VueJS has rapidly gained popularity as one of the most widely used JavaScript frameworks, known for its approachability. In this course, you will delve into the fundamentals of VueJS, including its setup process and the underlying principles that make it work. Through practical application, you will reinforce your understanding by developing a practice project, specifically designed for this course. Prior knowledge of basic JavaScript, as well as familiarity with HTML and CSS, is recommended.
If you are searching for the right course to learn about iOS Development from scratch, you've just found it. This course will take you from a complete beginner to a confident practitioner, as we focus on practical iOS development without neglecting the theory.
Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services Create Azure App Service Web Apps Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Implement Azure functions Azure Functions overview Developing Azure Functions Implement Durable Functions Develop solutions that use blob storage Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Create an Azure Resource Manager Template Develop solutions that use Cosmos DB storage Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Create and deploy ARM templates Implement user authentication and authorization Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Implement secure cloud solutions Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Implement API Management API Management overview Defining policies for APIs Securing your APIs Develop event-based solutions Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Develop message-based solutions Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Monitor and optimize Azure solutions Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Additional course details: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Sales engineers Account managers Networking engineers Technical and non-technical audiences Overview After taking this course, you should be able to: Understand the role that programmable infrastructure is having on the transition to the digital enterprise Describe Cisco DNA, its components and benefits, and explain a few use cases Describe the different technologies and solutions within the Cisco programmable infrastructure portfolio Describe Cisco DNA Center REST APIs Understand the functionality provided by Cisco WebEx Teams Describe Cisco CMX, services, and related APIs Describe the importance of DevOps culture within network operations in the shift to becoming a digital enterprise The Programming Use Cases for Cisco Digital Network Architecture (DNAPUC) v1.0 course highlights the shift toward the digital enterprise and examines the components, benefits, and use cases of Cisco Digital Network Architecture (Cisco DNA?) in an enterprise environment. You will learning about key platforms including Cisco© DNA Center, Cisco WebEx Teams?, Cisco Connected Mobile Experiences (CMX), and their related APIs. This course also covers open standards, tools, and network APIs that you can use to complement the Cisco DNA software portfolio, including Python, JavaScript Object Notation (JSON), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Next Generation (YANG). Understanding Programmable Infrastructure Digital Enterprise Four Pillars of Digitization Network Programmability and Automation What Should Be Automated? Quantifying Programmability and Automation for the Business Network Programmability and Automation Use Cases Introducing Cisco DNA Cisco DNA Overview Cisco DNA Components Benefits of Cisco DNA Cisco DNA Use Cases Describing Programmable Infrastructure Cisco Programmability Options Data Center Infrastructure Enterprise Network Programmability Streaming Telemetry Collaboration Management, Monitoring, and Analytics Describing Network APIs How APIs Enable Business Automation API Overview Data Encoding with JSON and XML RESTful APIs RESTCONF and NETCONF Overview Data Modeling with YANG Describing Cisco DNA Center APIs Cisco DNA Center Overview Cisco DNA Center Automation Enterprise Benefits Cisco DNA Center Applications and Use Cases Cisco DNA Center REST API Overview Case Study: Network Automation at Symantec Describing Cisco Collaboration APIs Cisco Webex Teams Overview Cisco Webex Teams Business Benefits Cisco Webex Teams API Overview Describing Cisco Mobility APIs Cisco CMX Overview Cisco CMX Programmability Business Benefits Cisco CMX Mobility Services API Overview Case Study: Victoria University and Cisco CMX Implementing DevOps Culture Within Network Operations Transition to DevOps CALMS Model (Culture, Automation, Lean, Measurement, Sharing) Role of Cisco Technology in the Transition to DevOps Additional course details: Nexus Humans Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
From installation and project creation to writing tests with JUnit, Mockito, and Hamcrest, this course will cover all the important concepts that you need to get up and running with unit testing.
This is a comprehensive and practical Apache Spark course. In this course, you will learn and master the art of framing data analysis problems as Spark problems through 20+ hands-on examples, and then scale them up to run on cloud computing services. Explore Spark 3, IntelliJ, Structured Streaming, and a stronger focus on the DataSet API.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback
Learn about the Raspberry Pi, build a DIY Google Home Clone and RetroPie Gaming System, work with GPIO pins, and much more.
