• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1632 Architecture courses in Cowdenbeath delivered Online

VMware Aria Operations for Logs: Install, Configure, Manage [V8.12]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators System engineers Consultants Overview By the end of the course, you should be able to meet the following objectives: Identify the features and benefits of VMware Aria Operations for Logs Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements Describe the VMware Aria Operations for Logs architecture and use cases Deploy and configure a VMware Aria Operations for Logs cluster Use the Explore Logs page to get a deep understanding of log data Create and manage queries Manage VMware Aria Operations for Logs agents and agent Groups Create custom dashboards Explain how to use the VMware Aria Operations for Logs widgets Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions Discuss VMware Aria Operations for Logs (SaaS) This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations? for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Logs Describe the VMware Aria cloud management platform Describe the VMware Aria? use cases Describe the key capabilities of VMware Aria Operations for Logs Describe the requirements for a log analytics solution Explain the importance of efficient log management Navigate the VMware Aria Operations for Logs UI Describe the various stages of log processing VMware Aria Operations for Logs Architecture and Deployment Identify the minimum requirements for deploying VMware Aria Operations for Logs Explain how to use the VMware Aria Operations for Logs sizing calculator Describe VMware Aria Operations for Logs compatibility with other VMware products Describe the VMware Aria Operations for Logs architecture Explain how to install the VMware Aria Operations for Logs virtual appliance Analyzing Logs Describe the primary functions of the VMware Aria Operations for Logs UI Describe log events Use Explore Logs for understanding and analyzing the log data VMware Using Dashboards Alerts and Reports Create VMware Aria Operations for Logs custom dashboards Describe how to use the VMware Aria Operations for Logs widgets Configure alerts Explain how to view and manage reports Administering VMware Aria Operations for Logs Describe user access control in VMware Aria Operations for Logs Describe user management Configure VMware Aria Operations for Logs settings Managing Data Sources and Content packs Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Install and manage content packs Manage certificates Install and manage agents for VMware Aria Operations for Logs Describe the VMware Aria Operations for Logs Importer VMware Aria Operations for Logs Integrations Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of integrating VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of using the vSAN content pack Explain how to configure the NSX content pack VMware Aria Operations for Logs (SaaS) Explain the VMware Aria Operations for Logs (SaaS) architecture Describe the ingestion options for Aria Operations for Logs (SaaS) Discuss integration with on-premises Aria Operations for Logs

VMware Aria Operations for Logs: Install, Configure, Manage [V8.12]
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Fast Track (v7)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN [v7] Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM Storage policy Discuss the impact of vSAN storage policy changes Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN file service architecture and configuration Explain the use cases of vSAN Direct Describe how to setup stretched and two-node vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager™ to automate driver and firmware installations Detail vSAN resilience and data availability Discuss the vSAN cluster backup methodology Describe the vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Apply a structured approach to troubleshoot vSAN cluster configuration and operational problems During this five-day, intensive course, you gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations.You also focus on learning the tools and skills necessary to troubleshoot vSAN 7 implementations and gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises.This course is a combination of the following courses: VMware vSAN: Plan and Deploy, VMware vSAN: Management and Operations, and VMware vSAN: Troubleshooting. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Life Cycle Manager to perform upgrades Deploy and configure a vSAN Cluster using Cluster Quickstart wizard Manually configure a vSAN Cluster using vSphere Client Explain and configure vSAN fault domains Using vSphere HA with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN Object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN Datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss Deduplication and Compression techniques Understand Deduplication and Compression overhead Discuss Compression only mode Configure Erasure Coding Configure swap object Thin Provisioning Discuss Reclaiming Storage Space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of Data-in Transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN Nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN Witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN Cluster Health Manage alerts, alarms, and notifications related to vSAN in vSphere Client Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use vSAN Proactive Test to detect and diagnose cluster issues vSAN Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency vSAN Troubleshooting Tools Use Skyline Health for vSAN to identify and correct issues in VMware vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere ESXi Shell Use commands to view, configure, and manage your VMware vSphere environment Discuss the esxcli vsan namespace commands Use log files to help vSAN troubleshooting Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Fast Track (v7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Fast Track (v7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Fast Track (v7)
Delivered OnlineFlexible Dates
Price on Enquiry

