We are constantly expanding our range of courses. If you have requirements for other courses which you don’t see on our website, try our SEARCH button at the top of each web page, or contact us as the course you are looking for may very well be available and is not yet visible on our website.



Many more courses to come…


TEST DRIVEN DEVELOPMENT– GTOTD – 2-3 days depending on previous experience and scope.

Tools, patterns and techniques for writing well-designed and testable code

Test-driven development is one of the key enablers for agile development, that allows us to develop stable and refactorable code, whose intent is clear and whose design can evolve incrementally. TDD allows us to capture and validate the rules governing the behaviour of our code.

And… it’s also fun! There’s a bunch of interesting tools available to assist us in developing robust tests, in identifying which tests to write, to help us compose tests and to automatically run our tests.

The course is taught through presentation, demos, plenty of hands-on labs and directed discussions.

More information…


This course teaches the basics of the administration and deployment of business processes and service-based applications in IBM Business Process Manager Advanced 8.0. It provides systems administrators, solutions administrators, and operators with the skills they need to install, configure, and manage Business Process Manager applications and to troubleshoot common problems. The course also covers the relationship of IBM Business Process Manager to the prior WebSphere Process Server product and the new functionality introduced with the “Process Center” function of IBM Business Process Manager Advanced 8.0.


  • Overview of IBM Business Process Manager
  • Installing and Configuring IBM Business Process Manager
  • Administering “Process Center” environments
  • Installing Business Process Applications
  • Business Process Choreography
  • Human Task Management
  • Business Rules
  • Problem Determination and Resolution
  • Connectivity and Transformation Options
  • Administering the Messaging Infrastructure
  • Performance Monitoring and Tuning
  • Clustering Process Server environments


What you will learn. After completing this course, the student should be able to:

  • Install and configure IBM Business Process Manager
  • Explain the relationship between “Process Center” and “Process Server” environments
  • Install, configure and manage business processes and service-based applications
  • Query the status of an individual execution of a business process
  • Manage Human Tasks and Business Rules
  • Compensate for unexpected process errors
  • Use various troubleshooting tools and techniques to diagnose problems
  • Control the routing and transformation of service requests
  • Configure messaging resources required for Process Server runtime
  • Improve the performance of the Process Server runtime
  • Create a clustered Process Server environment

More information…


This course teaches the participants on how to build integration solutions using IBM Integration Designer (IID) for deployment into IBM Business Process Manager 8.0 Advanced edition. This class starts with Service Oriented Architecture (SOA) basics. Participants will learn about the Service Component Architecture (SCA) programming model and the Service Data Objects (SDO) data model. Business process development using The role of adapters when integrating disparate back ends is discussed and participants learn about the IID tooling in detail.


  • SOA Fundamentals
  • Advantages of SOA
  • Introduction to IBM Business Process Manager 8.0 Advanced edition.
  • Service Component Architecture (SCA)
  • Business Objects
  • Business Process Choreography
  • WebSphere Business Integration Adapters
  • WebSphere Adapters JCA
  • Mapping interfaces and Business Objects
  • Relationships
  • Business Rules
  • Selectors
  • Human Task Management
  • Basics of IBM Process Manager: Process Server Administration

What you will learn. After completing this course, the student should be able to:

  • Describe the fundamentals of SOA
  • Understand the business advantages of SOA
  • Explain the SOA runtime element
  • IBM Integration Designer (IID) fundamentals
  • Develop complex business processes using WS-BPEL v2.0
  • Develop a web based client for a business process
  • List the various tooling features in IID and use them to build integration solutions
  • Describe the various IBM Adapters available to integrate disparate systems
  • Explain the Java Connector Architecture (JCA) and learn to use JCA adapters
  • Learn to use the Human Tasks feature when developing Business Processes (BPEL)
  • Explain the Common Event Infrastructure (CEI)
  • Understand the basics of IBM Business Process Manager: Process Server administration

More information…


This 2-day course examines and establishes the fundamental theories, concepts, domains, techniques and terminology that are essential for every business and information technology professional who is involved in data warehousing. Students are introduced to best practice approaches and structures for data warehouse development and implementation. Common definitions and characteristics of data warehouses, data warehouse architectures, readiness issues, incremental data warehouse project planning, data warehouse strategy and mistakes to avoid all receive special emphasis.

This course concentrates on data warehouse deliverables independent of any specific methods, but within the framework of best practices. It focuses on understanding deliverables that may be produced throughout the data warehouse process and issues reasons for producing them. This course closes with exploration for practical next steps the students can take. This includes steps further to develop knowledge and skills, to position oneself for success, and to get started with data warehousing.

More information…


The workshop provides a full discussion of and experience with database design. Three types of trade-offs to the data will be applied – technology, safe and aggressive tradeoffs. Safe compromises are trade-offs that will optimize the data model without compromising integrity or redundancy. An example of a safe trade-off is to partition a table. Aggressive compromises will optimize the data but may comprise data integrity. An example of this is to store redundant data. Technology trade-offs use overhead features of the DBMS, such as indices. Indices can improve query performance but can compromise maintenance performance. You will learn how to apply safe, aggressive and technology trade-offs for optimizing the data.

More information…


Course Description

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.

Course Objectives:

In this course, you will develop, operate, manage, and enforce security capabilities for systems and networks.

You will:

  • Assess information security risk in computing and network environments.
  • Create an information assurance lifecycle process.
  • Analyze threats to computing and network environments.
  • Design secure computing and network environments.
  • Operate secure computing and network environments.
  • Assess the security posture within a risk management framework.
  • Collect cybersecurity intelligence information.
  • Analyze collected intelligence to define actionable response.
  • Respond to cybersecurity incidents.
  • Investigate cybersecurity incidents.
  • Audit secure computing and network environments.


5 Days

More information…