Oracle BI /
ODI

ODI

ODI Online Training

Sap Rams Training offering the best ODI Online Training.

Who is Eligible:

Any Graduates/Post Graduates are eligible.
Anyone having knowledge in Data Warehousing technologies.
Any technical background consultants are eligible to learn ODI Online Training.

  • 1

    What is Oracle Data Integrator

    20:56
  • 2

    Why Oracle Data Integrator

    20:56
  • 3

    Overview of ODI 11g Architecture

    20:56
  • 4

    Overview of ODI 11g Components

    20:56
  • 5

    About Graphical Modules

    20:56
  • 6

    Types of ODI Agents

    20:56
  • 7

    Overview of Oracle Data Integrator Repositories

    20:56
  • 1

    Oracle 11G Database

    20:56
  • 3

    Weblogic Server 11G

    20:56
  • 1

    Administrating the ODI Repositories

    20:56
  • 2

    Creating Repository Storage Spaces

    20:56
  • 3

    Creating and Connecting to the Master Repository

    20:56
  • 4

    Creating and Connecting to the Work Repository

    20:56
  • 5

    Managing ODI Agents

    20:56
  • 6

    Creating a Physical Agent

    20:56
  • 7

    Launching a Listener, Scheduler and Web Agent

    20:56
  • 8

    Example of Load Balancing

    20:56
  • 1

    Overview of ODI Topology

    20:56
  • 2

    About Data Servers and Physical Schemas

    20:56
  • 3

    Defining the Physical Architecture

    20:56
  • 4

    Defining the Logical Architecture

    20:56
  • 5

    Mapping Logical and Physical Resources

    20:56
  • 6

    Defining Agents

    20:56
  • 7

    Defining a Topology

    20:56
  • 8

    Planning the Topology

    20:56
  • 1

    Overview of Topology Navigator

    20:56
  • 2

    Creating Physical Architecture

    20:56
  • 3

    Creating a Data Server

    20:56
  • 4

    Testing a Data Server Connection

    20:56
  • 5

    Creating a Physical Schema

    20:56
  • 6

    Creating Logical Architecture

    20:56
  • 7

    Overview of Logical Architecture and Context Views

    20:56
  • 8

    Linking the Logical and Physical Architecture

    20:56
  • 1

    Overview of ODI Projects

    20:56
  • 2

    Creating a New Project

    20:56
  • 4

    Organizing Projects and Folders

    20:56
  • 5

    Understanding Knowledge Modules

    20:56
  • 6

    Exchanging ODI Objects

    20:56
  • 7

    Exporting and Importing Objects

    20:56
  • 1

    What is a Model

    20:56
  • 2

    Understanding Metadata in ODI

    20:56
  • 3

    Understanding Reverse Engineering

    20:56
  • 4

    Creating Models

    20:56
  • 5

    Organizing Models

    20:56
  • 6

    Creating Data stores

    20:56
  • 7

    Using Constraints in ODI

    20:56
  • 8

    Creating Keys and References

    20:56
  • 1

    What is an Interface

    20:56
  • 2

    Business Rules for Interfaces

    20:56
  • 3

    What is a Mapping

    20:56
  • 5

    What is a Filter

    20:56
  • 6

    What is a Constraint

    20:56
  • 7

    What is a Staging Area

    20:56
  • 8

    Creating a Basic Interface

    20:56
  • 1

    What is an Interface

    20:56
  • 2

    Business Rules for Interfaces

    20:56
  • 3

    What is a Mapping, Filter, Join

    20:56
  • 4

    Overview of Integration Process

    20:56
  • 5

    What is a Staging Area

    20:56
  • 6

    About Execution Location

    20:56
  • 7

    Using Knowledge Modules (KM) with ODI Interface

    20:56
  • 8

    Creating a Basic Interface

    20:56
  • 1

    Designing an Interface

    20:56
  • 2

    Multiple Source Data stores

    20:56
  • 5

    Disabling Transformations

    20:56
  • 6

    Overview of the Flow

    20:56
  • 7

    Specifying the Staging Area

    20:56
  • 8

    Selecting Knowledge Modules

    20:56
  • 1

    Monitoring Interfaces

    20:56
  • 3

    Viewing Sessions and Tasks

    20:56
  • 4

    How to Monitor Execution of an Interface

    20:56
  • 5

    How to Troubleshoot a Session

    20:56
  • 6

    Keys to Reviewing the Generated Code

    20:56
  • 7

    Working with Errors

    20:56
  • 8

    Tips for Preventing Errors

    20:56
  • 1

    Using Business Rules in Interfaces

    20:56
  • 2

    Overview of Business Rule Elements

    20:56
  • 3

    Using variables

    20:56
  • 4

    Using User Functions

    20:56
  • 5

    Using Substitution Methods

    20:56
  • 7

    Developing Your Own KM

    20:56
  • 8

    Using RKM for Customized Reverse Engineering

    20:56
  • 1

    What is a Procedure

    20:56
  • 2

    Examples of Procedures

    20:56
  • 3

    Creating Procedures

    20:56
  • 4

    Adding Commands

    20:56
  • 6

    Running a Procedure

    20:56
  • 7

    Using Operator to View Results

    20:56
  • 1

    What is a package

    20:56
  • 2

    Creating a package

    20:56
  • 3

    Executing a package

    20:56
  • 4

    Creating Advanced Packages

    20:56
  • 6

    Controlling an Execution Path

    20:56
  • 7

    Creating a Loop

    20:56
  • 8

    Using the Advanced tab

    20:56
  • 1

    What is a Scenario

    20:56
  • 2

    Managing Scenarios

    20:56
  • 3

    Preparing Scenarios for Deployment

    20:56
  • 4

    Automating Scenario Management

    20:56
  • 5

    Scheduling the ODI Scenario

    20:56
  • 6

    Overview of ODI version management

    20:56
  • 7

    Using Version Browser and Version Comparison Tool

    20:56
  • 8

    Handling concurrent changes

    20:56
  • 1

    Why Data Quality

    20:56
  • 2

    When to Enforce Data Quality

    20:56
  • 3

    Data Quality in Source Applications

    20:56
  • 4

    Data Quality Control in the Integration Process

    20:56
  • 5

    Data Quality in the Target Applications

    20:56
  • 6

    Enforcing Data Quality

    20:56
  • 7

    Exploring Your Data

    20:56
  • 8

    Auditing Data Quality

    20:56
  • 1

    Overview of ODI version management

    20:56
  • 2

    Techniques of Changed Data Capture

    20:56
  • 3

    Changed Data Capture in ODI

    20:56
  • 4

    CDC Strategies and Infrastructure

    20:56
  • 5

    CDC Consistency

    20:56
  • 7

    Viewing Data/Changed data

    20:56
  • 8

    Using Journalizing

    20:56
  • 1

    Using Open Tools

    20:56
  • 2

    Installing Open Tools

    20:56
  • 3

    Using Open Tools in a Package

    20:56
  • 4

    Using Open Tools in a Procedure or in a KM

    20:56
  • 5

    Developing Your Own Open Tools

    20:56
  • 6

    Setting Up ODI Security

    20:56
  • 7

    Defining Security Policies

    20:56
  • 8

    Defining Password Policy

    20:56
N/A