ITIL© 4 High Velocity IT (HVIT)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD Overview of the key ITIL 4 high-velocity terminology Understand when the transformation to high velocity IT is desirable and feasible Understand the five objectives associated with digital products ? to achieve: Valuable investments ? strategically innovative and effective application of IT Fast development - quick realization and delivery of IT services and IT-related products Resilient operations - highly resilient IT services and IT-related products Co-created value - effective interaction between service provider and consumer Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE Understand how high velocity IT relates to: The four dimensions of service management The ITIL service value system The service value chain The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT Understand the following concepts: Ethics Safety culture Toyota Kata Lean / Agile / Resilient / Continuous Service-dominant logic Design thinking Complexity thinking Use the principles, models and concepts to contribute to: Help get customers? jobs done Trust and be trusted Commit to performance Deal with uncertainty Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS Know how the service provider ensures valuable investments are achieved. Know how to use the following practices to contribute to achieving valuable investments: Portfolio management Relationship management Know how the service provider ensures fast deployment is achieved Know how to use the following practices to contribute to achieving fast deployment: Architecture management Business analysis Deployment management Service validation and testing Software development and management Know how the service provider ensures resilient operations are achieved Know how to use the following practices to contribute to achieving resilient operations: Availability management Capacity and performance management Monitoring and event management Problem management Service continuity management Infrastructure and platform management Know how the service provider ensures co-created value is achieved Know how to use the following practices to contribute to achieving co-created value with the service consumer: Relationship management Service design Service desk Know how the service provider ensures assured conformance is achieved Know how to use the following practices to contribute to achieving assured conformance: Information security management Risk management

ITIL© 4 High Velocity IT (HVIT)
Delivered OnlineFlexible Dates
£2,385

Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Identify the role and value of Cisco Silicon One in a campus environment. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches. Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches. Describe the maintenance features on Cisco Catalyst 9000 Series switches. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP. Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center. Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Positioning Cisco Catalyst 9000 Series Switches Cisco Catalyst Silicon One Architecture Exploring Cisco Catalyst 9000 Series Switches Management Capabilities Scale and Performance Features on Cisco Catalyst 9000 Series Switches Security Features on Cisco Catalyst 9000 Series Switches Automation Features on Cisco Catalyst 9000 Series Switches QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches Maintenance Features on Cisco Catalyst 9000 Series Switches Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches Application Hosting on Cisco Catalyst 9000 Series Switches Cloud Management for Catalyst 9000 Series Using Meraki Dashboard Automating Network Changes with Cisco DNA Center Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Developing on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced software developers who are already familiar with AWS services Overview In this course, you will learn how to: Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture Recommend the appropriate AWS services to develop a microservices based cloud-native application Use the AWS API, CLI, and SDKs to monitor and manage AWS services Migrate a monolithic application to a microservices application using the 6 Rs of migration Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture. This three-day advanced course covers advanced development topics such as architecting for a cloud-native environment; deconstructing on-premises, legacy applications and repackaging them into cloud-based, cloud-native architectures; and applying the tenets of the Twelve-Factor Application methodology. Module 1: The cloud journey Common off-cloud architecture Introduction to Cloud Air Monolithic architecture Migration to the cloud Guardrails The six R?s of migration The Twelve-Factor Application Methodology Architectural styles and patterns Overview of AWS Services Interfacing with AWS Services Authentication Infrastructure as code and Elastic Beanstalk Demonstration: Walk through creating base infrastructure with AWS CloudFormation in the AWS console Hands-on lab 1: Deploy your monolith application using AWS Elastic Beanstalk Module 2: Gaining Agility DevOps CI/CD Application configuration Secrets management CI/CD Services in AWS Demonstration: Demo AWS Secrets Manager Module 3: Monolith to MicroServices Microservices Serverless A look at Cloud Air Microservices using Lambda and API Gateway SAM Strangling the Monolith Hands-on lab: Using AWS Lambda to develop microservices Module 4: Polyglot Persistence & Distributed Complexity Polyglot persistence DynamoDB best practices Distributed complexity Steps functions Module 5: Resilience and Scale Decentralized data stores Amazon SQS Amazon SNS Amazon Kinesis Streams AWS IoT Message Broker Serverless event bus Event sourcing and CQRS Designing for resilience in the cloud Hands-on lab: Exploring the AWS messaging options Module 6: Security and Observability Serverless Compute with AWS Lambda Authentication with Amazon Cognito Debugging and traceability Hands-on lab: Developing microservices on AWS Additional course details: Nexus Humans Advanced Developing on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Developing on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced Developing on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered OnlineFlexible Dates
£2,975

Einführung in die Verschlüsselung: Terminologie & Technik (German)

