Official IBM Courses (instructor-led) (40%) theory and (60%) hands-on labs (cloud-based) Academic Certificate: Practice & Final Test Equivalent to 1 st Concentration (40hs instructor-led) Based on a different technology domain. Additional Academic Certificate: Practice & Final Test Theory & hands-on exercises on cross-technology areas relevant to the learned technology 3
4 Program results in Teachers trained 20 Training sessions ~ 20 faculty members each) instructors from Europe, USA and Egypt. 8 Countries, - 12 cities - 13 universities - 16 campuses. population Targets by Universities & 34,000 students
5 MEA UNIVERSITY PORTAL Cyber Security Application
6 6 E-Learning
7 Tracking and assessment 1. Progress bar on each section to track the student s progress 2. Checkpoint tests in the Foundation and concentration course to assess the knowledge of the students before advancing. 7
8 8 Practice Test
9 IBM Academic Track Application Complete Academic Certification Track Overview Security Application Developer Application Administrator Content: Technology Overview, Technology Domains, Understanding Applications, build and manage Applications. Application Developer - Tool: IBM Worklight Foundation V6.2 Studio Courses: Application Development and Deployment Application Administrator - Tool: IBM Worklight Foundation V6.2 Server Courses: Managing Applications Developing Web Applications, Testing Apps, Security Essentials
10 IBM Academic Track You are here Security Application Developer Application Administrator Introduction (2 hs instructor-led) Pre-requisite courses (10 hs self-paced) Course Industry Overview Past, Present and Future Trends Enterprise Industry Domains: - Healthcare - Telco - Banking - Government Case Studies in Africa IBM Research in Cross-skills Links and additional resources VW324 - Roadmap to Web Development Web applications: an introduction HTML5 and JavaScript Dojo and jquery JavaScript Framework ZU370 - Introduction to HTML5 and JavaScript Programming HTML5 development support for cross-platform applications Code JavaScript functions Use the form elements of HTML5 ZD325 - Developing Application with Dojo Developing Web applications with Dojo Ajax calls to services with Dojo ZU372 - Developing Application with jquery Getting started with jquery scripting Developing a jquery page
11 IBM Academic Track Application Developer You are here Security Application Developer Application Administrator IBM Official Courses (36 hs instructor-led) IBM Textbooks WD602 - Application Development - IBM Worklight V6.2 Identify a mobile application design types Develop a mobile application to run on an Android or ios platform using the IBM Worklight hybrid coding approach Use IBM Worklight client-side APIs for cross-platform portability Frameworks: Dojo Frameworks: jquery Frameworks: Sencha Touch UI Apache Cordova framework to access native functions. Use IBM Worklight server-side APIs for back-end integration Secure a mobile application using authentication techniques Manage application updates and versions Getting Started with IBM Worklight IBM Exams IBM Academic Certificate IBM Academic Certificate Application Developer IBM Professional Certification IBM Certified Application Developer Worklight V6.2 Test C : IBM Worklight V6.2, Application Development
12 IBM Academic Track System Administrator You are here Security Application Developer Application Administrator IBM Official Courses (36 hs instructor-led) IBM Textbooks WA855 - WebSphere Application Server V8.5.5 Administration WebSphere Application Server basic administration concepts Architectural concepts related to WebSphere Application Server Install and configure IBM HTTP Server (IHS) Assemble, deploy and install server-side Java applications Configure WebSphere Application Server security WA505 - Managing Applications with IBM Worklight V6 Describe the various mobile application design approaches Describe the Worklight runtime architecture Secure the Worklight server environment Use the Worklight console to monitor push notifications Manage application updates and versions Migrate applications from a development to production Monitor device usage statics and generate analytic reports Enabling Apps with IBM Worklight Application Center IBM Exams IBM Academic Certificate IBM Academic Certificate System Administrator IBM Professional Certification IBM Certified System Administrator Worklight V6.2 Test C IBM Worklight V6.2, System Administration
13 IBM Academic Track 1.1 Application Developer: Basic knowledge of: English Proficiency Operating System experience Java programming Web Services and REST Database connectivity Prerequisite Skills Working knowledge of: Eclipse based development tools Command Line Interface (CLI) HTML and CSS JavaScript programming and JavaScript Framework (such as jquery, Dojo and Sencha) Designing applications for mobile devices Developing hybrid and native applications for both Android and ios 1.2 Administration Basic knowledge of: Experience with application server administration. Experience using Apache Ant. Good understanding of LDAP. Familiarity with Worklight Studio. Familiarity with web application development and deployment
14 IBM Academic Track You are here Security Application Developer Application Administrator Security - Secure your mobile applications With the explosive growth in the mobile ecosystem, mobile application security is a huge concern. New mobile application designs require new ways of testing to ensure data safety. In this article, explore different aspects of mobile application security. With hands-on examples, learn to use IBM Security AppScan Standard with mobile user agents and with emulators and actual devices for Android and ios. - Install & configure the Symbian Simulator for Cognos Go This document provides step by step instructions on how to install and configure the Symbian simulator for use with IBM Cognos GO!. Learn how to Find the Java Development Kit jdk-1_5_0_x, installing the Java Wireless Toolkit, obtain a local copy of the cognos_mobile.jad file and laundhing the Go! in the Symbian Simulator. Applications with IBM Quality Assurance app quality is different. Developers like yourself, are responsible for much of the actual testing, but you need end user feedback and quality metrics to improve user experience and app quality. IBM Quality Assurance (IBM MQA) provides you the ability to instrument your apps to capture tester and live-user experiences, including context-aware crash log and in-app bug reports, in-app user feedback and insightful and streamlined quality metrics.
