-
Module 1: Overview of IBM Cognos BI
-
Module 2: Introduction to IBM Cognos BI Administration
-
Module 2: Identify IBM Cognos BI Architecture
- Lesson 1: Identify features of the IBM Cognos BI architecture
- Lesson 2: Examine Cognos BI servlets and services
- Lesson 3: Identify an example of Cognos BI request processing
- Lesson 4: Performance planning and installation options and configurations
- Lesson 5: Examine the Cognos Application Firewall
- Lesson 6: Perform a distributed installation and configuration of IBM Cognos BI on a single machine
-
Module 3: Secure the IBM Cognos BI Environment
- Lesson 1: Identify the IBM Cognos BI security model
- Lesson 2: Define authentication and authorization in IBM Cognos BI.
- Lesson 3: Identify security policies
- Lesson 4: Secure administrative capabilities (access to functionality)
- Lesson 5: Specify security settings after installation.
- Lesson 6: Implement security in IBM Cognos Framework Manager and IBM Cognos Transformer
-
Module 4: Administer the IBM Cognos BI Server Environment
- Lesson 1: Overview of administrative tasks that can be performed in IBM Cognos Administration
- Lesson 2: Monitor system metrics
- Lesson 3: Manage dispatchers and services
- Lesson 4: Tune server performance
- Lesson 5: Audit IBM Cognos BI
- Lesson 6: Formulate the IBM Cognos BI backup strategy
- Lesson 7: Identify issues while troubleshooting the server environment
-
Module 5: Manage Run Activities
-
Module 6: Manage Content in IBM Cognos Administration
-
Module 7: IBM Cognos BI for Consumers
- Module 1: Identify where Consumers access IBM Cognos BI content
- Module 2: Use published reports
- Module 3: Drill through to related data
- Module 4: Run reports with options
- Module 5: Add Comments in saved output
- Module 6: Personalize how content appears
- Module 7: Manage human tasks
- Module 8: Set alerts and watch rules
-
Module 8: Drill-Through Definitions
- Module 1: Enable users to navigate to related data in IBM Cognos BI
- Module 2: Parameter-driven drill through vs. dynamic drill through
- Module 3: Steps to enable drill-through access for a package
- Module 4: Limit the items that users can drill through from (set scope)
- Module 5: Set a measure as the scope
- Module 6: Drill Through Assistant
-
Module 9: Additional Configuration and Customization of the Environment
-
Module 10: End-to-end Workshop
-
Module 11: IBM Cognos Map Manager