Efficient ways to create professional-looking diagrams, images and screenshots Cherryleaf’s popular, and affordable, online Technical Author/technical writing course teaches you the key skills of technical writing for IT and software user documentation. It's ideal if you’re: Looking to start your career as a Technical Author, Technical Writer, or similar role Writing instructions, but you’ve never had any proper training in how to do this well You’ll gain confidence you’re approaching each writing project in the right way, and creating content that follows best practice. This technical communication course is accredited by the Institute of Scientific and Technical Communicators The Technical Author/technical writing training course’s content is accredited by the Institute of Scientific and Technical Communicators, the professional body for Technical Communicators in the United Kingdom. It is an independent assessment of the course’s quality. This course is also recommended by the Society for Technical Communication (USA), the Australian Society for Technical Communication, and the Technical Communicators Association of New Zealand to their members. Learn from the experts As well as teaching technical communication, we also create end-user documentation, Help and UI text for clients. This means every course is based on practical experience of technical writing in today’s environment. The techniques you’ll learn on this course are the same ones used by our projects team. Professional certification as a technical communicator Cherryleaf’s training courses can help you be admitted to the national professional body for technical communicators in the UK (it also has members around the world) - The Institute of Scientific and Technical Communicators (ISTC). Junior Members, Members and Fellows are certified by the ISTC through a vetting process, with Members and Fellows entitled to use the initials MISTC or FISTC after their names. Being a member of the ISTC can help in having your skills and experience recognized by others. Comments from delegates There is something new to learn for most technical authors who are in the early stages of their career. Overall, I would say that the course did benefit me, and I can see myself revisiting parts of it in the future. Emma W., ARM plc I attended a job interview which included a written exercise where I had to jot down how I would go about designing and presenting information for the users of the service unit I was applying to. I could not believe my luck, it was as if the interviewer had designed it with the contents of this course in mind, and, as a result, I got the job! Amber A. I thought it was an excellent course – very thought-provoking and useful. The exercises were enjoyable and really helped, far beyond simply reading from a book about the tasks involved in the job. And I greatly appreciate all your advice and support. Karl D. Thank you very much for all your feed-back – I’ve been reading through this as it has come in this morning. This is really useful and very much appreciated. David H. Who is this course for? This course is ideal for you if you need to: Create end-user documentation and other forms of instructional content with ease Master the fundamentals of technical writing Get a solid understanding of the Technical Author’s role. This course is ideal for more experienced technical writers who’ve never had any formal training. What is a Technical Author? Technical Authors are sometimes known as: Technical Communicators, Technical Writers, Content Developers, Information Developers and Documentarians. Based in the United States or mainland Europe? We've designed the course to work for people living all around the world. On the videos, you'll hear a lovely, clear British accent. What will I learn? In this course, we’ll take you through the process of creating technical documentation. You’ll learn and practise: The purpose and value of technical documentation (aka having an answer if people ask why you should be doing this work). The entire documentation process. We’ll explain what you need to do, from beginning to end. We cover planning, writing, editing, indexing, and production. The skills you need as a technical communicator. How to work more efficiently. This framework will help you avoid wasting time. How to work more effectively. We’ll show you how to write and design your information in a structured, useful, usable and informed way. We don’t like to overhype our courses, so here are some reasons why not to get our technical writing training course. Those are: If you have requirements for your documents to meet specific regulatory documentation standards in these industry sectors: aerospace, military, railway, or automotive. Where documentation must be written to a specific XML standard. (You’ll need to take our DITA module in our advanced course as well). If you need to write technical API documentation for developers. (You’ll need to take our API module in our advanced course as well). Apart from that, this course will help you create the user assistance for your application or product. Duration and delivery format The course comprises 15 modules in total, which you can complete at your own pace. The course modules are delivered over the Web in small, manageable video presentations. You can download the course handouts as Word or PDF files. With the time needed to complete the exercises, you will need to allocate around two days in order to complete the course. You can pause the videos at any time and return to the course at times that suit you. Your Instructor Cherryleaf Cherryleaf is a technical writing services company formed in 2002 by people with a passion for technical communication and learning development. Cherryleaf is recognised as a leader within the technical communication profession. Our staff have written articles for the Society for Technical Communication's (STC) Intercom magazine, the Institute of Scientific and Technical Communicator's Communicator journal and tekom's TCWorld magazine. They've also written books on technical communication. We've presented webinars for Adobe, Madcap Software or the STC, and we've spoken at various conferences around the world. Today, organisations throughout Europe use Cherryleaf’s services so they can provide clear information that enables users and staff to complete tasks productively. Course Curriculum First Section The purpose of technical documentation (7:17) The different models for technical documentation (9:52) What is a technical author? (21:24) Adopting a user-centred design approach (10:38) Overview of the writing process (10:40) Planning your content (10:24) Researching the product and audience (13:20) Software tools (10:40) Writing the topics – Overview (30:31) Writing the topics – How to write and present different types of information (13:33) Writing the topics – Using images and videos (11:43) Writing the topics – Index, Search and Metadata (16:57) Hyperlinking (5:20) Reviewing and editing (9:42) End of course (7:21) Bonus content Frequently Asked Questions When does the course start and finish? It is a completely self-paced online course - you decide when you start and when you finish.How long do I have access to the course?You have access for 12 months.What if I am unhappy with the course?We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.