15 IBM Big Data Academic Track Complete Academic Certification Track Overview Security Big Data Data Warehousing Analyst Data Overview, Information Governance, Domains, Industry Applications and Case Studies. Pre-requisite skills: DB2 Academic Associate Classroom Course and Big Data Fundamentals Big Data - Hands-On: IBM BigInsights, InfoSphere Streams, Data Explorer Bootcamp - IBM Big Data Fundamentals Bootcamp Data Warehouse Analyst - Hands-On: IBM DB2 BLU, Netezza and DashDB Implementation and Use of DB2 BLU Acceleration, IBM PureData System for Analytics Programming & Usage Big data and analytics, Securing data platforms, adaptors for multiple data sources, data
16 IBM Big Data Academic Track You are here Security Big Data Data Warehousing Analyst Introduction (3 hs instructor-led) Course IBM Overview Past, Present and Future Trends Data in the enterprise Industry Domains: - Healthcare - Telco - Banking - Government Case Studies in Africa IBM Research in Big Data Links and additional resources Pre-requisite courses (10 hs self-paced) DEV452 - DB2 Academic Associate e-learning Course Relational database concepts, DB2 and Data Studio overview SQL and database objects, data concurrency and locking Database Security and troubleshooting DB2 purexml and Application Development The Next IM Frontier Big Data DB2 Database and Application Fundamentals Academic Exam Test DB2 9 Database and Application Development cation/certification.html Hadoop Fundamentals I (Version 2) (5 hours) Introduction to Hadoop and Hadoop architecture Introduction to MapReduce Querying data Hadoop administration
17 IBM Big Data Academic Track Big Data You are here Security Big Data Data Warehousing Analyst IBM Official Bootcamps (40 hs instructor-led) Bootcamp - IBM Big Data Fundamentals Bootcamp Introduction to Big Data Hadoop & BigInsights Overview HDFS & MapReduce Hadoop Query Languages Hbase, BigSQL and JAQL Application Development BigSheets, Text Analytics and AQL Streams Overview Data Explorer Overview IBM Textbooks Harness the Power of Big Data ftp://public.dhe.ibm.com/software/pdf/at/swp10/harness_the_power _of_big_data.pdf IBM Exams IBM Big Data Academic Exam P : IBM Big Data Fundamentals Technical Mastery Test IBM Big Data Fundamentals Technical Professional v1 P : IBM Big Data Fundamentals Technical Mastery Test
18 IBM Big Data Academic Track Data Warehousing Analyst You are here Security Big Data Data Warehousing Analyst IBM Official Courses (40 hs instructor-led) CL450 - Implementation and Use of DB2 BLU Acceleration Implement DB2 BLU Acceleration for a new/existing DB2 database. Configure a DB2 database that uses DB2 BLU Acceleration, Describe the default workload management used for DB2 BLU Data warehouse reference architecture CDW Modeling and Design CL485 - DB2 10 for Linux, UNIX, and Windows Quickstart for Experienced Relational DBAs Administer a DB2 database system using commands and GUI Use the DB2 provided monitor and Functions in SQL DW585 - IBM PureData System for Analytics Programming & Use Develop SQL applications Create databases, tables and schemas Set up Clustered Base Tables Generate statistics IBM Textbooks Getting Started with Data Warehousing IBM Exams IBM Data Warehouse Academic Exam P : IBM Big Data Fundamentals Technical Mastery Test IBM Big Data Fundamentals Technical Professional v1 Test P : IBM ISW-9.7 Smart Analytics Technical Mastery Test ibm.com/jct03001c/certify/mastery_tests/ovrM80.shtml