By Course Cloud

Course Overview Data security is one of the most promising and booming sectors for tech enthusiasts. If you want to pursue a career as a data security officer or software engineer, Java Cryptography can help you in many ways. learn Java Cryptography Architecture from this Einführung in die Verschlüsselung: Terminologie & Technik (German) course and take your skill to another level. This Einführung in die Verschlüsselung: Terminologie & Technik (German) course will teach you how you can use cryptography for securing your device and applications. You will learn hashing examples, efficient stream-based hashing, message authentication code, security password hashing and how you can use these techniques for your program.  You will learn Java Cryptography Architecture from scratch in this course. This course will be beneficial for software engineers, data security officers, web designers, app testers or anyone who wants to build his career in the IT sector. This best selling Einführung in die Verschlüsselung: Terminologie & Technik (German) has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Einführung in die Verschlüsselung: Terminologie & Technik (German) is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Einführung in die Verschlüsselung: Terminologie & Technik (German) is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Einführung in die Verschlüsselung: Terminologie & Technik (German) is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Einführung in die Verschlüsselung: Terminologie & Technik (German), you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Einführung in die Verschlüsselung: Terminologie & Technik (German) will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Einführung in die Verschlüsselung: Terminologie & Technik (German) to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Einführung in die Verschlüsselung: Terminologie & Technik (German)
Delivered Online On Demand
£25

GW100 SAP Gateway - Building OData Services

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for DevelopersConsultants Overview Explore SAP Gateway architecture and deployment optionsPerform OData queries and operations with SAP GatewayDefine data model and implement CRUD operationsExtend SAP Gateway services and build new ones with CDS ViewsConfigure routing, multiple origin, and SAP Workflow supportImplement advanced OData operations and introduce OData V4Handle security and consume OData services using SAP Web IDE Students will explore SAP Gateway architecture and deployment options. SAP Gateway Overview SAP Gateway Architecture SAP Gateway Deployment Options OData Overview OData and REST OData Operations OData Queries Consuming OData using SAP Web IDE SAP Gateway Service Implementation Defining a Data Model Implementing Read Operations Implementing Navigation Implementing Query Options Implementing Change Operations SAP Gateway Service Generation RFC/BOR Generator Search Help Generator SAP Gateway Service Redefinition Redefining a Data Service Redefining a Gateway Service SAP Gateway and CDS Views SAP Fiori Programming Model CDS/SADL Generator Data Source Reference CDS View Annotations SAP Gateway Hub Functionalities Multiple Back-End Systems Support Configuring Routing Capabilities Multiple Origin Composition SAP Workflow Support Advanced OData Options Implementing Function Imports Implementing Expand Operations Implementing Deep Insert Operations Handling ETags Batch Requests Media Links Offline Support Server Side Caching SAP Gateway Security Authentication Data Security SAP Gateway OData V4 Support OData V4 Implementation OData V4 Publishing

GW100 SAP Gateway - Building OData Services
Delivered OnlineFlexible Dates
Price on Enquiry

