Formations Formations par éditeur

Page 93 sur 106
Global Knowledge
IBM Data Privacy PassportsPar Global Knowledge

Data privacy is critical to you, but it has never been more challenging to maintain. Applications are spread across on-premises and cloud platforms, including sensitive data that needs to be protected everywhere. How can you protect your data after it leaves the system of record?

  • Your sensitive data might already be protected with encryption on a trusted system of record, such as the IBM® Z. However, as soon as that data leaves the confines of the trusted system of record, several questions immediately come to mind:
  • Can data privacy and protection be maintained and enforced?
  • Your system of record is trusted to maintain data privacy and protection. When shared, sensitive data that was encrypted is decrypted, copied, and may or may not be reencrypted before it is stored. After it is taken from that system, data protections must remain intact. Adequate controls to retain end-to-end data privacy and protection must be available.
  • Can access to data be revoked?
  • Your sensitive data must always be protected, compliance must be guaranteed, and consent must be respected. If conditions that are related to your sensitive data change, such as access or use, the ability to respond and comply must be possible.
  • Is data privacy and protection provable?
  • Information about data access, use, and policies must be readily available for auditing purposes. In addition, time that is spent by your security staff, auditors, and developers to administer and prove proper data privacy and protection is in place, should be minimized.
  • To help you safeguard your sensitive data and provide ease of auditability and control, IBM introduced a new capability for IBM Z® called IBM Data Privacy Passports. It can help minimize the risk and impact of data loss and privacy breaches when collecting and storing sensitive data. Data Privacy Passports can manage how data is shared securely through a central control of user access.
  • Data Privacy Passports can protect data wherever it goes. Security policies are kept and honored whenever the data is accessed. Future data access may be revoked remotely via Data Privacy Passports, long after data leaves the system of record, and sensitive data may even be made unusable simply by destroying its encryption key.
  • Data Privacy Passports is designed to help reduce the time that is spent by staff to protect data and ensure privacy throughout its lifecycle via a central point of control.
  • IBM Data Privacy Passports extends your data security in several ways. This includes protecting sensitive data, even when it is shared over diverse environments, preventing unauthorized access, and enhancing data privacy within a trusted environment.

• This course will demonstrate how Data Privacy Passports will provide privacy protection to your environment and assist with your security strength in depth strategy.

• In this course you will learn how leveraging the Data Centric Audit and Protection (DCAP) capabilities of IBM Data Privacy Passports can help safeguard all sensitive data to comply with data privacy regulations, minimize the amount of sensitive data needlessly shared within the organization and to 3rd parties, ease the burden of manual and cumbersome audits, revoke access to sensitive data, and ultimately have full control over the protection of your data wherever it goes.

Important
This course consists of several independent modules. The modules, including the lab exercises, stand on their own and do not depend on any other content.

Exercises and recorded demos reinforce the concepts and technologies being covered in the lectures.

Global Knowledge
IBM SPSS Modeler (v18.1.1) : Segmentation clientsPar Global Knowledge

This course focuses on using analytical models to predict a categorical field, such as churn, fraud, response to a mailing, pass/fail exams, and machine break-down. Students are introduced to decision trees such as CHAID and C&R Tree, traditional statistical models such as Logistic Regression, and machine learning models such as Neural Networks. Students will learn about important options in dialog boxes, how to interpret the results, and explain the major differences between the models.

M2i Formation
Google Workspace - Créer un site d'équipePar M2i Formation
  • Créer un site "plateforme" de projet interne ou d'équipe
  • Publier le site avec autorisations et permissions
  • Collaborer en temps réel.
Dawan
GroovyPar Dawan

Maîtriser la programmation avec Groovy

Micropole Institut
Oracle Data Integrator v12 (aperçu v11)Par Micropole Institut

Cette formation Oracle Data Integrator a pour objectif :

  • Identifier les différents composants d'une architecture Oracle Data Integrator (ODI)
  • Installer et configurer une architecture ODI
  • Utiliser ODI Studio pour intégrer des données.
M2i Formation
PowerShell - Automatiser l'administrationPar M2i Formation
  • Décrire les concepts de base de PowerShell (version 4 et 5)
  • Mettre en oeuvre les pipelines
  • Décrire comment cela fonctionne
  • Utiliser PSProviders et PSDrives
  • Afficher les sorties d'écran
  • Utiliser WMI et CIM
  • Préparer le scripting
  • Intégrer les commandes
  • Administrer les ordinateurs à distance
  • Utiliser les différents composants Windows PowerShell ensemble
  • Utiliser les travaux en arrière-plan et les tâches planifiées
  • Utiliser les techniques avancées et les profils PowerShell.
Global Knowledge
PowerHA SystemMirror 7 : Planification, mise en oeuvre et administrationPar Global Knowledge

Ce cours de 5 jours permet d'acquérir les compétences nécessaires pour concevoir et configurer un cluster en haute disponibilité.

Les participants découvriront les fonctionnalités du produit et profiteront des ressources matérielles mises à disposition pour configurer et tester leur premier cluster. IBM PowerHA SystemMirror 7.2.1 représente la nouvelle génération de solutions de haute disponibilité.

Ce cours comprend différents modules indépendants les uns des autres ainsi que de nombreux exercices.

M2i Formation
Oracle 12c - Sauvegardes et restaurationsPar M2i Formation
  • Identifier les mécanismes importants mis en oeuvre pour les sauvegardes et restaurations d'une base de données Oracle
  • Définir une stratégie de sauvegarde adaptée à vos bases de données Oracle
  • Utiliser les utilitaires de sauvegardes et restaurations logiques export et import Data Pump
  • Réparer une base de données en mode NOARCHIVELOG en cas de perte de fichier datafile, controlfile, redolog, spfile...
  • Mettre en place le mode ARCHIVELOG et gérer l'archivage
  • Réparer une base de données en mode ARCHIVELOG en cas de perte de fichier datafile, controlfile, redolog, spfile, reprises partielles ou totales
  • Identifier RMAN (Recovery Manager) et ses principales commandes
  • Mettre en oeuvre et utiliser les technologies Flashback d'une base de données Oracle.
Global Knowledge
IBM InfoSphere QualityStage v11.5 : Niveau AvancéPar Global Knowledge

Ce cours de 4 jours vous guide à travers les processus de nettoyage des données de QualityStage. Vous apprendrez à transformer une source de données non structurée dans un format adapté pour le chargement dans une cible de données existante. Vous nettoyerez la source de données en concevant une règle client que vous créez et utiliser pour régler la standardisation des données.

Evolution-Nord
Google agendaPar Evolution-Nord
Maitriser toutes les fonctionnalités permettant de gérer son agenda en ligne, le partager, gérer ses tâches, le piloter depuis un smartphone.