19 IBM Academic Roadmap Data You are here Security Big Data Data Warehousing Analyst Security - Fight against SQL injection attacks In the world of security exploits, one vulnerability, although easily resolved, is number one on the OWASP top 10: the Structured Query Language (SQL) injection attack. Although this class has existed since 1995, it remains one of the most prevalent attacks on web assets. Get to know the SQL injection attack and discover how it's carried out on a production website Then learn how to test a website for this class of vulnerability by using IBM Security AppScan Standard - Introduction to Data Analysis using R Learn how to tackle data analysis problems using the powerful open source language R. The course will take you from learning the basics of R to using it to explore many different types of data. You will learn how to prepare data for analysis, compute various statistical measures, create meaningful data visualizations, create reusable R functions, create R models to predict expected future outcomes, and more! - Developing Application with jquery (Course Code: ZU372) Learn how to tackle data analysis problems using the powerful open source language R. The course will take you from learning the basics of R to using it to explore many different types of data. You will learn how to prepare data for analysis, compute various statistical measures, create meaningful data visualizations, create reusable R functions, create R models to predict expected future outcomes
20 IBM Big Data Academic Track Prerequisite Skills Big Data Data Warehousing Basic knowledge of: English language proficiency Ability to work in a Linux environment to perform hands-on lab exercises Knowledge of SQL A programming background General understanding of data management and analytics software Basic knowledge of Hadoop DB2 OLAP Server Administration and Performance Tuning Knowledge of an Eclipse-based tool xposure to the C++, Java, and Perl languages. A working knowledge of both XSLT and XPath. Basic knowledge of: English language proficiency DB2 Knowledge and relational database system Use basic OS functions such as utilities, file permissions, hierarchical file system, commands, and editor State the functions of the Structured Query Language (SQL) and be able to construct DDL, DML, and authorization statements General understanding of data management and analytics software Ability to work in a Linux environment to perform hands-on lab exercises Knowledge of scripting and ability to use development tools
21 IBM Cyber Security Academic Track Cyber Security Complete Academic Certification Track Overview Cyber Security Application Security Security Intelligence Analyst Cyber Security Understanding treats and security risks in the society and in the enterprise. Security Domains (People, Data, Application and Infrastructure). Application Security - Tool: IBM Security AppScan Standard Courses: Essentials of Application Security. Application Security Fundamentals with IBM AppScan Standard. Security Intelligence Analyst - Tool: IBM Security QRadar SIEM Courses: of Security Intelligence and Advanced Concepts for SIEM Security Apps security, Security Data Access, concepts of Security in the space.
22 IBM Cyber Security Academic Track Cyber Security You are here Cyber Security Application Security Security Intelligence Analyst (4 hs instructor-led) Pre-requisite courses (10 hs self-paced) Cyber Security Course IBM Security Overview Past, Present and Future Trends Enterprise Security Industry Domains: - Healthcare - Telco - Banking - Government Case Studies in Africa IBM Research in Security Cross-skills Links and additional resources ZU370 - Introduction to HTML5 and JavaScript Programming HTML5 development support for cross-platform applications Code JavaScript functions, and use the form elements of HTML5 DEV452 Database Academic Associate e-learning Course Relational database concepts, DB2 and Data Studio overview SQL and database objects, data concurrency and locking Database Security and troubleshooting DB2 purexml and Application Development The Next IM Frontier Big Data XF2015 X-Force 2015 Trend and Risk Security Report This report is an analysis of the security landscape, designed to help individuals better understand the latest security risks.
