i2 iBase is an intuitive intelligence data management application that enables collaborative teams of analysts to capture, control and analyze multi-source data in security-rich workgroup environments. It addresses the analyst’s daily challenge of discovering and uncovering networks, patterns and trends in today’s increasing volumes of complex structured and unstructured data. i2 iBase provides a multi-user data sharing environment that combines rich analysis and visualization capabilities with dissemination tools.
Database designers and administrators use i2 iBase Designer to design, create and update, configure and maintain iBase databases as well as to perform tasks that can only be done when other users are excluded from the database.
This 3-day hands-on course covers the concepts required to use i2 iBase Designer at its full potential.
The i2 iBase Designer Training meets the following learning objectives
Understand the concepts, the development cycle, and the architecture of an iBase database.
Learn how to identify users and their needs.
Learn how to model, create, and configure iBase databases.
Learn how to deploy iBase databases and access them via Analyst's Notebook and iBase.
Discover the Administration pane within iBase Designer.
iBase Designer terminology.
Explanation and discussion around database concepts.
Mapping the data flow and identifying the different levels of database usage.
Modeling the database (entities, links and respective fields).
Creation of an organizational database with a focus on modeling (entities, links, fields and menus).
Review the information flow and modeling through iBase.
Creation of a second database.
Scenario with focus on modeling, information distribution and security established in iBase.
Administration and options within iBase Designer (import, user security, information dissemination, schedules, upsize in SQL, indexing, migration and reconfiguration of the database).
Understanding the basics and working knowledge of Windows environment, Windows Explorer, Microsoft Office and Web browsers.
Being familiar with database concepts.
Having successfully completed the i2 Analyst's Notebook Training - Part 1 and/or using i2 Analyst's Notebook frequently and understanding its basic functions and concepts.
Having successfully completed the i2 iBase User Training and/or using i2 iBase frequently and understanding its basic functions and concepts.
This training is designed for criminal intelligence or fraud analysts and anyone else considering the use of i2 iBase Designer.
This training is also intended for IT teams supporting a team of investigators using i2 iBase.