Sketchup Artificial Intelligence Training Course

By ATL Autocad Training London

Who is this course for? Sketchup Artificial Intelligence Training Course. Mastering SketchUp Artificial Intelligence (AI) is essential for designers, offering automation, efficiency, and innovative solutions. It saves time, enhances visualizations, fosters collaboration, and future-proofs skills, ensuring a competitive edge in the design industry. Click here for more info: Website How to Book? 1-on-1 training. Customize your schedule from Mon to Sat from 9 am to 7 pm Call to book  Duration: 16 hours. Method: In-person or Live Online Sketchup and (Artificial Intelligence) Stable Diffusion Rendering Course (16 hours) Module 1: Sketchup Fundamentals (2 hours) Sketchup software overview and interface navigation Introduction to basic drawing tools and fundamental geometry creation techniques Module 2: Texturing and Material Mastery (2 hours) Application of textures and customization of materials Exploration of texture mapping and comprehensive material libraries Module 3: Illumination and Shadows (2 hours) Comprehending lighting principles and strategic light placement Crafting realistic shadows and reflections Module 4: Advanced Modeling Techniques (3 hours) Creating intricate shapes and harnessing advanced modeling tools Efficiently managing groups, components, and modifiers Module 5: Stable Diffusion Rendering (2 hours) Initiating stable diffusion rendering Optimizing rendering settings for superior outcomes Module 6: Scene Composition and Camera Configuration (2 hours) Exploring composition principles and camera perspectives Scene management and creation of captivating walkthrough animations Module 7: Rendering Optimization Strategies (2 hours) Techniques for optimizing models to expedite rendering Application of render passes and post-processing methods Module 8: Real-World Projects and Portfolio Building (1 hour) Application of acquired skills in completing authentic projects Professional portfolio presentation techniques Optional: Stable Diffusion and Python Installation (Additional 10 hours) Module 1: Introduction to Stable Diffusion and Python Comprehensive understanding of Stable Diffusion and Python's significance Module 2: System Prerequisites Hardware and software requirements for successful installation Module 3: Python Installation Guide Step-by-step installation process for various operating systems Module 4: Configuring Python Environment Configuration of environment variables and package managers Module 5: Stable Diffusion Installation Downloading and installing the Stable Diffusion package Module 6: Setting Up the Development Environment Configuration of integrated development environments (IDEs) for Python and Stable Diffusion Module 7: Troubleshooting and Common Issues Identification and resolution of common installation errors Module 8: Best Practices and Recommendations Effective management of Python and Stable Diffusion installations Module 9: Practical Applications and Projects Hands-on exercises exemplifying the practical usage of Stable Diffusion and Python Module 10: Advanced Topics (Optional) Exploration of advanced features and techniques Stable Diffusion https://stablediffusionweb.com https://stable-diffusion-ui.github.io https://stability.ai/stable-diffusion Upon successful completion of the Sketchup and Stable Diffusion Rendering Course with a focus on AI image rendering, participants will achieve the following: 1. Mastery of AI Image Rendering: Attain expertise in employing AI-powered rendering techniques to produce realistic and top-quality visualizations. 2. Proficiency in Sketchup for 3D Modeling: Navigate the software adeptly, utilize drawing tools with proficiency, and craft intricate 3D models. 3. Enhanced Rendering Optimization: Implement AI-based rendering to enhance model visuals, resulting in faster rendering times and superior image quality. 4. Application of AI-driven Lighting and Shadows: Employ AI algorithms for precise lighting placement, shadows, and reflections, elevating the realism of renderings. 5. Development of a Professional Portfolio: Present AI-rendered projects within a polished professional portfolio, highlighting advanced image rendering capabilities. 1. Mastering Sketchup: Attain proficiency in Sketchup, a renowned and user-friendly 3D modeling software, equipping you with the skills needed to adeptly create and manipulate 3D models. 2. Advanced Rendering Expertise: Explore stable diffusion rendering, an avant-garde technique that simplifies the creation of realistic and high-quality renderings. Broaden your rendering capabilities, producing visually stunning representations of your designs. 3. Practical Industry Applications: Cultivate practical skills relevant to diverse industries, encompassing architecture, interior design, product development, and visualization. Elevate your professional portfolio with captivating renderings that showcase your design prowess. 4. Interactive Learning: Participate in hands-on exercises and projects that promote active learning and the practical application of concepts. Benefit from personalized feedback and expert guidance, ensuring your continuous progress throughout the course. 5. Career Advancement: Elevate your career prospects by adding valuable skills to your toolkit. Proficiency in crafting detailed 3D models and impressive renderings through stable diffusion techniques opens doors to diverse job opportunities within the design and visualization sector. 6. Flexibility and Convenience: Access course materials online and learn at your own pace. Enjoy the flexibility of tailoring the coursework to your schedule, allowing you to harmonize your learning journey with other commitments. Course Advantages: Tailored Learning: Enjoy personalized 1-on-1 sessions, accommodating your schedule from Monday to Saturday, 9 am to 7 pm. Mastery of Sketchup: Develop proficiency in the widely-used and user-friendly 3D modeling software, enabling efficient creation and manipulation of 3D models. Advanced Rendering Proficiency: Acquire expertise in stable diffusion rendering for producing realistic, high-quality renderings that enhance the visual appeal of your designs. Practical Applicability: Develop practical skills applicable across diverse domains, including architecture, interior design, product development, and visualization, enriching your professional portfolio. Interactive Practical Experience: Engage in hands-on exercises with personalized guidance from seasoned instructors, ensuring consistent progress in your skillset. Career Progression: Boost your career opportunities by gaining valuable skills in 3D modeling and generating impressive renderings through stable diffusion techniques. Comprehensive Support: Benefit from free portfolio reviews, mock interviews, and career advice, providing additional resources to enhance your professional journey.

Sketchup Artificial Intelligence Training Course
Delivered in London or OnlineFlexible Dates
£780