23 IBM Cyber Security Academic Track Application Security You are here Cyber Security Application Security Security Intelligence Analyst IBM Official Courses (24 hs instructor-led) RT330 - Essentials of Web Application Security Web Application Basics Hacking Introduction to Web Application Security OWASP Top 10 Web Application Security Vulnerabilities WASC threat classifications 7 coding principles that will help secure Web applications Common Vulnerabilities such as SQL Injection & Cross-site scripting Describe best practices for integrating security in the SDLC Threat Modeling & Application Security Testing TK400 - IBM Security AppScan Standard Fundamentals Use advanced techniques to scan web applications Describe potential risks of conducting automated security scans Review scan results, filter false positives Prioritize issues and communicate them to stakeholders Use Glass box and malware scanning. Create reports that are based on discovered security issues Security AppScan SDK and extensions Framework (AXF) IBM Textbooks Redbook: REDP Improving Your Web Application SDLC Security Posture with IBM Rational AppScan IBM Exams IBM Application Security Academic Exam IBM Certified IBM AppScan Standard Edition Test C AppScan Standard Edition
24 IBM Cyber Security Academic Track Security Intelligence Analyst You are here Cyber Security Application Security Security Intelligence Analyst IBM Official Courses (32 hs instructor-led) IBM Textbooks BQ102 - IBM Security QRadar SIEM 7.2 Network Security Dashboard Analyzing Log Activity, Network Activity and Advanced Filtering Asset and Vulnerability Assessment Offense Investigation, Rules and Tuning Reporting and Customer Support Redbook: REDP Realizing Efficient Enterprise Security Intelligence by Using IBM Security Intelligence Solutions BQ121 - IBM Security QRadar SIEM 7.2 Advanced Manage the QRadar administration functionality Create and customize network and remote hierarchies Create Reference Sets Create user security profiles and custom properties Create and deploy a Universal DSM Create event, flow and anomaly rules IBM Certified Associate - Security QRadar Test C IBM Security Qradar IBM Exams IBM Security Intelligence Analyst Academic Exam
25 IBM Cyber Security Academic Application Security Basic knowledge of: Track Prerequisite Skills English language proficiency Knowledge of HTTP, HTML coding, and development General Cyber security awareness, especially in web applications Understanding of web based security vulnerabilities (such as XSS and SQL Injection) Security Intelligence Analyst Required Prerequisites: Basic TCP/IP networking skills System administration knowledge Basic information security skills
26 IBM Cyber Security Academic Track You are here Cyber Security Application Security Security Intelligence Analyst Application - Secure your mobile applications With the explosive growth in the mobile ecosystem, mobile application security is a huge concern. New mobile application designs require new ways of testing to ensure data safety. In this article, explore different aspects of mobile application security. With hands-on examples, learn to use IBM Security AppScan Standard with mobile user agents and with emulators and actual devices for Android and ios. - IBM InfoSphere Guardium Technical Training (Course Code: GU201) This course offers a balanced mix of lectures, hands-on lab work, case studies, and testing. You will learn how to create reports, audits, alerts, metrics, compliance oversight processes, and database access policies and controls. You will also learn about system administration, archiving, purging, and backups. - IBM Proven Practices: IBM Cognos BI Authentication and Single Sign-On. Implement seamless authentication between security systems and IBM Cognos BI, using these guidelines. This document contains important information about the technical concepts and backgrounds involved and the design of authentication and single sign-on (SSO) functionality in IBM Cognos BI. It also discusses setting expectations regarding supported vs unsupported environments and information that must be gathered for troubleshooting the IBM Cognos BI side of things. This document is intended for security architects and administrators designing authentication for a system includes Cognos BI.
27 IBM Academic Roadmap Complete Academic Certification Track Overview Business Intelligence Predictive Analytics Security Content: Overview, Domains, Business Intelligence & Analytics Applications, Predictive Analysis Business Intelligence - Tool: IBM Cognos Studio Reports Courses: Business Intelligence, Report Studio: Author Professional Reports Predictive Analytics - Tool: IBM SPSS Modeler Courses: Predictive Modeling Analytics Analytics Tools for Big Data, Business Intelligence of Data Platforms, Analytics solutions
28 IBM Academic Roadmap You are here Business Intelligence Predictive Analytics Security (4 hs instructor-led) Course Analytics Industry Overview Past, Present and Future Trends Enterprise Analytics Industry Domains: - Healthcare - Telco - Banking - Government Case Studies in Africa Watson Research Cross-skills Links and additional resources Pre-requisite courses (10 hs self-paced) B IBM Cognos BI for Consumers (V10.2) Access Content and Manage Events in IBM Cognos BI Define users, groups, and roles Access published reports in IBM Cognos Connection Set access permissions, save, view and manage report versions Set alerts and watch rules on saved output Create a simple dashboard reports, add interactivity to dashboards Create a multi-page dashboard B5A08 - Overview of IBM Cognos BI (v10.2.2) Examine Report Studio and its interface with report types Create a multi-fact query and examine detail and summary filters Create and convert lists to Crosstab Reports
29 IBM Academic Roadmap Business Intelligence You are here Business Intelligence Predictive Analytics Security IBM Official Courses (40 hs instructor-led) B5A58 - IBM Cognos Report Studio: Authoring Professional Reports Fundamentals (V10.2.2) Examine Report Studio and its interface with report types Create a multi-fact query, and examine detail and summary filters Create and convert lists to Crosstab Reports Present Data Graphically B5A59 - IBM Cognos Report Studio: Author Professional Reports Advanced (V10.2.2) Examine detail filters and summary filters Format and sort crosstab reports Add RAVE visualizations Use parameters and prompts to focus data Add run-time information to the reports Pass parameter values to filter the data in drill-through targets IBM Textbooks Redbook: REDP IBM Cognos Business Intelligence V10.1: Intelligence Unleashed IBM Exams IBM Business Intelligence - Academic Exam IBM Professional Certification Cognos BI Reports IBM Certified Designer - Cognos 10 BI Reports Test C : IBM Cognos 10 BI Author
30 IBM Academic Roadmap Predictive Analytics You are here Business Intelligence Predictive Analytics Security IBM Official Courses (40hs instructor-led) 0A005 - Introduction to IBM SPSS Modeler & Data Mining (V16) Explain the stages of the CRISP-DM process model. Modeling objectives, classification, work with nodes and supernodes. Explain the primary concepts used in data mining. Build, evaluate and deploy a model. Add records and fields from multiple datasets into one dataset. 0A055 - Advanced Data Preparation IBM SPSS Modeler (V16) Importing dates from data sources, and data transformation Count and state forms of the derive node Data sampling and reduction principal components, SQL optimization Decision Trees, Time series analysis, Linear, Cox and Logistic regression 0A0G2 - Automated Data Mining with IBM SPSS Modeler Building predictive models, automation and customer segmentation Reading and preparing data for modeling using a variety of methods IBM Textbooks Redbook: REDP IBM SPSS predictive analytics: Optimizing decisions at the point of impact IBM Exams IBM Predictive Analytics - Academic Exam IBM Certified Associate - SPSS Modeler Data Analysis v2 Test C : IBM SPSS Modeler Data Mining for Business Partners
31 IBM Academic Roadmap Prerequisite Skills Business Intelligence Knowledge of your organizations business intelligence process and reporting needs Experience using the Windows operating system Experience using a Web browser Basic knowledge of SQL Basic knowledge of XML Predictive Analytics General computer literacy
32 IBM Academic Roadmap Predictive Analytics You are here Business Intelligence Predictive Analytics Security Application Installing and configuring the Symbian Simulator for Cognos Go This document provides step by step instructions on how to install and configure the Symbian simulator for use with IBM Cognos GO!. Learn how to Find the Java Development Kit jdk-1_5_0_x, installing the Java Wireless Toolkit, obtain a local copy of the cognos_mobile.jad file and laundhing the Go! in the Symbian Simulator. Security IBM Analytics Proven Practices: IBM Cognos BI Authentication and Single Sign-On. Implement seamless authentication between security systems and IBM Cognos BI, using these guidelines. This document contains important information about the technical concepts and backgrounds involved and the design of authentication and single sign-on (SSO) functionality in IBM Cognos BI. It also discusses setting expectations regarding supported vs unsupported environments and information that must be gathered for troubleshooting the IBM Cognos BI side of things. This document is intended for security architects and administrators designing authentication for a system includes Cognos BI.
33 Facebook Page: IBM MEA University Program-Egypt Summer Boot Camp July 25 (IBM & ITI)
34 Oriette Mohamed Nayel Manager, Middleware Lab Services IBM Egypt
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
IBM BigInsights Has Potential If It Lives Up To Its Promise. InfoSphere BigInsights A Closer Look
IBM BigInsights Has Potential If It Lives Up To Its Promise By Prakash Sukumar, Principal Consultant at iolap, Inc. IBM released Hadoop-based InfoSphere BigInsights in May 2013. There are already Hadoop-based
Mobile Cross Platform Development really? Jonathan Marshall, IBM Mobile Technical Specialist. 2013 IBM Corporation
Mobile Cross Platform Development really? Jonathan Marshall, IBM Mobile Technical Specialist Objectives Worklight update Brief demonstration Experiences around cross-platform development 2 IBM MobileFirst
What s Happening to the Mainframe? Mobile? Social? Cloud? Big Data?
Glenn Anderson, IBM Lab Services and Training What s Happening to the Mainframe? Mobile? Social? Cloud? Big Data? Summer SHARE August 2014 Session 15595 (c) Copyright 2014 IBM Corporation 1 Today s mainframe
2015 Ironside Group, Inc. 2
2015 Ironside Group, Inc. 2 Introduction to Ironside What is Cloud, Really? Why Cloud for Data Warehousing? Intro to IBM PureData for Analytics (IPDA) IBM PureData for Analytics on Cloud Intro to IBM dashdb
DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group
DevOps Best Practices for Mobile Apps Sanjeev Sharma IBM Software Group Me 18 year in the software industry 15+ years he has been a solution architect with IBM Areas of work: o DevOps o Enterprise Architecture
Initial Value Proposition (IVP) www.techcusp.com
Initial Value Proposition (IVP) Introduction Tech Cusp, Inc. TechCusp is Global, full-service IT Services & Software Development firm Founded in 2006 Techcusp.com is a privately held end-to-end IT services
Introduction to IBM Worklight Mobile Platform
Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.
Build and Secure Mobile Apps in the Enterprise. Ed Brill Ian Robinson Josh Lambert
Build and Secure Mobile Apps in the Enterprise Ed Brill Ian Robinson Josh Lambert Introductions Ed Brill Director, Mobile Enterprise Marketing IBM Ian Robinson Program Director, MobileFirst Platform and
IBM MobileFirst Hands-on Labs environment with Linux on z Systems and z/os
IBM MobileFirst Hands-on Labs environment with Linux on z Systems and z/os Session Nr: 16772 + 16773 Wilhelm Mild Executive IT Architect [email protected] Erich Amrehn Distinguished Engineer [email protected]
QA Tools (QTP, QC/ALM), ETL Testing, Selenium, Mobile, Unix, SQL, SOAP UI
QA Tools (QTP, QC/ALM), ETL Testing, Selenium, Mobile, Unix, SQL, SOAP UI From Length: Approx 7-8 weeks/70+ hours Audience: Students with knowledge of manual testing Student Location To students from around
What s Happening to the Mainframe? Mobile? Social? Cloud? Big Data?
December, 2014 What s Happening to the Mainframe? Mobile? Social? Cloud? Big Data? Glenn Anderson IBM Lab Services and Training Today s mainframe is a hybrid system z/os Linux on Sys z DB2 Analytics Accelerator
Take full advantage of IBM s IDEs for end- to- end mobile development
Take full advantage of IBM s IDEs for end- to- end mobile development ABSTRACT Mobile development with Rational Application Developer 8.5, Rational Software Architect 8.5, Rational Developer for zenterprise
SQL Server 2012 Business Intelligence Boot Camp
SQL Server 2012 Business Intelligence Boot Camp Length: 5 Days Technology: Microsoft SQL Server 2012 Delivery Method: Instructor-led (classroom) About this Course Data warehousing is a solution organizations
Essentials for IBM Cognos BI (V10.2) Overview. Audience. Outline. Актуальный B5270 5 дн. / 40 час. 77 800 руб. 85 690 руб. 89 585 руб.
Essentials for IBM Cognos BI (V10.2) Overview Essentials for IBM Cognos BI (V10.2) is a blended offering consisting of five-days of instructor-led training and 21 hours of Web-based, self-paced training.
Microsoft Training and Certification Guide. Current as of December 31, 2013
Microsoft Training and Certification Guide Current as of December 31, 2013 Welcome to the Microsoft Training and Certification Guide. This device is intended to provide a quick, comprehensive view of our
IBM Worklight Mobile Application development and Management. 2012 IBM Corporation
IBM Worklight Mobile Application development and Management MOBILE: the next stage in computing s evolution Mobile/Wireless/Cloud Web/Desktop Client/Server Host/Mainframe Mobile is different: Ubiquitous
Integrating Mobile apps with your Enterprise
Integrating Mobile apps with your Enterprise Jonathan Marshall [email protected] @jmarshall1 Agenda Mobile apps and the enterprise Integrating mobile apps with Enterprise Applications Mobile apps and
eeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
QA Tools (QTP, QC/ALM), Selenium with Java, Mobile with Automation, Unix, SQL, SOAP UI
QA Tools (QTP, QC/ALM), Selenium with Java, Mobile with Automation, Unix, SQL, SOAP UI From Length: Approx 7-8 weeks/70+ hours Audience: Students with knowledge of manual testing Student Location To students
Successful Mobility. Matej Lavric Sales Leader for Mobile CEE
Successful Mobility Matej Lavric Sales Leader for Mobile CEE There are 7.1 billion people on the planet 6 billion of them have access to mobile phones, only 3.5 billion of them use a toothbrush 2 90% of
XpoLog Competitive Comparison Sheet
XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
IBM BigInsights for Apache Hadoop
IBM BigInsights for Apache Hadoop Efficiently manage and mine big data for valuable insights Highlights: Enterprise-ready Apache Hadoop based platform for data processing, warehousing and analytics Advanced
Microsoft Training and Certification Guide. Current as of March 16, 2015
Microsoft Training and Certification Guide Current as of March 16, 2015 Welcome to the Microsoft Training and Certification Guide. This guide is intended to provide a quick, comprehensive view of our training
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle Safe Harbor Statement The following is intended to outline our general
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
Data Integration Checklist
The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media
Cross Platform Applications with IBM Worklight
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.11, November 2015 101 Cross Platform Applications with IBM Worklight P.S.S.Vara Prasad and Mrs.S.Durga Devi Dept. of IT
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Ragy Magdy Regional Channel Manager MEA IBM Security Systems
Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by
Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP
Big-Data and Hadoop Developer Training with Oracle WDP What is this course about? Big Data is a collection of large and complex data sets that cannot be processed using regular database management tools
Implementing Data Models and Reports with Microsoft SQL Server 20466C; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Implementing Data Models and Reports with Microsoft SQL Server 20466C; 5
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
ExecuTrain Live Virtual Training Schedule. Sepetember December 2013
ExecuTrain Live Virtual Training Schedule Sepetember December 2013 What is a Live Virtual? Get Live Virtual, Instructor-led room Learning at your desktop or wherever your Internet connection allows you
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics Please note the following IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
BIG DATA HADOOP TRAINING
BIG DATA HADOOP TRAINING DURATION 40hrs AVAILABLE BATCHES WEEKDAYS (7.00AM TO 8.30AM) & WEEKENDS (10AM TO 1PM) MODE OF TRAINING AVAILABLE ONLINE INSTRUCTOR LED CLASSROOM TRAINING (MARATHAHALLI, BANGALORE)
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Fast and Easy Delivery of Data Mining Insights to Reporting Systems
Fast and Easy Delivery of Data Mining Insights to Reporting Systems Ruben Pulido, Christoph Sieb [email protected], [email protected] Abstract: During the last decade data mining and predictive
Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer
Automated Data Ingestion Bernhard Disselhoff Enterprise Sales Engineer Agenda Pentaho Overview Templated dynamic ETL workflows Pentaho Data Integration (PDI) Use Cases Pentaho Overview Overview What we
IBM Cognos Training: Course Brochure. Simpson Associates: SERVICE www.simpson associates.co.uk
IBM Cognos Training: Course Brochure Simpson Associates: SERVICE www.simpson associates.co.uk Information Services 2013 : 2014 IBM Cognos Training: Courses 2013 2014 +44 (0) 1904 234 510 training@simpson
BusinessObjects XI R2 Product Documentation Roadmap
XI R2 Product Documentation Roadmap XI R2 indows and UNIX Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents, which may cover products that are offered
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
IBM MobileFirst Launch David Lee Heyman
IBM MobileFirst Launch David Lee Heyman WW Mobile Business Agility Tiger Team IBM's Mobile Enterprise - A personal journey Watch now: http://youtu.be/0sealyljfag Announcing: IBM MobileFirst 5 2013 IBM
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Bachelor of Science in Business Administration - Information Systems and Technology Major
Bachelor of Science in - Information Systems and Technology Major Ling Li, Chair Li Xu, Information Technology Area Coordinator Roya Ardalan, Chief Discipline Advisor The information systems and technology
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal [email protected] [email protected] www.maas360.com Why Mobile Applications are a Must? Rising
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
... Introduction... 17. ... Acknowledgments... 19
... Introduction... 17... Acknowledgments... 19 PART I... Getting Started... 21 1... Introduction to Mobile App Development... 23 1.1... The Mobile Market and SAP... 23 1.1.1... Growth of Smart Devices...
Develop enterprise mobile applications with IBM Rational software
Develop enterprise mobile applications with IBM software Providing comprehensive mobile application development and lifecycle management solutions Highlights Helps streamline and optimize the software
Introduction to IBM Cognos Business Intelligence (BI)
Introduction to IBM Cognos Business Intelligence (BI) New England Users Group (NEDB2UG) Sturbridge, Massachusetts, USA, http://www.nedb2ug.org November 20, 2014 Milan Babiak Technical Solution Architect
Consulting and Systems Integration (1) Networks & Cloud Integration Engineer
Ericsson is a world-leading provider of telecommunications equipment & services to mobile & fixed network operators. Over 1,000 networks in more than 180 countries use Ericsson equipment, & more than 40
The Power of the Unica Marketing Platform
White Paper The Power of the Unica Marketing Platform The Unica Marketing Platform is a set of administration tools, user interface elements and integration services shared by all Unica products. First
Infor CRM Education on Infor Campus
Infor CRM Education on Infor Campus Infor CRM courses are located on Infor Campus here! Instructions to locate and register for Infor CRM videos, non-certification, and certification courses are included
Big Data Analytics: Where is it Going and How Can it Be Taught at the Undergraduate Level?
Big Data Analytics: Where is it Going and How Can it Be Taught at the Undergraduate Level? Dr. Frank Lee Chair, ECE/CS/IT New York Institute of Technology Old Westbury, NY 11568 Topics This talk describes:
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Course Outline: Course: Implementing a Data Warehouse with Microsoft SQL Server 2012 Learning Method: Instructor-led Classroom Learning
Course Outline: Course: Implementing a Data with Microsoft SQL Server 2012 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This 5-day instructor-led course describes
MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper
MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle
IBM InfoSphere BigInsights Enterprise Edition
IBM InfoSphere BigInsights Enterprise Edition Efficiently manage and mine big data for valuable insights Highlights Advanced analytics for structured, semi-structured and unstructured data Professional-grade
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
Big Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
HTML5. Turn this page to see Quick Guide of CTTC
Programming SharePoint 2013 Development Courses ASP.NET SQL TECHNOLGY TRAINING GUIDE Visual Studio PHP Programming Android App Programming HTML5 Jquery Your Training Partner in Cutting Edge Technologies
Course Summary. Prerequisites
Course Summary Kony MobileFabric 6.5 The Kony MobileFabric course is intended for developers and integrators working with Kony MobileFabric and Kony Studio. This course consists of 6 self-paced modules,
IBM Big Data Platform
IBM Big Data Platform Turning big data into smarter decisions Stefan Söderlund. IBM kundarkitekt, Försvarsmakten Sesam vår-seminarie Big Data, Bigga byte kräver Pigga Hertz! May 16, 2013 By 2015, 80% of
Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes
Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes Highly competitive enterprises are increasingly finding ways to maximize and accelerate
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
Microsoft 20466 - Implementing Data Models and Reports with Microsoft SQL Server
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20466 - Implementing Data Models and Reports with Microsoft SQL Server Length 5 days Price $4070.00 (inc GST) Version C Overview The focus of this five-day
Outlines. Business Intelligence. What Is Business Intelligence? Data mining life cycle
Outlines Business Intelligence Lecture 15 Why integrate BI into your smart client application? Integrating Mining into your application Integrating into your application What Is Business Intelligence?
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
IBM Cognos 8 Business Intelligence Analysis Discover the factors driving business performance
Data Sheet IBM Cognos 8 Business Intelligence Analysis Discover the factors driving business performance Overview Multidimensional analysis is a powerful means of extracting maximum value from your corporate
What s New in IBM Web Experience Factory 8.5. 2014 IBM Corporation
What s New in IBM Web Experience Factory 8.5 2014 IBM Corporation Recent history and roadmap Web Experience Factory 8.0 2012 Multi-channel Client-side mobile Aligned with Portal 8 Developer productivity
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Big Data and Trusted Information
Dr. Oliver Adamczak Big Data and Trusted Information CAS Single Point of Truth 7. Mai 2012 The Hype Big Data: The next frontier for innovation, competition and productivity McKinsey Global Institute 2012
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.
Big Data Hadoop Administration and Developer Course This course is designed to understand and implement the concepts of Big data and Hadoop. This will cover right from setting up Hadoop environment in
IBM Big Data Platform
Mike Winer IBM Information Management IBM Big Data Platform The big data opportunity Extracting insight from an immense volume, variety and velocity of data, in a timely and cost-effective manner. Variety:
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
BUSINESS TECHNOLOGY (BTE)
University of Miami Academic Bulletin 1 BUSINESS TECHNOLOGY (BTE) BTE 120. Introduction to Computer Information Systems. 3 Credit An introduction to computers and information processing, with emphasis
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices
Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices S. Rohit [email protected] Trends in Enterprise Mobility The need for business agility along with changing employee
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 20467A: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Length: 5 Days Published: December 21, 2012 Language(s): English Audience(s): IT Professionals Overview Level: 300
Digital Marketplace - G-Cloud
Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We
Implementing and Administering an Enterprise SharePoint Environment
Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified
IBM Data Warehousing and Analytics Portfolio Summary
IBM Information Management IBM Data Warehousing and Analytics Portfolio Summary Information Management Mike McCarthy IBM Corporation [email protected] IBM Information Management Portfolio Current Data
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
